How to fundraise when the powerful want to stop you – Open Democracy

We also want to be able to collect money without one person being held responsible for the whole campaign's actions we have collective responsibility.

After the truckers in Canada got their GoFundMe donations withheld, and in light of our previous experiences, we sought a system that wouldn't be able to withhold donations once theyve been made.

Such cases of extra-judicial action take a toll on legitimate activity and represent a significant means to throttle political opposition.

No matter your political persuasion, theres bound to be a cause you sympathise with that has faced the undemocratic impulses of monetary gatekeepers.

Arguably, centralised crowdfunding sites for example, sites like GoFundMe with a payments firm like Stripe or Visa controlling the flow of funds are more likely to succumb to this as there is a single point of attack.

Uncertainty about income drives campaigners to find alternatives to the payment majors.

Ukraine DAO (Decentralised Autonomous Organisation) uses blockchain systems to raise and distribute funds for the war with Russia. It is a grassroots network that has funnelled over $8m, donated in Ethereum cryptocurrency, to directly assist military and humanitarian efforts with the blessing of the Ukrainian state.

The DAOs team say that the transparency and efficiency of raising cryptocurrency makes it an attractive choice for gathering cash fast. Efficiency may also refer to avoiding the arduous bureaucracy typically involved in financing military operations. This kind of fundraising breaks new ground by allowing ordinary people to mobilise resources for serious geopolitical projects.

In a similar way campaigners for Julian Assange raised over $35m with a mission to seek justice for the WikiLeaks founder.

Liberate Hemp now takes donations in cryptocurrency first and foremost due to the precarity of e-commerce involving hemp. The only easy approach that met our needs were donations direct to our crypto wallet.

So what practical options exist for campaigns stunted by these murky arbitration processes?

There are some, albeit limited, solutions, from cryptocurrencies to crowdfunding platforms designed to withstand take-downs.

Prashan Paramanathan of Chuffed, which hosts campaigns such as Extinction Rebellion, explains that his platform allows fundraising so long as it is not to support criminal activity. Unfortunately, he said, the UK and other jurisdictions have been broadening the definition of various forms of protest as criminal activity, which puts platforms in a tricky situation.

See the rest here:

How to fundraise when the powerful want to stop you - Open Democracy

Futurex Wins "Enterprise Encryption Solution of the Year" Award in 2022 CyberSecurity Breakthrough Awards Program – PR Newswire

Prestigious international awards program honors Futurex for innovativeand robust encryption solutions for enterprises

BULVERDE, Texas, Oct. 6, 2022 /PRNewswire/ --Futurex, a leader in hardened, enterprise-class data security solutions, today announced that it has won of the "Enterprise Encryption Solution of the Year" award in the 6th annual CyberSecurity Breakthrough Awards program conducted by CyberSecurity Breakthrough, a leading independent market intelligence organization that recognizes the top companies, technologies and products in the global information security markets today. This year's program attracted more than 4,100 nominations from more than 20 different countries throughout the world.

"We are honored to be recognized by CyberSecurity Breakthrough again this year for our enterprise encryption solutions," said Ryan Smith, Vice President of Business Development at Futurex. "Futurex offers an industry-leading solution suite that has developed independently over time, allowing us to focus on the core needs of our customers. This has led to industry-first innovation and recognized excellence. Critical to Futurex's continued success is our commitment to our employees: by focusing on employee success, we retain a capable, motivated workforce with decades of industry knowledge."

"Congratulations to Futurex for being our pick for 2022's "Enterprise Encryption Solution of the Year."

Futurex's innovative hardware security modules (HSMs), key management servers, and cloud HSM solutions address mission-critical data encryption and key management needs. Futurex offers HSMs as well as full key lifecycle management, application encryption, cloud key management, remote key distribution, and tokenization. The Base Architecture Model (BAM) shared across all Futurex solutions is a common code base that makes it easy for enterprises to roll out updates and quickly make changes across groups of devices. This level of interoperability helps enterprises seeking to streamline their infrastructure by adopting a single-vendor solution.

