Poland threatens hefty fines for social media companies that censor legal speech, users everywhere celebrate – RT

Social media companies that remove posts whose content is legal can be fined up to 1.8 million under a new Polish bill. Users have welcomed its introduction as an antidote to other countries growing censorship demands.

Any social media company that removes content or blocks accounts that do not violate Polish law can be fined under the new legislation, announced in a press conference on Thursday by Justice Minister Zbigniew Ziobro. The bill also creates a special Court for the Protection of Freedom of Speech within one of the district courts.

Individuals whose posts have been censored will have the right to complain to the platform in question, which has 24 hours to respond. The user then has 48 hours to petition the new court to have their content reinstated, and the court then has seven days to consider the petition.

If the court finds in favor of the user and the social media platform does not restore the content or unblock the account, they will be fined up to 1.8 million by the Office of Electronic Communications. The whole process will happen online, according to Ziobro.

The victims of ideological censorship are unfairly quashed by social media platforms just because they express views and refer to values that are unacceptable from the point of view of communitieswith an ever-stronger influence on the functioning of social media, the justice minister said.

The user of social media must feel that his rights are protected. Nor can there be any censorship of speech. Freedom of speech and freedom of debate are the essence of democracy.

The new court will also be tasked with handling blocking requests regarding content that does violate Polish law. Additionally, it will handle a new type of blind lawsuit in which someone who is wronged by an anonymous party on the internet can file a lawsuit to correct the wrong, even without the defendants personal data. All that would be needed for such a suit is the offenders username, the website where the offending post was made, and the date and time of posting.

Secretary of State Sebastian Kaleta said this solution represents a significant improvement over attempts by countries such as France and Germany to handle such problems, noting that their efforts are primarily repressive and focus on the quick removal of content rather than protecting free expression.

A government press release specifically cited the European Commissions Digital Service Act a sprawling EU-wide piece of legislation which also focus[es] on removing prohibited content as one of the motivating factors behind Warsaws rollout of the new protections for online speech.

Poland wants to adopt its own regulations, effectively defending the constitutional right to freedom of expression, so that in the event of a disputethe courts will decide on a possible violation of the law, it said.

Social media users far outside Poland were thrilled by the legislation.

Many especially Americans were impatient to see such laws in their own countries. Must be nice to have such leaders, one user sighed wistfully.

Others considered a move to Poland.

And several users simply tagged US President Donald Trump, who has vowed to veto the National Defense Authorization Act if it does not include a provision to strip social media platforms of their Section 230 legal liability. Section 230 exempts social media platforms from legal responsibility for content posted by their users while still allowing them to moderate that content a loophole its opponents have claimed enables ideologically-motivated censorship.

While both houses of Congress have passed the bill with veto-proof majorities, the president still plans to veto it, according to White House Press Secretary Kayleigh McEnany.

Unfortunately for Americans looking eastward, Poland is not yet allowing visitors from the US (except from Illinois and New York) due to the novel coronavirus epidemic.

Like this story? Share it with a friend!

See original here:

Poland threatens hefty fines for social media companies that censor legal speech, users everywhere celebrate - RT

YouTubes decision to appoint local representative in Turkey will increase censorship, rights watchdogs say – Stockholm Center for Freedom

YouTubes move to appoint a local representative in Turkey will inevitably lead to an increase in arbitrary censorship and compromise peoples privacy and right of access to information, and could implicate YouTube in human rights violations, said Human Rights Watch, ARTICLE 19 and the Freedom of Expression Association (FD) in a joint statement on Friday.

The statement said YouTubes decision also sets a dangerous precedent that makes it harder for other tech companies to refuse to appoint a local representative in Turkey and more difficult for YouTube and other companies to refuse to appoint local representatives in countries around the world with weak rule of law frameworks and equally problematic legislation that may require it. The rights watchdogs said YouTube should be a partner in efforts to challenge the law and champion the right to free speech, instead of cooperating with this form of state interference with freedom of expression.

The main social media companies quite rightly have so far chosen not to comply with this draconian law, which facilitates censorship, said Hugh Williamson, Europe and Central Asia director at Human Rights Watch. YouTubes decision to comply with the requirement to set up a local representative in the belief that it will be possible to ride out the storm and hold out against a flood of take-down requests is deeply misguided and blinkered to the deplorable climate for free speech in Turkey.

The Turkish parliament approved an amendment to the law on Internet crimes in July. Thebillsets forth progressive sanctions forcing social media platforms with more than 1 million connections a day to appoint a representative in Turkey with whom the Turkish authorities can resolve problems arising from cases of insult, intimidation and violation of privacy.

The bill obligates social media platforms to respond within 48 hours to complaints about violations of personal rights or to judicial orders to remove content. The social network provider that fails to remove offending content within 24 hours after a court ruling will be held responsible for damages incurred by the content.

Until now no other companies have decided to appoint a representative in Turkey despite getting fined for not doing so.

The appointment of a representative in adherence to the law brings with it the obligation to comply with unjustified and politically motivated take-down and content removal requests by the Turkish authorities, the organizations said.

According to the rights watchdogs, YouTubes announcement is deeply troubling and reflects the companys failure to understand the existing threats and violations to freedom of expression in Turkey and how this will facilitate further erosion of that right. Critical expression is routinely censored in Turkey, and far-reaching executive influence over courts means that the judiciary rarely protects free speech.

Turkish authorities make an enormous number take-down and content removal requests in violation of freedom of expression and information. According to research carried out by FDs EngelliWeb initiative, by the end of 2019 Turkey had blocked access to 408,494 websites, 130,000 URLs, 7,000 Twitter accounts, 40,000 tweets, 10,000 YouTube videos and 6,200 pieces of Facebook content.

In the absence of due process and an independent judiciary, including functioning democratic institutions such as the Constitutional Court, it will be impossible for YouTube or any social media platform to protect the rights of users in Turkey as they will become the long arm of the Turkish state, said Yaman Akdeniz, one of the founders of FD.

