How to Encrypt Your iPhone or iPad Backup - MUO - MakeUseOf

How to Encrypt Your iPhone or iPad Backup - MUO - MakeUseOf


How to Encrypt Your iPhone or iPad Backup - MUO - MakeUseOf

Posted: 23 Feb 2021 12:00 PM PST

[unable to retrieve full-text content]How to Encrypt Your iPhone or iPad Backup  MUO - MakeUseOf

Physical and Digital Safety: Arrest and detention - CPJ Press Freedom Online

Posted: 24 Feb 2021 06:14 AM PST

Covering certain stories–such as human rights abuses, corruption, or civil unrest–can place you at a higher risk of arrest and detention, particularly in countries with authoritarian regimes or with a heavy militarized and police presence.

When confronted by the authorities it is generally prudent to comply with their commands, even if they are not lawful, in order to protect your safety.

Journalists should consider the following digital and physical safety advice to help better protect themselves.

Digital Security Advice

Taking steps to secure your devices and your data in advance of potential detention or arrest can reduce the possibility of others accessing information about you and your sources.

Preparing your devices

If you are arrested or detained, your devices may be confiscated and searched.

Take the following steps to secure your device and your data:

  • Secure your devices with a pinlock or password. Be aware that this may not stop authorities from being able to unlock it.
  • Know the law regarding use of encryption in the country you are reporting in, and consider turning it on for your computers and Android devices. The recent iPhone comes with encryption as standard. You will need to power down your device to enable the encryption.
  • Know what data, including documents and photos, is kept on your devices and where it is located. Remove data that you feel puts you at risk.
  • Regularly back up your information to an external storage device, such as a hard drive. You should then delete the content from the device. Be aware that authorities or criminal groups with sophisticated tech capacity may still be able to recover deleted content.
  • Encrypt your external drives. It is a good idea to keep copies of your data on more than one drive and store them in separate places ideally not your home or office, which could be searched if you are detained.
  • Clear your browsing history regularly, and log out regularly from all your accounts.
  • Know what content is in your messaging apps and set up a process for regularly backing up and deleting content.
  • Manage the contacts in your phones and messaging apps. Remove details of people you feel could put you or them at risk. Be aware that contacts are stored in apps and in the cloud, as well as on the SIM card.
  • Set up your devices to remote wipe. If you are concerned you won't have time to remote wipe your devices if arrested or detained you should speak with a trusted contact about wiping them for you. A device will only wipe if it is connected to the internet or mobile data. Consider whether wiping your device will make you look more suspicious.
  • If your devices leave your line of sight and are then returned to you at a later date they may have been infected with spyware. If possible, you should buy new devices. If this is not possible, you should carry out a factory reset of your phone but be aware that it may not remove the spyware.

Protecting your accounts

If you are detained you may be asked to hand over passwords to your online accounts. While you may not be able to prevent people from accessing your accounts, you can take preventative steps to limit the data available to them.

Limit people's access to content in your accounts:

  • Review the content in all your accounts, especially email and social media, regularly. Know what information could put you or others at risk.
  • Regularly back up and delete content from these accounts, including old emails and social media messages. Be aware that this content will only be deleted from your account; it will not be deleted from the account of the person you are in contact with. Unless the service you are using is end-to-end encrypted, like Signal or WhatsApp, a copy of all your data, including emails and messages, is kept by the company and can be subpoenaed by governments.
  • Your social media accounts give away a lot of information about who you are in contact with via your followers and friends lists. This information can be used to map your personal and professional networks. Review your friends and followers on social media and remove anyone you feel puts your or others at risk. A copy of this data will still exist on the server of the company and can be subpoenaed by governments.
  • Be aware that photos and videos held in online services can be used to identify personal contacts, such as family members, as well as professional ones, including sources.
  • Make access to your accounts more difficult by logging out of your accounts and regularly clearing your browsing history. Limit the number of messaging apps and email services applications on your phone or computer.