According to James Johnson, managing director, CyberSecurity Breakthrough, "Encryption lies at the foundation of most, if not all, cybersecurity technologies and as more devices and infrastructure become connected to the internet, this presents a growing problem. There are several core competencies at the heart of Futurex's recent success although they have been in the hardware encryption business for over 40 years. In recent years, the company has been gaining global recognition for its innovative cryptographic solutions and high-profile technology partnerships. Congratulations to Futurex for being our pick for 2022's "Enterprise Encryption Solution of the Year."

About Futurex

For more than 40 years, Futurex has been a trusted provider of hardened, enterprise-class data security solutions. More than 15,000 organizations worldwide, including financial services providers and corporate enterprises, have used Futurex's innovative hardware security modules, key management servers, and enterprise-class cloud solutions to address their mission-critical systems, data security, and cryptographic needs. This includes the secure encryption, storage, transmission, and certification of sensitive data. For more information, please visit futurex.com.

SOURCE Futurex

Read more:
Futurex Wins "Enterprise Encryption Solution of the Year" Award in 2022 CyberSecurity Breakthrough Awards Program - PR Newswire

Matrix patches five vulnerabilities in its end-to-end encryption – SC Media

Matrix recently patched five vulnerabilities in its end-to-end encryption two of them critical that have the ability to break the confidentiality and authentication of messages.

If not patched, these vulnerabilities would let a malicious server read user messages and impersonate devices.

Matrix manages some 100,000 servers worldwide. Its technology delivers a federated communication protocol that lets clients with accounts on Matrix servers exchange messages. Matrix provides simple HTTP APIs and SDKs that help developers create chatrooms, direct chats and chat bots, complete with end-to-end encryption, file transfer, synchronized conversation history, formatted messages, and read receipts.

The vulnerabilities were discovered by security researchers at Royal Holloway University London, University of Sheffield, and Brave Software and then published in an 18-page academic paper. According to a blog posted by Matrix, the two critical vulnerabilities include the following:

Eric Cole,advisory board memberat Theon Technology, said this teaches us two important lessons. First, encryption software must have more rigorous testing than other software. Second, unpatched systems are still one of the top methods attackers use to compromise servers even with encryption software, so its important to patch, patch, patch.

While it appears that this has been caught before it has been used in the wild, it is important to remember that we just do not know, Cole said. Attackers are clever, attackers can hide their tracks and attackers can use delay methods to make it harder to detect. It appears this was caught early enough, but proper investigations of potential infected users should still be performed.

Read more:
Matrix patches five vulnerabilities in its end-to-end encryption - SC Media

China upgrades Great Firewall to defeat censor-beating TLS tools – The Register

China appears to have upgraded its Great Firewall, the instrument of pervasive real-time censorship it uses to ensure that ideas its government doesnt like dont reach Chinas citizens.

Great Firewall Report (GFW), an organization that monitors and reports on Chinas censorship efforts, has this week posted a pair of assessments indicating a crackdown on TLS encryption-based tools used to evade the Firewall.

The groups latest post opens with the observation that starting on October 3, more than 100 users reported that at least one of their TLS-based censorship circumvention servers had been blocked. The TLS-based circumvention protocols that are reportedly blocked include trojan, Xray, V2Ray TLS+Websocket, VLESS, and gRPC.

Trojan is a tool that promises it can leap over the Great Firewall using TLS encryption. Xray, V2ray and VLESS are VPN-like internet tunneling and privacy tools. Its unclear what the reference to gRPC describes but it is probably a reference to using the gRPC Remote Procedure Call (RPC) framework to authenticate client connections to VPN servers.

GFWs analysis of this incident is that blocking is done by blocking the specific port that the circumvention services listen on. When the user changes the blocked port to a non-blocked port and keep using the circumvention tools, the entire IP addresses may get blocked.

Interestingly, domain names used with these tools are not added to the Great Firewalls DNS or SNI blacklists, and blocking seems to be automatic and dynamic.

Based on the information collected above, we suspect, without empirical measurement yet, that the blocking is possibly related to the TLS fingerprints of those circumvention tools, the organisation asserts.

An alternative circumvention tool, naiveproxy, appears not to be impacted by these changes.

Earlier in the week, Great Firewall Report also posted analysis asserting China has barred google.com and all of its subdomains.