The joint statement said companies like YouTube have a responsibility to respect human rights and mitigate harm as set out in the United Nations Guiding Principles on Business and Human Rights.

The tech companies should not bow to this pressure or enter into behind-closed-doors agreements with the authorities, said Sarah Clarke, head of Europe and Central Asia at ARTICLE 19. As long as the environment for freedom of expression and the rule of law is this hostile in Turkey, other social media platforms should continue not to comply with the amendments to the Internet law.

ARTICLE 19, Human Rights Watch and FD called on YouTube to reconsider its decision to appoint a local representative, clarify how the company intends to respect the rights to freedom of expression and privacy in Turkey and publish the companys Human Rights Impact Assessment that led to the decision to appoint a representative office in Turkey.

The organizations also urged the Turkish government to repeal the new law, which will negatively affect millions of users of social media platforms in Turkey.

Take a second to support SCF on Patreon!

Related

Go here to read the rest:

YouTubes decision to appoint local representative in Turkey will increase censorship, rights watchdogs say - Stockholm Center for Freedom

Building a Better U.S. Approach to TikTok and Beyond – Lawfare

One of the defining technology decisions of the Trump administration was its August 2020 ban on TikTokan executive order to which legal challenges are still playing out in the courts. The incoming Biden-Harris administration, however, has indicated its intention to pivot away from Trumps approach on several key technology policies, from the expected appointment of a national cyber director to the reinvigoration of U.S. diplomacy to build tech coalitions abroad. President Biden will need to make policy decisions about software made by companies incorporated in foreign countries, and to what extent that might pose national security risks. There may be a future TikTok policy, in other words, that isnt at all aboutor at least isnt just aboutTikTok.

In April 2020, Republican Rep. Jim Banks introduced legislation in the House of the Representatives that sought to require developers of foreign software to provide warnings before consumers downloaded the products in question. Its highly likely that similar such proposals will enter Congress in the next few years. On the executive branch side, the Biden administration has many decisions ahead on mobile app supply chain security, including whether to keep in place Trumps executive order on TikTok. These questions are also linked to foreign policy: President Biden will need to decide how to handle Indias bans of Chinese software applications, as India will be a key bilateral tech relationship for the United States. And the U.S. government will also have to make choices about cloud-based artificial intelligence (AI) applications served from other countriesthat is, where an organizations AI tools are run on third-party cloud serversin the near future.

In this context, what might a better U.S.policy on the security risks of foreign-made software look like? The Trump administrations TikTok executive order was more of a tactical move against a single tech firm than a fully developed policy. The new administration will now have the opportunity to set out a more fully realized, comprehensive vision for how to tackle this issue.

This analysis offers three important considerations for the U.S. executive branch, drawing on lessons from the Trump administrations TikTok ban. First, any policy needs to explicitly define the problem and what it sets out to achieve; simply asserting national security issues is not enough. Second, any policy needs to clearly articulate the alleged risks at play, because foreign software could be entangled with many economic and security issues depending on the specific case. And third, any policy needs to clearly articulate the degree to which a threat actors supposed cost-benefit calculus makes those different risks likely. This is far from a comprehensive list. But failure to address these three considerations in policy design and implementation will only undermine the policys ultimate effectiveness.

Defining the Problem

First, any policy on foreign software security needs to be explicitly clear about scopethat is, what problem the government is trying to solve. Failure to properly scope policies on this front risks confusing the public, worrying industry and obscuring the alleged risks the government is trying to communicate. This undermines the governments objectives on all three fronts, which is why scoping foreign software policies clearly and explicitlyin executive orders, policy memos and communication with the publicis critical.

Trumps approach to TikTok and WeChat provides a lesson in what not to do. Arguably, the TikTok executive order was not even a policy: It was more a tactical-level move against a single tech firm than a broader specification of the problem set and development of solutions. Trump had discussed banning TikTok in July 2020 as retaliation for the Chinese governments handling of the coronavirusso, putting aside that this undermined the alleged national security motives behind the executive order, the order issued on TikTok wasnt completely out of the blue. That said, the order on WeChat that accompanied the so-called TikTok ban was surprising, and its signing only created public confusion. Until then, much of the congressional conversation on Chinese mobile apps had focused on TikTok, and the Trump administration had given no warning that WeChat would be the subject of its actions too. Whats more, even after the executive orders were signed in August, most of the Trump administrations messaging focused just on TikTok, ignoring WeChat. The administration also wrote the WeChat executive order with troublingly and perhaps sloppily broad language that scoped the ban as impacting Tencent Holdingswhich owns WeChat and many other software applicationsand thus concerned gaming and other software industries, though the administration subsequently stated the ban was aimed only at WeChat.

Additionally, the Trump administrations decisions on U.S.-China tech often blurred together trade and national security issues. The Trump administration repeatedly suggested that TikToks business presence in mainland China inherently made the app a cybersecurity threat, without elaborating on why the executive orders focused solely on TikTok and WeChat rather than other software applications from China too. Perhaps the bans were a possible warning shot at Beijing about potential collection of U.S. citizen databut its worth asking if that warning shot even worked given the legal invalidations of the TikTok ban and the blowback even within the United States. Again, the overarching policy behind these tactical decisions was undeveloped. It was unclear if TikTok and WeChat were one-off decisions or the beginning of a series of similar actions.

