Britons should not face extradition to the US for alleged crimes on UK soil – The Guardian

A decade ago I wrote an article for the Guardian about the fundamental unfairness of the US extradition treaty. Back then, British citizens risked being hauled before American courts over allegations of criminality in the UK. Politicians on the left and right issued condemnations. The US pressed on regardless.

Today, there are different cases, but substantially the same system with the same unaddressed problems.

In 2011 the computer hacker Gary McKinnon was the target. He had broken into US computer systems in search of classified documents about unidentified flying objects. American authorities, unconcerned about his diagnosis with Aspergers syndrome, accused the would-be UFO hunter of intimidation and coercion.

Eventually, the then home secretary Theresa May blocked the extradition. But the government of the day, with its characteristically la carte attitude towards human rights, did not address the fundamental issue: the extradition treaty itself. It remains, and so does the risk to any of us of being plucked from our homes on behalf of the US authorities.

This week it is the turn of the businessman Mike Lynch to try to fend off an extradition attempt. He sold a British company he had founded to the US firm Hewlett-Packard, and the two parties subsequently fell out. A British civil court is already considering the dispute, but the US insists on a criminal case on its soil. Lynch must appear before a judge to argue for permission to remain in his own country.

It would be wrong to say that nothing has changed since 2011. A measure known as the forum bar now exists. This enables courts to stop some extraditions if they decide that a substantial measure of alleged criminal activity took place in the UK, and that it would be in the interests of justice for the extradition to be refused.

However it is no guarantee of success. Yes, the extradition of Julian Assange was recently refused, but on grounds that, were he exposed to what Americans euphemistically call special administrative measures in US prisons, his mental health would deteriorate to the point where he would take his own life.

What are those measures? The court was told about a prisoner barred from associating with other prisoners even outside his cell and from communicating with his lawyer via email. Long periods in solitary confinement are common. Little wonder a British court found that, given Assanges mental health, extradition would be oppressive.

But the forum bar has not dissuaded the US. Its attempts to claim Britons for its justice system are as audacious as ever. We remain unprotected by our own government.

Despite all this, last month a Conservative minister, Chris Philp, rejected the case for making any change at all. Where a grave injustice was threatened, he said, then UK courts could act. With that, the House of Commons shut up shop for the day and MPs went home.

Perhaps the oddest aspect of this debate is its Groundhog Day character. Time after time the British public is shocked by the extradition system, politicians normally implacably opposed to one another agree something must be done, and the treaty endures. Why is that? Assiduous lobbying by the US perhaps, or just timidity?

The lack of reform makes looking back at my decade-old article on this subject rather wearying. Back then I asked why, if a case concerned allegations of criminality in Britain, the US should object to its being tried in the UK. The question remains unanswered.

For now, the best hope is simply that our courts can repulse repeated extraterritorial attempts by the US to forcibly remove British citizens. We should not have to live with the risk of undergoing that ordeal on the say-so of US prosecutors. Ministers must act. It would reflect a sorry political failure if I had to write another piece about an unjust extradition system in 2031.

Read this article:
Britons should not face extradition to the US for alleged crimes on UK soil - The Guardian

What Mexico’s AMLO Really Thinks About Biden – Foreign Policy

In the weeks between the U.S. election and the inaugural, Mexicos president took several actions that seemed surprisingly hostile to the United States. Andrs Manuel Lpez Obrador (widely known as AMLO) was one of only three world leaders who did not recognize President Joe Bidens election victory until after the formal Electoral College vote. In December, AMLO oversaw the approval of a new security law that will greatly constrain U.S. anti-drug operations in Mexico. In early January, he offered political asylum to Julian Assange, the WikiLeaks founder who faces felony charges in the United States for publishing classified documents.

Then, in mid-January, his government exonerated a Mexican general and former defense minister, Salvador Cienfuegos, arrested in the United States for collaborating with a drug cartel. (This came after the United States agreed to extradite Gen. Cienfuegos in response to a Mexican demand to preserve effective security cooperation. The Mexican government then publicly released the Drug Enforcement Administration evidence against the general, information provided to Mexico in confidence and protected under the bilateral treaty on mutual legal assistance.)

This litany of friction upset cross-border security cooperation and threatens to generate a broader crisis in the relationship. Thats why AMLOs actions set off speculation among Mexico watchers over his motivation. Some argued he was indulging in yanqui-bashing for the sake of domestic politics. Others believed he was signaling his strong preference for the previous U.S. president, Donald Trump, with whom AMLO was notably friendly.

Both explanations are flawed. AMLO has never been reflexively anti-American nor interested in an antagonistic relationship with his northern neighbor. And just because he worked with Trump does not mean he will be opposed to Biden. More likely, AMLO is trying to preemptively set his preferred terms of cooperation with the new U.S. administration.

Understanding Lpez Obradors actions requires first understanding that he is a man on a mission. He has dedicated his career to building a more egalitarian and more prosperous Mexico, under the guidance of a benevolent yet powerful state that pilots the economy and society. Now that he is president, but limited to a single six-year term, he is also in a hurry. He has instituted and enshrined in the constitution a series of social-welfare programs directed at long-neglected sectors of society, and initiated infrastructure projects designed to benefit poorer regions of the country. He has increased regulation on firms while trying to rebuild the dominant position of the state oil company (Pemex) and electricity firm (CFE) to reestablish Mexican energy independence. And he is actively limiting checks and balances on presidential power to ensure the long-term survival of this project. He will not stand for anything that could delay or derail his plans. Since coming to office in 2018, he has pressed forward in the face of a vocal opposition, a global pandemic, and mounting evidence that his plans will fail in the long term.