Which is an odd thing to say given that China started blocking Google in 2010 and Greatfire.org, another service that monitors Chinas internet censorship, says Google and its online services, including YouTube and Google.com, are 100 percent blocked in China, and have been blocked for ages. Google.cn redirects to Google.com.uk in Hong Kong, but even that .hk domain is blocked these days in mainland China along with the .com.

Its also hard to reconcile Great Firewall Reports assertion and Googles decision from earlier this week to discontinue availability of its online translation service in China due to Beijing's censorship.

Inconsistencies aside, Great Firewall Reports asserts it has spotted a new effort to suppress access to Google.

The censors," we're told, "first started Server Name Indication (SNI) SNI-based censorship on google.com and *.google.com on Thursday, September 22, 2022, sometime between 6:23 AM and 7:33 PM Beijing Time (UTC+8). Specifically, the censor looks for SNI values in Transport Layer Security (TLS) ClientHello messages, and when a SNI value matches the blacklist rules, the censor sends forged TCP RST packets to tear down the connections.

Eight days later, domain name system filtering kicked in to block queries and hamper access to any Google domain. Great Firewall Report believes 1,147 google.com domains are now blocked in China even though they were probably blocked already in some way or another. This may be another or updated filtering mechanism deployed by Beijing.

SNI, for what it's worth, is used by browsers connecting to a web server using TLS (HTTPS) to specify the domain of the website the user wishes to visit. A server can handle multiple sites from one IP address, and SNI is used to select the site the person wants. SNI is typically sent non-encrypted, prior to the establishment of encryption between the browser and server, so it's ripe for government snoops to detect and use to censor unwanted connections.

Its not hard to guess why China might have chosen this moment to upgrade the Great Firewall: the 20th National Congress of the Chinese Communist Party kicks off next week. The event is a five-yearly set piece at which Xi Jinping is set to be granted an unprecedented third five-year term as president of China.

The Congress takes place amid a slowing economy, and strict zero-COVID policies that have frustrated Chinas citizenry. While dissent has been limited to occasional online rumblings, China will not want its internet to carry anything other than good no, brilliant! news of the Congress to its people.

See the original post here:
China upgrades Great Firewall to defeat censor-beating TLS tools - The Register

ioSafe Introduces Air-gapped Cybersecurity to Isolate Encrypted Data in Its Solo G3 Secure External Hard Drive – Business Wire

VANCOUVER, Wash.--(BUSINESS WIRE)--Already the recognized leader in onsite data protection, ioSafe today introduced air-gapped cybersecurity capability in its ioSafe Solo G3 Secure external hard drive. The Solo G3 Secure drive contains an impenetrable barrier between a computer and the ioSafe Solo G3 Secure storage device. This feature delivers the most sophisticated protection available in a fireproof and waterproof drive.

ioSafe continues to innovate to extend its industry-leading fireproof and waterproof data protection solutions, said Randal Barber, CEO of ioSafe parent company CDSG. Combined with its renowned and unprecedented time-to-recovery, businesses and government agencies, media companies and creative professionals, can restore massive amounts of data without loss even if a disaster should occur.

With the Solo G3 Secure, a user authorizes computer access to the self-encrypting drive using a smartphone app via Bluetooth. Without access authorization, the drive is invisible to the computer, and data is protected from cyberattack as well as fire and water. The authorized user must stay within 10 feet of the Solo G3 Secure or the connection to the computer is lost. In addition, after ten incorrect or unauthorized entry attempts, the drive is wiped.

The ioSafe Solo G3 Secure contains a FIPS 140-2 Level-3 validated self-encrypting drive, which uses XTS-AES 256-bit full-disk hardware encryption.

The new ioSafe Solo G3 Secure is available immediately in 2TB (MSRP $499) and 4TB (MSRP $649) options with USB 3.2 gen 1 connectivity (5 Gbps). The devices include a two-year hardware warranty and two years of Data Recovery Service. Customers may order products through iosafe.com or standard distribution channels.

For more information, visit https://iosafe.com/products/solo-g3-secure/ and iosafe.com.

About ioSafe

ioSafe is a brand of the CDSG family, renowned for its role in secure data storage and data transport for governments, military organizations, creative professionals, and businesses worldwide. ioSafes patented fireproof and waterproof data storage technology, and its comprehensive Data Recovery Service, provide peace of mind. ioSafe customers know their data is always protectedand should the unthinkable happen, they are back up and running faster than any other available solution.

ioSafe products are designed and developed in the United States. Businesses, individuals, and government agencies globally rely on ioSafe to protect their data from disasters caused by fire and floodand broken plumbing.

