• chevron_right

      Anti-Piracy Companies Locked Down Russian TV, Now Putin Wants It Back

      news.movim.eu / TorrentFreak · Saturday, 5 November, 2022 - 16:51 · 2 minutes

    piracy encrypt In the wake of Russia’s invasion of Ukraine, French satellite broadcaster Eutelsat refused to stop Russia from using its satellites.

    Russia relies on state-run TV channels to spread propaganda, and since 50% of homes have access to a satellite dish, keeping this one-way communication mechanism open is a priority. Last month Eutelsat reported that two of its satellites were being jammed by interference, in this case, a likely attempt by Iranian authorities to silence the opposition there.

    But what if there was a much simpler way to black out millions of TV sets, across an entire country, without firing a shot? These are big questions for Russia right now, and according to reports, Moscow has no intention of letting that happen.

    Locked Down By Foreign Technologies

    Russians have access to a number of free-to-air channels but an estimated 30% of the population also pay to access subscription packages. To ensure that only those who pay get to watch, premium TV is protected by so-called conditional access systems and when Russian providers placed their orders, anti-piracy companies in the U.S. and EU scooped up the business.

    This puts Russia in a bit of a spot, to put it mildly. On the one hand, these effective systems help to protect broadcasters from piracy. On the other, companies based in countries now seen as the enemy have the power to effectively disconnect millions of people, using systems that were designed for precisely that job.

    Russia Says That it Will Remove the Threat

    Whether this type of blackout would ever happen is another matter, but Russia doesn’t like what it sees.

    Alexey Volin, Director General of state-backed satellite operator Russian Satellite Communications Company (RSCC), told Izvestia that his company is already developing a domestic system to help replace anti-piracy solutions operated by foreign companies.

    Telecommunications company GS Labs develops similar anti-piracy systems as an affiliate of Russia’s largest pay TV operator, Tricolor TV. According to GS Labs’ director of sales, Alexey Goylo, the risk of overseas companies controlling access to broadcasts isn’t limited to locking consumers out. They also have the means to turn off anti-piracy measures altogether.

    “The operator would then have to broadcast an unencrypted signal, which would destroy his business model,” Goylo told Izvestia.

    Ready By The End of 2022

    Russian Satellite Communications Company (RSCC) says it hopes to have its solution ready by the end of the year and GS Labs says it would like to be involved. State-controlled telecoms company Rostelecom welcomed RSCC’s efforts to counter what one expert described as a foreign “trojan horse” inside Russia’s pay TV market.

    “We are ready to consider the use of a domestic solution, subject to its integration with existing subscriber devices and competitiveness in price with existing conditional access systems,” Rostelecom said.

    The names of the Western anti-piracy companies are absent from media reports but familiar names have been protecting Russian content from piracy for many years.

    In 2013, Irdeto announced that it had been selected by the Russian Satellite Communications Company to secure content distributed by RSCC satellites. Four years later, Irdeto reported that its technology had been deployed across two million Russian subscribers to protect content owned by broadcaster MTS.

    Then, after sealing another deal in 2021 , this year Irdeto employees enjoyed a short break from the fight against piracy as they volunteered to help out Ukrainian refugees fleeing the war.

    Image credits: Pixabay/ geralt

    From: TF , for the latest news on copyright battles, piracy and more.

    • chevron_right

      Serious vulnerabilities in Matrix’s end-to-end encryption are being patched

      news.movim.eu / ArsTechnica · Wednesday, 28 September, 2022 - 16:00

    Serious vulnerabilities in Matrix’s end-to-end encryption are being patched

    Enlarge (credit: matrix.org)

    Developers of the open source Matrix messenger protocol are releasing an update on Thursday to fix critical end-to-end encryption vulnerabilities that subvert the confidentiality and authentication guarantees that have been key to the platform's meteoric rise.

    Matrix is a sprawling ecosystem of open source and proprietary chat and collaboration clients and servers that are fully interoperable. The best-known app in this family is Element, a chat client for Windows, macOS, iOS, and Android, but there's a dizzying array of other members as well.

    matrix-640x351.png

    (credit: Hodgson)

    Matrix roughly aims to do for real-time communication what the SMTP standard does for email, which is to provide a federated protocol allowing user clients connected to different servers to exchange messages with each other. Unlike SMTP, however, Matrix offers robust end-to-end encryption, or E2EE, designed to ensure that messages can't be spoofed and that only the senders and receivers of messages can read the contents.

