The ruling elite’s war on truth: America’s leaders are increasingly disconnected from reality – Salon

Joe Biden's victory instantly obliterated the Democratic Party's longstanding charge that Russia was hijacking and compromising U.S. elections. The Biden victory, the Democratic Party leaders and their courtiers in the media now insist, is evidence that the democratic process is strong and untainted, that the system works. The elections ratified the will of the people.

But imagine if Donald Trump had been re-elected. Would the Democrats and pundits at The New York Times, CNN and MSNBC pay homage to a fair electoral process? Or, having spent four years trying to impugn the integrity of the 2016 presidential race, would they once again haul out the blunt instrument of Russian interference to paint Trump as Vladimir Putin's Manchurian candidate?

Trump and Giuliani are vulgar and buffoonish, but they play the same slimy game as their Democratic opponents.The Republicans scapegoat the deep state, communists and now, bizarrely, Venezuela; the Democrats scapegoat Russia. The widening disconnect from reality by the ruling elite is intended to mask their complicity in the seizure of power by predatory global corporations and billionaires.

"This is a disgraceful thing that was done in this country," Giuliani said at his recent bad-hair-day press conference. "Probably not much more disgraceful than the things these people did in office, which you didn't and don't bother to cover and you conceal from the American people, but we let this happen, we use largely a Venezuelan voting machine in essence to count our vote. We let this happen. We're going to become Venezuela. We cannot let this happen to us. We cannot allow these crooks, because that's what they are, to steal an election from the American people. They elected Donald Trump. They didn't elect Joe Biden. Joe Biden is in the lead because of the fraudulent ballots, the illegal ballots, that were produced and that were allowed to be used, after the election was over."

Giuliani's rant was topped by those of Sidney Powell,until this weekanother of Trump's lawyers, who blamed software designed for Hugo Chvez, who died in 2013, for Trump's loss, as well as "the massive influence of Communist money." The software "was created so Hugo Chvez would never lose another election, and he did not after that software was created," Powell said. "He won every single election and then they exported it to Argentina and other countries in South America, and then they brought it here."

Compare this to how Hillary Clinton, during the recent primary campaign, warned that the Russians were "grooming" a female candidate, widely assumed to be Rep. Tulsi Gabbard, to run as a third-party candidate to serve Russian interests. Previously, Clinton called the 2016 Green Party candidate Jill Stein a "Russian asset." She insisted, although special counsel Robert Mueller and his prosecutors found no evidence to support her charge, that the Trump campaign had worked closely in 2016 with Moscow and WikiLeaks which she insists is a Russian front to defeat her. Clinton's staff put together a "hit list" in the final days of her 2008 campaign, according to the book,"Shattered: Inside Hillary Clinton's Doomed Campaign"by Jonathan Allen and Amie Parnes, listing those who were loyal to the Clintons and those who were not. They used a scale of 1 to 7.

"Step back and think about it," Clinton wrote in her book, "What Happened," about the 2016 election. "The Russians hacked our election systems. They got inside. They tried to delete or alter voter information. This should send a shiver down the spine of every American."

Never mind that both ruling parties are silent about themassive interference in our elections byIsrael, which uses its lobbying groups to lavishly fund political candidates in both parties and flies members of Congress and their families to Israel for junkets at seaside resorts. Israel's intrusion in our political process, including when Israeli Prime Minister Benjamin Netanyahu addressed Congress in 2015, without informing then President Barack Obama, to attack the president's Iran nuclear deal, dwarfs that of any other country, including Russia.

The two warring factions within the ruling elite, which fight primarily over the spoils of power while abjectly serving corporate interests, peddle alternative realities. If the deep state and Venezuelan socialists or Russia intelligence operatives are pulling the strings, no one in power is accountable for the rage and alienation caused by the social inequality, the unassailability of corporate power, the legalized bribery that defines our political process, the endless wars, austerity and de-industrialization. The social breakdown is, instead, the fault of shadowy phantom enemies manipulating groups such as Black Lives Matteror the Green Party.

"The people who run this country have run out of workable myths with which to distract the public, and in a moment of extreme crisis have chosen to stoke civil war and defame the rest of us black and white rather than admit to a generation of corruption, betrayal, and mismanagement," Matt Taibbi writes.

These fictional narratives are dangerous. They erode the credibility of democratic institutions and electoral politics. They posit that news and facts are no longer true or false. Information is accepted or discarded based on whether it hurts or promotes one faction over another. While outlets such as Fox News have always existed as an arm of the Republican Party, this partisanship has now infected nearly all news organizations, including publications such as The New York Times and The Washington Post,along with the major tech platforms that disseminate information and news. A fragmented public with no common narrative believes whatever it wants to believe.

I first assumed this job posting from the New York Times for a Moscow correspondentwas a parody posted by the Onion. It wasn't. It speaks volumes about the self-immolation of the New York Timesand the press.

JOB DESCRIPTION:Vladimir Putin's Russia remains one of the biggest stories in the world. It sends out hit squads armed with nerve agents against its enemies, most recently the opposition leader Aleksei Navalny. It has its cyber agents sow chaos and disharmony in the West to tarnish its democratic systems, while promoting its faux version of democracy. It has deployed private military contractors around the globe to secretly spread its influence. At home, its hospitals are filling up fast with Covid patients as its president hides out in his villa. If that sounds like a place you want to cover, then we have good news: We will have an opening for a new correspondent as Andy Higgins takes over as our next Eastern Europe Bureau Chief early next year.

Of course, every charge leveled here against Russia regarding foreign interference can be leveled in spades against the United States, both in the present and past, and even the implied criticism of its pandemic response seems like a textbook case of projection. More to the point, why should the Times even send someone to Moscow to report on what Russians think, feel and how they view themselves and the world if they have already decided they are a cartoon villain? Why have a Moscow bureau at all?

A parody response circulating on the internet imagined a parallel posting byPravdafor a U.S. correspondent:

JOB DESCRIPTION:Donald Trump's America remains one of the biggest stories in the world. It sends out its armies, its drones, and its agents around the world to kill its enemies. It has its cyber agents sow chaos and disharmony, undermining and overthrowing regimes, while promoting its faux version of democracy. It has deployed private military contractors around the globe to secretly spread its influence. At home, its hospitals are filling up fast with Covid patients as its president hides out on the golf course. If that sounds like a place you want to cover, then we have good news. We will have an opening for a new correspondent.

I was a foreign correspondent for 20 years, 15 of them with the New York Times. My job was to become bicultural, which requires hundreds of hours of language classes, to see the world from the perspective of those I covered and reflect it back to an American audience. But this type of reporting is now anachronistic.The paper might as well rehire the con artist Jayson Blair to sit in his apartment and snort coke while filing fictional variants on the preordained narrative the paper demands. Or maybe computer algorithms can do the job.