AMLO is now approaching the Biden administrationwhich has signaled a desire to establish a good working relationship with Mexico even as it promotes clean energy, democracy, and human rights as the pillars of its Latin American policyas another potential domestic impediment. He doesnt want to be disruptive or antagonistic toward Biden on the world stage, but he does want to preemptively push back against resistance the new U.S. president might display to AMLOs domestic policies. Its a signal that, while AMLO desires a constructive relationship with the United States, he will strongly oppose anything emanating from Washington that questions, let alone counters, his domestic agenda.

AMLOs brushbacks certainly dont bode well for U.S.-Mexico relations at the start of the Biden administration. Cooperation on security affairs had already declined under AMLO, with suspicions stoked on both sides. Mexico accused the U.S. DEA of fabricating evidence against Cienfuegos, the Mexican general and former defense secretary, and the U.S. Justice Department accused Mexico of bad faith and threatened to stop sharing information that is crucial to effective operations against organized crime. Collaboration in the fight against crime and violence in Mexico will inevitably suffer in the near term, including efforts to combat a burgeoning traffic in fentanyl which is contributing to a serious public health challenge in the United States.

Yet AMLO has already walked back some of the provocations, signaling that he ultimately would prefer a constructive relationship with the United States. The restrictions on U.S. law enforcement operations in Mexico have been loosened, for example. AMLO has also suggested that U.S. authorities arrested the general on the eve of the election for political reasons, implying that it was an aberration, not representative of U.S. behavior toward Mexico. And AMLO argued that his release of confidential information from a Trump administration investigation should not get in the way of good relations with Biden.

AMLOs objective is to prevent his powerful neighbor from exploiting its advantage to pressure Mexico to alter its domestic policies. For two years now, Mexican relations with the United States have reflected a desire to deny Trump a reason to translate his anti-Mexico rhetoric into anti-Mexico policy. Aware of its great importance to Trump, Mexico willingly modified its migration policies. AMLO deployed the National Guard to prevent Central American migrants from crossing Mexico to get to the United States. He also allowed the United States to force asylum seekers to wait in Mexican border towns for their day in U.S. court. And in exchange, the Trump administration kept quiet as AMLO pursued what he calls Mexicos Fourth Transformationa domestic policy program that has involved the Mexican president weakening democratic institutions, effectively eliminating private investment in the energy sector, contravening Mexican commitments on climate change, and most recently threatening to eliminate institutions dedicated to enforcing freedom of information and anti-trust efforts (which would directly contravene provisions in the United StatesMexicoCanada Agreement trade agreement, or USMCA, the revision of the NAFTA that Mexico signed in 2019).

Given the Biden teams emphasis on democracy, human rights, and climate change, and its stated concern about the treatment of U.S. investors in Mexico, AMLO is expecting greater U.S. pressure to modify elements of AMLOs beloved domestic-policy project. To prevent this, he is returning to his roots as a Mexican nationalist, protecting Mexican sovereignty in a tactical shift to limit U.S. meddling in Mexican affairs.

At the same time, AMLO is fully aware that the deep integration between the two countries economies means that a good working relationship with the United States is also essential to his domestic-policy success. He understands that cross-border integration of supply chains means that the most sophisticated sectors of the Mexican economy cannot operate without a seamless trading relationship. And he knows that this export sector is the engine that will pull Mexico out of its current depression and provide significant tax revenues on which his expansion of the state depends.

In dealing with AMLO, the United States must adhere to an adage about Mexico that is true once again: Mexico is more prone to cooperate when policy differences are expressed quietly, behind closed doors, than when they are aired in public. The Biden administration will need to take AMLOs sensibilities into account as it selects where, when, and how to challenge him. It should also rely heavily on the USMCA. AMLO has proven to be hesitant to take actions that run contrary to the terms of this treaty.

AMLOs dual objectivesthe need for good relations with the United States, but also to constrain the likelihood of U.S. efforts to press Mexico for policy changepoints to a Mexico that will be a prickly partner for the new Biden administration, but not an anti-American antagonist. Dealing with Mexico will be more challenging than it was four years ago, but with deft diplomacy the relationship can be productive.

Read the original:
What Mexico's AMLO Really Thinks About Biden - Foreign Policy

Ivanka’s sneaky role in Trump’s pardons – Morning Bulletin

Ivanka Trump intensively lobbied the former President over his list of pardons and commutations as part of a plan to run for office in the future, a bombshell report reveals.

The report claims Ivanka lobbied her father Donald Trump over some 140 commutations and pardons, and worked closely with a criminal justice reform organisation beloved by Kim Kardashian.

Ivanka plans to use the platform of criminal justice reform, popular in the US, to build herself a political future, the report from Axios claims, citing multiple sources.

"It would not be surprising if it's among the causes she champions in her next chapter," the source said.

Mr Trump's last-minute list of pardons and commutations made headlines, as it was released just 12 hours before the former President left office. He pardoned 73 individuals and commuted the sentences of 70 others.

The list angered some supporters of Mr Trump who'd long campaigned for the pardoning of Julian Assange and Edward Snowden. The pair were notably absent from the Presidential pardons.

Among those included were a mix of rappers, white collar criminals, as well as the President's former campaign adviser Steve Bannon. Mr Trump also pardoned Elliott Broidy, a former fundraiser for the Republican party, who pleaded guilty to conspiring to violate foreign lobbying laws in 2020.

Ivanka and husband Jared Kushner "intensively lobbied" Mr Trump in the days leading up to the announcement, multiple sources claimed.

The former senior White House adviser attended numerous meetings at the White House during the process and took calls from empty offices.

Ivanka was working with non-government organisations including #Cut50 - an advocacy group working to cut incarceration in the US. The organisation is also known because its founder, Jessica Jackson, is mentoring Kim Kardashian in her quest to become a lawyer.

