Articles about encryption

Crypto fingers

Quantum crypto upstart QuintessenceLabs hopes to cut the cord

With AU$3.26m from Australia's government, quantum crypto outfit QuintessenceLabs has set to work getting the fibre out of its diet, and instead running quantum key exchange over free space. While there have been scientific demonstrations of quantum exchanges both terrestrially and between earth and satellites, …

China's 'future-proof' crypto: We talk to firm behind crazy quantum key distribution network

Two hundred local government employees across the capital of China's eastern Shandong province will soon be encrypting messages with keys that are "impossible" to crack. QuantumCTek, headquartered in the humid, subtropical city of Hefei in eastern China, will next month launch a commercial network for creating and sharing …
Andrew Silver, 19 Jul 2017
Backdoor key

UK spookhaus GCHQ can crack end-to-end encryption, claims Australian A-G

British signals intelligence agency Government Communications Headquarters (GCHQ) can crack end-to-end encrypted messages sent using WhatsApp and Signal, according to Australian attorney-general George Brandis. Brandis made the claim speaking to the Australian Broadcasting Corporation's AM program, on the occasion of Australia …
Simon Sharwood, 14 Jul 2017
Businessman with unlocked padlock - shutterstck

G20 calls for 'lawful and non-arbitrary access to available information' to fight terror

Comment The meeting of G20 leaders decided to do something about the internet. The final G20 Leaders' Statement on Countering Terrorism included the following plan: We will work with the private sector, in particular communication service providers and administrators of relevant applications, to fight exploitation of the internet …

Former GCHQ boss backs end-to-end encryption

Former GCHQ director Robert Hannigan has spoken out against building backdoors into end-to-end encryption (e2) schemes as a means to intercept communications by terrorists and other ne'er do wells. UK Home Secretary Amber Rudd has criticised mobile messaging services such as WhatsApp, that offer end-to-end encryption in the …
John Leyden, 10 Jul 2017

Oz government wants its own definition of what 'backdoor' means

Australia’s federal government has shifted its ground on the encryption debate, and is now working to hem in the debate by constraining the definition of “backdoor”. The technologist’s understanding is that anything that compromises encryption represents a “backdoor” of some kind, from NSA-style bug-hoarding to key escrow to …
open_door_648

German e-gov protocol carries ancient vulns

Germany's e-government system is open to padding oracle attacks and other vulnerabilities because of an insecure communications protocol. According to this SEC-Consult advisory, which landed on Friday, the problems are in the OSCI-Transport Library version 1.2, for which a common implementation is in Java. OSCI, the Online …
Telegram from dictionary

Encrypted chat app Telegram warned by Russian regulator: 'comply or goodbye'

Russia's communications regulator is threatening to lower the boom on popular encrypted messaging application Telegram. It might look like yet another government attack on user-accessible encryption, but in this letter, the head of regulator Roskomnadzor Alexander Zharov says the messaging app is violating Russian legislation …

Australian govt promises to push Five Eyes nations to break encryption

The Australian government looks set to take a hard line on encryption at this week’s Five Eyes meeting, and encourage the other nations in the network to jump on the back-door band wagon. The Five Eyes nations - the UK, United States, Canada, Australia and New Zealand - have an agreement to gather and share intelligence, and …
Rebecca Hill, 26 Jun 2017
sniffer

AES-256 keys sniffed in seconds using €200 of kit a few inches away

Side-channel attacks that monitor a computer's electromagnetic output to snaffle passwords are nothing new. They usually require direct access to the target system and a lot of expensive machinery – but no longer. Researchers at Fox‑IT have managed to wirelessly extract secret AES-256 encryption keys from a distance of one …
Iain Thomson, 23 Jun 2017

Cisco's 'encrypted traffic fingerprinting' turned into a product

Cisco has turned research published nearly a year ago into a product it hopes will protect enterprises against malware hidden in encrypted traffic. As The Register reported in July 2016, a group of Cisco researchers have been working on how to spot dangers entering networks through TLS. Since you can't see inside encrypted …
Mikko Hypponen, Chief Research Officer at F-Secure

F-Secure's Mikko Hypponen on IoT: If it uses electricity, it will go online

Mikko Hypponen, chief research officer at Finnish security company F-Secure, spoke to The Reg at the launch of Sense, a consumer firewall device that aims to "secure your connected things". Hypponen says IoT is unavoidable. "If it uses electricity, it will become a computer. If it uses electricity, it will be online. In future …
Tim Anderson, 21 Jun 2017

WhatsApp app in flap over chap's snap of URL mishap

A developer has found a hole in secure messaging tool WhatsApp's handling of links that could expose some traffic to third parties. The condition, discovered by developer Adam Wolk, arises when a user types a link into a WhatsApp message. Wolk found that, as the URL is entered into the message, WhatsApp pings the host server, …
Shaun Nichols, 19 Jun 2017

Backdoor backlash: European Parliament wants better privacy

A committee of the European Parliament is pushing back against the anti-encryption sentiment infesting governments around the world, with a report saying citizens need more protection, not less. In a draft report that landed last week, the parliament's Committee on Civil Liberties, Justice and Home Affairs says data protection …
voting

Worried about election hacking? There's a technology fix – Helios

Election hacking is much in the news of late and there are fears that the Russians/rogue lefties/Bavarian illuminati et al are capable of falsifying results. For example, voters in the state of Georgia's sixth district are going to the polls on Tuesday for a close-fought election, and serious doubts have been raised about the …
Iain Thomson, 16 Jun 2017

Look who's joined the anti-encryption posse: Germany, come on down

Germany has joined an increasing number of countries looking to introduce anti-encryption laws. Speaking on Wednesday, German interior minister Thomas de Maizière said the government was preparing a new law that would give the authorities the right to decipher and read private encrypted messages, specifically citing encrypted …
Kieren McCarthy, 15 Jun 2017

Telegram chat app founder claims Feds offered backdoor bribe

The founder of chat app Telegram has publicly claimed that feds pressured the company to weaken its encryption or install a backdoor. "During our team's 1-week visit to the US last year we had two attempts to bribe our devs by US agencies + pressure on me from the FBI," Pavel Durov said on Twitter. "It would be naive to think …
John Leyden, 14 Jun 2017
Bitcoin punch cards

Australian oppn. leader wants to do something about Bitcoin, because terrorism and crypto

Australia's opposition leader Bill Shorten has suggested that governmental action to deny use of encryption to terrorists should extend to Bitcoin. In a speech to the House of Representatives yesterday, Shorten fell into lock-step with Australia's plan to compel technology companies to build not-backdoors into their products …
Simon Sharwood, 13 Jun 2017

Create a news alert about encryption, or find more stories about encryption.

Biting the hand that feeds IT © 1998–2017