Articles about encryption

Padlock

Oz MP flies crypto-kite, wants backdoors without backdoors

Federal MP Anthony Byrne wants to re-start the encryption debate in Australia. Speaking in parliament yesterday, the member of Australia's opposition Labor Party recalled last year's debate in the USA over a court's right to unlock iPhones during investigations into the 2015 San Bernardino attack. Now-dismissed FBI boss James …

Internet Society tells G20 nations: The web must be fully encrypted

The Internet Society has called for the full encryption of the internet, decrying the fact that securing the digital world has increasingly become associated with restricting access to law enforcement. In a blog post aimed at the leaders of the G20 economies, ISOC CEO Kathryn Brown argues that the digital economy "will only …
Kieren McCarthy, 10 Apr 2017

WWW daddy Sir Tim Berners-Lee stands up for end-to-end crypto

Sir Tim Berners-Lee has criticised plans to weaken encryption or extend surveillance in the wake of recent terrorist attacks. Days after the attack on Westminster that claimed the lives of three pedestrians and a police officer, Home Secretary Amber Rudd said there should be no safe space for terrorists to communicate online. …
John Leyden, 4 Apr 2017

D'oh! Amber Rudd meant 'understand hashing', not 'hashtags'

It was the cringiest moment in an already gaffe-prone interview on The Andrew Marr Show last week. Speaking about preventing the upload of objectionable content, Home Secretary Amber Rudd said the government needs to get people who "understand the necessary hashtags" talking. That was of course in addition to Rudd's widely …
Kat Hall, 3 Apr 2017
Joey from the sitcom friends pokes his head around the door (invasively). Photo copyright NBC

Europe to push new laws to access encrypted apps data

Update The European Commission will in June push for access to data stored in the cloud by encrypted apps, according to EU Justice Commissioner Věra Jourová. Speaking publicly, and claiming that she has been pushed by politicians across Europe, Jourová said that she will outline "three or four options" that range from voluntary …
Kieren McCarthy, 30 Mar 2017
Parliament in the clouds

UK digital minister Matt Hancock praises 'crucial role' of encryption

Digital minister Matt Hancock has praised the "crucial role" of encryption in today's society, just a day after Home Secretary Amber Rudd called for an encryption ban on applications such as WhatsApp. Hancock was relaying the story of radio inventor Guglielmo Marconi in a speech at the Institute of Directors. He said when …
Kat Hall, 27 Mar 2017
backdoor_648. Pic via Shutterstock

UK Home Sec: Give us a snoop-around for WhatApp encryption. Don't worry, we won't go into the cloud

The UK government is once again suggesting encryption has no place in citizens' hands, in the wake of revelations that Westminster attacker Khalid Masood was using WhatsApp shortly before murdering pedestrians with his car, and stabbing a police officer to death. While she stopped short of threatening a Brazilian-style …

'Sorry, I've forgotten my decryption password' is contempt of court, pal – US appeal judges

The US Third Circuit Court of Appeals today upheld a lower court ruling of contempt against an ex-cop who claimed he couldn't remember the password to decrypt his computer's hard drives. In so doing, the appeals court in Philadelphia avoided addressing a lower court's rejection of the defendant's argument that being forced to …
Thomas Claburn, 20 Mar 2017
Comey

FBI boss: 'Memories are not absolutely private in America'

FBI director James Comey has told a cybersecurity conference that any communications – be it with your spouse, your priest, or your lawyer – and any of your memories are up for grabs should a court order it. Speaking at the Boston Cyber Security Summit, Comey said that America's founding fathers had set down that there is a …
Iain Thomson, 8 Mar 2017
Trump meeting with tech leaders

Messaging app used by Trump aides 'riddled with security bugs'

Security researchers have discovered multiple vulnerabilities in Confide, the encrypted messaging app reportedly used by President Donald Trump's aides to speak to each other in secret. IOActive reported flaws it had discovered in Confide to the app's developers, who responded promptly by patching the application, allowing …
John Leyden, 8 Mar 2017
Image by Maksim Kabakouhttp://www.shutterstock.com/pic-362745248/stock-photo-privacy-concept-broken-shield-on-wall-background.html

SHA-1 crack just got real: System Center uses it to talk to Linux

When Google revealed last week that it had destroyed the SHA-1 algorithm, it hammered another nail into the venerable algo's coffin. But as we noted in our report on the feat, many applications still use SHA-1. And if you're one of the many Windows shops running Microsoft's System Center Operations Manager Management Server, …
Man loads in blanket into the washing machine. Photo by Shutterstock

Upstart Datrium has a soft blanket to wrap up your data if security is giving it the shivers

Datrium Blanket Encryption combines always-on deduplication, compression and encryption so that data is secure – or so it claims – whether that data is at a host, in flight across a network, or at rest in persistent storage. When it says "at the host," it means that data is deduplicated and compressed and encrypted in the …
Chris Mellor, 1 Mar 2017
France Germany

Germany, France lobby hard for terror-busting encryption backdoors – Europe seems to agree

The tech industry has hit back at France and Germany's demands for EU laws requiring secret backdoors in file and communications encryption. Last week, Thomas de Maizière and Bruno Le Roux, respectively the German and French ministers of the interior, sent a letter to the European Commission calling for measures to stem what …
Iain Thomson, 28 Feb 2017

Git fscked by SHA-1 collision? Not so fast, says Linus Torvalds

About that SHA-1 collision: Linus Torvalds has taken to Google+ to emphasise that in Git, its main role is error detection, so “the sky isn't falling.” The weak hashing algorithm is used, among other things, to provide a digital signature for software, documents like PDFs, and encryption certificates. The mathematical …

'First ever' SHA-1 hash collision calculated. All it took were five clever brains... and 6,610 years of processor time

Google researchers and academics have today demonstrated it is possible – following years of number crunching – to produce two different documents that have the same SHA-1 hash signature. This proves what we've long suspected: that SHA-1 is weak and can't be trusted. This is bad news because the SHA-1 hashing algorithm is used …

Privacy concerns over gaps in eBay crypto

eBay uses HTTPS on its most critical pages, such as those where payment or address information is entered, but a lack of encryption on several sensitive pages still poses a concern for the privacy conscious. Many pages on the site, which require user input or contain their personal info, are not HTTPS encrypted, according to …
John Leyden, 22 Feb 2017

Republicans send anti-Signal signal to US EPA

US House Republicans Lamar Smith (R-TX) and Darin LaHood (R-IL) have demanded a probe into staff at the US Environmental Protection Agency who are apparently using private encrypted communications. Earlier this month, insiders at the EPA, the US Department of Labor, the Foreign Service, and possibly other agencies and …
Michael McCaul

No crypto backdoors, more immigration ... says Republican head of House Committee on Homeland Security

RSA USA Representative Michael McCaul (R-TX), head of the US House Committee on Homeland Security, seemed a tad off-message today at the RSA USA security conference. He told an audience in San Francisco this morning that his committee had examined proposals to demand mandatory backdoors in encryption products and software to help …
Iain Thomson, 14 Feb 2017

Create a news alert about encryption, or find more stories about encryption.

Biting the hand that feeds IT © 1998–2017