I guess I should not be surprised. After all, it was the Times that produced a 10-part podcast by its reporter Rukmini Callimachi based on interviews with a Muslim identified as Abu Huzayfah al-Kanadi who claimed to have been a member of ISIS in the Middle East. He provided lurid accounts of murders and crucifixions he supposedly carried out. His stories, catering to the rampant Islamophobia that poisons American society, were the audio version of snuff films. They were also a lie. The Canadian "Abu Huzayfah," whose real name was Shehroze Chaudhry, was arrested in September 2020 by the Royal Canadian Mounted Policeand charged under Canadian hoax laws for fabricating his story.

The flagrant partisanship and discrediting of truth across the political spectrum are swiftly fueling the rise of an authoritarian state. The credibility of democratic institutions and electoral politics, already deeply corrupted by PACs, the Electoral College, lobbyists, the disenfranchisement of third-party candidates, gerrymandering and voter suppression, is being eviscerated.

Silicon Valley billionaires, including Facebook co-founder Dustin Moskovitz and ex-Google CEO Eric Schmidt, donated more than $100 million to a Democratic super PAC that created a torrent of anti-Trump TV ads in the final weeks of the campaign to elect Biden. The heavy infusion of corporate money to support Biden wasn't done to protect democracy. It was done because these corporations and billionaires know a Biden administration will serve their interests.

The press, meanwhile, has largely given up on journalism. It has retreated into competing echo chambers that only speak to true believers. This catering exclusively to one demographic, which it sets against another demographic, is commercially profitable. But it also guarantees the balkanization of the United States and edges us closer and closer to fratricide.

When Trump leaves the White House millions of his enraged supports, hermetically sealed inside hyperventilating media platforms that feed back to them their rage and hate, will see the vote as fraudulent, the political system as rigged, and the establishment press as propaganda. They will target, I fearthrough violence, the Democratic Party politicians, mainstream media outlets and those they demonize as conspiratorial members of the deep state, such as Dr. Anthony Fauci. The Democratic Party is as much to blame for this disintegration as Trump and the Republican Party.

The election of Biden is also very bad news for journalists such as Matt Taibbi, Glen Ford, Margaret Kimberley, Glenn Greenwald, Jeffrey St. Clair or Robert Scheer who refuse to be courtiers to the ruling elites. Journalists that do not spew the approved narrative of the right-wing, or, alternatively, the approved narrative of the Democratic Party, have a credibility the ruling elite fears. The worse things get and they will get worse as the pandemic leaves hundreds of thousands dead and thrusts millions of Americans into severe economic distress the more those who seek to hold the ruling elites, and in particular the Democratic Party, accountable will be targeted and censored in ways familiar to WikiLeaks and Julian Assange, now in a London prison and facing possible extradition to the United States and life imprisonment.

Barack Obama's assault on civil liberties, which included the repeated misuse of the Espionage Act to prosecute whistleblowers, the passage of Section 1021 of the National Defense Authorization Actto permit the military to act as a domestic police force and the ordering of the assassination of U.S. citizens deemed to be terrorists in Yemen, was far worse than those of George W. Bush. Biden's assault on civil liberties, I suspect, will surpass those of the Obama administration.

The censorship was heavy-handed during the campaign. Digital media platforms, including Google, Twitter, YouTube and Facebook, along with the establishment press worked shamelessly as propaganda arms for the Biden campaign. They were determined not to make the "mistake" they made in 2016 when they reported on the damaging emails, released by WikiLeaks, from Hillary Clinton's campaign chairman John Podesta. Although the emails were genuine, papers such as the New York Times routinely refer to the Podesta emails as "disinformation." This, no doubt, pleases its readership, 91 percent of whom identify as Democrats according to the Pew Research Center. But it is another example of journalistic malfeasance.

Following the election of Trump, the media outlets that cater to a Democratic Party readership made amends. The New York Times was one of the principal platforms that amplified Russiagate conspiracies, most of which turned out to be false. At the same time, the paper largely ignored the plight of the dispossessed working class that supported Trump. When the Russiagate story collapsed, the paper pivoted to focus on race, embodied in the 1619 Project. The root cause of social disintegration the neoliberal order, austerity and deindustrialization was ignored, since naming it would alienate the paper's corporate advertisers and the elites on whom the paper depends for access.

Once the 2020 election started, the New York Times and other mainstream outlets censored and discredited information that could hurt Biden, including a tape of Biden speaking with former Ukrainian President Petro Poroshenko, which appears to be authentic. They gave credibility to any rumor, however spurious, which was unfavorable to Trump. Twitter and Facebook blocked access to a New York Post story about the emails allegedly found on Hunter Biden's discarded laptop. Twitter locked the New York Post out of its own account for over a week. Glenn Greenwald, whose article on Hunter Biden was censored by his editors at The Intercept, which he helped found, resigned. He released the email exchanges with his editors over his article. Ignoring the textual evidence of censorship, editors and writers at The Intercept engaged in a public campaign of character assassination against Greenwald. This sordid behavior by self-identified progressive journalists is a page out of the Trump playbook and a sad commentary on the collapse of journalistic integrity.

The censorship and manipulation of information was honed and perfected against WikiLeaks. When WikiLeaks tries to release information, it is hit with botnets or distributed denial of service attacks. Malware attacks WikiLeaks' domain and website. The WikiLeaks site is routinely shut down or unable to serve its content to its readers. Attempts by WikiLeaks to hold press conferences see the audio distorted and the visual images corrupted. Links to WikiLeaks events are delayed or cut. Algorithms block the dissemination of WikiLeaks content. Hosting services, including Amazon, removed WikiLeaks from its servers. Julian Assange, after releasing the Iraqi war logs, saw his bank accounts and credit cards frozen. WikiLeaks' PayPal accounts were disabled to cut off donations. The Freedom of the Press Foundation in December 2017 closed down the anonymous funding channel to WikiLeaks which was set up to protect the anonymity of donors. A well-orchestrated smear campaign against Assange was amplified and given credibility by the mass media and filmmakers such as Alex Gibney. Assange and WikiLeaks were first. We are next.

Sen.Chris Murphy, D-Conn., told CNN during this campaign that Russian disinformation efforts are "more problematic" than in 2016. He warned that "this time around, the Russians have decided to cultivate U.S. citizens as assets. They are attempting to try to spread their propaganda in the mainstream media."

This will be the official mantra of the Democratic Party, a vicious redbaiting campaign without actual reds, especially as the country spirals out of control. The reason I have a show on Russia-fundedRT Americais the same reason Vaclav Havel could only be heard on the US-fundedVoice of Americaduring the communist control of Czechoslovakia. I did not choose to leave the mainstream media. I was pushed out. And once anyone is pushed out, the ruling elite is relentless about discrediting the few platforms left willing to give them, and the issues they raise, a hearing.

