encryption

Neowise CarbonFTP 1.4 Insecure Proprietary Password Encryption

Neowise CarbonFTP version 1.4 suffers from an insecure proprietary password encryption implementation. Second version of this exploit that is updated to work with Python 3.





encryption

Design And Implementation Of A Voice Encryption System For Telephone Networks

This whitepaper goes into detail on design and implementation details for performing voice encryption on telephone networks. Written in Spanish.






encryption

RC4 Simple FILE Encryption / Decryption

Simple script to perform RC4 encryption / decryption.




encryption

XOR File Encryption / Decryption

Script to perform basic XOR file encryption / decryption.








encryption

Symantec Mobile Encryption For iPhone 2.1.0 Denial Of Service

Symantec Mobile Encryption for iPhone version 2.1.0 suffers from a denial of service vulnerability.





encryption

Zoom's Adding End-to-End Encryption for Real This Time, But It'll Cost You

With the acquisition of a start-up specialising in encrypted messaging and cloud services, Zoom will finally be able to make good on its claims of offering end-to-end encryption.




encryption

New Zoom 5.0 app rectifies security concerns with government-strength encryption tech and meeting protection

The company has made steps to secure meetings against Zoombombing




encryption

The backdoor threat to encryption


This post originally appeared in the opinion page of the Boston Globe on October 1, 2015.

As they ratchet up a campaign for backdoor access to information on iPhones and other devices with encryption, some law enforcement leaders paint a dark vision of technology. Manhattan DA Cyrus Vance suggests that passcodes on smartphones blocked identification of a murderer. British Prime Minister David Cameron sees a “safe haven” for terrorists “in dark places.” FBI Director James Comey alludes to phones buzzing devilish messages in the pockets of ISIS recruits and says widespread encryption “threatens to lead us to a very, very dark place.”

Sure, it’s the job of law enforcement officers to look on the dark side, and to focus on protecting people and catching criminals. But evil lies with terrorists and criminals — not the phones or apps they use. Cellphones are targets simply because they have become such rich new sources of evidence for law enforcement. Chief Justice John Roberts called them windows into our entire lives.

Comey acknowledges the benefits of strong encryption may outweigh the costs, but says “part of my job is make sure the debate is informed by a reasonable understanding of the costs.” Part of my job at the Commerce Department a few years ago was to make sure government debate on security and law enforcement issues was informed by a reasonable understanding of costs to security and privacy, innovation, economic growth, and democratic values in the world.

With backdoors, these costs are real. Leading cryptologists have detailed how backdoors would create “grave security risks.” Comey has suggested to Congress that tech companies can solve this problem if only they spend enough time on it. Yet no amount of magical thinking can undo the contradiction between promoting strong encryption as a defense against the barrage of identity theft, espionage, and other cybercrimes while opening up new vulnerabilities.

There is an acute need to strengthen data security everywhere, and no realistic way to leave a door open for good guys and democracies that have rigorous checks and balances but not for cybercriminals or authoritarian states.

Backdoors undermine not only security, but also the competitive position of US companies that are trying to strengthen global trust in their brands and correct perceptions of “direct access” for US intelligence and law enforcement left by the Snowden leaks.

If backdoors are adopted for US products, people intent on keeping information secure, whether for benign or nefarious reasons, will turn to alternatives like cheap burner phones, devices sold in other countries, and encryption applications.

The United States would face a choice of whether to join the ranks of countries that try to block devices and services. That dilemma shows another important cost of backdoors — they undermine America’s position in the world.

The United States has promoted technologies that help democratic activists avoid surveillance by repressive governments, objected to measures in India and China that imply backdoors or block imports of encrypted devices like Blackberries, and taken unprecedented steps to provide transparency and limits on foreign intelligence collection. If the United States adopts backdoor requirements, though, no matter how constrained by checks and balances, it will face cries of hypocrisy.