Read more here:
ioSafe Introduces Air-gapped Cybersecurity to Isolate Encrypted Data in Its Solo G3 Secure External Hard Drive - Business Wire

ADVA launches Adva Network Security for network protection from cyberattacks – LightWave Online

ADVA (FSE: ADV) says it has pooled its network security expertise to create Adva Network Security. The new company will develop, produce, and integrate encryption technology to protect communications networks for cyberattacks.

The new company is seen as a complement to ADVAs networking technology portfolio. Adva Network Security will have its own IT infrastructure and secure data center facilities in Germany and will collaborate with national security organizations on its mission, ADVA says.

The network security landscape is more dangerous and difficult to navigate than ever before, and thats before we even consider the threat of quantum computer attacks appearing on the horizon. By creating Adva Network Security as a separate entity, were empowering businesses and governments to confront this most urgent issue. Through our new company, were enabling customers to comprehensively address the data vulnerability crisis that threatens every aspect of our lives, commented Christoph Glingener, CEO of ADVA. Adva Network Security encryption technology has been tested by the most experienced and competent experts. It secures even the fastest data connections with the lowest latency, protecting communications without compromising the transmission quality.

Michael Roth, most recently vice president R&D NMS, planning, CP at ADVA, will serve as general manager of Adva Network Security. By creating Adva Network Security, were ensuring that networks can deliver new levels of protection to safeguard ever-more sensitive communications such as national security services. We live in a world where the value of information is increasing. At the same time, criminal hackers and unfriendly government actors have unprecedented financial resources at their disposal. Our new independent organization of highly specialized security experts will provide protection for the most sensitive data in motion at every network layer, said Roth.

Adva Network Security will build on the optical transport encryption capabilities ADVA has developed (see, for example, ADVA launches ConnectGuard Cloud for virtualized encryption in hybrid and multi-cloud environments, ADVA adds encryption to FSP 150 demarcation device, and ADVA FSP 3000 ConnectGuard offers post-quantum cryptography security"), including the parent companys work in quantum encryption (see, for example, Utility Schleswig-Holstein Netz, ADVA field trial quantum security over aerial fiber).

For related articles, visit the Network Design Topic Center.

For more information on high-speed transmission systems and suppliers, visit the Lightwave Buyers Guide.

To stay abreast of fiber network deployments, subscribe to Lightwaves Service Providers and Datacom/Data Center newsletters.

Excerpt from:
ADVA launches Adva Network Security for network protection from cyberattacks - LightWave Online

Hardware Encryption Market 2022-2027: Growing Rapidly with Latest Trends and Future scope with Top Key Players- Kanguru Solutions, Toshiba, Western…

Hardware Encryption Market Study 2022-2027:

Hardware Encryption Market (Newly published report) which covers Market Overview, Future Economic Impact, Competition by Manufacturers, Supply (Production), and Consumption Analysis, and focuses on various products and other market trends.

The market research report on the global Hardware Encryption industry provides a comprehensive study of the various techniques and materials used in the production of Hardware Encryption market products. Starting from industry chain analysis to cost structure analysis, the report analyzes multiple aspects, including the production and end-use segments of the Hardware Encryption market products. The latest trends in the industry have been detailed in the report to measure their impact on the production of Hardware Encryption market products.

Get sample of this report @ https://www.marketresearchupdate.com/sample/373571

Leading key players in the Hardware Encryption market are Kanguru Solutions, Toshiba, Western Digital, Netapp, Maxim Integrated Products, Kingston Technology, Gemalto, Seagate Technology, Samsung Electronics, Winmagic, Micron Technology, Thales

Results of the recent scientific undertakings towards the development of new Hardware Encryption products have been studied. Nevertheless, the factors affecting the leading industry players to adopt synthetic sourcing of the market products have also been studied in this statistical surveying report. The conclusions provided in this report are of great value for the leading industry players. Every organization partaking in the global production of the Hardware Encryption market products have been mentioned in this report, in order to study the insights on cost-effective manufacturing methods, competitive landscape, and new avenues for applications.