Ms Jackson said she's worked with Ivanka on numerous commutations and non-political pardons.

She said she became the White House's go-to person on the issue.

The people Ivanka is said to have personally lobbied for include:

It follows reports Ivanka is considering a run for Florida governor against Republican senator Marco Rubio. Other reports claim Ivanka could run for Congress in New Jersey - the Trump family also own property in the state.

The senior aide to the former President was often considered a moderating influence on her father - but following the election the President's daughter took on a more aggressive tone, and sparred with her critics online.

In November, the 39-year-old clashed with CNN anchor Jake Tapper after she claimed the US had experienced a fall in emissions.

She hit out at a state investigation into 2017 inauguration funds, calling her own deposition a "politically motivated demonstration of vindictiveness and waste of taxpayer dollars".

She also referred to New York authorities' investigation into Mr Trump's taxes a "fishing expedition" and claimed Mr Trump is being pursued as part of a "vendetta".

Originally published as Ivanka's sneaky role in Trump's pardons

See original here:
Ivanka's sneaky role in Trump's pardons - Morning Bulletin

What Is End-to-End Encryption, and Why Does It Matter? – How-To Geek

Titima Ongkantong/Shutterstock.com

End-to-end encryption (E2EE) ensures that your data is encrypted (kept secret) until it reaches an intended recipient. Whether youre talking about end-to-end encrypted messaging, email, file storage, or anything else, this ensures that no one in the middle can see your private data.

In other words: If a chat app offers end-to-end encryption, for example, only you and the person youre chatting with will be able to read the contents of your messages. In this scenario, not even the company operating the chat app can see what youre saying.

First, lets start with the basics of encryption. Encryption is a way of scrambling (encrypting) data so that it cant be read by everyone. Only the people who can unscramble (decrypt) the information can see its contents. If someone doesnt have the decryption key, they wont be able to unscramble the data and view the information.

(This is how its supposed to work, of course. Some encryption systems have security flaws and other weaknesses.)

Your devices are using various forms of encryption all the time. For example, when you access your online banking websiteor any website using HTTPS, which is most websites these daysthe communications between you and that website are encrypted so that your network operator, internet service provider, and anyone else snooping on your traffic cant see your banking password and financial details.

Wi-Fi uses encryption, too. Thats why your neighbors cant see everything youre doing on your Wi-Fi networkassuming that you use a modern Wi-Fi security standard that hasnt been cracked, anyway.

Encryption is also used to secure your data. Modern devices like iPhones, Android phones, iPads, Macs, Chromebooks, and Linux systems (but not all Windows PCs) store their data on your local devices in encrypted form. Its decrypted after you sign in with your PIN or password.

RELATED: Why Does Microsoft Charge $100 for Encryption When Everyone Else Gives It Away?

So encryption is everywhere, and thats great. But when youre talking about communicating privately or storing data securely, the question is: Who holds the keys?

For example, lets think about your Google account. Is your Google datayour Gmail emails, Google Calendar events, Google Drive files, search history, and other datasecured with encryption?

Well, yes. In some ways.

Google uses encryption to secure data in transit. When you access your Gmail account, for example, Google connects via secure HTTPS. This ensures that no one else can snoop on the communication going on between your device and Googles servers. Your internet service provider, network operator, people within range of your Wi-Fi network, and any other devices between you and Googles servers cant see the contents of your emails or intercept your Google account password.

Google also uses encryption to secure data at rest. Before the data is saved to disk on Googles servers, it is encrypted. Even if someone pulls off a heist, sneaking into Googles data center and stealing some hard drives, they wouldnt be able to read the data on those drives.

Both encryption in transit and at rest are important, of course. Theyre good for security and privacy. Its much better than sending and storing the data unencrypted!

But heres the question: Who holds the key that can decrypt this data? The answer is Google. Google holds the keys.

Since Google holds the keys, thismeans that Google is capable of seeing your dataemails, documents, files, calendar events, and everything else.

If a rogue Google employee wanted to snoop on your dataand yes, its happenedencryption wouldnt stop them.

If a hacker somehow compromised Googles systems and private keys (admittedly a tall order), they would be able to read everyones data.

If Google was required to turn over data to a government, Google would be able to access your data and hand it over.

Other systems may protect your data, of course. Google says that it has implemented better protections against rogue engineers accessing data. Google is clearly very serious about keeping its systems secure from hackers. Google has even been pushing back on data requests in Hong Kong, for example.

So yes, those systems may protect your data. But thats notencryption protecting your data from Google. Its just Googles policies protecting your data.

Dont get the impression that this is all about Google. Its notnot at all. Even Apple, so beloved for its privacy stances, does not end-to-end encrypt iCloud backups. In other words: Apple keeps keys that it can use to decrypt everything you upload in an iCloud backup.

Now, lets talk chat apps. For example: Facebook Messenger. When you contact someone on Facebook Messenger, the messages are encrypted in transit between you and Facebook, and between Facebook and the other person. The stored message log is encrypted at rest by Facebook before its stored on Facebooks servers.

But Facebook has a key. Facebook itself can see the contents of your messages.

The solution is end-to-end encryption. With end-to-end encryption, the provider in the middlewhoever you replace Google or Facebook with, in these exampleswill not be able to see the contents of your messages. They do not hold a key that unlocks your private data. Only you and the person youre communicating with hold the key to access that data.

Your messages are truly private, and only you and the people youre talking to can see themnot the company in the middle.

End-to-end encryption offers much more privacy. For example, when you have a conversation over an end-to-end encrypted chat service like Signal, you know that only you and the person youre talking to can view the contents of your communications.

However, when you have a conversation over a messaging app that isnt end-to-end encryptedlike Facebook Messengeryou know that the company sitting in the middle of the conversation can see the contents of your communications.