Going forward, any executive branch policy on foreign software needs to explicitly specify the scope of the cybersecurity concerns at issue. In other words, the executive needs to clearly identify the problem the U.S. government is trying to solve. This will be especially important as the incoming Biden administration contends with cybersecurity risks emanating not just from China but also from Russia, Iran and many other countries. If the White House is concerned about targeted foreign espionage through software systems, for example, those concerns might very well apply to cybersecurity software developed by a firm incorporated in Russiawhich would counsel a U.S. approach not just limited to addressing popular consumer apps made by Chinese firms. If the U.S. is concerned about censorship conducted by foreign-owned platforms, then actions by governments like Tehran would certainly come into the picture. If the problem is a foreign government potentially collecting massive amounts of U.S. citizen data through software, then part of the policy conversation needs to focus on data brokers, toothe large, unregulated companies in the United States that themselves buy up and sell reams of information on U.S. persons to anyone whos buying.

Software is constantly moving and often communicating with computer systems across national borders. Any focus on a particular company or country should come with a clear explanation, even if it seems relatively intuitive, as to why that company or country poses a particularly different or elevated risk compared to other sources of technology.

Clearly Delineate Between Different Alleged Security Risks

The Trump administrations TikTok ban also failed to clearly articulate and distinguish between its alleged national security concerns. Depending on ones perspective, concerns might be raised about TikTok collecting data on U.S. government employees, TikTok collecting data on U.S. persons not employed by the government, TikTok censoring information in China at Beijings behest, TikTok censoring information beyond China at Beijings behest, or disinformation on the TikTok platform. Interpreting the Trump administrations exact concerns was difficult, because White House officials were not clear and explicit about which risks most concerned them. Instead, risks were blurred together, with allegations of Beijing-compelled censorship thrown around alongside claims that Beijing was using the platform to conduct espionage against U.S. persons.

If there was evidence that these practices were already occurring, the administration did not present it. If the administrations argument was merely that such actions could occur, the administration still did not lay out its exact logic. There is a real risk that the Chinese government is ordering, coercing or otherwise compelling technology companies incorporated in its borders to engage in malicious cyber behavior on its behalf worldwide, whether for the purpose of censorship or cyber operations. Beijing quite visibly already exerts that kind of pressure on technology firms in China to repress the internet domestically. Yet to convince the public, industry, allies, partners, and even those within other parts of government and the national security apparatus that a particular piece or source of foreign software is a national security risk, the executive branch cannot overlook the importance of clear messaging. That starts with clearly articulating, and not conflating, the different risks at play.

The spectrum of potential national security risks posed by foreign software is large and depends on what the software does. A mobile app platform with videos and comments, for instance, might collect intimate data on U.S. users while also making decisions about content moderationso in that case, its possible the U.S. government could have concerns about mass data collection, censorship and information manipulation all at once. Or, to take another example, cybersecurity software that runs on enterprise systems and scans internal company databases and files might pose an array of risks related to corporate espionage and nation-state espionagebut this could have nothing to do with concerns about disinformation and content manipulation.

Software is a general term, and the types and degrees of cybersecurity risk posed by different pieces of software can vary greatly. Just as smartphones are not the same as computing hardware in self-driving cars, a weather app is not the same as a virtualization platform used in an industrial plant. Software could be integrated with an array of hardware components but not directly connect back to all those makers: Think of how Apple, not the manufacturers of subcomponents for Apple devices, issues updates for its products. Software could also directly connect back to its maker in potentially untrusted ways, as with Huawei issuing software updates to 5G equipment. It could constantly collect information, such as with the TikTok app itself and it could learn from the information it collects, like how TikTok uses machine learning and how many smartphone voice-control systems collect data on user speech. This varied risk landscape means policymakers must be clear, explicit and specific about the different alleged security risks posed by foreign software.

Give Cost-Benefit Context on Security Risks

Finally, the U.S. government should make clear to the public the costs and benefits that a foreign actor might weigh in using that software to spy. Just because a foreign government might hypothetically collect data via something like a mobile appwhether by directly tapping into specific devices or by turning to the apps corporate owner for data hand-oversdoesnt mean that the app is necessarily an optimal vector for espionage. It might not yield useful data beyond what the government already has, or it might be too costly relative to using other active data collection vectors. Part of the U.S. governments public messaging on cyber risk management should therefore address why that particular vector of data collection would be more attractive than some other vector, or what supplementary data it would provide. In other words, what is the supposed value-add for the foreign government? This could also include consideration of controls offered by the softwares country of originfor example, transparency rules, mandatory reporting for publicly traded companies, or laws that require cooperation with law enforcement or intelligence servicesmuch like the list of trust criteria under development as part of Lawfares Trusted Hardware and Software Working Group.

In the case of the Trump administrations TikTok executive order, for example, there was much discussion by Trump officials about how Beijing could potentially use the app for espionage. But administration officials spoke little about why the Chinese intelligence services would elect to use that vector over others, or what about TikTok made its data a hypothetical value-add from an intelligence perspective.

If the risk concern is about targeted espionage against specific high-value targets, then the cost-benefit conversation needs to be about what data that foreign software provides, and how easily it provides that benefit, relative to other methods of intelligence collection. If the risk concern is about bulk data collection on all the softwares users, then the cost-benefit conversation needs to be about why that data is different from information that is openly available, was stolen via previous data breaches, or is purchasable from a U.S. data broker. That should include discussing what value that data adds to what has already been collected: Is the risk that the foreign government will develop microtargeted profiles on individuals, supplement existing data, or enable better data analytics on preexisting information?

The point again is not that TikToks data couldnt add value, even if it overlapped with what Chinese intelligence services have already collected. Rather, the Trump administration did not clearly articulate Beijings supposed cost-benefit calculus.

Whatever the specific security concern, managing the risks of foreign espionage and data collection through software applications is in part a matter of assessing the potential payoff for the adversary: not just the severity of the potential event, or the actors capabilities, but why that actor might pursue this option at all. Policy messaging about these questions speaks to the governments broader risk calculus and whether the U.S. government is targeting the most urgent areas of concern. For instance, if the only concern about a piece of foreign software is that it collects data on U.S. persons, but it then turns out that data was already publicly available online or heavily overlaps with a foreign intelligence services previous data theft, would limiting that foreign softwares spread really mitigate the problems at hand? The answer might be yes, but these points need to be articulated to the public.