Product Types:AESRSA

On the Basis of Application:Consumer ElectronicsITTransportAerospaceMedicalFinancial ServicesOther

Get Discount on Hardware Encryption report @ https://www.marketresearchupdate.com/discount/373571

This report also consists of the expansion, mergers, and acquisitions, and price, revenue, and production. This report also provides revenue, CAGR, and production shares by the manufacturer.

1) The varying scenarios of the overall market have been depicted in this report, providing a roadmap of how the Hardware Encryption products secured their place in this rapidly-changing marketplace. Industry participants can reform their strategies and approaches by examining the market size forecast mentioned in this report. Profitable marketplaces for the Hardware Encryption Market have been revealed, which can affect the global expansion strategies of the leading organizations. However, each manufacturer has been profiled in detail in this research report.

2) Hardware Encryption Market Effect Factors Analysis chapter precisely gives emphasis on Technology Progress/Risk, Substitutes Threat, Consumer Needs/Customer Preference Changes, Technology Progress in Related Industry, and Economic/Political Environmental Changes that draw the growth factors of the Market.

3) The fastest & slowest growing market segments are pointed out in the study to give out significant insights into each core element of the market. Newmarket players are commencing their trade and are accelerating their transition in Hardware Encryption Market. Merger and acquisition activity forecast to change the market landscape of this industry.

This report comes along with an added Excel data-sheet suite taking quantitative data from all numeric forecasts presented in the report.

Regional Analysis For Hardware EncryptionMarket

North America(the United States, Canada, and Mexico)Europe(Germany, France, UK, Russia, and Italy)Asia-Pacific(China, Japan, Korea, India, and Southeast Asia)South America(Brazil, Argentina, Colombia, etc.)The Middle East and Africa(Saudi Arabia, UAE, Egypt, Nigeria, and South Africa)

View Full Report @ https://www.marketresearchupdate.com/industry-growth/hardware-encryption-market-scope-and-overview-2022-2027-373571

Whats in the offering: The report provides in-depth knowledge about the utilization and adoption of Hardware Encryption Industries in various applications, types, and regions/countries. Furthermore, the key stakeholders can ascertain the major trends, investments, drivers, vertical players initiatives, government pursuits towards the product acceptance in the upcoming years, and insights of commercial products present in the market.

Lastly, the Hardware Encryption Market study provides essential information about the major challenges that are going to influence market growth. The report additionally provides overall details about the business opportunities to key stakeholders to expand their business and capture revenues in the precise verticals. The report will help the existing or upcoming companies in this market to examine the various aspects of this domain before investing or expanding their business in the Hardware Encryption market.

Our Recently Published Article:

https://tealfeed.com/usa-meetings-events-market-development-strategy-3yifu

https://tealfeed.com/europe-explosive-charging-equipment-market-price-a3q2w

https://tealfeed.com/usa-m-phenylene-diamine-mpd-cas-pg6iu

https://tealfeed.com/usa-simultaneous-localization-mapping-technology-market-j5a11

https://tealfeed.com/usa-metal-gear-component-industry-future-2by4n

https://tealfeed.com/europe-liquid-ammonium-liquid-potassium-thiosulfate-cf9jp

This Press Release has been written with the intention of providing accurate market information which will enable our readers to make informed strategic investment decisions. If you notice any problem with this content, please feel free to reach us on mediarelations@xherald.com.

Read more from the original source:
Hardware Encryption Market 2022-2027: Growing Rapidly with Latest Trends and Future scope with Top Key Players- Kanguru Solutions, Toshiba, Western...

What Does SSL Stand For? A 10-Minute Look at the Secure Sockets Layer – Hashed Out by The SSL Store

Whats SSL? SSL, or secure sockets layer, is the standard technology used to secure online communications. Lets take a quick look at what SSL is and what it does to enable your secure transactions online

You know when you go to a website and see a padlock icon in your browsers address bar? That means the website is using SSL, or secure sockets layer. SSL secures your communication with the website so hackers cant eavesdrop and see your credit card number or password.

(Technically speaking, SSL is an outdated term because its been replaced by a very similar but updated technology known as transport layer security, or TLS. But people still like to use the term SSL because its been around longer and, therefore, is easier to remember.)