Its not just about chat apps. For example, email can be end-to-end encrypted, but it requires configuring PGP encryption or using a service with that built in, like ProtonMail. Very few people use end-to-end encrypted email.

End-to-end encryption gives you confidence when communicating about and storing sensitive information, whether its financial details, medical conditions, business documents, legal proceedings, or just intimate personal conversations you dont want anyone else having access to.

End-to-end encryption was traditionally a term used to describe secure communications between different people. However, the term is also commonly applied to other services where only you hold the key that can decrypt your data.

For example, password managers like 1Password, BitWarden, LastPass, and Dashlane are end-to-end encrypted. The company cant rummage through your password vaultyour passwords are secured with a secret only you know.

In a sense, this is arguably end-to-end encryptionexcept that youre on both ends. No one elsenot even the company that makes the password managerholds a key that lets them decrypt your private data. You can use the password manager without giving the password manager companys employees access to all your online banking passwords.

Another good example: If a file storage service is end-to-end encrypted, that means that the file storage provider cant see the contents of your files. If you want to store or sync sensitive files with a cloud servicefor example, tax returns that have your social security number and other sensitive detailsencrypted file storage services are a more secure way to do that than just dumping them in a traditional cloud storage service like Dropbox, Google Drive, or Microsoft OneDrive.

Theres one big downside with end-to-end encryption for the average person: If you lose your decryption key, you lose access to your data. Some services may offer recovery keys that you can store, but if you forget your password and lose those recovery keys, you can no longer decrypt your data.

Thats one big reason that companies like Apple, for example, might not want to end-to-end encrypt iCloud backups. Since Apple holds the encryption key, it can let you reset your password and give you access to your data again. This is a consequence of the fact that Apple holds the encryption key and can, from a technical perspective, do whatever it likes with your data. If Apple didnt hold the encryption key for you, you wouldnt be able to recover your data.

Imagine if, every time someone forgets a password to one of their accounts, their data in that account would be wiped out and become inaccessible. Forget your Gmail password? Google would have to erase all your Gmails to give you your account back. Thats what would happen if end-to-end encryption was used everywhere.

Here are some basic communication services that offer end-to-end encryption. This isnt an exhaustive listits just a short introduction.

For chat apps, Signal offers end-to-end encryption for everyone by default. Apple iMessage offers end-to-end encryption, but Apple gets a copy of your messages with the default iCloud backup settings. WhatsApp says that every conversation is end-to-end encrypted, but it does share a lot of data with Facebook. Some other apps offer end-to-end encryption as an optional feature that you have to enable manually, including Telegram and Facebook Messenger.

For end-to-end encrypted email, you can use PGPhowever, its complicated to set up. Thunderbird now has integrated PGP support. There are encrypted email services like ProtonMail and Tutanota that store your emails on their servers with encryption and make it possible to more easily send encrypted emails. For example, if one ProtonMail user emails another ProtonMail user, the message is automatically sent encrypted so that no one else can see its contents. However, if a ProtonMail user emails someone using a different service, theyll need to set up PGP to use encryption. (Note that encrypted email doesnt encrypt everything: While the message body is encrypted, for example, subject lines arent.)

RELATED: What Is Signal, and Why Is Everyone Using It?

End-to-end encryption is important. If youre going to have a private conversation or send sensitive information, dont you want to make sure that only you and the person youre talking to can see your messages?

Originally posted here:
What Is End-to-End Encryption, and Why Does It Matter? - How-To Geek

Amazon Ring’s End-to-End Encryption: What it Means – EFF

Almost one year after EFF called on Amazons surveillance doorbell company Ring to encrypt footage end-to-end, it appears they are starting to make this necessary change. This call was a response to a number of problematic and potentially harmful incidents, including larger concerns about Rings security and reports that employees were fired for watching customers videos. Now, Ring is finally taking a necessary stepmaking sure that the transmission of footage from your Ring camera to your phone cannot be viewed by others, including while that footage is stored on Amazons cloud.

Ring should take the step to make this feature the default, but for the time being, you will still have to turn encryption on.

You can read more about Rings implementation of end-to-end encryption in Rings whitepaper.

Amazon is currently rolling out the feature, so it may not be available to you yet . When it is available for your device, you can followRings instructions. Make sure to note down the passphrase in a secure location such as a password manager, because its necessary to authorize additional mobile devices to view the video. A password manager is software that encrypts a database of your passwords, security questions, and other sensitive information, and is protected by a master password. Some examples are LastPass and 1Password.

Videos taken by the Ring device for either streaming or later viewing are end-to-end encrypted such that only mobile devices you authorize can view them. As Amazon itself claims, [w]ith video E2EE, only your enrolled mobile device has the special key needed to unlock these videos, designed so no one else can view your videos -- not even Ring or Amazon.

The security whitepaper gives the details for how this is implemented. Your mobile device locally generates a passphrase and several keypairs, which are stored either locally or encrypted on the cloud in such a way that the passphrase is needed to decrypt it. This is helpful for enrolling additional mobile devices. The Ring device then sets up a local WiFi connection, which the mobile device connects to. The public key information for the enrolled mobile device is sent over that connection, and subsequently used to encrypt videos before sending them over the Internet.

To break the system, someone would have to gain access to the temporary local network you created while you were doing initial setup, or you would have to approve adding them as an authorized user by entering the passphrase while setting up an additional mobile device.

So long as the implementation in the software matches the whitepaper specification and footage is not escrowed in any other way, we have high hopes for the encryption scheme Ring has devised. It may be close to a best-practice implementation of this kind of technology.