Conclusion

A key part of designing federal policies on software supply chain security is recognizing the globally interconnected and interdependent nature of software development today. Developers working in one country to make software for a firm incorporated in a second may sell their products in a third country and collect data sent to servers in a fourth. Software applications run in one geographic area may talk to many servers located throughout the world, whether a Zoom call or Gmailand the relatively open flow of data across borders has enabled the growth of many different industries, from mobile app gaming to a growing number of open-source machine-learning tools online.

If the U.S. government wants to draw attention to security risks of particular pieces or kinds of foreign software, or software coming from particular foreign sources, then it needs to be specific about why that software is being targeted. Those considerations go beyond the factors identified here. The WeChat executive order, for instance, wasnt just unclear in specifying the national security concerns ostensibly motivating the Trump administration; it also failed to discuss what a ban on WeChat in the United States would mean for the apps many users. Hopefully, greater attention paid to these crucial details will help better inform software security policies in the future.

Read this article:

Building a Better U.S. Approach to TikTok and Beyond - Lawfare

Here’s Why Quantum Computing Will Not Break Cryptocurrencies – Forbes

Safe Deposit. Symbol of cryptocurrency safety. The man puts a physical bitcoin in small Residential ... [+] Vault. Toned soft focus picture.

Theres a lurking fear in cryptocurrency communities about quantum computing. Could it break cryptocurrencies and the encryption that protects them? How close might that be? Do the headlines around quantum supremacy mean that my private keys are at risk?

The simple answer: no. But lets dive deeper into this phenomenon and really try to understand why this is the case and how quantum computing will interact with cryptocurrencies.

To start off with, lets define quantum computing and the classical computing were all used to, and seeing where the terms compare and contrast with one another. Quantum computing can be roughly placed in the same paradigm as classical pre-1900s physics and modern physics which comprises Einsteins insights on relativity and quantum physics.

Classical computing is the kind of computers weve grown used to, the extensions of Turings theories on computation, the laptops or mobile phones that you carry around with you. Classical computing relies heavily on the manipulation of physical bits the famous 0s and 1s.

Quantum computing relies on qubits, bits that are held in superposition and use quantum principles to complete calculations. The information captured or generated by a quantum system benefits from the ability of qubits to be in more than one physical state at a time (superposition), but there is information decay in capturing the state of the system.

One point that will be immediately relevant to the discussion is that quantum computers are not universally better than classical computers as a result. When people speak about quantum supremacy, including reports from Google GOOG and/or China, they really mean that a quantum computer can do a certain task better than classical computers, perhaps one that is impossible to do in any reasonable timeframe with classical computers.

We can think of this in terms of time scales from a computing perspective there are some, but not all functions, that go from being impossible to accomplish in any meaningful human-level time period to ones that become slow but manageable with a large enough quantum computer.

In a way, you can think of Turing tests and quantum supremacy tests in much the same way. Designed at first to demonstrate the superiority of one system over another (in the case of Turing tests, artificial language generation vs. human language comprehension, in the case of quantum supremacy tests, quantum computing systems vs classical computers), theyve become more gimmick than substance.

A quantum computer has to perform better at some minute and trivial task that might seem impressive but completely useless in much the same way a Turing test of machine-generated English might fool a Ukrainian child with no fluency in the language.

This means that we have to narrow down to a function that quantum computers can be better on that would materially affect cryptocurrencies or the encryption theyre built on in order for quantum supremacy to matter.

One area of specific focus is Shors Algorithm, which can factor large prime numbers down into two smaller ones. This is a very useful property for breaking encryption, since the RSA family of encryption depends on factoring large prime numbers in exactly this manner. Shors Algorithm works in theory with a large enough quantum computer and so its a practical concern that eventually, Shors Algorithm might come into play and among other things, RSA encryption might be broken.

On this front, the US National Institute of Standards and Technology (NIST) has already started gathering proposals for post-quantum cryptography, encryption that would operate and not be broken even with much larger quantum computers than the ones were currently able to build. They estimate that large enough quantum computers to disrupt classical encryption will potentially arrive in the next twenty years.

For cryptocurrencies, a fork in the future that might affect large parts of the chain, but it will be somewhat predictable there is a lot of thought being placed on post-quantum encryption technology. Bitcoin would not be one of the first planks to fall if classical encryption were suddenly broken for a number of reasons. Yet, a soft fork (as opposed to a hard one) might be enough to help move crypto-assets from suddenly insecure keys to secure post-quantum encryption.

Even an efficient implementation of Shors Algorithm may not break some of the cryptography standards used in bitcoin. SHA-256 is theorized to be quantum-resistant.

The most efficient theoretical implementation of a quantum computer to detect a SHA-256 collision is actually less efficient than the theorized classical implementation for breaking the standard. The wallet file in the original Bitcoin client is using SHA-512 (a more secure version than SHA-256) to help encrypt private keys.

Most of the encryption in modern cryptocurrencies are built on elliptic curve cryptography rather than RSA especially in the generation of signatures in bitcoin which requires ECDSA. This is largely due to the fact that elliptic curves are correspondingly harder to crack than RSA (sometimes exponentially so) from classical computers.

Thanks to Moores law and better classical computing, secure RSA key sizes have grown so large so as to be impractical compared to elliptic curve cryptography so most people will opt for elliptic curve cryptography for performance reasons for their systems, which is the case with bitcoin.

However, quantum computers seem to flip this logic on its head: given a large enough quantum computer with enough qubits, you can break elliptic curve cryptography easier than you might break RSA.

Both elliptic curve cryptography are widely used in a bunch of other industries and use cases as well RSA-2048 and higher are standards in the conventional banking system to send encrypted information, for example.