"If the problem is 'American citizens' being cultivated as 'assets' trying to put 'interference' in the mainstream media, the logical next step is to start asking Internet platforms to shut down accounts belonging to any American journalist with the temerity to report material leaked by foreigners (the wrong foreigners, of course it will continue to be okay to report things like the 'black ledger'),"writes Taibbi, who has done some of the best reporting on the emerging censorship. "FromFoxor theDaily Calleron the right,to left-leaning outlets likeConsortiumor theWorld Socialist Web Site,to writers like me even we're all now clearly in range of new speech restrictions, even if we stick to long-ago-established factual standards."

Taibbi argues that the precedent for overt censorship took place when the major digital platforms Facebook, Twitter, Google, Spotify, YouTube in a coordinated move blacklisted the right-wing talk show host Alex Jones.

"Liberal America cheered," Taibbi told me when I interviewed him for my show, "On Contact":

They said, "Well, this is a noxious figure. This is a great thing. Finally, someone's taking action."What they didn't realize is that we were trading an old system of speech regulation for a new one without any public discussion. You and I were raised in a system where you got punished for speech if you committed libel or slander or if there was imminent incitement to lawless action, right? That was the standard that the Supreme Court set, but that was done through litigation. There was an open process where you had a chance to rebut charges. That is all gone now. Now, basically there's a handful of these tech distribution platforms that control how people get their media. They've been pressured by the Senate, which has called all of their CEOs in, and basically ordered them, "We need you to come up with a plan to prevent the sowing of discord and spreading of misinformation."This has finally come into fruition. You see a major reputable news organization like the New York Post with a 200-year history locked out of its own Twitter account. The story [Hunter Biden's emails] has not been disproven. It's not disinformation or misinformation. It's been suppressed as it would be suppressed in a Third World country. It's a remarkable historic moment. The danger is that we end up with a one-party informational system. There's going to be approved dialogue and unapproved dialogue that you can only get through certain fringe avenues. That's the problem. We let these companies get this monopolistic share of the distribution system. Now they're exercising that power.

In the Soviet Union the truth was passed, often hand to hand, in undergroundsamizdatdocuments, clandestine copies of news and literature banned by the state. The truth will endure. It will be heard by those who seek it out. It will expose the mendacity of the powerful, however hard it will be to obtain. Despotisms fear the truth. They know it is a mortal threat. If we remain determined to live in truth, no matter the cost, we have a chance.

Visit link:
The ruling elite's war on truth: America's leaders are increasingly disconnected from reality - Salon

Symmetric Encryption Algorithms: Live Long & Encrypt – Hashed Out by The SSL Store – Hashed Out by The SSL Store

Much like tribbles in Star Trek, symmetric encryption is everywhere. Well explore symmetric key algorithms and take you to places no non-IT person has gone before

Symmetric encryption algorithms are the underlying processes that make secure communications possible. If you were to put it into Star Trek-related terms, symmetric algorithms are the warp drive for your starships propulsion system. Theyre integral to information security and are what help your business move forward with data encryption securely and at faster-than-light speeds.

(Yes, I know, Im really flying my nerd flag high today. While fascinating, symmetric key algorithms arent exactly light or easy reading so Ive got to have some fun when writing. Damn it, Jim, Im a cybersecurity writer, not a cryptographer.)

Make sure to refresh your coffee (or earl grey tea, if thats more your speed). Were about to take a deep dive into exploring what symmetric encryption algorithms are, why theyre important, and what the most common symmetric encryption algorithm types are.

Make it so.

Lets hash it out.

Symmetric algorithms are the cryptographic functions that are central to symmetric key encryption. Theyre a set of instructions or steps that computers follow to perform specific tasks relating to encrypting and decrypting data.

Feel like you need a universal translator? Okay, lets break this down a bit more.

Symmetric encryption algorithms are used (combined with an encryption key) to do two main things:

Symmetric encryption algorithms use the same encryption key for both encryption and decryption. (Unlike asymmetric encryption algorithms, which use two different keys.)

Encryption algorithms, in general, are based in mathematics and can range from very simple to very complex processes depending on their design. In the case of symmetric encryption algorithms, theyre paired with a single key to convert readable (plaintext) data into unintelligible gibberish (ciphertext). They then use the same key to then decrypt the ciphertext back into plaintext. And all of this is done in a way that ensures data confidentiality and privacy. Pretty cool, huh?

Symmetric encryption algorithms are actually known by a few different names:

In general, the purpose or goal of encryption is to make it so that only someone with the key can decrypt and read the secret message. In case you need a quick reminder of how symmetric encryption works, heres a quick overview:

In this graphic above, moving from left to right, youll see that you start with the plaintext, readable data. Once the symmetric encryption algorithm and key are applied to that data, it becomes unreadable ciphertext. The way to decrypt that message to decipher its meaning is to use a decryption key. In the case of symmetric encryption, the decryption key is identical to the key that was used to encrypt the data. Basically, you use the same key twice.

In a nutshell, a symmetric algorithm is a set of instructions in cryptography that use one key to encrypt and decrypt data. These encryption algorithms and keys are lightweight in the sense that theyre designed for speed in processing large blocks or streams of data. (This is why symmetric encryption algorithms are known as bulk ciphers.)

Asymmetric key algorithms and keys, on the other hand, are resource eaters. The keys are massive and are expensive to use at scale. What I mean is that they suck up a lot of your CPU processing resources and time, battery power, and bandwidth to execute.

Remember how we described symmetric algorithms as being a key component of your warp drive? Lets continue with that analogy. So, if you were to think about what asymmetric encryption algorithms are, theyd be like the equivalent of the thrusters in the propulsion system. Sure, theyll get you there eventually, but theyre not suitable for rapid encryption at scale.

However, theyre great for encrypting smaller batches of data in public channels. And asymmetric key exchanges (which well talk more about shortly) are a great way to distribute keys in those insecure public channels.

This is why people often turn to symmetric encryption for encoding large amounts of data.

As youll soon discover, not all symmetric algorithms are created equally. They vary in terms of strength but what exactly is does strength mean in cryptography? The short answer is that cryptographic strength is all about how hard it is for a hacker to break the encryption to gain access to the data. The longer answer, of course, may vary depending on the type of algorithm you evaluate. But, in general, cryptographic strength typically boils down to a few key traits:

Symmetric encryption can be a bit of a balancing act because you need algorithms and keys that are computationally hard yet practical enough to use with acceptable performance.