Rings relationship to law enforcement has long been a concern for EFF. Ring now has over a thousand partnerships with police departments across the country that allow law enforcement to request, with a single click, footage from Ring users. When police are investigating a crime, they can click and drag on a map in the police portal and automatically generate a request email for footage from every Ring user within that designated area.

What happens when Ring users refuse to share that footage, without end-to-end encryption, has beena major concern. Even if a user refuses to share their footage, police can still bring a warrant to Amazon to obtain it. That means users video and audio could end up contributing to investigations they wish they had not facilitatedlike immigration cases or enabling police spying on protestseven without the users knowing this had happened.

This access is made possible because Ring footage is stored by Amazon on Amazon servers. The end-to-end encryption model described in Rings whitepaper should cut off this access. If your footage on Amazons servers is encrypted and only your phone has the keys, then police would have to bring a warrant directly to you for your footage, rather than going behind your back and having Amazon share the video. Contrary to what law enforcement officials may claim, therefore, end-to-end encryption will not put these videos completely off limits from their investigations.

One question that remains unanswered is whether Rings encryption will block the ability for other companies to transmit live-streamed footage from Ring cameras to police. In November 2020, local media reported that Jackson, Mississippi would start a pilot program with the help of a company called PILEUM/Fusus that would allow police to live stream footage from the security cameras of consenting participants. Although camera registries and shared access to security cameras is not novel, what was particularly troubling about this was the insistence that this program would allow people with networked home security devices, including Ring cameras, to also transmit their live footage straight to the local police surveillance centers.

Ring reached out to a number of organizations, including EFF, to reaffirm that they are in no way involved with this pilot program. Fusus technology reportedly works by installing a Fusus core on your local network, which can supposedly find and transmit any live footage on your network, including Ring cameras.

These changes to Ring raise the question of whether turning on Rings new end-to-end encryption feature will undermine Fususs ability to transmit footage. Its unclear why anyone would consent to participating in a similar pilot program and installing a Fusus core, and then undermine that decision by opting into Ring encryption.But this scenario still leaves us wondering what current and future schemes by law enforcement to get Ring footage will undermine the use of end-to-end encryption.

It may seem like EFF expends a lot of effort fighting against Ring and other Internet connected home security devicesbut we do it for good reason. Police departments that could not legally build and use a large-scale government surveillance network are using Ring cameras as a loophole to avoid public input and accountability. Consumers choice to buy a camera cannot and should not be a way to launder mass surveillance and streamline digital racial profiling.

In the wake of investigative reporting and public advocacy, Ring has made a number of concessions. Theyve beefed up security measures, jettisoned undisclosed third party trackers, and even allowed people to opt out of receiving police requests for footage. These were all good steps, but they all did nothing to prevent police from bringing a warrant to Amazon in order to use your footage as evidence without your permission or even direct knowledge. One of Rings security and privacy soft spots has always been that it stores your footage for you. With end-to-end encryption enabled, a safeguard against blanket requests for footage from the cloud is introduced. It means that users have the ability to decide when and if to share their footage, in a way Amazon or Ring can not easily circumvent. It also means that law enforcement requests for footage have to go directly to the camera owner, just as they did before the advent of cloud storage.

We hope Ringtakes the step to make this feature the default. With these safeguards in place, we can now move on to other concerns, like more federal regulation, ending consent searches so that police would be required to get a warrant any time they want your footage, preventing local police from sharing your footage with other agencies for unrelated reasons, and finding safeguards that prevent the technology from being used as a pipeline for sending racially biased suspicions straight to the police.

View original post here:
Amazon Ring's End-to-End Encryption: What it Means - EFF

The new avatar of the encryption wars – Hindustan Times

The government has proposed a new bill to regulate mathematics. The bill envisages that certain mathematical operations such as multiplication, division, LCM and GCD would be banned, if they are prime numbers and have more than 309 digits and a licensing regime, which would only allow licensed entities to perform these operations.

If the above reads like a parody, it may soon cease to be and become reality.

An Australian Prime Minister, Malcolm Turnbull declared in 2017 that, The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia.

In a joint communique issued on October 11, 2020, the Five Eye nations (United States, United Kingdom, Australia, New Zealand, Canada), along with Japan and India, stated, Particular implementations of encryption technology... pose significant challenges to public safety, including to highly vulnerable members of our societies like sexually exploited children and called upon technology companies to enable law enforcement access to content in a readable and usable format where an authorisation is lawfully issued, is necessary and proportionate, and is subject to strong safeguards and oversight.

The specific implementation of encryption technology that has worried governments the world over is the Signal protocol (E2EE), which guarantees that even intermediaries who provide these services will not be able to decrypt these messages in transit. It also guarantees plausible deniability, where if someone receives an encrypted message from you, they can be absolutely sure you sent it (rather than having been forged by some third party), but cant prove to anyone else that it was a message you wrote.

A variation of their anxieties played out in India, in the WhatsApp traceability debate, where the government pushed for traceability (Tell me who the sender is), but also said that it does not want to break end-to-end encryption, an impossible request, as sender deniability is at the heart of the end-to-end encryption. When repeatedly rebuffed by WhatsApp, an attempt was made to resolve the matter through the judicial system to compel the intermediaries (WhatsApp) to stop deploying messaging systems that use E2EE.

Given this background, the use of children in the statement to build a case for banning E2EE is interesting because it uses a propaganda technique called Pedophrasty, where children are invoked to prop up an argument, and make the opponents against the argument look like unprincipled savages and make everyone else suspend all rational and critical thinking, and agree to the argument.

But we must not agree to this dangerous set of proposals, as they are a continuum to the encryption wars, which started in the 1970s, where Western governments tried to limit use of encryption technologies by using export controls and ultimately failed.