Physical Security Advice

Pre-assignment considerations

  • Research and understand what your legal rights are as a journalist in the country you are reporting in. Try to find out:

–What you can/cannot be arrested for;

–Details of previous journalist arrests and how they were treated;

–Which units are likely to be making arrests on the day (i.e. uniformed police, covert/undercover officers, the military, etc.)

–How long you can be detained before being charged;

–If you will be allowed to make a phone call(s) and to whom;

–If you will have access to a lawyer/legal representative who can speak your language;

–Who will pay for any lawyer/legal representative;

–If your embassy/consulate will be notified of your arrest (if applicable);

–Where you are likely to be taken if arrested

  • Consider if taking any items or equipment on assignment with you might increase your chances of being arrested (e.g. satellite phones, walkie talkies, binoculars, military style clothing, night vision goggles, etc.)
  • Always ensure you have the correct and valid documents with you (e.g. press credentials, driver's license, passport, visa, etc.)
  • Take a fully charged mobile phone with you, some cash, any medication you might be taking, and basic supplies like drinking water, energy snacks, and warm clothes.
  • Dress appropriately for the conditions. If detained by the police you may be wearing the same clothes for some time.
  • Think about how you will react if you are arrested. Be aware that police officers can be heavy handed and aggressive depending on the location and situation.
  • Take the minimum amount of equipment necessary to help prevent equipment losses.
  • For more information, please consult CPJ's Risk Assessment template.

Communication

  • Identify a legal representative who can be contacted if you are arrested. Store their name and contact number on your phone, and also on a piece of paper and/or written on your arm.
  • If working abroad, record the emergency contact details of your embassy/consulate in your phone.
  • Try and avoid working alone. If you do it may take longer to raise the alarm if you are detained/arrested.
  • If there is a chance of detention/arrest, set up a regular check-in procedure with your office, family, or friends. Let them know how often you plan on checking in, an overdue procedure, and what time they can expect you to return.

On assignment

  • Try to avoid hanging around in the same place for an extended period of time, especially if in a sensitive area such as outside a political building.
  • Police officers in many countries dislike being filmed or photographed. Be mindful of this when working close to or around the police.
  • Never carry any weapons, alcohol, drugs, or other sensitive material that could increase the chances of being arrested.

If you are detained/arrested

  • Before arresting you, the police officer should tell you that you are being arrested and for what reason. Pay attention to the location, time and circumstances leading up to the arrest.
  • Always stay calm and be respectful. If wearing a hat and/or sunglasses, take them off. Maintain eye contact with the officer if possible and don't resist.
  • It is advisable to avoid photographing or filming the arrest – it might provoke the police and may lead to your equipment being damaged or confiscated.
  • Keep your bag, equipment, and electronic devices within your line of sight whenever possible.
  • Make the police aware of any health conditions, such as asthma or diabetes. Tell the police as soon as you're arrested if you are taking medication to control your condition.
  • Tell the police if you have a history of mental health problems or if you are having mental health issues at the time.
  • If possible, document as much information about the police officers involved as you can, including their names, numbers, departments, and readily identifiable features (e.g. tattoos, facial hair etc.)
  • Pay attention to individuals standing around who could be a witness to your arrest. If necessary, ask them to raise the alarm.
  • If you do not speak or cannot read the local language, do not sign any documents or admit to anything until a translator and/or lawyer or legal representative is present.
  • The police officer may search you, pat you down, or conduct a strip search if they believe you might be hiding illegal items. A strip search ought to be conducted in a private place where you could be more vulnerable. Multiple officers should always be present at any strip search, and women should insist that any strip search is conducted by a female officer.
  • Depending on your location the police officers may try to intimidate you and/or coerce you into admitting to a crime. Under such circumstances, stick to your story, avoid admitting anything that you did not do, and wait for legal support to arrive.
  • If you are assaulted by any police officer try to keep a record of your injuries, medical treatment received, and any hospital visits. Try to take notes of the names and a visual description of those responsible.

