Zoom Developing End-to-End Encryption Feature for Paying Users - MacRumors
Zoom Developing End-to-End Encryption Feature for Paying Users - MacRumors |
- Zoom Developing End-to-End Encryption Feature for Paying Users - MacRumors
- Mobile Encryption Market Size, Key Players, Dynamics and Technological Advancement 2020-2026 - Morning Tick
- TunnelBear review - Tom's Guide
- Exclusive: Apple dropped plan for encrypting backups after FBI complained - sources - Reuters
Zoom Developing End-to-End Encryption Feature for Paying Users - MacRumors Posted: 01 Jun 2020 03:53 AM PDT Videoconferencing service Zoom says it is developing end-to-end encryption for the platform, but the feature will only be available to paying users.
Zoom has attracted millions of free and paying customers amid the global health crisis, with stay-at-home measures causing a surge in the number of people working remotely. However, lax security, such as the ability for unregistered users to join meetings, has led to zoom-bombing pranks and caused alarm amongst safety experts and privacy advocates. "Charging money for end-to-end encryption is a way to get rid of the riff-raff," Jon Callas, a technology fellow of the American Civil Liberties Union, told Reuters. Callas said it would deter spammers and other malicious users who take advantage of free services. End-to-end encryption ensures no one but the participants and their devices can see and hear what is happening in a meeting, but it would also have to exclude people who call in to Zoom meetings from a telephone line. Zoom is currently under investigation by regulators such as the U.S. Federal Trade Commission over previous claims about encryption that have been criticized as exaggerated or false, according to Reuters. Privacy experts also told the news organization that with the Justice Department and some members of Congress condemning strong encryption, Zoom could draw unwanted new attention by expanding in that area. Back in April, Zoom was accused of misleading users with claims that calls on the platform are end-to-end encrypted, when in fact videos are secured using TLS encryption, the same technology that web servers use to secure HTTPS websites. Currently, Zoom's in-meeting text chat is the only feature of Zoom that is actually end-to-end encrypted. But in theory, the service could spy on private video meetings and be compelled to hand over recordings of meetings to governments or law enforcement in response to legal requests. Apple already uses end-to-end encryption to protect FaceTime users as call data travels between two or more devices. Even Apple can't decrypt the call and listen in to user's conversations. |
Posted: 24 Jun 2020 05:54 AM PDT The report on the Global Mobile Encryption Market by Reports and Data report consists of the historical data, latest market trends, rules and regulations, technological advancements, new upcoming technologies, and prevalent strategies adopted by industry participants. This study also analyzes the overall market status, market share, growth rate, key market drivers, growth opportunities and challenges, risks and entry barriers, sales channels, and others. This is the latest report, covering the current COVID-19 scenario. The Coronavirus pandemic has greatly affected the global industry. It has brought along various changes in market conditions. The rapidly changing market scenario and the initial and future assessment of the impact are covered in the research report. The report discusses all major aspects of the market with expert opinions on the current status along with a historical analysis. Get FREE Sample Copy with TOC of the Report to understand the structure of the complete report @ https://www.reportsanddata.com/sample-enquiry-form/2179 The report is filled with statistics and graphical representations for a better understanding of the data that is presented in a detailed chapter-wise format. Profiles of prominent market players also help predict the state and direction of the industry. Our team of experts has conducted extensive studies on the Mobile Encryption market, including a competitive analysis highlighting the key players. In market segmentation by manufacturers, the report covers the following companies- IBM, Sophos, Alertboot, Blackberry, McAfee, Dell, Eset, Certes Networks, Symantec, and Mobileiron, among others. This category-based assessment is beneficial for the reader to capitalize on those market segments that promise positive growth in the coming years. The report also examines the Mobile Encryption Market on the basis of the value, cost structure, and gross revenue. The three factors are analyzed for the different product types, the companies that are primarily engaged in the manufacture of the prevalent products, and the leading regional market in terms of sales of those product types. Apart from the statistical analysis, the total sales have also been assessed for the different types, applications, and regions. The segmentation included in the report is beneficial for readers to capitalize on the selection of appropriate segments for the Mobile Encryption sector and can help companies in deciphering the optimum business move to reach their desired business goals. For the purpose of this report, Reports and Data have segmented into the global Mobile Encryption Market on the basis of component, application, organization size, deployment mode, end-users, and region: Component Outlook (Revenue: USD Billion; 2016-2026)
