The Google Allo release comes just months after Apple s high-profile court battle with the US government over encryption built into its iPhones.At its developer conference, the company announced that its new messaging app, Allo, would feature an incognito mode that offered end-to-end encryption.The FBI had wanted Apple to rewrite the software on a phone used by one of the San Bernardino shooters to help it retrieve data.Following that showdown, it was unclear if the tech industry would double down on strong encryption or begin to soften its stance.Users will have to select an incognito mode and will have control over how long messages are stored on their devices.End-to-end encryption can also make it harder for users to search through past messages going back into the distant past.
When it launches this summer, Allo will offer an incognito mode that switches on an end-to-end encryption system known as Signal, designed by the privacy-focused non-profit Open Whisper Systems.And in the wake of Apple s landmark fight with the FBI over the encrypted iPhone of San Bernadino killer Syed Rizwan Farook, the move represents another step in Silicon Valley s shift toward user-controlled encryption in defiance of law enforcement.Allo s incognito mode represents a far more limited approach to encryption than Whatsapp s, Apple s, Viber s, or even what it s offering with Duo: Unlike with those apps, you must purposefully turn on incognito mode to send encrypted Allo messages; the app doesn t hide all messages by default.But Google s launching its encrypted communication apps as new tools that may or may not catch on, rather than Whatsapp s far bolder move to turn on encryption for its existing, massive userbase.Gmail and Google Hangouts, meanwhile, still lack end-to-end encryption, leaving them open to government surveillance orders.Allo and Duo s new security features, in other words, are Google s baby steps towards a fully-encrypted future, not the sort of bold moves to elevate privacy above profit or politics that some of its competitors have already taken.
District Judge Robert Bryan declined to intervene in the ongoing case against a suspect called Jay Michaud, who is one of 137 people now facing charges in the US in relation to the FBI's probe into Playpen, an illicit website formerly hosted on the Tor network.As Mozilla noted in its initial court filing, Tor, which is used to anonymise internet browsing, is partly based on the same open-source code used in its popular Firefox browser.However, in the wake of a plea from the US Justice Department citing "national security" Judge Bryan reversed his decision on Monday 17 May and said prosecutors no longer had to make any bug disclosure to Michaud's defence team.Thousands of people around the world are under investigation as a result of the case, however law enforcement recently encountered issues after two defendants secured rulings that declared their warrants invalid.These setbacks were largely due to "jurisdictional issues" that surround the FBI's use of malware to snare the suspects.During the period it was under its control, the agency used a court-ordered malware technique in an attempt to identify as many of the website's 214,898 members as possible.
View photosFILE - In this Nov. 18, 2015 file photo, Alibaba founder Jack Ma speaks at the CEO Summit, attended by 800 business leaders from around the region representing U.S. and Asia-Pacific companies, in Manila, Philippines, ahead of the start of the Asia-Pacific Economic Cooperation summit.AP Photo/Susan Walsh, File MoreNEW YORK AP — Jack Ma, the head of Chinese e-commerce giant Alibaba, is withdrawing from an anti-counterfeiting convention in Florida just two days before he was scheduled to give the keynote speech.Alibaba announced the move Tuesday following last week's suspension of the company's membership in the International Anti-Counterfeiting Coalition, a small but influential group that lobbies U.S. officials and testifies before Congress.Ma is a self-made billionaire, and Alibaba, which he founded in 1999, went public in 2014 in the biggest initial public offering of stock to date.According to an investigation by The Associated Press, Barchiesi had stock in Alibaba Group Holding Ltd., had close ties to an Alibaba executive and had used family members to help run the coalition.Alibaba has dismissed the case as "wasteful litigation."
Google debuted a shiny new chat app called Allo during its IO 2016 conference today, and while it's a fresh take on messaging, one element of the app is actually quite familiar.Turns out Allo's end-to-end encryption is built on the Signal Protocol, the same standard used to power encryption in WhatsApp and the Signal app."We've been collaborating together on the integration of Signal Protocol into Allo, which will bring all of Signal Protocol's strong encryption properties to Allo's incognito mode," wrote Open Whisper Systems, creator of the protocol, in a blog post.This is worrisome as you might accidentally send a message you wanted encrypted as, well, not encrypted, if you forget to switch to Incognito Mode.What's more, as noted by TechCrunch, Allo's most helpful features won't be so helpful if it can't see what you're talking about.Others have argued that opt-in end-to-end encryption at this point is better than none at all, but how many users bite when Allo becomes available later this summer remains to be seen.