While symmetric encryption algorithms might sound like the most logical tools for all types of online data encryption, its not quite that simple. Much like the ever-logical Spock and the charismatic Captain Kirk, symmetric encryption also has weaknesses especially when used on their own in public channels. These weaknesses come in the form of key distribution and key management issues:

When using symmetric encryption, ideally, you and the person youre communicating with sort out your secret key ahead of time (prior to using it for any data exchanges). This means that in order to share a symmetric key securely with someone, youd need to meet up with them in person to give it to them. But what if youre across the country from the other party? Or, worse, what if youre on the other side of the world from them?

While this wouldnt be an issue in the Star Trek universe, where you could simply transport from one place to another within seconds, this isnt feasible in our 21st century transporterless world. Here, people are exchanging information with web servers worldwide every moment of every day. This means that people cant meet up ahead of time to hand out or receive keys. So, we have to rely on other means to securely exchange keys with other parties.

This is where asymmetric algorithms or, more specifically, key exchange protocols come into play. Asymmetric key exchanges make it possible to exchange symmetric keys in otherwise insecure public channels. What you may or may not realize is that youre actually using this combination of symmetric and asymmetric encryption techniques right now.

Lets consider your connection to our website as an example. See that padlock icon in your browser? It means youre connected to a secure website.

So, when you initially connected to TheSSLstore.com, your browser had to perform a process with our server thats known as a TLS handshake. This handshake is a way for the server to prove to your browser that its legitimate and isnt an imposter. (You know, cause cybercriminals love to pretend to be other people to trick people in connecting with them. Theyre kind of like Romulans in that way always engaging in subterfuge.) The handshake process uses asymmetric encryption and asymmetric key exchange processes to do this.

Of course, there are a few versions of the handshake TLS 1.0, TLS 1.2, TLS 1.3 and there specific differences in how they work. (For example, the Internet Engineering Task Force [IETF] pushes for the strict use of forward-secrecy-only ciphers in TLS 1.3 but thats a topic for another time.) Just know that only the TLS 1.2 handshake should be the minimum used. As of October 2020, Qualys SSL Labs reports that 99% of sites support the TLS 1.2 protocol and 39.8% support the TLS 1.3 protocol.

We wont get into the specifics of how the TLS handshake works here, but know that it involves the use of cipher suites. These groups of ciphers are what help to make it possible to establish a secure, HTTPS connection by determining which of each of the following to use:

You can read more about the process in this explainer blog on how the TLS handshake works. But for now, lets stay with the topic at hand of symmetric encryption algorithms.

During the symmetric encryption that takes place when you connect securely to a website, youre using a bulk cipher to make that happen. There are two subcategories of bulk ciphers: block ciphers and stream ciphers.

In this type of cipher, plaintext data breaks down into fixed-length groups of bits known as blocks (which are typically connected via a process known as chaining). Each block then gets encrypted as a unit, which makes this process a bit slow. And if theres not enough data to completely fill a block, padding (typically an agreed upon number of 0s) is then used to ensure that the blocks meet the fixed-length requirements.

The ideal block cipher has a massive key length that isnt practical, so many modern ciphers have to scale back key sizes to make them usable. But just as a quick note: Unlike with asymmetric encryption, symmetric encryption key sizes dont determine the size of the data blocks.

The majority of modern symmetric encryption algorithms fall within the block cipher camp, and these types of ciphers have broader usage and application opportunities. So, were mainly going to focus on them here. But if youre wondering what the most popular or common stream ciphers are, dont worry, weve got you covered.

With this type of cipher, it encrypts plaintext data one bit at a time. As such, data gets processed in a stream rather than in chunks like in block ciphers. This makes the process less resource-intensive and faster to achieve.

Now, were not going to get into all of the specifics of block ciphers and stream ciphers thats a whole other topic for another time. Just be sure to keep an eye out in the coming weeks for a separate article that breaks down block ciphers and stream ciphers.

Okay, now this is where things start to get exciting (or more complicated, depending on your perspective). With shared key encryption, there are several well-known symmetric key algorithms to know. Lets break them all down to understand what they are and how they work.

For this section, weve put together a symmetric algorithm list that will help us navigate the most common symmetric ciphers. Well start with one of the oldest and work our way up to the latest and greatest meaning, the algorithm that we typically use today for modern symmetric encryption.

First up on our list is the data encryption standard. DES, also known as DEA (short for data encryption algorithm), is one of the earliest symmetric encryption algorithms thats since been deprecated. Its based on the Feistel Cipher (much like many other varieties of block ciphers) and was actually deemed one of the first symmetric algorithms to be adopted as a Federal Information Processing Standard (FIPS) in 1976.

DES dates back to the early 1970s when its original form (Lucifer) was developed by IBM cryptographer Horst Feistel. IBM reports that the encryption method was originally created at the behest of Lloyds Bank of the United Kingdom. The National Bureau of Standards (now known as the National Institute of Standards, or NIST for short) ended up seeking proposals for a commercial application for encryption, and IBM submitted a variation of it. It was even desired for use by the National Security Agency (NSA) to protect their data.

This type of symmetric encryption maps inputs of a specific length to outputs of a specific length. As such, it operates on 64-bit blocks meaning that it could encrypt data in groups of up to 64 blocks simultaneously and has a key size of 56 bits. There are also 8 additional parity bits to the key, which serve as a way to check for data transmission errors. However, its important to note that parity bits arent something youd ever use for encryption.

This size key is actually very small by todays standards, which makes it highly susceptible to brute force attacks. Also, the key and block lengths differ from the original Lucifer key and block lengths, both of which were reduced from 128 bits.

To learn more about how DES encryption and Feistel Networks work, check out this great video from Coursera and Stanford University.

The Data Encryption Standard (DES) document (FIPS PUB 46-3) was officially withdrawn on May 19, 2005, along with the documents FIPS 74 and FIPS 81. The National institute of Standards and Technologys Secretary of Commerce published the following in the Federal Register:

These FIPS are withdrawn because FIPS 46-3, DES, no longer provides the security that is needed to protect Federal government information. FIPS 74 and 81 are associated standards that provide for the implementation and operation of the DES.

DES encryption was succeeded by triple data encryption algorithm (TDEA) for some applications, although not all. However, DES was primarily superseded as a recommendation by the advanced encryption standard, or whats known as AES encryption, in 2000. This is what we most commonly use today for symmetric encryption.

Now, lets explore those two other types of symmetric encryption algorithms.

The triple data encryption algorithm, which was created in the late 1990s, is a bit tricky as it actually goes by several abbreviations: TDEA, TDES, and 3DES. But as you can probably guess from its name, 3DES is based on the concept of DES but with a twist.