CPJ's online Safety Kit provides journalists and newsrooms with basic safety information on physical, digital, and psychological safety resources and tools, including covering civil unrest. If you need assistance, journalists should contact CPJ via emergencies@cpj.org.

Mobile Encryption Market – Key Players, Size, Trends, Growth Opportunities, Analysis and Forecast To 2027 – The Courier - The Courier

Posted: 23 Feb 2021 01:17 AM PST

The research and analysis conducted in Mobile Encryption Market Report helps clients to predict investment in an emerging market, expansion of market share or success of a new product with the help of global market research analysis. This report has been designed in such a way that it provides very evident understanding of the business environment and Mobile Encryption industry. Nevertheless, this global market research report unravels many business problems very quickly and easily. Due to high demand and the value of market research for the success of different sectors, Mobile Encryption Market report is provided that covers many work areas.

Global mobile encryption market is set to witness a healthy CAGR of 31.30% in the forecast period of 2019 to 2026. The report contains data of the base year 2018 and historic year 2017. This rise in the market value can be attributed due to increasing concern for data security issues and privacy of data and proliferation of smartphones and tablets across enterprises.

Mobile encryption is the method of clambering or encryption of helpful information in mobile devices to limit unauthorized access. The encryption takes place for the information existing in the computer as well for the information that travels through the computer to different media such as the Internet. Dependence on the mobile device, its robbery and the storing of subtle data on the devices generates massive ultimatum for services and apps for mobile encryption.

Download Sample Copy of the Report to understand the structure of the complete report (Including Full TOC, Table & Figures) @ https://www.databridgemarketresearch.com/request-a-sample/?dbmr=global-mobile-encryption-market&somesh

Market Drivers:

  • Growing use of mobile devices in the organizations, fuels the growth of the market
  • Increasing concern towards sensitive and important data in various mobile devices, also impacts the market growth
  • Surging trend for IoT among end-users, is helping the market to grow
  • Need for stringent compliance and regulatory requirements, fosters the growth of the market

Market Restraints:

  • The operation outflow for the mobile encryption, is a main limitation for the market
  • Absence of trained workforce and alertness, also poses the threat to the market

Segmentation: Global Mobile Encryption Market

By Component

  • Solution
  • Services
    • Professional services
      • Support and maintenance
      • Training and education
      • Consulting
    • Managed services

By Application

  • Disk encryption
  • File/folder encryption
  • Communication encryption
  • Cloud encryption
  • Others

By End-User Type

  • Small and Medium-sized Enterprises (SMEs)
  • Large enterprises

By Deployment Type

  • On-premises
  • Cloud

By Vertical

  • Banking, Financial Services, and Insurance (BFSI)
  • Aerospace and Defense
  • Healthcare
  • Government and public sector
  • Telecommunications and IT
  • Retail
  • Others
    • Manufacturing
    • Education
    • Media and Entertainment

By Geography

  • North America
    • U.S.
    • Canada
    • Mexico
  • South America
    • Brazil
    • Argentina
    • Rest of South America
  • Europe
    • Germany
    • France
    • United Kingdom
    • Italy
    • Spain
    • Russia
    • Turkey
    • Belgium
    • Netherlands
    • Rest of Europe
  • Asia-Pacific
    • Japan
    • China
    • South Korea
    • India
    • Australia
    • Singapore
    • Malaysia
    • Indonesia
    • Thailand
    • Philippines
    • Rest of Asia-Pacific
  • Middle East & Africa
    • South Africa
    • Egypt
    • Saudi Arabia
    • United Arab Emirates
    • Israel
    • Rest of Middle East & Africa

Key Developments in the Market:

  • In November 2017, IBM Z allows organizations to omnipresent encrypt data that is connected with a complete implementation, cloud service or database, whether in flight or at rest.  All this comes with no applications modifications. It is driven by the most strong and safe transaction scheme in the world that can carry out more than 12 billion encrypted transactions a day.
  • In August 2017, Bharti Airtel declares a strategic alliance with Symantec Corp., this collaboration to support businesses in India's growing need for cyber security, securing and avoiding internet risks in an extremely digitally connected world. Under this alliance, Airtel will be Symantec's exclusive Cyber Security Services partner in India and distribute the company safety software from Symantec.