In the 1990s, the National Security Agency in the US proposed the use of Clipper Chip in every phone, which implemented encryption but gave backdoor access to the US government. After Matt Blaze showed how rogue applications can use the chip to access data without the government backdoor, this attempt was abandoned.

In 2010, Google published a blog post, detailing how Chinese state backed hackers, attacked Gmail to spy on Chinese human rights advocates via a backdoor, installed by Google at the behest of the US government in Gmail to comply with search warrants on users. When Ericsson put backdoors into Vodafone products and deployed these in Greece for aiding law enforcement, these backdoors were used to spy on the Greek prime minister, by unknown perpetrators, who were never found.

All these incidents point out two fundamental realities. The first one is that backdoors are always dual-use and can be used by anyone and, hence, they dont keep anyone safe. The second is that E2EE is safe and easy enough for anyone to use and hence has achieved mainstream adoption. This has made the usual approach preferred by law enforcement agencies of coercing intermediaries to put backdoors irrelevant and obsolete.

Outlawing E2EE deployment and forcing intermediaries to comply with these proposed rules or leave the country by threatening to shut down their business operations, hence, may become the preferred policy response. But these rules, even if they become the law everywhere, are doomed to fail, in the same way, the discovery of irrational numbers (square root of 2) could not be suppressed by drowning its inventor Hippasus, in the sea, as it takes only a rented computer at 700 a month to run a back-end service implementing E2EE.

If existing intermediaries are forced to abandon it, others like EncroChat (popular among drug cartels) will step in and fill the void. The busting of EncroChat, when law enforcement agencies successfully penetrated the drug cartels by putting a tool in its servers, also indicates that it is possible to work around E2EE in some cases, using offensive technical measures by compromising endpoints. It would also be a far more proportionate measure than attempting to ban mathematical equations.

Anand Venkatanarayanan researches disinformation, cyber weapons and data security and is a privacy advocate

The views expressed are personal

Read the original here:
The new avatar of the encryption wars - Hindustan Times

Ring Spotlight Cam now has end-to-end encryption at $160 (Save 20%), more from $85 – 9to5Toys

Amazon is currently discounting a selection of Ring smart home security gear headlined by the Spotlight CamBattery at $159.99 shipped. Down from $200, todays offer amounts to 20% in savings, matches our previous mention, and comes within $11 of the all-time low. Rings battery-powered 1080p Spotlight Cam can be mounted just about anywhere thanks to its untethered design that can go months before needing to be recharged. Its weather-resistant build also allows you to monitor package deliveries and other outdoor activity, and a built-in LED spotlight helps you illuminate the driveway, too. Plus, Ring just rolled outend-to-end encryption for this camera to help adjust privacy concerns. Rated 4.6/5 stars from over 18,900 customers. Head below for more from $85.

Then dont forget that you can still score Rings Video Doorbell 3/Plus at up to 25% off, with prices starting at $150. Thats alongside the recently-unveiled Ring Video Doorbell that enters at $60, as well as Rings roll outend-to-end encryptionto add some extra privacy into the mix.

Get alerts on your phone, tablet and PC whenever motion is detected, so you can see, hear and speak to people on your property from anywhere. Armed with HD video, lights and a siren, Spotlight Cam protects your home around the clock day or night, rain or shine. Monitor your property in HD video, and check-in on home at anytime with Live View on-demand video and audio.

FTC: We use income earning auto affiliate links. More.

Subscribe to the 9to5Toys YouTube Channel for all of the latest videos, reviews, and more!

See original here:
Ring Spotlight Cam now has end-to-end encryption at $160 (Save 20%), more from $85 - 9to5Toys

Cloud Encryption Market by Manufacturers, Regions, Type and Application, Forecast To 2026 Ciphercloud, Gemalto, Hytrust, IBM, Netskope, Secomba, and…

The global Cloud Encryption market research report provides the detail analysis of various factors that used for the growth of the market. These factors provide thoughtful and deep knowledge of the flow and future directors of the market. Along with this, these factors also help to provide new market opportunities for the new players who are entering in the Global Cloud Encryption Market. The statistical and numerical data that is provided in the market research report is integrated in the tabular, graphical and pie charts format, which makes easy for the marketers to understand the facts and figures. Moreover, the market research report also covers the information on market drivers, restrains, future opportunities and challenges that helps in the growth of the global Cloud Encryption market.

The report study has also discovered new suggestions and applications of various organizations, which the manufacturers to improve their business on a global scale. The research report also covers the current Covid-19 impact on various industries and channels and what will be its future impact on the global Cloud Encryption market.

Top Companies Covered:

You can get free sample report includes TOC, Tables, and Figures of Cloud Encryption market 2015-2027, here: https://www.zealinsider.com/report/63600/cloud-encryption-market#sample

Request Sample Enquiry Buying Company Profile

The global Cloud Encryption market research report covers market attractiveness analysis, where each segment of the market is benchmarked based on its market size, growth rate and general appeal. The global Cloud Encryption marketis expected to achieve market growth as well as upcoming market opportunities or challenges in the forecast period of 2020 to 2027. The company researcher analyses the market is mounting at a vigorous CAGR in the forecast period.

Moreover, the global Cloud Encryption market research analysis report also provides the complete details on the major elements of the market like mergers and acquisition of the major key players, research and development activities, new product launches, product pricing and Covid-19 impact on the major players of the market. The global Cloud Encryption market research report covers estimation of the market from 2020-2027 and historical information from 2015-2019.

Global Cloud Encryption Market by Types:

Global Cloud Encryption Market by Applications:

Global Cloud Encryption Market by Geographical Region:

Enquire Here for, Report Enquire, Discount and Customization: https://www.zealinsider.com/report/63600/cloud-encryption-market#inquiry

The Market Coverage chapter in the market research report provides an important assessment of market segments like market types, application and region, also provides application view, significant makers, product offerings and measure period.