Yet, even with a large enough quantum computer, you would still have to reveal or find somebodys public keys so they could be subject to attack. With cryptocurrency wallet reuse being frowned upon, and a general encouragement of good privacy practices, the likelihood of this attack is already being reduced.

Another area of attack could be Grovers algorithm, which can exponentially speed up mining with a large enough quantum computer though its probable that ASICs, the specialized classical computers mostly used to mine bitcoin now, would be faster compared to the earliest versions of more complete quantum computers.

This poses more of a stronger threat when it comes to the state of cryptocurrencies: the ability to mine quickly in a sudden quantum speedup could lead to destabilization of prices and more importantly control of the chain itself an unexpected quantum speedup could, if hidden, lead to vast centralization of mining and possible 51% attacks. Yet the most likely case is that larger systems of quantum computing will be treated like any kind of hardware, similar to the transition for miners between GPUs, FGPAs and ASICs a slow economic transition to better tooling.

Its conceivable that these avenues of attack and perhaps other more unpredictable ones might emerge, yet post-quantum encryption planning is already in process and through the mechanism of forks, cryptocurrencies can be updated to use post-quantum encryption standards and defend against these weaknesses.

Bitcoin and even other cryptocurrencies and their history are filled with examples of hardware and software changes that had to be made to make the network more secure and performant and good security practices in the present (avoiding wallet reuse) can help prepare for a more uncertain future.

So quantum computers being added to the mix wont suddenly render classical modes of encryption useless or mining trivial quantum supremacy now doesnt mean that your encryption or the security of bitcoin is at risk right at this moment.

The real threat is when quantum computers become many scales larger than they currently are by which point planning for post-quantum encryption, which is already well on the way would come to the fore, and at which point bitcoin and other cryptocurrencies can soft fork and use both decentralized governance and dynamism when needed in the face of new existential threats to defeat the threat of quantum supremacy.

Here is the original post:
Here's Why Quantum Computing Will Not Break Cryptocurrencies - Forbes

Rolls-Royce has given away clues to unravel the Wraith Kryptos cipher – SlashGear

Rolls-Royce CEO Torsten Mller-tvs said it best in describing its newest collection car. Wraith Kryptos is a Rolls-Royce Collection like no other. It is embedded with a cryptographic cipher and filled with mystery and intrigue.

Unveiled last July, Wraith Kryptos is unlike any bespoke vehicle from Goodwood. The interior and exterior are brimming with mysterious ciphers inspired by cryptography.

Those Matrix-inspired symbols are the creation of Rolls-Royce Bespoke Designer Katrin Lehmann, and that finding the key is the first step in uncovering the mysterious code, said Rolls-Royces press release.

However, theres a problem. Nobodys been able to decrypt the mysterious ciphers as of press time. As clients receive the first deliveries of their bespoke Wraith Kryptos, the British luxury carmaker has given away some clues to unravel the mystery behind Wraith Kryptos. Unsurprisingly, the key has something to do with the Spirit of Ecstasy hood ornament.

The Spirit of Ecstasy, the figurine that graces the bonnet of every Rolls-Royce motor car, holds the key to uncovering this code, added Mller-tvs. The word KRYPTOS is engraved in Rolls-Royce cipher around the base of the figurine, and with this information, clients will be able to embark on their cryptographic journey.

Apparently, the seven letters of KRYPTOS provides the starting point in breaking the code. In Wraith Kryptos, the Spirit of Ecstasy has green enamel detailing. Using the KRYPTOS engraving at the base as your starting point, focus your attention on the vehicles Delphic Gray paint that reveals brilliant specks of green and blue when exposed to varying degrees of light more clues that may lead to the final answer.

Inside, you get more clues. Youll find more ciphering on the illuminated treadplates, and Rolls-Royce said to look closer at the embroidery on the seat headrests. Only two people in the world are privy to Wraith Kryptos bewildering puzzle, and the answer remains in a sealed envelope hidden in a safe.

Rolls-Royce is giving away a unique and prestigious prize to the lucky someone who breaks the KRYPTOS code. The first client to decrypt this code will receive a unique gift from Rolls-Royce in recognition of their extraordinary talent! concluded Mller-tvs. Clients are encouraged to submit their answers using Rolls-Royces Whispers app beginning in February 2021.

The Rolls-Royce Wraith is a luxurious grand tourer for effortless travel. It has a 6.5-liter twin-turbocharged V12 motor with 624 horsepower and 590 pound-feet of torque. It has a top speed of 155 mph, and it rushes from zero to 60 mph in 4.4-seconds.

Wraith Kryptos is the most fascinating among Rolls-Royces collection models. But unlike Wraith Eagle VIII and Ghost Zenith, only Kryptos is built to boggle the mind.

Link:
Rolls-Royce has given away clues to unravel the Wraith Kryptos cipher - SlashGear

This might be how law enforcement agencies break into the iPhone – AppleInsider

A group of cryptography experts have proposed a theory about how law enforcement can still break into iPhone despite continuous iOS patches and layers of safeguards Apple's strongest encryption protects less data than it used to.

Matthew Green, an associate professor at Johns Hopkins Information Security Institute, proposed the theory in a Twitter thread on Wednesday in response to news of the ACLU suing for information about iPhone unlocking methods. The theory is based on research from two of his students, Maximilian Zinkus and Tushar M. Jois.

Green contends that law enforcement agencies no longer need to break the strongest encryption on an iPhone because not all types of user data are protected by it.

The research was prompted by the fact that forensic companies reportedly no longer have the ability to break Apple's Secure Enclave Processor. That means it's very difficult to crack a iPhone's password. Given that law enforcement agencies continue to break into locked devices, Green and his students began researching how that could be possible.

They came up with a possible answer, which Green said would be fully detailed in a report after the holidays. Although it's conjecture, it could explain how government and police entities are still able to extract data from locked iPhones.