Today, were taking a step back from more in-depth technical articles to take a quick look at the basics: what does SSL stand for? What is SSL? How does it work? And, of course, how you can protect your own website with SSL.

Lets hash it out.

SSL stands for secure sockets layer. In the simplest terms, SSL is a technology thats commonly used to securely send data (for example credit cards or passwords) between a users computer and a website. The term also describes a specific type of digital certificate (SSL certificate) that companies use to prove they own their domain. (Well speak more about that a little later.)

SSL is a protocol (i.e., a set of rules computer systems follow when communicating with each other) that was created in the 1990s to allow web browsers to securely send sensitive info to/from a website. Nowadays, however, we rely on transport layer security (TLS) to handle these tasks, but the term SSL has stuck around and thats the term most people use. Well talk more about SSL certificates and TLS a little later in the article. But just note that since youll commonly see SSL or SSL/TLS being used interchangeably across the internet, were just going to use the term here as well to keep things simple.

If youre looking for quick rundown of what SSL is and why its important, check out our TL;DR overview section.

If you want to learn how to enable SSL/TLS on your website, just click on this link and well take you to that section of the article. But if youre interested in learning more about what SSL/TLS does and how you use it, then keep reading.

The answer to this question is easy: your browser will tell you, usually in at least two ways:

The good news is that more and more websites are using SSL to keep site visitors like you and me secure. W3Techs reports that HTTPS is the default protocol for 79.6% of all websites. This is up from around 75% back in September 2021. Nice looks were moving in the right direction.

Heres a quick visual comparison of a website thats transmitting via a secure HTTPS protocol (using SSL/TLS) versus one thats using the insecure HTTP protocol:

If the website is using HTTP, this means that any data sent from your browser to the server hosting the website risks the data being read, modified, or stolen in transit. As a website owner, its really bad news for you and your customers because it means their data is exposed and you may be liable for not securing it in the first place.

Now that you understand the basics of what SSL stands for and what it does, lets take a brief look under the hood. How exactly does SSL protect website users and data against hackers?

SSL protects data while its in transit (travelling between the users browser and the website/web server). There are actually three different things SSL does to protect website users. SSL enables secure authentication, data encryption, and data integrity assurance. This allows you to:

All of these things are made possible through a cryptographic process known as an SSL handshake (AKA TLS handshake). Much like how you introduce yourself to someone and shake their hand, your computer does the same with a websites server:

From there, some other technical steps take place that we arent going to get into right now. (Check out the previously linked article for a more in depth look at how different versions of the SSL/TLS handshake work.) Bada bing, bada boom the end result is that your browser and the website server establish a secure connection through which you can transmit sensitive data (such as using your credentials to log in to a website).

Pretty cool, huh?

Remember how we mentioned an SSL certificate is part of the SSL handshake? Yep, thats a mandatory step every website needs an SSL certificate before it can enable SSL/TLS. An SSL certificate is a digital file (issued to the website owner by a certificate authority such as DigiCert or Sectigo) that verifies them as the legitimate owner of the website.

Whats the point of that? To help you assert your digital identity in a way that other entities (users, browsers, operating systems, etc.) can verify youre legitimate and not an imposter. This way, when a user connects to your website, they know its legitimate and can establish a secure, encrypted connection.

Heres a quick example of what the SSL certificate looks like for TheSSLstore.com:

For those of you who like a little more technical knowledge about what SSL stands for: The term SSL refers to the technology (cryptographic protocol, or the instructions) that makes secure communications possible. However, people sometimes use the same term to also refer to a type of data file known as an SSL certificate (AKA a TLS certificate). This digital certificate is an X.509 file containing data that ties you or your organizations verifiable information to the domain.

As such, its also known as a website security certificate because this information (along with other key cryptographic info it contains) helps to increase the security of your websites connections.

Ever visited a website and you werent sure if it was legitimate or trustworthy? Knowing how to view the details in their SSL certificate can help you figure out what company is running the website, who they are, and whether theyre a legit entity. (After all, you dont want to share your personal and sensitive details with a potential cybercriminal!)

