{"id":24452,"date":"2014-07-01T16:40:56","date_gmt":"2014-07-01T20:40:56","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24452"},"modified":"2014-07-01T16:40:56","modified_gmt":"2014-07-01T20:40:56","slug":"microsoft-flips-switch-on-new-webmail-encryption","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/microsoft-flips-switch-on-new-webmail-encryption.php","title":{"rendered":"Microsoft flips switch on new webmail encryption"},"content":{"rendered":"<p><p>    Microsoft has pulled back the curtain on its implementation of    tougher    encryption standards for Web-based email and some cloud    services, the company announced Tuesday.  <\/p>\n<p>    In the works for more than six    months, Microsoft has now activated Transport Layer    Security encryption (TLS) for its webmail services at    Outlook.com, Hotmail.com, Live.com, and MSN.com. This means it    will be significantly harder for email originating from and    being sent to a Microsoft account to be spied on, as long as    the connecting email service also uses TLS.  <\/p>\n<p>    Matt Thomlinson, vice president of Microsoft's Trustworthy    Computing division, said that this work is part of a    \"comprehensive engineering effort to strengthen encryption.\"  <\/p>\n<p>    \"This effort also helps us reinforce that governments use    appropriate legal processes, not technical brute force, if they    want access to that data,\" he said.  <\/p>\n<p>    Although Thomlinson didn't specify the origins of this work,    Microsoft's heightened encryption efforts follow an October    2013 report that the NSA had been    spying on Internet giants in a program called Muscular. The    report was based on documents leaked by one-time National    Security Agency contractor Edward Snowden.  <\/p>\n<p>    Microsoft's move also comes just a few weeks after a    well-publicized Google webmail    report that painted Redmond in less than flattering colors.    Google scored Microsoft, along with Comcast and Apple, as    webmail providers with inadequate levels of encryption to    protect their users' email.  <\/p>\n<p>    Comcast and Microsoft representatives told CNET at the time of    Google's report that their companies were in the process of    implementing TLS for their webmail services. Apple did not    return a request for comment.  <\/p>\n<p>    Microsoft also has activated Perfect Forward    Secrecy encryption (PFS) for its cloud storage service    OneDrive. The OneDrive website,    OneDrive mobile apps, and OneDrive syncing tools will now all    use the tougher PFS encryption standard, which protects user    confidentiality even when an third-party is eavesdropping on    the network.  <\/p>\n<p>    Finally, Microsoft has opened a \"transparency center\" at its    headquarters in Redmond, Wash., where governments can review    Microsoft source code for \"key products\" to confirm that no    hidden backdoors have been added to the software. Microsoft has    not revealed which of its products will be available for    review.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.cnet.com\/news\/microsoft-flips-the-switch-on-webmail-encryption\" title=\"Microsoft flips switch on new webmail encryption\">Microsoft flips switch on new webmail encryption<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Microsoft has pulled back the curtain on its implementation of tougher encryption standards for Web-based email and some cloud services, the company announced Tuesday. In the works for more than six months, Microsoft has now activated Transport Layer Security encryption (TLS) for its webmail services at Outlook.com, Hotmail.com, Live.com, and MSN.com. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-24452","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24452"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24452"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24452\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}