Unlike its predecessor, TDEA uses multiple separate keys to encrypt data one variation of TDEA uses two keys and the other variation uses three keys (hence the triple in its name). The stronger of the two is the one that uses three keys.

Heres an illustration of how the three-key TDEA process works:

The use of multiple keys makes processing data slow and increases the computational overhead, which is why organizations often skipped over 3DES and moved straight on to using AES.

TDEA operates using a decent 168-bit key size. However, like DES, 3DES also operates on small 64-bit blocks. Its small block size made it susceptible to the sweet32 vulnerability (CVE-2016-2183 and CVE-2016-6329), or whats known as the sweet32 birthday attack. This exploit takes advantage of a vulnerability that enables unintended parties to access portions of DES/TDEA-encrypted data.

The TDEA symmetric key encryption algorithm is set to deprecate in terms of being useful for cryptographic protection in 2023. However, in the meantime, NIST SP 800-76 Rev. 2 specifies that 3DES can be used by federal government organizations to protect sensitive unclassified data so long as its used within the context of a total security program. Such a program would include:

AES is the most common type of symmetric encryption algorithm that we use today. In fact, even the NSA uses AES encryption to help secure its sensitive data.

AES is a variant of the Rijndael family of symmetric encryption algorithms. Unlike its DES or TDEA counterparts, its based on a substitution-permutation network. So, it uses this as its foundation in lieu of the Feistel cipher. Youll find the advanced encryption standard in use for everything from SSL/TLS encryption to wireless and processor security. Its fast, secure, and doesnt noticeably increase your processing overhead (at least, when you use the right key).

AES operates on block sizes of 128 bits, regardless of the key size used, and performs encryption operations in multiple rounds.

Theres a total of four AES encryption sub-processes:

The rounds, which are performed on the plaintext data, uses substitutions from a lookup table. So, one of the rounds looks akin to this:

AES, which became the new FIPS-approved encryption standard after replacing DES and superseding 3DES, has a maximum key size of up to 256 bits. This is about 4.5 times larger than a DES key. Any larger, and it wouldnt be practical for at-scale applications. Now, the size of the key determines how many rounds of operations will execute for example, a 128-bit key will have 10 rounds, whereas a 256-bit key will have 14.

Of course, AES encryption is incredibly strong. So, any attempts to crack AES via brute force using modern computer technology is futile, as a certain collective of cybernetic individuals love to say. Even Lt. Commander Data would likely struggle with such a computational effort. I say that because even quantum computers arent expected to have as big of an effect on symmetric encryption algorithm as it will on, say, modern asymmetric encryption methods. (Symmetric encryption methods would require larger keys to be quantum resistant, whereas public key methods will no longer be secure period.)

For a more in depth look at the advanced encryption standard, be sure to check out our other article on the topic. There, youll get a highly technical look at how AES works.

There are plenty of other types of symmetric encryption algorithms that are useful for different purposes and cryptographic functions. Just to give you a quick taste, the list of some of these algorithms include:

Of course, there are other ciphers, too but were not going to include them all here. But this at least gives you some examples of whats out there as far as AES algorithms are concerned.

Symmetric encryption algorithms, when used on their own, are best suited for encrypting data at rest or in non-public channels. I say that because theyre often found protecting at-rest data in various situations, including databases, online services, and banking-related transactions. (The latter is because the Payment Card Industry Data Security Standards, or PCI DSS for short, requires it.)

However, those arent the only places theyre useful. Oh, no youll also find symmetric algorithms in use across the internet. When you use them in conjunction with asymmetric encryption for key exchange such as when you connect to a secure website then symmetric encryption comes into play with services such as:

Didnt feel like diving into all of the technical mumbo-jumbo? (Or didnt feel like reading through my nerdy Star Trek comparisons of symmetric encryption algorithms?) No worries. Here are a few of the main takeaways from this article on symmetric key algorithms:

Be sure to stay tuned for our next chapter in this blog series on symmetric encryption in the coming weeks. And until next time live long and proper.

Originally posted here:
Symmetric Encryption Algorithms: Live Long & Encrypt - Hashed Out by The SSL Store - Hashed Out by The SSL Store

Google plans to test end-to-end encryption in Android messages – TechCrunch

For the past year and a half, Google has been rolling out its next-generation messaging to Android users to replace the old, clunky, and insecure SMS text messaging. Now the company says that rollout is complete, and plans to bring end-to-end encryption to Android messages next year.

Googles Rich Communications Services is Androids answer to Apples iMessage, and brings typing indicators, read receipts, and youd expect from most messaging apps these days.

In a blog post Thursday, Google said it plans to roll out end-to-end encryption starting with one-on-one conversations leaving open the possibility of end-to-end encrypted group chats. Itll become available to beta testers, who can sign up here, beginning later in November and continue into the new year.

End-to-end encryption prevents anyone even Google from reading messages as they travel between sender and the recipient.

Google dipped its toes into the end-to-end encrypted messaging space in 2016 with the launch of Allo, an app that immediately drew criticism from security experts for not enabling the security feature by default. Two years later, Google killed off the project altogether.

This time around, Google learned its lesson. Android messages will default to end-to-end encryption once the feature becomes available, and wont revert back to SMS unless the users in the conversation loses or disables RCS.

Read the original post:
Google plans to test end-to-end encryption in Android messages - TechCrunch

Alan partners with Tanker for end-to-end encrypted medical chat – Mobihealth News

Leading French independent health insurer Alan has teamed up with data security company Tanker to bring end-to-end encryption to its telehealth chat platform. The service is the first telehealth chat platform available to the general public that is end-to-end encrypted.

WHY IT MATTERS

The Alan app links users with associated doctors through a messaging service or video-consultations, which enable users to access quality medical care quickly while the platform handles all reimbursements.

HIMSS20 Digital

Through the partnership with Tanker, Alan is ensuring its digital healthcare has the same dedication to doctor-patient confidentiality as in-person healthcare. Utilising technology previously reserved for messaging apps such as WhatsApp and iMessage or restricted to certain operating systems as with Apple Health, the data shared through the chat service is encrypted so it is only accessible to the user and the medical team.

This gives Alans 115,000 users total control over their personal medical data.

Dr Pierre-Auguste Beaucot, a general practitioner with Alan, praised the innovation: Complete observance of doctor-patient confidentiality and ensuring the maximum level of security for patients who use our telehealth platform is primordial. With client-side encryption, only doctors can access the content of medical conversations. The contrary would have been unthinkable.

THE LARGER TREND

France has seen a major increase in the usage of teleconsultations as a result of the pandemic, going from 35,000 visits during the month of February 2020 to an average of 400,000 teleconsultations a week since April 2020.