Application Outlook (Revenue: USD Billion; 2016-2026)
Organization Size Outlook (Revenue: USD Billion; 2016-2026)
Buy Your Copy Now (Customized report delivered as per your specific requirement) @ https://www.reportsanddata.com/checkout-form/2179 The Global Mobile Encryption Market report provides the present economic situations with item values, benefits, limits, supply and demand, market development rate, and others. The Mobile Encryption industry report also undertakes a SWOT examination, speculation attainability investigation, venture return investigation, and other analytical tools. Geographically, the research report is divided into several key Regions, including the production, consumption, revenue, and market share and the growth rate of Mobile Encryption in these regions, from 2016 to 2027. The regions mapped in the report are North America, Europe, Asia Pacific, Latin America, and Middle East & Africa Objectives of the study: Our panel of expert analysts specializing in the value chain has conducted an exhaustive, industry-wide study to offer readers accurate insights into the future of the Mobile Encryption market and give key market players authentic information derived via both primary and secondary sources of data collection. Additionally, the report also comprises of inputs from our consultants, which can help companies make the most of the available market opportunities. It also offers a detailed breakdown of the sales of Mobile Encryption and the factors that could potentially influence the growth of the industry. The information provided in this report will be able to help readers capitalize on the available growth prospects. TOC highlights of the Global Mobile Encryption Market: Chapter 1 analyzes the Mobile Encryption Introduction, product offerings, and scope, complete market overview, growth opportunities, market risks, driving forces, and others. Chapter 2 presents a detailed study of the key manufacturers of Mobile Encryption, along with sales, revenue, and the price of Mobile Encryption. Chapter 3 includes the competitive scenario among the major manufacturers and vendors. Chapter 4 shows the global Mobile Encryption market by regions, clubbed with sales, revenue, and market share for each region, from 2016 to 2027. Chapters 5, 6, 7, 8, and 9, study the market by region, by type, by application, and by manufacturer, with the sales, revenue, and market share based on leading countries in these regions. Browse the full report @ https://www.reportsanddata.com/report-detail/mobile-encryption-market The research report by Reports and Data analyzes and forecasts the growth of the Mobile Encryption Market at the global and regional levels. The market has been projected in terms of volume and price for the forecast period. The report also sheds light on the various opportunities within the market. |
TunnelBear review - Tom's Guide Posted: 30 Jun 2020 08:53 AM PDT TunnelBear provides a reliable, beginner-friendly VPN service that operates across 23 locations, including Singapore, Europe, North America, Brazil, Australia, and others. It's certainly not the most advanced VPN on the market, but it does a great job of simplifying things for those with limited tech knowledge. Overall, we like TunnelBear – the user interface is intuitive and it's backed by a neat no-logging policy and annual security audits by an independent auditor, but the lack of options might be restrictive for those whole want to delve deeper into their VPN. In this TunnelBear review, we analyse everything you need to know about this VPN to help you make the decision on whether it's right for you. Plans and PricingThere are three versions of TunnelBear available. You can get a basic free-forever option, an Unlimited plan that starts at $3.33 per month, and a Teams subscription that costs from $5.75 per month. The free plan is very limited. It includes all the features found in the full version, but is capped at 500 MB of data per month. To put that into perspective, that's really only enough to test the program out, as it equates to roughly six hours of browsing or around half an hour of standard-definition video streaming. In its free form it's certainly not a great torrenting VPN. Fortunately, you can upgrade to an Unlimited plan for just $3.33 per month with a three-year subscription. An annual plan will up the price to $4.99 a month, while if you choose to truly pay monthly, it'll be $9.99 a month. As suggested by the name, this plan includes unlimited data, along with priority support. If you sign up for a three-year plan, you'll also get access to the RememBear password manager (usually $2.50 per month), which adds a nice bit of value if you're in need of it. If you're looking for a VPN for your small business, the Teams plan costs $5.57 per user, per month (with a minimum of two users). It comes with a range of VPN management tools, including an integrated management dashboard and centralized billing. It's worth noting that there's no money-back guarantee, so we'd recommend trialling TunnelBear's free plan before committing to a paid plan. However, TunnelBear's FAQ has a note on refunds, saying they may be offered on a case-by-case basis. We reckon that if you asked very nicely, did it sooner rather than later and had a good reason, the 'friendly support bears' might take pity and offer you a refund – but neither we nor TunnelBear make any promises. Finally, for those that want to pay anonymously, Bitcoin payments are available with annual subscriptions.