The Outline chapter in the market research report emphases on all the key market drivers, restrains and market limitations, which helps the growth of the global Cloud Encryption market in the current and forecast period. Along with this, this chapter also provides market development rate, drive market patterns and major market viewpoints.

The Regional Analysis chapter in the market research report focuses on all the division and sub-division across the globe. In this chapter, the marketers analyze and evaluate the most recent market import and fare patterns, along with this, the report also provides information on the production and utilization quantities of the Cloud Encryption products. The market major parts in every area and income period details are also covered in the global Cloud Encryption market research report.

Choose Require Company Profile Data from list: https://www.zealinsider.com/report/63600/cloud-encryption-market#companydata

Takeaway points from this report:

Buy single user with discounted price now: https://www.zealinsider.com/checkout?reportId=63600&&usert=su

About Us:

We at Zeal Insider aim to be global leaders in qualitative and predictive analysis as we put ourselves in the front seat for identifying worldwide industrial trends and opportunities and mapping them out for you on a silver platter. We specialize in identifying the calibers of the markets robust activities and constantly pushing out the areas which allow our clientele base in making the most innovative, optimized, integrated and strategic business decisions in order to put them ahead of their competition by leaps and bounds. Our researchers achieve this mammoth of a task by conducting sound research through many data points scattered through carefully placed equatorial regions.

Contact Us:

Zeal Insider1st Floor, Harikrishna Building,Samarth Nagar, New Sanghvi,Pune- 411027 Indiatel: +91-8149441100 (GMT Office Hours)tel: +17738002974[emailprotected]

Continue reading here:
Cloud Encryption Market by Manufacturers, Regions, Type and Application, Forecast To 2026 Ciphercloud, Gemalto, Hytrust, IBM, Netskope, Secomba, and...

Encryption Software Market Size, Top Key Players, Applications, Business Statistics, Trends and Forecast 2021-2027 NeighborWebSJ – NeighborWebSJ

Fort Collins, Colorado: A new informative report on the Encryption Software Market has recently published by Reports Globe to its massive repository. The primary and secondary research techniques have been used to compile data from different sources such as websites, media publications, and press releases. The Encryption Software market offers up-to-date information on different market segments and sub-segments. It offers an all-inclusive study of different key factors affecting the growth of the Encryption Software market. The global market research report offers extensive research on different technologies, tools, and standard methodologies that are fueling the growth prospect of the Encryption Software market.

Global Encryption Software Market was valued at 6.87 billion in 2019 and is projected to reach USD43.38 billion by 2027, growing at a CAGR of 27.96% from 2020 to 2027.

The Encryption Software market is highly consolidated due to the presence of many companies operating in this sector. The report describes the current market position of these companies, their past performance, graphs of supply and demand, production and consumption patterns, distribution network, sales channels, and growth opportunities in the market. The main market candidates listed in the report are:

The global informative report begins with a brief introduction of Encryption Software market and market overview, classification, application, technologies, products or services, and key players operating across the globe. The global informative report elaborates on the global market scope, market scope at the present, and prediction of demand from global clients in the future. The global market research report has been presented in a clear and professional manner for easy and better understanding to readers. The driving forces, limitations, and global opportunities are listed for the Encryption Software market to get the gist of different dynamics of the global market. It has been compiled through proven research techniques such as primary research and secondary research.

Request a Discount on the report @ https://reportsglobe.com/ask-for-discount/?rid=30360

Market Segments and Sub-segments Covered in the Report are as per below:

Geographical scenario:

The geographical analysis of the Encryption Software market has been done by examining different global regions such as North America, Latin America, Middle East, Asia-Pacific, and Africa on the basis of different parameters. The primary target for the Encryption Software market are the Encryption Software countries. The Encryption Software market has broadly compiled through extensive research and analysis techniques such as qualitative and quantitative analysis. Furthermore, it offers a blend of SWOT and Porters five techniques to analyze the data of the global market. Moreover, this report offers a complete analysis of different business perspectives such as the ups and downs of the global market shares. To expand the market at the global level, it makes use of different techniques and sales methodologies for achieving the outcomes of the businesses.

Collectively, this research repository encapsulates data of Encryption Software market to offer strategic decision-making abilities to various investors, business owners, decision-makers as well as policymakers.

The Encryption Software Market is divided into the following regions:

North America (USA, Canada)Latin America (Chile, Brazil, Argentina, rest of Latin America)Europe (UK, Italy, Germany, France, rest of the EU)Asia Pacific (India, Japan, China, South Korea, Australia, rest of APAC)Middle East and Africa (Saudi Arabia, United Arab Emirates, South Africa, rest of MEA)

View market snapshot before purchasing @ https://reportsglobe.com/product/global-encryption-software-market/

Following major key questions are addressed through this global research report:

1. What will be the Encryption Software market size over the forecast period?2. What are the demanding regions for making significant growth in the upcoming future?3. What are the challenges in front of the Encryption Software market?4. Who are the key vendors in Encryption Software market?5. What are the effective sales patterns and methodologies for boosting the performance of the Encryption Software market?6. What are the different ways to find out potential customers as well as global clients?7. Which factors are hampering the Encryption Software market?8. What are the outcomes of SWOT and porters five techniques?9. What are the demanding trends of the Encryption Software market?

Key strategic developments in the Encryption Software market:

This global study also includes the key strategic developments of the Encryption Software market including the new product launchings, partnerships and collaboration among the key players functioning at the global level.

Request customization of the report @ https://reportsglobe.com/need-customization/?rid=30360

Key target audience for Encryption Software report:

The report is insightful documentation and provides significant insights to customers, business owners, decision-makers, providers, distributors, suppliers, policymakers, manufacturers, investors, and individuals who have a keen interest in the Encryption Software market.