Competitive Analysis

Global mobile encryption market is highly fragmented and the major players have used various strategies such as new product launches, expansions, agreements, joint ventures, partnerships, acquisitions, and others to increase their footprints in this market. The report includes market shares of mobile encryption market for global, Europe, North America, Asia-Pacific, Middle East & Africa and South America.

Major Market Competitors/Players

Few of the major competitors currently working in the global mobile encryption market are Adeya SA, AlertBoot Data Security, Becrypt Ltd, BlackBerry Limited., CLINICAL SOLUTIONS GROUP, INC., CERTES NETWORKS, INC, Check Point Software Technologies Ltd., DataMotion, Inc., NVIDIA Corporation, ESET, SATTURN HOLEŠOV spol. s r. o., Hewlett Packard Enterprise Development LP, Huawei Technologies Co., Ltd., Intel Corporation, Orpheo, EclecticIQ BV, SecurStar, Silent Circle, Sophos Ltd., Symantec Corporation, T-Systems, Zix Corporation among others.

New Business Strategies, Challenges & Policies are mentioned in Table of Content, Request FREE TOC at @ https://www.databridgemarketresearch.com/toc/?dbmr=global-mobile-encryption-market&somesh

Major Highlights of Mobile Encryption market in Covid-19 pandemic covered in report:

The report provides impact of COVID-19 on Mobile Encryption market along with its impact on overall industry and economy of world. Further, it adds changes in consumer buying behavior as it impacts majorly on market growth and sales. Distributors and traders on marketing strategy analysis focusing on region wise needs in covid-19 pandemic is also added in the Mobile Encryption market report. The last segment of COVID-19 impact chapter include recovery and major changes opted by major players involved in Mobile Encryption market.

Reasons to Purchase this Report:

  • Market segmentation analysis including qualitative and quantitative research incorporating the impact of economic and policy aspects
  • Regional and country level analysis integrating the demand and supply forces that are influencing the growth of the market.
  • Market value USD Million and volume Units Million data for each segment and sub-segment
  • Competitive landscape involving the market share of major players, along with the new projects and strategies adopted by players in the past five years
  • Comprehensive company profiles covering the product offerings, key financial information, recent developments, SWOT analysis, and strategies employed by the major market players

Table of Content:

PART 01: EXECUTIVE SUMMARY

PART 02: SCOPE OF THE REPORT

PART 03: RESEARCH METHODOLOGY

PART 04: INTRODUCTION

PART 05: MARKET LANDSCAPE

PART 06: MARKET SIZING

PART 07: FIVE FORCES ANALYSIS

PART 08: MARKET SEGMENTATION BY PRODUCT

PART 09: MARKET SEGMENTATION BY DISTRIBUTION CHANNEL

PART 10: CUSTOMER LANDSCAPE

PART 11: MARKET SEGMENTATION BY END-USER

PART 12: REGIONAL LANDSCAPE

PART 13: DECISION FRAMEWORK

PART 14: DRIVERS AND CHALLENGES

PART 15: MARKET TRENDS

PART 16: COMPETITIVE LANDSCAPE

PART 17: COMPANY PROFILES

PART 18: APPENDIX

Inquire Before Buying This Research Report: https://www.databridgemarketresearch.com/inquire-before-buying/?dbmr=global-mobile-encryption-market&somesh

About Us:

An absolute way to forecast what future holds is to comprehend the trend today!

Data Bridge Market Research set forth itself as an unconventional and neoteric Market research and consulting firm with an unparalleled level of resilience and integrated approaches. We are determined to unearth the best market opportunities and foster efficient information for your business to thrive in the market. Data Bridge Market Research provides appropriate solutions to complex business challenges and initiates an effortless decision-making process.