It boils down to the fact that an iPhone can be in one of two states: Before First Unlock (BFU) and After First Unlock (AFU). When you first power up your device and enter your passcode, it goes into the AFU state. When a user types in their code, the iPhone uses it to derive different sets of cryptographic keys that stay in memory and are used to encrypt files.

When a user locks their device again, it doesn't go into BFU, but remains in the AFU state. Green notes that only one set of cryptographic keys gets purged from memory. That set stays gone until a user unlocks their iPhone again.

The purged set of keys is the one used to decrypt a subset of an iPhone's files that fall under a specific protection class. The other key sets, which stay in memory, are used to decrypt all other files.

From here, all a law enforcement entity needs to do is use known software exploits to bypass the iOS lock screen and decrypt most of the files. Using code that runs with normal privileges, they could access data like a legitimate app. As Green points out, the important part appears to be which files are protected by the purged set of keys.

Based on Apple's documentation, it appears that the strongest protection class only applies to mail and app launch data.

Comparing that to the same text from 2012, it seems that the strongest encryption doesn't safeguard as many data types as it once did.

The data types that don't get the strong protection include Photos, Texts, Notes, and possibly certain types of location data. Those are all typically of particular interest to law enforcement agencies.

Third-party apps, however, are able to opt-in to protect user data with the strongest protection class.

As far as why Apple seems to have weakened the protections, Green theorizes that the company forfeited maximum security to enable specific app or system features like location-based reminders. Similarly, some apps wouldn't be able to function properly if the strongest encryption class was used for most data.

Green notes that the situation is "similar" on Android. But, for Apple, the cryptography professor says that "phone encryption is basically a no-op against motivated attackers."

The findings, as well as other details and possible solutions are outlined in a research paper penned by Green, Zinkus, and Jois.

Read the rest here:
This might be how law enforcement agencies break into the iPhone - AppleInsider

Researchers in Abu Dhabi build first national crypto library for the UAE – Gulf Business

The UAE has set up the first national crypto library to enable the country to safeguard vital and confidential sources of information.

The library is an initiative of the Advanced Technology Research Council (ATRC) through its Cryptography Research Centre.

Researchers at Cryptography Research Centre, one of ATRCs initial seven dedicated research centres, have already released multiple versions of the crypto library and are working on its integration into the UAEs critical digital infrastructure, according to a statement from the centre.

Cryptography Research Centre currently employs and collaborates with scientists in multiple fields of cryptography such as post-quantum cryptography (PQC), hardware-based cryptography, lightweight cryptography, cryptanalysis, cryptographic protocols, and cloud encryption schemes, amongst others.

The ever-evolving sophistication of cyberattacks should not be taken for granted, Faisal Al Bannai, secretary-general of the Advanced Technology Research Council (ATRC) said.

By developing a national crypto library in the UAE and integrating this within critical digital infrastructure, we can increase our security levels and build sovereign capability simultaneously.

Read: Kaspersky signs MoU with Zayed University to boost cybersecurity training in UAE

The library encompasses a collection of algorithms that cryptographers use in a specific order to safeguard confidential and high-security information.

The integration of the National Crypto Library with live systems will enable a more fluid security strategy across critical data-sensitive sectors such as finance, health-care, and telecommunications, said Dr. Najwa Aaraj, chief researcher at Cryptography Research Centre.

Go here to read the rest:
Researchers in Abu Dhabi build first national crypto library for the UAE - Gulf Business

EU looks to enter broadband space race – ComputerWeekly.com

With Elon Musks Skylink constellation set to take the lead in a market that UK government-backed OneWeb wants a slice of, the European Union (EU) has revealed itself as the next on the launch pad for satellite-based broadband services.

Details of the bid have been revealed by the European Commission (EC), which has selected a consortium of European satellite manufacturers, operators and service providers, telco operators and launch service providers to study the design, development and launch of a European-owned, space-based communication system.

The EC said the study would assess the feasibility of a new initiative aiming to strengthen European digital sovereignty and provide secure connectivity for citizens, commercial enterprises and public institutions, as well as providing global coverage for rural and not-spot areas.

Once it gets the green light, the new EU flagship programme would complement the existing Copernicus and Galileo craft and, said the EC, would fully exploit the synergies of the technological potential of the digital and space industries.

The European space-based connectivity system, advocated by internal market commissioner Thierry Breton, is intended to provide secure communication services to the EU and its member states as well as broadband connectivity for European citizens, companies and mobility sectors, strengthening EU digital sovereignty.

It will build on the EUs GOVSATCOM programme of pooling and sharing satellite services, and is claimed to ensure a high level of reliability, resilience and security not currently available in the market. It will also leverage the EuroQCI initiative, which promotes quantum cryptography technology.

More specifically, the study phase awarded by the EC will consolidate the user and mission requirements and provide a preliminary architectural design and service provision concept, as well as associated budgetary estimates. A public-private partnership scheme will be considered and assessed during this phase.

The study will look at how the space-based system could enhance and connect to current and future critical infrastructures, including terrestrial networks, strengthening EU capability to access the cloud and providing digital services in an independent and secure way, which is said to be essential for building confidence in the digital economy and ensuring European strategic autonomy and resilience.

The EC sees the project as being able to take advantage of, and even strengthen, the role of satellites in a 5G ecosystem, assessing interoperability while also taking into account the evolution towards upcoming 6G technologies. At the beginning of December 2020, Nokia was appointed project leader for Hexa-X, the ECs 6G flagship initiative for research into the next generation of wireless networks.

The EC believes a sovereign satellite infrastructure will benefit a wide range of sectors, including road and maritime transport, air traffic and control, autonomous vehicle development, and many internet of things applications. It is intended to offer enhanced security in the transmission and storage of information and data supporting the needs of various users such as governmental agencies, finance and banking companies, science networks, critical infrastructures and datacentres.