How Reports Globe is different than other Market Research Providers:

The inception of Reports Globe has been backed by providing clients with a holistic view of market conditions and future possibilities/opportunities to reap maximum profits out of their businesses and assist in decision making. Our team of in-house analysts and consultants works tirelessly to understand your needs and suggest the best possible solutions to fulfill your research requirements.

Our team at Reports Globe follows a rigorous process of data validation, which allows us to publish reports from publishers with minimum or no deviations. Reports Globe collects, segregates, and publishes more than 500 reports annually that cater to products and services across numerous domains.

Contact us:

Mr. Mark Willams

Account Manager

US: +1-970-672-0390

Email: [emailprotected]

Web: reportsglobe.com

Original post:
Encryption Software Market Size, Top Key Players, Applications, Business Statistics, Trends and Forecast 2021-2027 NeighborWebSJ - NeighborWebSJ

Cloud Encryption Service : Global Market Size, Scope, Growth, and Analysis 2020-2026 The Bisouv Network – The Bisouv Network

Cloud Encryption Service Market describes an in-depth evaluation and professional study on the present and future state of the Cloud Encryption Service market across the globe, including valuable facts and figures. Cloud Encryption Service Market provides information regarding the emerging opportunities in the market & the market drivers, trends & upcoming technologies that will boost these growth trends. The report provides a comprehensive overview including Definitions, Scope, Application, Production and CAGR (%) Comparison, Segmentation by Type, Share, Revenue Status and Outlook, Capacity, Consumption, Market Drivers, Production Status and Outlook and Opportunities, Export, Import, Emerging Markets/Countries Growth Rate. The report presents a 360-degree overview of the competitive landscape of the industries. The Cloud Encryption Service market report assesses the key regions (countries) promising a huge market share for the forecast period.

Top Key players of Cloud Encryption Service Market Covered In The Report:Thales e-Security (La Defense, France)Gemalto N.V. (Amsterdam, Netherlands)Sophos Group plc (Abingdon, UK)Symantec Corporation (California, US)Skyhigh Networks (California, US)

Key Market Segmentation of Cloud Encryption Service:

Product type Segmentation

Support and MaintenanceTraining and EducationPlanning and ConsultingManaged Service

Industry Segmentation

HealthcareGovernment and Public UtilitiesTelecom and ITRetailAerospace and Defense

The Cloud Encryption Service report gives detail complete examination to territorial sections that covered The USA, Europe, Japan, China, India, Southeast Asia, South America, South Africa, and Rest of World in Global Outlook Report with Cloud Encryption Service Market definitions, characterizations, delivering reports, cost structures, advancement strategies, and plans. The results and information are top notches in the Cloud Encryption Service report utilizing outlines, diagrams, pie graphs, and other pictorial portrayals concerning its Current Trends, Dynamics, and Cloud Encryption Service Business Scope, Key Statistics and CAGR Analysis of top key players.

Buy Latest Copy of Report Now! @ https://www.qurateresearch.com/report/buy/ICT/global-cloud-encryption-service-market/QBI-BIS-ICT-592437/

Key Highlights from Cloud Encryption Service Market Study:

Income and Sales Estimation Historical Revenue and deals volume is displayed and supports information is triangulated with best down and base up ways to deal with figure finish market measure and to estimate conjecture numbers for key areas shrouded in the Cloud Encryption Service report alongside arranged and very much perceived Types and end-utilize industry. Moreover, macroeconomic factor and administrative procedures are discovered explanation in Cloud Encryption Service industry advancement and perceptive examination.

Assembling Analysis The Cloud Encryption Service report is presently broke down concerning different types and applications. The Cloud Encryption Service market gives a section featuring the assembling procedure examination approved by means of essential data gathered through Industry specialists and Key authorities of profiled organizations.

Competition Analysis Cloud Encryption Service Leading players have been considered relying upon their organization profile, item portfolio, limit, item/benefit value, deals, and cost/benefit.

Demand and Supply and Effectiveness Cloud Encryption Service report moreover gives support, Production, Consumption and (Export and Import).

Which prime data figures are included in the report? -Market size (Last few years, current and expected)-Market share analysis as per different companies)-Market forecast)-Demand)-Price Analysis)-Market Contributions (Size, Share as per regional boundaries)

Who all can be benefitted out of this report? -Market Investigators-Teams, departments, and companies-Competitive organizations-Individual professionals-Vendors, Buyers, Suppliers-Others

What are the crucial aspects incorporated in the report? -Industry Value Chain-Consumption Data-Market Size Expansion-Key Economic Indicators

Strategic Points Covered in TOC:

Chapter 1: Introduction, market driving force product scope, market risk, market overview, and market opportunities of the global Cloud Encryption Service market.

Chapter 2: Evaluating the leading manufacturers of the global Cloud Encryption Service market which consists of its revenue, sales, and price of the products.

Chapter 3: Displaying the competitive nature among key manufacturers, with market share, revenue, and sales.

Chapter 4: Presenting global Cloud Encryption Service market by regions, market share and with revenue and sales for the projected period.

Chapter 5, 6, 7, 8 and 9: To evaluate the market by segments, by countries and by manufacturers with revenue share and sales by key countries in these various regions.

Contact Us:

Web:www.qurateresearch.comE-mail:[emailprotected]Ph: US +13393375221

Follow Us @

LinkedIn

Twitter

Note: In order to provide more accurate market forecast, all our reports will be updated before delivery by considering the impact of COVID-19.

See more here:
Cloud Encryption Service : Global Market Size, Scope, Growth, and Analysis 2020-2026 The Bisouv Network - The Bisouv Network