Contact:

US: +1 888 387 2818

UK: +44 208 089 1725

Hong Kong: +852 8192 7475

corporatesales@databridgemarketresearch.com

Fleeing WhatsApp for Better Privacy? Don't Turn to Telegram - WIRED

Posted: 27 Jan 2021 12:00 AM PST

Last weekend, Raphael Mimoun hosted a digital security training workshop via videoconference with a dozen activists. They belonged to one Southeast Asian country's pro-democracy coalition, a group at direct risk of surveillance and repression by their government. Mimoun, the founder of the digital security nonprofit Horizontal, asked the participants to list messaging platforms that they'd heard of or used, and they quickly rattled off Facebook Messenger, WhatsApp, Signal, and Telegram. When Mimoun then asked them to name the security advantages of each of those options, several pointed to Telegram's encryption as a plus. It had been used by Islamic extremists, one noted, so it must be secure.

Mimoun explained that yes, Telegram encrypts messages. But by default it encrypts data only between your device and Telegram's server; you have to turn on end-to-end encryption to prevent the server itself from seeing the messages. In fact, the group messaging feature that the Southeast Asian activists used most often offers no end-to-end encryption at all. They'd have to trust Telegram not to cooperate with any government that tries to compel it to cooperate in surveilling users. One of them asked where Telegram is located. The company, Mimoun explained, is based in the United Arab Emirates.

First laughter, then a more serious feeling of "awkward realization" spread through the call, says Mimoun. After a pause, one of the participants spoke: "We're going to have to regroup and think about what we want to do about this." In a follow-up session, another member of the group told Mimoun the moment was a "rude awakening."

Earlier this month, Telegram announced that it had hit a milestone of 500 million active monthly users and pointed to a single 72-hour period when 25 million people had joined the service. That surge of adoption seems to have had two simultaneous sources: First, right-wing Americans have sought less-moderated communications platforms after many were banned from Twitter or Facebook for hate speech and disinformation, and after Amazon dropped hosting for their preferred social media service Parler, taking it offline.

Telegram's founder, Pavel Durov, however, has attributed the boost more to WhatsApp's clarification of a privacy policy that includes sharing certain data—though not the content of messages—with its corporate parent, Facebook. Tens of millions of WhatsApp's users responded to that restatement of its (years-old) info-sharing practices by fleeing the service, and many went to Telegram, no doubt attracted in part by its claims of "heavily encrypted" messaging. "We've had surges of downloads before, throughout our 7-year history of protecting user privacy," Durov wrote from his Telegram account. "But this time is different. People no longer want to exchange their privacy for free services."

But ask Raphael Mimoun—or other security professionals who have analyzed Telegram and who spoke to WIRED about its security and privacy shortcomings—and it's clear that Telegram is far from the best-in-class privacy haven that Durov describes and that many at-risk users believe it to be. "People turn to Telegram because they think it's going to keep them safe," says Mimoun, who last week published a blog post about Telegram's flaws that he says was based on "five years of bottled up frustration" about the misperceptions of its security. "There is just a really big gap between what people feel and believe and the reality of the privacy and security of the app."

Telegram's privacy protections aren't necessarily faulty or broken on a fundamental level, says Nadim Kobeissi, a cryptographer and founder of the Paris-based cryptography consultancy Symbolic Software. But when it comes to encrypting users' communications so that they can't be surveilled, it simply doesn't measure up to WhatsApp—not to mention the nonprofit secure messaging app Signal, which Kobeissi and most other security professionals recommend. That's because WhatsApp and Signal end-to-end encrypt every message and call by default, so that their own servers never access the content of conversations. Telegram by default only uses "transport layer" encryption that protects the connection from the user to the server rather than from one user to another. "In terms of encryption, Telegram is just not as good as WhatsApp," says Kobeissi. "The fact that encryption is not enabled by default already puts it way behind WhatsApp."

Comments

Popular Posts

Harry Dunn's parents to meet Anne Sacoolas as immunity row continues - The Guardian

Top 100 cool tech gadgets you can't miss - Queensland Times

A Look At Blockchain Smartphones Available Now - I4U News