In the backdrop of President Obama’s discussions with Chinese President Xi Jinping about cybersecurity are concerns about Chinese measures that require “secure and controllable” information technology and assert “Internet sovereignty.” It is hard to picture our president making headway on such concerns if his own government is contemplating backdoors.

In the end, the president himself likely will have to decide where his administration comes out on backdoors. When he does, he will have to pick sides.

The choices are less stark than the law enforcement meme “going dark” implies. Even so, it may be, as Chief Justice Roberts has written, that “Cellphones have become important tools in facilitating coordination and communication among members of criminal enterprises” but “Privacy comes at a cost.” So do security and trust.

The time has come for the president to shut the door on backdoors and send a clear message to the world that American technology is a trusted instrument of freedom.

Image Source: © Albert Gea / Reuters
      
 
 




encryption

Zoom acquires Keybase to get end-to-end encryption expertise

Zoom announced this morning that it has acquired Keybase, a startup with encryption expertise. It did not reveal the purchase price. Keybase, which has been building encryption products for several years including secure file sharing and collaboration tools, should give Zoom some security credibility as it goes through pandemic demand growing pains. The company has […]




encryption

Zoom acquires Keybase to get end-to-end encryption expertise

Zoom announced this morning that it has acquired Keybase, a startup with encryption expertise. It did not reveal the purchase price. Keybase, which has been building encryption products for several years including secure file sharing and collaboration tools, should give Zoom some security credibility as it goes through pandemic demand growing pains. The company has […]




encryption

FBI chief Christopher Wray warns that social media and encryption is fueling domestic terror

FBI Director Christopher Wray said Wednesday in Washington: 'Terrorism today moves at the speed of social media' and the rapid development of technology has helped boost lone terrorists.




encryption

Republicans introduce bill to stop end-to-end encryption

The bill was proposed by Senator Lindsey Graham and it is titled the 'Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 6 2019'' or the 'EARN IT Act of 2019'.




encryption

Zoom buys security service in bid to address safety concerns and introduce end-to-end encryption

Keybase will help the Zoom build end-to-end encryption designed to safeguard user data and privacy and bolster its current security measures which it incorrectly claimed included full encryption.




encryption

Zoom 5.0 Amplifies User Privacy; Brings 256-Bit GMC Encryption

Zoom video conferencing platform has seen exponential growth in user-base since coronavirus lockdown across the globe. It offers both free and paid subscription plans with support for up to 1000 participants. When it comes to security, the service has been questioned




encryption

Zoom Introduces End-To-End Encryption Security But There’s A Catch

Video conferencing while working from home is the new norm and our stint with such apps could be longer than expected. As a result, apps like Zoom, Google Meet, Skype, and others have witnessed a spike in their popularity. However, numerous




encryption

Forget Apple vs. the FBI: WhatsApp Just Switched on Encryption for a Billion People

WhatsApp just made the scope of the Apple-FBI encryption battle look kinda small. WIRED's senior staff writer, Cade Metz, breaks down exactly why this is a big deal.




encryption

Multiring-induced multicolour emission: hyperbranched polysiloxane with silicon bridge for data encryption

Mater. Chem. Front., 2020, 4,1375-1382
DOI: 10.1039/D0QM00075B, Research Article
Yuanbo Feng, Hongxia Yan, Fan Ding, Tian Bai, Yufeng Nie, Yan Zhao, Weixu Feng, Ben Zhong Tang
The presented work shows an impressive multicolour luminescence hyperbranched polysiloxane attributed to the multiring through-space conjugation named “multiring induced multicolor emission” (MIE), as well as its application in data encryption.
The content of this RSS Feed (c) The Royal Society of Chemistry




encryption

Express newslist: Updates on Draft National Encryption Policy, beef ban and other stories




encryption

A VLSI architecture for Rijndael, the advanced encryption standard




encryption

A VHDL implementation of the Advanced Encryption Standard-Rijndael Algorithm