As you can see in the left part of the above image, this provides general information about what the certificate is used for and which entity it was issued to. The right half of the image is the Subject details, which provides additional verifiable information about our company. In this case, it provides the following information:

All of this information can easily be verified using official resources, such as the State of Floridas Division of Businesses website:

Of course, thats not all of the information that this type of digital certificate provides. It also informs you:

Now, lets really throw a wrench into things by talking more about this term we touched on earlier. TLS, or transport layer security, is a closely related internet protocol thats so closely related to SSL that its actually considered its official successor. However, there are some technical differences in how SSL and TLS work, but were not going to dive into all of that here.

What you need to know is that when youre on a website thats secure by SSL, its technically secured by TLS. Unfortunately, people often use the terms SSL and TLS interchangeably. This gets confusing because so many people and organizations ours included still tend to use the term SSL to describe both terms.

So, why do we still call it SSL? After all, its a deprecated security protocol that was replaced with TLS back in 1999 after multiple iterations (SSL 1.0, 2.0, and 3.0). Frankly, its most likely because people are slow to change. Theres a strange tendency to stick to the terms were familiar with, so its easier for people to just call it SSL instead of TLS. (I guess, to quote a common adage, if it aint broke, dont fix it.)

So, whether someone calls it SSL or TLS, unless theyre talking about it at a highly technical level, theyre generally referring to the same secure protocol that makes the padlock icon appear in your browser or the digital certificate file that plays a central role in making that occur.

Now that weve gotten all of that info out of the way, answering what does SSL stand for? you may be wondering how you can put SSL/TLS to use on your website. Good news: its really easy. Just follow these five steps to turn make your secure website reality:

Of course, once all of this is done, use an SSL/TLS checker tool to ensure that your certificate is properly installed and configured. This can help prevent surprise issues from coming your way.

Alright, that brings us to the end of this article, which we hope helped you better understand what SSL stands for. But if youve skipped ahead and are now just joining us for a quick overview, SSL (or, really, TLS) is a secure internet protocol that allows users to share their data securely with websites.

The three key processes that SSL facilitates are:

SSL, as a protocol, uses information provided by digital certificates that go by the same name (SSL certificates). Nowadays, these are technically TLS certificates, but hardly anyone actually bothers calling them that. (You know, because were all a tad lazy and its easier to call them what weve been calling them for years.). So, there you have it. Now you can show off your technical chops around the water cooler or during the next trivia night by being able to answer the question, What does SSL stand for?

Here is the original post:
What Does SSL Stand For? A 10-Minute Look at the Secure Sockets Layer - Hashed Out by The SSL Store

Jailed for 11 years,Class A drug conspirator who attempted to outsmart police using encryption – About Manchester – About Manchester

Joseph McCormick aged 41 of Bob Massey Close, Manchester was this week jailed for 11 years and 4 months.for his role in a conspiracy to supply Class A drugs.

He was found to have been using the alias Butternoon while messaging other Organised Crime Group members using encrypted mobile devices to prevent police from detecting their conversations.

Encrypted mobile phones have been used by Organised Crime Groups for a number of years.

When the phones first came into operation, they were usually only reserved for use by top level OCG members. The use of encrypted devices has become a common accessory for criminals to network with their groups.

Unfortunately for the organised criminals, UK law enforcement accessed the Encrochat data through a legal data hack to secure illicit communications provided by the NCA which has enabled police to secure the conviction of McCormick and other criminals

Yesterday the court heard Joseph McCormick, played a leading role, regularly communicating with several handles on the EncroChat system and refer to dropping large packages of Class A drugs at multiple safe houses located across Greater Manchester.

Further implicating himself, messages show in May 2020, McCormick went out to collect the drugs instead of his runners, despite being released from prison less than a year ago on previous drug offences.

During the initial questioning, he was asked why he continued to commit similar offences following his previous 80-month sentence in 2015, despite knowing its illegality, to which he answered, no comment.

Detective Constable Chris Cotton of Challenger south city of Manchester team said: McCormick played a leading role by using encrypted communications within an organised network of criminals and I hope that the sentencing yesterday will reassure the public that we are committed to making our communities a safer place by disrupting this type of serious criminality. We understand the scourge that drug dealing, and the supply of class A drugs brings to our communities, and we are committed in our mission to keep drugs from the streets of Greater Manchester.

Our team worked meticulously with other agencies to piece together a timeline of McCormicks actions to bring about charges and then a conviction for his crimes, the severity of his offences should not be underestimated. The supply of drugs in our area fuels further criminality and violence across Manchester and we are committed to disrupting their networks.