As the pandemic has pushed telehealth into the mainstream, security and privacy have been a top priority, particularly as these services become integrated into the norm of healthcare post-pandemic. Recently, Singapore-based start-up Doctor Anywhere launched end-to-end encrypted mental health video-consultations to provide enhanced privacy for a stigmatised sector of healthcare.

ON THE RECORD

Charles Gorintin, Alan's co-founder and CTO, commented: The protection of privacy is a concern for all users of internet services. It is even more so in the case of healthcare. Alan is investing in technology so that everyone can benefit from the very best care with complete peace of mind.

Clment Ravouna, co-founder and CEO of Tanker, added: Without doctor-patient confidentiality, there would be no digitisation of healthcare. Alan's vision will hugely simplify our relationship with healthcare in the years to come. We are proud to go forward with them and provide them with the infrastructure they need to make their platform secure.

See the original post:
Alan partners with Tanker for end-to-end encrypted medical chat - Mobihealth News

Google Messages Set to Roll Out End-to-End Encryption – Infosecurity Magazine

Google has finally announced that end-to-end encryption (E2EE) will begin rolling out on its Messages platform, bringing it in line with rivals WhatsApp and iMessage in the security stakes.

Messages by Google is built on the open Rich Communication Services (RCS) standard to offer improvements over legacy SMS such as anti-spam, launching of video calls direct from conversations, Smart Reply and more.

Google announced late last Friday that it had completed its global rollout of the platform for all Android users.

However, until now the missing piece in the puzzle was security, with both Facebook (WhatsApp) and Apple offering E2EE to maximize privacy for their users.

Google now joins its rivals with these capabilities, starting with one-to-one conversations and only when both users are on Messages.

End-to-end encryption ensures that no one, including Google and third parties, can read the content of your messages as they travel between your phone and the phone of the person youre messaging, explained product lead, Drew Rowney. This will roll out to beta testers beginning this month and continue into next year.

However, while the new functionality is likely to be a hit with consumers and business users, it will put Google on a collision path with legislators and law enforcers in the US.

Over recent years, high-profile figures have tried to pressure tech giants like Apple into engineering bespoke backdoors into their products so that investigators can unlock phones and read the encrypted messages of suspects.

They argue that E2EE otherwise offers a safe haven for terrorists, child abusers and other criminal elements disregarding the fact that if Apple et al were to accede to their wishes, these individuals would surely migrate to other platforms.

Now Google will have to stand up for its users and argue that backdoors cannot be engineered for law enforcement without undermining security for all a point repeatedly batted away by lawmakers.

In its most recent missive last month, the Five Eyes intelligence community plus India and Japan repeated its demands, and arguedthat the tech community just isnt trying hard enough to find a way forward.

Read more from the original source:
Google Messages Set to Roll Out End-to-End Encryption - Infosecurity Magazine

Did they crack the code? The importance of encryption for protest movements – OpenGlobalRights

Protesters march during a rally against government and President Lukashenko in Minsk, Belarus, 25 October 2020. According to reports, over 100,000 opposition activists took to the streets against Belarusian government and President Alexander Lukashenko calling him to step down and demanding new presidential elections. EFE/EPA/STR

In the presidential elections held in August in Belarus, Alexander Lukashenko was re-elected with 80% of the votes, yet only a few believed the official account. This disparity between reality and the state claims instigated record numbers of people to pour into streets and demand repeated elections. The regime answered with a brutal crackdown on protesters and internet shutdowns to limit accessing and sharing information. But Belarusians found a way to communicate through an encrypted messaging service called Telegram, which played a vital role in organizing protesters and disseminating information horizontally without any formalized leadership. Encryption remains a central tool for bypassing state surveillance, especially in countries with repressive governments, but it does not come without lingering safety and security concerns.

When Belarusians called for transparent elections, they were met with extreme police violence and detentions, photos of which filled the media and caused international outrage. A parallel battle was happening in the digital realm through the blocking of independent media and opposition websites and intermittent internet blackouts. These restrictions aimed to cause a chilling effect on popular mobilisation and prevent the publishing of information and evidence about police abuse. Lukashenko blamed foreign interference for the internet shutdowns but experts pointed to the government that controls the state-owned Internet provider Beltelecom. NetBlocks reported that internet access in Belarus has been disrupted for several days, creating an information vacuum preventing citizens from establishing contact with each other and with the outside world. On the night of the elections results, the government shut down social networks, blocked VPNs, while encrypted traffic was also blocked on certain websites and two election platforms so that people could not observe news about possible violations. Later that day, the whole mobile internet was shut down and most of the media outlets were unavailable. None of the usual messaging services worked without additional tools to bypass the censorship. Viber, WhatsApp, and Messenger were inaccessible.

Belarusian authorities used a DPI method for blocking internet access, but also monitored real-time communications, examined unencrypted content, and implemented targeted blockings and shutdowns, enabling both invasive privacy breaches and mass censorship. Similar technology has been documented in other countries, notably China and Russia, where it has been reviewed as a tool for implementing the Sovereign Internet Law. It seems like government manipulation of the internet will remain a constant feature in the future.

Multiple crackdowns have brought to the spotlight the rights to freedom of peaceful assembly and of association in the digital space. According to a UN special rapporteur threats to digital expression and internet freedom are more pronounced than ever [] and internet shutdowns have emerged as a popular means of information control. This issue has been lately growing in importance as the restrictions amid the COVID-19 pandemic have made the shutdowns of online civic space ever more consequential for exercising civil and political rights. The Belarusian case of coping with state interference through encrypted messaging service can be instrumental for understanding similar scenarios across the globe.

In the post-Soviet country with a booming IT sector adding 6.4% GDP, harnessing the potential of the tech platforms has been central to the oppositions success. YouTube popularized Siarhei Tsikhanouski and subsequently his wife, who ran as the lead candidate against Lukashenko. Again, when social media platforms became mostly unavailable, protesters turned to Telegram. The anti-censorship tools used by Telegram through robust encryption allowed Belarusian citizens to continue connecting via the app and access its channels to share messages, warn protesters of police movements, and guide demonstrators to certain neighborhoods.

The diffuse coordination made it more difficult for the security services to repress the protesters. As a journalist summed up: This is the Telegram revolution. Its not the opposition, not the political parties. Everything is made by bloggers, influencers, and these Telegram channels. Lukashenko himself acknowledged Telegrams importance when announcing that all the various Telegram channels that control crowds in Minsk will go away. The protests show how critical encryption is to protect citizens human rights and safety. It also offers a model to be copied by activists in many other countries looking to evade government control. Similar channels have been used by popular movements in Catalonia and Hong Kong, proving that even though the context might be different, similar tactics can still be adopted.

