{"id":24451,"date":"2014-07-01T16:40:52","date_gmt":"2014-07-01T20:40:52","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24451"},"modified":"2014-07-01T16:40:52","modified_gmt":"2014-07-01T20:40:52","slug":"encryption-race-continues-as-microsoft-bulks-up-protection-for-email-and-file-storage","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/encryption-race-continues-as-microsoft-bulks-up-protection-for-email-and-file-storage.php","title":{"rendered":"Encryption race continues as Microsoft bulks up protection for email and file storage"},"content":{"rendered":"<p><p>  6 hours ago Jul. 1, 2014 - 8:09 AM PDT<\/p>\n<p>    Microsoftis nowencrypting messages flowing between    its own Outlook.com mail service and third-party mail providers    using Transport Layer Security, and has also    enabledPerfect Forward Security in Outlook.com and    OneDrive file storage. Perfect Forward Secrecy usesa    different encryption key for each connection, according to a        Microsoft Technet blog.  <\/p>\n<p>    TLS support means that mail flowing into and out of Outlook.com    accounts is encrypted and thus better protected as it travels    between Microsoft and other email providers, as long as those    other email vendorsalso support TLS, wrote Matt    Thomlinson, VP of Microsofts trustworthy computing security    group.  <\/p>\n<p>    Microsoft rival     Google last month called for other email    providerstomake use of Perfect Forward Secrecy    technology so that messages areprotected from    theirpoint of creation to theirdestination.  <\/p>\n<p>    Thomlinson also said Microsoft worked withinternational    mail providers including Deutsche Telekom, Yandex and Mail.Ru    to test and help ensure that mail stays encrypted in transit    to and from each email service.  <\/p>\n<p>    Ever since Edward Snowdens disclosures about the U.S. National    Security Agencysnooping on cloud customer data, U.S.    cloud providers have been falling all over themselves to prove    they are good stewards of customer information.  <\/p>\n<p>    Microsofts general counsel Brad Smith,     who spoke on the topic at Gigaomsrecent Structure    Conference, has been in the forefront of that fight.  <\/p>\n<p>    These companiessayunchecked (and secretive)    government data gathering is bad for their businesses and argue    that its also bad for the U.S. in general. The NSA disclosures    have given non-U.S.-basedcloud providers a powerful    marketing tool to argue that German citizens (or companies)    should stick to German providers for their cloud computing    needs; ditto France, and so on.  <\/p>\n<p>    NowU.S. tech powers likeMicrosoft, Hewlett-Packard,    Google and so on have to showthat they are prepared to    fight  even fight the U.S. government, if need be  to protect    customer data.  <\/p>\n<p>    At Structure,     HP EVP Bill Veghtesaid NSA-gate had hurt cloud    adoption in China, which is building infrastructure like    gangbusters while U.S. vendors have to deal with spying    concerns. Its just a bummer, he said.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more from the original source:<br \/>\n<a target=\"_blank\" href=\"http:\/\/gigaom.com\/2014\/07\/01\/encryption-arms-race-continues-as-microsoft-bulks-up-protection-for-email-and-file-storage\" title=\"Encryption race continues as Microsoft bulks up protection for email and file storage\">Encryption race continues as Microsoft bulks up protection for email and file storage<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> 6 hours ago Jul. 1, 2014 - 8:09 AM PDT Microsoftis nowencrypting messages flowing between its own Outlook.com mail service and third-party mail providers using Transport Layer Security, and has also enabledPerfect Forward Security in Outlook.com and OneDrive file storage. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-24451","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24451"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24451"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24451\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24451"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24451"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24451"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}