The contract value of the year-long feasibility study amounts to 7.1m and the selected participants are Airbus, Arianespace, Eutelsat, Hispasat, OHB, Orange, SES, Telespazio and Thales Alenia Space.

Link:
EU looks to enter broadband space race - ComputerWeekly.com

IBM Leverages Cloud To Push The Encryption Envelope – The Next Platform

Unfortunately, the powerful capabilities of quantum computers also introduce risks to our current security technology, namely public key cryptography. Symmetric key cryptography such as Advanced Encryption Scheme (AES) or Secure Hash Algorithm (SHA) -2 and -3 will not be completely compromised. The only known attack uses Grovers algorithm, which achieves fast unstructured search for the key space for symmetric ciphers or the output space for cryptographic hash algorithms. However, enhanced search by Grovers algorithm has an upper limit. Furthermore, the attack requires a considerable amount of quantum resources. Therefore, these symmetric key algorithms can sustain their security by simply increasing the key sizes or output sizes to at most twice their current size.

The rapid adoption by enterprises of hybrid cloud and multicloud environments along with the rise of the Internet of Things, a much more remote workforce and other trends that have contributed to the increasingly distributed nature of modern IT has put the vast amounts of data that is being generated in a precarious position. No longer created, collected and store in central datacenters sitting behind corporate firewalls, workloads and data are now bouncing between public clouds, between clouds and on-premises datacenters, from the edge through the cloud to the datacenter and back again.

Data is everywhere and in multiple environments, putting it at greater risk from cyberthreats from increasing sophisticated criminal and nation-state operations that now have a much larger attack surface to work on. Theres no way to put a firewall around such a decentralized situation, so other means of security including encryption are getting more work as organizations look to shield sensitive data from cyberattacks and stay in compliance with the growing numbers of government regulations and standards think the European Unions General Data Protection Regulation (GDPR) or Californias Consumer Privacy Act (CCPA) designed to protect the privacy of business user and consumers.

However, even modern encryption has its shortcomings. Enterprises now can encrypt data when its at rest and when its in transit. However, when they have to start putting it to work to process and analyze it it must be decrypted, exposing it to cyber-criminals who want to access or steal it or to third parties that may be able to see it. In a hybrid cloud world, the risk is high.

Enter Fully Homomorphic Encryption (FHE). Initially discussed in the 1970s but not demonstrated until 2009, homomorphic encryption enables data to remain encrypted even as organizations process and analyze it in the cloud or in third-party environments, protecting it from bad actors and the eyes of others who are not supposed to see it. Once the calculations or other mathematical operations are run on the encrypted data, the results will be corrected once theyre decrypted.

Its important because data is more portable than ever, Eric Maass, director of strategy and emerging technology at IBM Security Services, tells The Next Platform. We are in a very fluid state. Infrastructure is everywhere. Once upon a time, we built monolithic applications and the data, for all intents and purposes, was well contained within sight of a monolith of sorts. Today, applications are very hybrid in nature. Theres computing thats happening on-prem. Theres aspects of that computation that may happen in a hybrid fashion on infrastructure-as-a-service provider. Data is just being sent wherever its needed, basically to be utilized by highly distributed applications. In a hybrid cloud era, we expect that the infrastructure has become far more distributed and therefore [so is] the computing and therefore where the data needs to flow in order to perform that computing.

IBM has been an active player in the development of FHE, with IBM researcher Craig Gentry in 2009 demonstrating the first working algorithm for homomorphic encryption, though it was far too slow for practical use. More recently, Big Blue this summer ran successful FHE field trials and released a FHE toolkit for MacOS and iOS, Apple operating systems, adding Linux and Android later. This month, announced its IBM Security Homomorphic Encryption Services, a scalable offering hosted on IBM Cloud that gives organizations an environment for experimenting with the encryption technology and consulting and managed services to help them with their efforts.

Over the past decade, IBM and other companies have worked to make processing encrypted data faster. The demonstration in 2009 showed it could be done, but at the time it could take days or weeks to run FHE calculations that otherwise would take seconds on decrypted data. The organizations worked to improve the algorithms used for FHE and IBM created open-source libraries, such as HELib and the aforementioned FHE Toolkit. The result is homomorphic encryption that is more functionally viable and ready for wider use. The algorithms IBM is using on its new cloud service are founded on lattice-based cryptography, an encryption technology that is being developed to push back at the oncoming cyberthreats that will arrive with more widespread quantum computing.

The combination of expanded compute power and advanced algorithms, FHE can now be performed at seconds-per-bit, an important measurement that indicates that homomorphic encryption is fast enough to be used in increasing numbers of use cases and early trials. Examples of uses cases can include healthcare facilities that want to give patient data to clinical researchers to help them search for cures for a disease but cant do so now because regulations prevent exposing such sensitive data to third parties or retailers who want to do more targeted marketing but are worried about jeopardizing trust of their consumers by using their data in a way that exposes it.

Over the last 10 years, a lot of what it comes down to is just the math, Maass says. It gets down to finding efficiencies in the way that the math is being done to improve the speed. Way back in the day, a single digit being computed in an FHE-enabled application took somewhere around a half an hour. We improved that. Its still multiple times slower than performing the same calculation on clear text data, but its improved to the point where a lot of the computation that we make here about basic analysis, statistical analysis of data, that sort of stuff, could be done in a way thats almost imperceptible.

IBMs FHE Services offering has two key goals: To give enterprises a cloud-based environment trying out the technology and running experiments and as a way of educating organizations and offering them services and support from IBM cryptography experts, both with the aim of preparing them to build and deploy FHE-enabled applications. The tools were developed by IBM Research and IBM Z, offering templates for common FHE use cases, including encrypted search, AI, machine learning and analytics. The IBM Cloud infrastructure can scale as needed.