    Read 21 remaining paragraphs | Comments

    • chevron_right

      $35M fine for Morgan Stanley after unencrypted, unwiped hard drives are auctioned

      news.movim.eu / ArsTechnica · Tuesday, 20 September, 2022 - 21:22

    $35M fine for Morgan Stanley after unencrypted, unwiped hard drives are auctioned

    Enlarge (credit: Getty Images)

    Morgan Stanley on Tuesday agreed to pay the Securities and Exchange Commission (SEC) a $35 million penalty for data security lapses that included unencrypted hard drives from decommissioned data centers being resold on auction sites without first being wiped.

    The SEC action said that the improper disposal of thousands of hard drives starting in 2016 was part of an “extensive failure” over a five-year period to safeguard customers’ data as required by federal regulations. The agency said that the failures also included the improper disposal of hard drives and backup tapes when decommissioning servers in local branches. In all, the SEC said data for 15 million customers was exposed.

    "Astonishing failures"

    “MSSB’s failures in this case are astonishing,” said Gurbir S. Grewal, director of the SEC’s enforcement division, using the initials for Morgan Stanley Smith Barney, the full name of the firm. “Customers entrust their personal information to financial professionals with the understanding and expectation that it will be protected, and MSSB fell woefully short in doing so.”

    Read 7 remaining paragraphs | Comments

    • chevron_right

      Amid backlash from privacy advocates, Meta expands end-to-end encryption trial

      news.movim.eu / ArsTechnica · Thursday, 11 August, 2022 - 17:46

    Meta is ever so slowly expanding its testing of end-to-end encryption

    Enlarge (credit: Getty Images)

    Meta is ever so slowly expanding its trial of end-to-end encryption in a bid to protect users from snoops and law enforcement.

    End-to-end encryption, often abbreviated as E2EE, uses strong cryptography to encrypt messages with a key that is unique to each user. Because the key is in the sole possession of each user, E2EE prevents everyone else—including the app maker, ISP or carrier, and three-letter agencies—from reading a message. Meta first rolled out E2EE in 2016 in its WhatsApp and Messenger apps, with the former providing it by default and the latter offering it as an opt-in feature. The company said it expects to make E2EE the default setting in Messenger by sometime next year. The Instagram messenger, meanwhile, doesn’t offer E2EE at all.

    Starting this week, the social media behemoth will begin testing a secure online storage feature for Messenger communication. For now, it’s available only to select users who connect using either an iOS or Android device. Users who are selected will have the option of turning it on.

    Read 7 remaining paragraphs | Comments

    • chevron_right

      Post-quantum encryption contender is taken out by single-core PC and 1 hour

      news.movim.eu / ArsTechnica · Tuesday, 2 August, 2022 - 12:31

    Post-quantum encryption contender is taken out by single-core PC and 1 hour

    Enlarge (credit: Getty Images)

    In the US government's ongoing campaign to protect data in the age of quantum computers, a new and powerful attack that used a single traditional computer to completely break a fourth-round candidate highlights the risks involved in standardizing the next generation of encryption algorithms.

    Last month, the US Department of Commerce's National Institute of Standards and Technology, or NIST, selected four post-quantum computing encryption algorithms to replace algorithms like RSA, Diffie-Hellman, and elliptic curve Diffie-Hellman, which are unable to withstand attacks from a quantum computer.

    In the same move, NIST advanced four additional algorithms as potential replacements pending further testing in hopes one or more of them may also be suitable encryption alternatives in a post-quantum world. The new attack breaks SIKE, which is one of the latter four additional algorithms. The attack has no impact on the four PQC algorithms selected by NIST as approved standards, all of which rely on completely different mathematical techniques than SIKE.

    Read 14 remaining paragraphs | Comments

    • chevron_right

      Facebook Is Now Encrypting Links to Prevent URL Stripping

      news.movim.eu / Schneier · Monday, 18 July, 2022 - 14:49

    Some sites, including Facebook, add parameters to the web address for tracking purposes. These parameters have no functionality that is relevant to the user, but sites rely on them to track users across pages and properties.

    Mozilla introduced support for URL stripping in Firefox 102 , which it launched in June 2022. Firefox removes tracking parameters from web addresses automatically, but only in private browsing mode or when the browser’s Tracking Protection feature is set to strict. Firefox users may enable URL stripping in all Firefox modes , but this requires manual configuration. Brave Browser strips known tracking parameters from web addresses as well.