Evidently, there are two sides to the liberating power of encryption. A key argument is that as much as it can be a tool for greater democracy, it can also foster illegal activities. Thinking of the democratic cause only, where the biggest Telegram channels are followed by millions of users, questions arise around self-organization, misinformation risks, and security threats to users. In a climate where traditional media cannot be trusted and oppositional media has been disabled, the platforms take on an unprecedented power over information. The biggest channel fuelling Belarusian protests is Nexta, with more than 2 million subscribers in a country of about 9.4 million people. Operating fast and without an editorial team, they do not have the time and the capacity to fact-check information. Misinformation can lead to higher risk-taking, such as when protesters wrongly heard that security forces joined them and approached the police chanting five cities have laid down their shields. They were later dragged into police vans and may have been among the thousands of detained Belarusians who faced torture and beatings.

Roman Protasevich, the chief editor of Nexta, offered a rare glimpse into the channels operational mindset when interviewed by the BBC: Do I feel responsible for what we publish? Only in terms of whether it will bring people closer to victory and the end of the dictatorship. Undoubtedly, a small team of six that works out of a community centre in Warsaw is short of resources to cross-check each piece of information when there are hundreds of items on the Telegram channel. But these and similar channels remain oblivious to alerting their followers that the information they publish has not been verified.

As the governments become increasingly repressive and tech-savvy in suppressing dissent, the popularity of encrypted platforms for news gathering and dissemination is here to stay. Encrypted communications fall beyond the reach of regulation, making them a strong alternative source. They will remain a key enabler of civic rights in undemocratic societies where the media is tightly controlled by the authorities. But with information power concentrated into the hands of a few, an additional layer of scrutiny should be placed on how they operate and whether or not they act responsibly towards citizens.

Nexta founder Stsyapan Putsila downplays their role saying that they do not force anyone to protest: We tell people that they can go out, defend their rights. Belarusians come out on their own. But he also added that Now we not only inform, but to some extent also coordinate people. For Nexta, the trade-off is worth the end goal of achieving democracy, and many of their followers would agree. But in the country hungry for uncensored information, this reluctance to take on a greater responsibility despite growing stakes creates additional risks for the protesters.

Excerpt from:
Did they crack the code? The importance of encryption for protest movements - OpenGlobalRights

The EU’s muddled approach to encryption – The Spectator US

The EU would like you to know that it doesnt want to ban encryption. In fact, it correctly recognizes that encryption is absolutely essential for our privacy and financial safety on the internet. Thats why a draft resolution due to be tabled in front of EU leaders at a pivotal summit later this month spends paragraphs extolling the virtues of online encryption, before setting out the EUs complaint: they would really like to be able to read encrypted messages. And they want technology companies to do something about it.

On the surface, the EUs argument might seem quite reasonable: most of us would generally believe that with warrants or similar safeguards, authorities should be able to read the messages of serious criminals or terrorists. This is an argument successive British governments have also been fond of making.

The problem is that once you scratch below the surface, legislators are essentially proudly proclaiming themselves to be pro-cake and pro-eating it.

Online security is quite different from offline security, in that our communications are ultimately protected by encryption, which boils down to complex mathematics. Encryption uses calculations which are easy to perform one-way round but almost impossible to reverse the mathematical equivalent of scrambling an egg which means tech companies can make our messages all but impossible to decipher as they traverse the internets network of cables and servers.

In fact, thanks to encryption, the creators of most modern messaging apps cant read their users messages even if they wanted to. This is crucial for our security and privacy: messages arent secure if someone who works for a tech company (or a criminal or spy posing as them) can access them. And it means that when governments or police forces ask tech companies to hand over data, they cant they never had it in the first place.

But this is giving governments which in the internet era have become accustomed to being able to drown themselves in terabyte after terabyte of bulk data something of a headache. In response, they have begun urging, or threatening to compel, tech companies to create some means of circumventing their sophisticated encryption for selected users, so that they can hand over their data.

This is, essentially, the online equivalent of getting someone to leave the back door open so you dont have to use the locked, barred and reinforced front door. And just like an open back door in real life, in practice that means youre leaving the door open to everyone.

If tech giants create vulnerabilities so it is easier to access user data, the same methods will also be used by criminals and foreign governments. In the online world, it is simply not possible to selectively weaken security just for the good guys.

The EUs latest resolution tackles this thorny problem by insisting that they are big supporters of encryptionandthat they understand the risks of backdoors, and so would not ask tech giants to insert them into their messaging apps.

Instead, they ask tech companies, researchers, academics and others to look for some other way of allowing them to access messages essentially deciding that a back door by any other name will somehow magically work differently.

We should be relieved that the latest EU proposal is so laughably vague, but it is symbolic of the dead-end in which governments across the world have got to when it comes to regulating the internet a task we all agree, to different extents, is necessary, but one for which most governments seem woefully ill-equipped.

***Get a digital subscription toThe Spectator.Try a month free, then just $3.99 a month***

If the EU is interested in tracking and monitoring criminals, there are already other technical methods available for example, through phone manufacturers themselves (though backdoors here could, again, cause unintended consequences). It could also spend more on human intelligence, which is traditionally far more effective, and has been starved of resources in the internet era.

Instead, the EU joins an array of other governments and bodies straddling between menace and comical ineffectiveness. By railing against encryption, they undermine public trust in a technology that is vital to our online privacy and security.

And by having nothing more than a plea to the heavens for some magical fix to their problem, the EU are instead making themselves look comically unprepared for the task of regulating the internet era of capitalism. We are two decades into the digital age, and our politicians are still decidedly analog.

This article was originally published on The Spectators UK website.

Go here to read the rest:
The EU's muddled approach to encryption - The Spectator US

AES Encryption Software Market 2020 Global Industry Size, Demand, Growth Analysis, Share, Revenue and Forecast 2022 – The Think Curiouser

This new research report compilation added as an assessment overview of the global AES Encryption Software market is directed to unravel crucial details about market developments, encompassing various factors such as market trends, lingering barrier implications as well as dominant drivers that effectively carve a favorable growth route for global AES Encryption Software market progression and growth. The report specifically underpins superlative reader comprehension about multiple market developments by gauging into regional growth spots.

Access the PDF sample of the AES Encryption Software Market report @ https://www.orbisresearch.com/contacts/request-sample/2876781?utm_source=Atish

Key Players Mentioned in the Report:

DellEsetGemaltoIBMMcafeeMicrosoftPkwareSophosSymantecThales E-SecurityTrend MicroCryptomathicStormshield

A keen observation and evaluation of the AES Encryption Software market developments based on qualitative and quantitative research practices have been meticulously compiled to understand dynamics such as drivers, restraints, challenges and threats that closely influence holistic growth in global AES Encryption Software market.