There continue to be challenges to mass adoption of homomorphic encryption, Maass says. FHE is complex and requires a lot of compute power as much as 100 times the compute resources of operations on plaintext data the lattice encryption keys and other FHE-specific technologies are not mainstream and may need particular infrastructure, and coding for FHE may be different from traditional methods. Applications and data need to be prepared in particular ways when dealing with FHE.

Data preparation really has a lot to do with what use case you plan to implement with the technology, he says. The simplest example is if you picture a spreadsheet of data, you have rows and columns. Traditional databases have rows and columns of data. Often with [FHE] data preparation, the columns need to become rows and the rows need to become columns. There are certain types of math that needs to take place in which were twisting and turning the data in ways that its not natively coming out of a traditional relational database. Its not overly complex, but it does take understanding those constraints and use cases in order to plan for that. Clearly, systems as they exist today for storing data within these organizations are not going to be natively compatible if we need to start twisting and turning the data that way.

Likely candidates for using FHE include organizations in highly regulated industries healthcare, financial services, retail and the like and those using data in highly collaborative and distributed, which is getting more common with the growing adoption of hybrid clouds.

That said, FHE will be a targeted sort of technology, not one designed to be a wholesale replacement for all forms of encryption, he says. Were going to still see basic asymmetric and symmetric encryption that exists for data at rest and data in transport continue to be the primary way to do that job. They do it well. They do efficiently. This is really targeted at data that needs to be protected as its being put into an untrusted domain, shared with a third party, maybe being utilized in an untrusted cloud computing environment where its out of our hands and we want to make sure that its not going to be exposed as were computing on it. Theres a time and place for every form of cryptography and we see this as complementary to the data at rest and data in transit algorithms and techniques that are out there today.

Its going to take time, but two to three years down the road homomorphic encryption will have evolved from a fresh-from-the-lab technology to one that is more widely used, Maass says. Gartner analysts earlier this year predicted that by 2025, at least 20 percent companies will have projects on the books that include FHE, up from about 1 percent now. IBMs FHE Services offering is a step in that direction by getting organizations prepared for the technologys evolution.

Continued here:
IBM Leverages Cloud To Push The Encryption Envelope - The Next Platform

Blockchain Can Provide Efficiencies in Healthcare and Other Sectors – Business West

More Than Just Bitcoin

By Matthew Ogrodowicz, MSA

Blockchain is a term used to broadly describe the cryptographic technology that underpins several applications, the most widely known of which is Bitcoin and other similar cryptocurrencies.

Matthew Ogrodowicz

Even though it is the largest current application, a survey conducted on behalf of the American Institute of Certified Public Accountants (AICPA) in 2018 found that 48% of American adults were not familiar with Bitcoin, Ethereum, or Litecoin, three cryptocurrencies among those with the largest market capitalizations. The largest of these, Bitcoin, currently sits at a market capitalization of approximately $355 billion. If half of all adults are unfamiliar with this largest application, it is safe to assume that even fewer know about other ways the technology could be used including for some of the regions major industries.

Three of these largest industries in Western Mass. are healthcare, manufacturing, and higher education. In each of these industries, the secure and verifiable information network created by blockchain can provide efficiencies. This network, essentially a public ledger, consists of a series of transactions (blocks), which is distributed and replicated across a network of computers referred to as nodes. These nodes each maintain a copy of the ledger, which can only be added to by the solving of a cryptographic puzzle that is verified by other nodes in the network.

The information on the ledger is maintained by another aspect of cryptography, which is that the same data encrypted in the same way produces the same result, so if data earlier in the chain is manipulated, it will be rejected by the other nodes even though the data itself is encrypted. Thus, an immutable chain of verifiable, secure information is created, capable of supporting applications in the aforementioned fields.

Each of these industries can benefit from the blockchains ability to host smart contracts. A smart contract is a digital protocol intended to facilitate, verify, or enforce the performance of a transaction. The simplest analogue is that of a vending machine once payment is made, an item is delivered. Smart contracts would exist on the blockchain and would be triggered by a predefined condition or action agreed upon by the parties beforehand. This allows the parties to transact directly without the need for intermediaries, providing time and cost savings as well as automation and accuracy.

Combined with the security and immutability noted earlier, smart contracts should prove to be a valuable tool, though there is still work to be done in codifying and establishing legal frameworks around smart contracts. Other applications of blockchain technology are more specifically applicable to individual fields.

In the field of healthcare, blockchains ability to process, validate, and sanction access to data could lead to a centralized repository of electronic health records and allow patients to permit and/or revoke read-and-write privileges to certain doctors or facilities as they deem necessary. This would allow patients more control over who has access to their personal health records while providing for quick transfers and reductions in administrative delay.

In the field of manufacturing, blockchain can provide more supply-chain efficiency and transparency by codifying and tracking the routes and intermediate steps, including carriers and time of arrival and departure, without allowing for unauthorized modification of this information. In a similar fashion, blockchain can provide manufacturers assurance that the goods they have received are exactly those they have ordered and that they are without defect by allowing for tracking of individual parts or other raw materials.

Finally, in the field of higher education, blockchain could be used to improve record keeping of degrees and certifications in a manner similar to that of electronic medical records. Beyond that, intellectual property such as research, scholarly publications, media works, and presentations could be protected by the blockchain by allowing for ease of sharing them while preserving the ability to control how they are used.

And, of course, blockchain development will be a skill high in demand that will benefit from the creation of interdisciplinary programs at colleges and universities that help students understand the development of blockchain networks as well the areas of business, technology, law, and commerce that are impacted by it.

For these reasons and many more, businesses should feel an urgency to increase their knowledge of blockchains impact on their industries while exploring the potential dividends that could be reaped by a foray into an emerging technology.

Matthew Ogrodowicz, MSA is a senior associate at the Holyoke-based accounting firm Meyers Brothers Kalicka, P.C.

Read the original:
Blockchain Can Provide Efficiencies in Healthcare and Other Sectors - Business West