Another important aspect in these investigations is the intelligence that is passed to us by members of the public which often plays a crucial part in our investigations.

Read the original:
Jailed for 11 years,Class A drug conspirator who attempted to outsmart police using encryption - About Manchester - About Manchester

WhatsApps latest campaign highlights built-in layers of protection – The Week

WhatsApp today launched the second film, part of its ongoing privacy campaign in India, focused on message privacy and WhatsApps layers of protection that come together to offer users more control and privacy over their conversations.

The film follows the launch of WhatsApps global brand campaign earlier in August that highlights WhatsApps built-in layers of privacy protections added over the years and how multiple privacy features enable people to have meaningful conversations in their most vulnerable moments.

Conceptualised by WhatsApp and directed by Jess Kohl, the film features Indian badminton star H.S. Prannoy, who was part of the team that created history by winning the Thomas Cup title in May this year. The film captures the essence of privacy and how the teams WhatsApp group, ingeniously called Its coming home gave them a safe and private space where they could not only strategise their game plan but also share their feelings in moments of self doubt. The film highlights WhatsApps privacy controls like end-to-end encrypted video calls, privacy settings like last seen and hidden online presence that promise users the privacy and security to share their most vulnerable moments and dreams that are larger than life, empowering them to live their dreams in private until they are ready to be shared with the world.

Talking about the campaign, Avinash Pant, director - marketing at Meta India, said, WhatsApps mission is to connect the world privately and this campaign highlights the multiple ways we defend privacy so users can feel free and confident with their messages. Through this film we want to celebrate our national champions who brought home the coveted Thomas Cup and demonstrate how WhatsApp provided them a safe space where they felt empowered to have private conversations even during vulnerable moments because they knew their messages were always protected and secure, no matter where they are. We want to show people the closeness thats possible with WhatsApps built-in layers of protection without compromising on the assurance of privacy and personal space to live your dreams in private until they're ready to be shared with the world.

Commenting on the film, Prannoy said, Being a part of the Thomas Cup squad was an honour and I knew to win the title as a team, we had to communicate as a team and go through those moments of hardship, emotional vulnerability, self-doubt together. WhatsApp was that safe space for us where we could have conversations, strategise and share our most private moments, thoughts and ambitions, away from the public eye. Every time I looked at the WhatsApp group name Its coming home it gave me the confidence and fervour to make my dreams a reality. In a country that loves cricket my dream was to make people love badminton as much as I do and to inspire the next generation of players to believe in themselves and the sport.

Over the last month, WhatsApp has launched an integrated brand campaign, including innovative print, OOH and digital activations to create awareness about the privacy features available on WhatsApp that provide users multiple layers of protection when messaging.

WhatsApps built-in layers of protection and privacy controls include:

1. Leave groups silently: Users will be able to exit a group privately without having to notify everyone.

2. Choose who can see when youre online: For the times you want to keep your online presence private, WhatsApp is introducing the ability to select who can and cant see when youre online.

3. Screenshot blocking for view once messages: WhatsApp is enabling screenshot blocking for View Once messages for an added layer of protection. This feature is being tested and will be rolled out to users soon.

4. Default E2EE: WhatsApp always protects your personal conversations with end-to-end encryption by default (regardless of device) so that no one, not even WhatsApp, except your intended recipient can see or hear your private personal conversations.

5. Encrypted backups: WhatsApp offers the ability to backup your chat history with end-to-end encryption so its secure and only accessible to you with a password or encryption key. No other messaging service at our scale provides this level of additional security for your messages.

6. Disappearing messages: WhatsApps disappearing messages offer peace of mind with the ability to set durations for disappearing messagings: 24 hours, 7 days, or 90 days so users can send photos and videos that disappear after they have been opened.

7. Block and report: Users can choose to stop receiving messages and calls from certain contacts by blocking them and reporting them if they are sending problematic content or spam.

8. Two-step verification: For more protection, the two-step verification feature gives users the option to set a unique six-digit PIN that can be used when registering your phone number with WhatsApp again. This optional feature adds another layer of security to their WhatsApp account.

See the article here:
WhatsApps latest campaign highlights built-in layers of protection - The Week