Make an enquiry of AES Encryption Software Market report @ https://www.orbisresearch.com/contacts/enquiry-before-buying/2876781?utm_source=Atish

Some of the most crucial market relevant information drawn in the report is aimed at equipping market players with a crisp overview of fast transitioning vendor landscape. The report is also designed to influence lucrative decision making amongst prominent players in terms of their investment discretion towards most appropriate investment decisions pertaining to dynamic product and pricing mix to initiate user acceptance. A close review of the sub-segmentation has also been tagged in the report, aimed at unveiling novel growth opportunities, offsetting market saturation. Minute classification of the growth hubs, encompassing details on global and local developments alike to entice critical decision making.

Types Covered in Report:(On-premises, Cloud, , , )

Application Covered in Report:(Disk Encryption, File/folder Encryption, Database Encryption, Communication Encryption, Cloud Encryption)

Browse the complete AES Encryption Software Market report @ https://www.orbisresearch.com/reports/index/global-aes-encryption-software-market-report-2019?utm_source=Atish

About Us:Orbis Research (orbisresearch.com) is a single point aid for all your Market research requirements. We have vast database of reports from the leading publishers and authors across the globe. We specialize in delivering customized reports as per the requirements of our clients. We have complete information about our publishers and hence are sure about the accuracy of the industries and verticals of their specialization. This helps our clients to map their needs and we produce the perfect required Market research study for our clients.

Contact Us:Hector CostelloSenior Manager Client Engagements4144N Central Expressway,Suite 600, Dallas,Texas 75204, U.S.A.Phone No.: +1 (972)-362-8199 ; +91 895 659 515

Visit link:
AES Encryption Software Market 2020 Global Industry Size, Demand, Growth Analysis, Share, Revenue and Forecast 2022 - The Think Curiouser

Encryption Software Market Overview, Growth, Demand and Forecast Research Report to 2026 – The Market Feed

Encryption Software market research study provides an all-inclusive assessment of the market while propounding historical intelligence, actionable insights, and industry-validated & statistically-upheld market forecast. A verified and suitable set of assumptions and methodology has been leveraged for developing this comprehensive study. Information and analysis of key market segments incorporated in the report have been delivered in weighted chapters.

Global Encryption Software Market research report provides the historical, present & future situation of Market Size & Share, Revenue, the demand of industry and the growth prospects of the Encryption Software industry in globally. This Encryption Software Market report has all the important data and analysis of market advantages or disadvantages, the impact of Covid-19 analysis & revenue opportunities and future industry scope all stated in a very clear approach. Encryption Software market report also calculates the Market Impacting Trends, Strategic Analysis, Market DROC, PEST Analysis, Porters 5-force Analysis, Market News, sales channels, distributors and forecast to 2026.

Encryption Software market report covers profiles of the top key players in Encryption Software, with price, sales, revenue and global market share. The Encryption Software competitive situation, sales, revenue and global market share of top manufacturers are analyzed emphatically by landscape contrast.

Top key players covered in Encryption Software market research report:

Request for a sample report to browse TOC, full company coverage & many more @ https://www.in4research.com/sample-request/823

Encryption Software market segmentation based on the product Type and Applications, with sales, market share and growth rate.

Based on Product Type:

Break down of Encryption Software Applications:

Encryption Software market breakdown data are shown at the regional level, to show the sales, revenue and growth by regions.

Impact of COVID-19 on Encryption Software Market

The report also contains the effect of the ongoing worldwide pandemic, i.e., COVID-19, on the Encryption Software Market and what the future holds for it. It offers an analysis of the impacts of the epidemic on the international market. The epidemic has immediately interrupted the requirement and supply series. The Encryption Software Market report also assesses the economic effect on firms and monetary markets. Futuristic Reports has accumulated advice from several delegates of this business and has engaged from the secondary and primary research to extend the customers with strategies and data to combat industry struggles throughout and after the COVID-19 pandemic.

Get in touch to know more about the Impact of COVID-19 & Revenue Opportunities in Encryption Software Market: https://www.in4research.com/impactC19-request/823

Encryption Software Market Report Provides Comprehensive Analysis as Following:

Frequently Asked Questions

Ask for more details or request a custom report from our industry experts @https://www.in4research.com/customization/823

FOR ALL YOUR RESEARCH NEEDS, REACH OUT TO US AT:

Contact Name: Rohan S.Email: [emailprotected] Phone: +1 (407) 768-2028

Read more here:
Encryption Software Market Overview, Growth, Demand and Forecast Research Report to 2026 - The Market Feed

Google Serves Up Messages, a WhatsApp Alternative With End-to-End Encryption – Toolbox

The ranks of WhatsApp alternatives have swelled over the years. The latest tech company to join this heavily-crowded space is Google, which has taken the plunge into instant messaging with Messages. Like WhatsApp, Messaging lets you start a video call, message and has a slew of other helpful features.

Google is filling the gap in Androids messaging capabilities through Messages a Rich Communication Service (RCS) based messaging application targeting Android users.

The tech titan paraded Messages an instant messaging app for text-based chats, media (images & videos), document sharing over data, or WiFi as an alternative to the hugely popular iMessage and Facebook-owned WhatsApp, which has over five billion installations. Messages by Google also competes with Telegram, another popular messaging application that has grown its footprint and has a 500 million+ user base.

Google partnered with several carrier networks, phone, and device makers to bring RCS to its global users. The Mountain View tech giant revealed that the application would be available throughout the world except those where RCS is not available. This includes China, Russia, Iran and North Korea.

See Also: Why Mobile Messaging Is Crucial for Customer Engagement: mGage Reveals

Drew Rowny, Product Lead for Messages, wrote in a blog post, Today, weve completed our global roll-out of chat features to make this modern messaging experience universal and interconnected for everyone on Android. Now anyone using Messages around the world has access to modern chat features either from their carrier or directly from Google.

Besides the global roll-out of Messages by Google, the company also announced end-to-end encryption (E2EE) for the instant messaging app. End-to-end encryption ensures that no one, including Google and third parties, can read the content of your messages as they travel between your phone and the phone of the person youre messaging, explains Rowny.

E2EE will be available as a beta test for select users who sign up for the Messages beta testing program. But theres a caveat E2EE for Messages will be available only for one-on-one chats and not for group conversations. Meanwhile, rivals apps such as WhatsApp, iMessage, Signal, and even Facebooks Messenger offer end-to-end encryption for one-on-one and group conversations. Telegram doesnt support E2EE, but it does offer Secret Chat, which is akin to E2EE.

E2EE for Messages will start rolling out to beta testers starting November and will continue next year.

Let us know if you liked this news on LinkedIn, Twitter, or Facebook. We would love to hear from you!

Read more here:
Google Serves Up Messages, a WhatsApp Alternative With End-to-End Encryption - Toolbox