FeaturesAlthough TunnelBear is far from the most advanced VPN on the market, it still comes with plenty of great features. For starters, the VigilantBear setting allows you to set up an internet kill switch, which will cut your connection if the VPN connection fails. This is a great addition, as without it you may end up thinking your connection is protected, but in reality your VPN has dropped and you're using your regular unprotected network. Another interesting feature is the GhostBear setting, which is designed to disguise the fact that you're using a VPN. This could particularly help users that need a China VPN to avoid the country's internet restrictions. You can also choose between OpenVPN TCP and UDP connections, although there's no option to change your connection protocol. Torrenting is something of a sensitive topic for VPNs, largely because P2P sharing is often used to download illegal or pirated content. While often not featured as a selling point on VPN providers' websites, torrenting may actually be supported – and TunnelBear comes through with the goods. We spoke directly to the TunnelBear team, and they confirmed that torrenting is supported in all locations. Unfortunately, TunnelBear isn't a great choice for accessing geo-blocked content – even on a full plan. We tested it with Netflix, Amazon Prime Video, Disney+, and BBC iPlayer – none of them worked. However, TunnelBear is clear about its security and logging policies, and provides details about the information it collects and exactly what happens to it. On top of this, TunnelBear is audited annually by Cure53, an independent security company. The results of these audits are made public, resulting in great transparency. We appreciate this commitment to security, and think independent audits are something every VPN worth its salt should undertake. Interface and in useTunnelBear is aimed at those with limited tech knowledge, and its user interface doesn't disappoint. It's simple, intuitive, and available on Windows, Mac, Android, and iOS devices. Firefox, Chrome, and Opera extensions are also available, and there's also documentation to help you install it on Linux devices. However, TunnelBear only offers 'limited support' for Linux, and does not support Kindle/eReaders, Windows mobile devices, Apple/Android TV, gaming systems, or routers and modems. While the majority of people won't be installing a VPN on their Xbox, it's a little disappointing to see this lack of support for niche systems – especially when many other VPNs can be used to protect pretty much every device you own. The desktop interface shows a world map highlighting the available VPN servers – but you can also view these as a list, which for usability is probably a better bet. To connect, simply select the location you want to use and click the On button. The Android and iOS interfaces are very similar to the desktop app, so once you've got used to one, you'll be able to get going on all of them. Finally, the three browser extensions offer a fast, simple way to protect your data and internet browsing activity. However, these are limited, and basically only include a list of locations and an on/off switch. Note, also, that they only protect browser traffic, unlike the desktop and mobile apps. In terms of performance, TunnelBear performed impressively. On our 75MB UK line, the VPN averaged around 66MB – in practice that's a negligible slowdown, and is good enough for pretty much anything you'll be doing. On our much faster 600MB US line, TunnelBear again impressed, delivering speeds of around 200MB. These connection speeds are up there with the best, and bearing in mind these tests were performed at the peak of the COVID-19 lockdown which saw other providers' connections slow to a crawl, this bodes well for the general reliability of TunnelBear's servers. SupportTunnelBear users have access to email support and a beginner-oriented self-help knowledge base. For starters, you can reach out to the support team via the Contact page on the provider website. In general, the team replies within hours and provides simple, accurate responses, but we'd really like to see live chat – the very best VPNs all provide excellent 24/7 support, and we'd love to see TunnelBear follow suit. If you have a more general issue or need help setting your TunnelBear account up, there's plenty of information in the knowledge base. Resources include articles answering common questions like 'does TunnelBear keep logs?', quick-start guides, and links to the company's Twitter account, where maintenance and system outage information is posted. The competitionTunnelBear is a great choice if you want a simple VPN, but there are numerous more advanced options on the market if you need something a little more powerful. For example, ExpressVPN ($6.67/month over 12 months) has over 3,000 servers in 160 locations and 94 countries. It runs on near any platform, is backed by powerful encryption tools, has excellent live-chat support and, importantly, can unblock just about any streaming service. If you're looking for a cheap and fully functional VPN, at just $1.99 per month Surfshark is another great alternative that offers more customisation than TunnelBear alongside excellent streaming power. TunnelBear: Final verdictTunnelBear certainly isn't the most powerful VPN in the world, but it's a great option for beginners and those with limited tech knowledge. It's well-known for its transparent independent security audits and is backed by a good range of advanced features. However, it's let down by its inability to access geo-blocked streaming services, and its support is lackluster compared to the very best. All things considered, though, for users just looking for a simple, easy-to-use and secure VPN, the no-frills TunnelBear is certainly a viable option. SpecsSupported platforms: Windows, Mac, iOS, Android, Linux (limited)
|