    Facebook has responded by encrypting the entire URL into a single ciphertext blob.

    Since it is no longer possible to identify the tracking part of the web address, it is no longer possible to remove it from the address automatically. In other words: Facebook has the upper hand in regards to URL-based tracking at the time, and there is little that can be done about it short of finding a way to decrypt the information.

    • chevron_right

      End-to-end encryption’s central role in modern self-defense

      news.movim.eu / ArsTechnica · Thursday, 7 July, 2022 - 11:07 · 1 minute

    A tunnel made of ones and zeroes.

    Enlarge (credit: Getty Images )

    A number of course-altering US Supreme Court decisions last month—including the reversal of a constitutional right to abortion and the overturning of a century-old limit on certain firearms permits—have activists and average Americans around the country anticipating the fallout for rights and privacy as abortion “trigger laws,” expanded access to concealed carry permits, and other regulations are expected to take effect in some states. And as people seeking abortions scramble to protect their digital privacy and researchers plumb the relationship between abortion speech and tech regulations , encryption proponents have a clear message: Access to end-to-end encrypted services in the US is more important than ever.

    Studies, including those commissioned by tech giants like Meta, have repeatedly and definitively shown that access to encrypted communications is a human rights issue in the digital age. End-to-end encryption makes your messages, phone calls, and video chats unintelligible everywhere except on the devices involved in the conversations, so snoops and interlopers can’t access what you’re saying—and neither can the company that offers the platform. As the legal climate in the US evolves, people who once thought they had nothing to hide may realize that era is now over.

    Read 12 remaining paragraphs | Comments

    • chevron_right

      NIST selects quantum-proof algorithms to head off the coming cryptopocalypse

      news.movim.eu / ArsTechnica · Wednesday, 6 July, 2022 - 00:35

    Conceptual computer artwork of electronic circuitry with blue and red light passing through it, representing how data may be controlled and stored in a quantum computer.

    Enlarge / Conceptual computer artwork of electronic circuitry with blue and red light passing through it, representing how data may be controlled and stored in a quantum computer. (credit: Getty Images)

    In the not-too-distant future—as little as a decade, perhaps, nobody knows exactly how long—the cryptography protecting your bank transactions, chat messages, and medical records from prying eyes is going to break spectacularly with the advent of quantum computing. On Tuesday, a US government agency named four replacement encryption schemes to head off this cryptopocalypse.

    Some of the most widely used public-key encryption systems—including those using the RSA, Diffie-Hellman, and elliptic curve Diffie-Hellman algorithms—rely on mathematics to protect sensitive data. These mathematical problems include (1) factoring a key's large composite number (usually denoted as N) to derive its two factors (usually denoted as P and Q) and (2) computing the discrete logarithm that keys are based on.

    The security of these cryptosystems depends entirely on classical computers' difficulty in solving these problems. While it's easy to generate keys that can encrypt and decrypt data at will, it's impossible from a practical standpoint for an adversary to calculate the numbers that make them work.

    Read 12 remaining paragraphs | Comments

    • chevron_right

      Mega says it can’t decrypt your files. New POC exploit shows otherwise

      news.movim.eu / ArsTechnica · Tuesday, 21 June, 2022 - 21:00

    Mega says it can’t decrypt your files. New POC exploit shows otherwise

    Enlarge

    In the decade since larger-than-life character Kim Dotcom founded Mega , the cloud storage service has amassed 250 million registered users and stores a whopping 120 billion files that take up more than 1,000 petabytes of storage. A key selling point that has helped fuel the growth is an extraordinary promise that no top-tier Mega competitors make: Not even Mega can decrypt the data it stores.

    On the company's homepage, for instance, Mega displays an image that compares its offerings to Dropbox and Google Drive. In addition to noting Mega's lower prices, the comparison emphasizes that Mega offers end-to-end encryption, whereas the other two do not.

    Over the years, the company has repeatedly reminded the world of this supposed distinction , which is perhaps best summarized in this blog post. In it, the company claims, "As long as you ensure that your password is sufficiently strong and unique, no one will ever be able to access your data on MEGA. Even in the exceptionally improbable event MEGA's entire infrastructure is seized! " (emphasis added).

    Read 18 remaining paragraphs | Comments