Exclusive: Apple dropped plan for encrypting backups after FBI complained - sources - Reuters Posted: 21 Jan 2020 02:59 PM PST SAN FRANCISCO (Reuters) - Apple Inc (AAPL.O) dropped plans to let iPhone users fully encrypt backups of their devices in the company's iCloud service after the FBI complained that the move would harm investigations, six sources familiar with the matter told Reuters. The tech giant's reversal, about two years ago, has not previously been reported. It shows how much Apple has been willing to help U.S. law enforcement and intelligence agencies, despite taking a harder line in high-profile legal disputes with the government and casting itself as a defender of its customers' information. The long-running tug of war between investigators' concerns about security and tech companies' desire for user privacy moved back into the public spotlight last week, as U.S. Attorney General William Barr took the rare step of publicly calling on Apple to unlock two iPhones used by a Saudi Air Force officer who shot dead three Americans at a Pensacola, Florida naval base last month. U.S. President Donald Trump piled on, accusing Apple on Twitter of refusing to unlock phones used by "killers, drug dealers and other violent criminal elements." Republican and Democratic senators sounded a similar theme in a December hearing, threatening legislation against end-to-end encryption, citing unrecoverable evidence of crimes against children. Apple did in fact did turn over the shooter's iCloud backups in the Pensacola case, and said it rejected the characterization that it "has not provided substantive assistance." Behind the scenes, Apple has provided the U.S. Federal Bureau of Investigation with more sweeping help, not related to any specific probe. An Apple spokesman declined to comment on the company's handling of the encryption issue or any discussions it has had with the FBI. The FBI did not respond to requests for comment on any discussions with Apple. More than two years ago, Apple told the FBI that it planned to offer users end-to-end encryption when storing their phone data on iCloud, according to one current and three former FBI officials and one current and one former Apple employee. Under that plan, primarily designed to thwart hackers, Apple would no longer have a key to unlock the encrypted data, meaning it would not be able to turn material over to authorities in a readable form even under court order. In private talks with Apple soon after, representatives of the FBI's cyber crime agents and its operational technology division objected to the plan, arguing it would deny them the most effective means for gaining evidence against iPhone-using suspects, the government sources said. When Apple spoke privately to the FBI about its work on phone security the following year, the end-to-end encryption plan had been dropped, according to the six sources. Reuters could not determine why exactly Apple dropped the plan. "Legal killed it, for reasons you can imagine," another former Apple employee said he was told, without any specific mention of why the plan was dropped or if the FBI was a factor in the decision. That person told Reuters the company did not want to risk being attacked by public officials for protecting criminals, sued for moving previously accessible data out of reach of government agencies or used as an excuse for new legislation against encryption. "They decided they weren't going to poke the bear anymore," the person said, referring to Apple's court battle with the FBI in 2016 over access to an iPhone used by one of the suspects in a mass shooting in San Bernardino, California. Apple appealed a court order to break into that phone for the FBI. The government dropped the proceedings when it found a contractor that could break into the phone, a common occurrence in FBI investigations. Two of the former FBI officials, who were not present in talks with Apple, told Reuters it appeared that the FBI's arguments that the backups provided vital evidence in thousands of cases had prevailed. "It's because Apple was convinced," said one. "Outside of that public spat over San Bernardino, Apple gets along with the federal government." However, a former Apple employee said it was possible the encryption project was dropped for other reasons, such as concern that more customers would find themselves locked out of their data more often. Once the decision was made, the 10 or so experts on the Apple encryption project - variously code-named Plesio and KeyDrop - were told to stop working on the effort, three people familiar with the matter told Reuters. APPLE SHIFTS FOCUSApple's decision not to proceed with end-to-end encryption of iCloud backups made the FBI's job easier. The agency relies on hacking software that exploits security flaws to break into a phone. But that method requires direct access to the phone which would ordinarily tip off the user, who is often the subject of the investigation. Apple's iCloud, on the other hand, can be searched in secret. In the first half of last year, the period covered by Apple's most recent semiannual transparency report on requests for data it receives from government agencies, U.S. authorities armed with regular court papers asked for and obtained full device backups or other iCloud content in 1,568 cases, covering about 6,000 accounts. The company said it turned over at least some data for 90% of the requests it received. It turns over data more often in response to secret U.S. intelligence court directives, which sought content from more than 18,000 accounts in the first half of 2019, the most recently reported six-month period. Had it proceeded with its plan, Apple would not have been able to turn over any readable data belonging to users who opted for end-to-end encryption. Instead of protecting all of iCloud with end-to-end encryption, Apple has shifted to focus on protecting some of the most sensitive user information, such as saved passwords and health data. But backed-up contact information and texts from iMessage, WhatsApp and other encrypted services remain available to Apple employees and authorities. Apple is not the only tech company to have removed its own access to customers' information. In October 2018, Alphabet Inc's (GOOGL.O) Google announced a similar system to Apple's dropped plan for secure backups. The maker of Android software, which runs on about three-quarters of the world's mobile devices, said users could back up their data to its own cloud without trusting the company with the key. Two people familiar with the project said Google gave no advance notice to governments, and picked a time to announce it when encryption was not in the news. The company continues to offer the service but declined to comment on how many users have taken up the option. The FBI did not respond to a request for comment on Google's service or the agency's approach to it. Reporting by Joseph Menn in San Francisco; Editing by Bill Rigby and Cynthia Osterman Our Standards:The Thomson Reuters Trust Principles. |
You are subscribed to email updates from "encrypt galaxy s7,encrypted cell,what does encrypting my phone do" - Google News. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
Comments
Post a Comment