In early 2010, Google confirmed that it had received EC complaints from Microsoft-owned Ciao and French legal search engine eJustice.fr—both of which expressed grave concerns about the terms and conditions imposed on Google s advertising syndication partners.At that point, the EC's antitrust boss outlined four different areas of concern.And it's that monopolistic behaviour that sits at the very heart of Google's status as the gatekeeper of the Internet, even as it continues to insist that "competition is just a click away."Others wondered if relationships between it and Google had simply thawed thanks to the arrival of two new chiefs at the companies.So where does Microsoft's exit—complete with the muffling of the funfair trumpet—leave the remaining complainants in the EC antitrust case?However, observers have argued that StreeMap's case was too limited in scope because it failed to address Google's alleged anti-competitive practices of demoting its rivals in the search market.
A judge in a high-profile child pornography case, in which a website called Playpen was accessible only through Tor, is trying to decide whether the FBI should disclose the NIT"s source code to the defendant.Judge Robert Bryan of the U.S. District Court for the Western District of Washington wrestled with the competing interests in a case status order he issued in the U.S. v. Michaud case this week."What should be done about it when, under these facts, the defense has a justifiable need for information in the hands of the government, but the government has a justifiable right not to turn the information over to the defense?"The FBI's strategy with NIT-aided investigations appears to involve hiding its use of hacking tools, and, in some cases, pressing for guilty pleas before defendants and their lawyers question the investigative techniques, said Nathan Freed Wessler, a staff attorney with the American Civil Liberties Union.The FBI has defended NITs, saying their use is limited.In the Michaud case, the defendant's lawyer had agreed earlier to view the source code using FBI-approved security measures, but the FBI backed away from that compromise.
Newer companies, like Slack or HipChat, have brought some colour and life to the office, but only focus on one very specific aspect – instant interaction – that does not permeate much beyond a specific type of employee or workplace.The Royal Bank of Scotland, which was one of the first companies to trial the software on a large scale, saw over 90% of its users return to Facebook at Work, according to Kevin Hanley, who leads design at the bank.Rather than scrolling through BuzzFeed, which is unlikely to have any work-related content, users are at least looking at semi-relevant updates."It's a different way of using Facebook," said Jayenne Montana, a marketing manager at Landmark Group.It's unclear how many will stay, but users are definitely enjoying it.As Val-Pierre Genton, VP of Audience at BrightTALK, commented, Facebook at Work "makes our global teams feel more united and closer," and that's all the company wants.
The Bank of England issued an urgent warning to UK financial institutions after Bangladesh hackIn the wake of an orchestrated cyberattack found to be targeting numerous banks across the globe, the Bank of England issued an urgent call of all UK institutions to check for "indicators of compromise" on any computer connected to the Swift messaging service, it has emerged.Officials close to the UK central bank, who spoke to Reuters on condition of anonymity, said the warning was issued in mid-to-late April – however is only now being made public.In this case, which is still being investigated, hackers were able to compromise $81 £56m in a complex scheme.It also demanded a "compliance check" to ensure that security policies put forward by Swift are being followed, alongside a check of who exactly has access to its sensitive applications and web portals.Now, security firms – including FireEye – are in the process of investigating the landmark attack.Echoing calls from the Bank of England, other central banks around the world have been instructed to bulk up security measures and IT systems.
On Thursday, James Clapper, the Director of National Intelligence, signed a new policy that will allow government investigators to review a person s public social media accounts before deciding whether to issue a security clearance.While this is a limited change—it will likely be handled through an automated search that will only find public postings from accounts that are explicitly tied to the individual under review—it is a significant step into the 21st century, moving beyond a time when investigators focused largely on analog information collection in an increasingly digital era of communications and sharing.During a hearing to review the new decision, Rep. Mark Meadows R-NC , chair of the House Oversight and Government Reform committee s subcommittee on government operations, noted that what a person says and does on social media can often give a better insight on who they really are.Over the last decade, Americans have become increasingly comfortable and adept at sharing general and intimate details alike about their lives and families on social media, whether it be pictures on Instagram, political opinions on Twitter, resumes on LinkedIn, or birth dates, cat memes and favorite foods on Facebook.At the same time, mistakenly believing that they were protected by the distance and anonymity suggested by the internet, Americans have developed an acute habit of blithely sharing insults and threats online without any regard for the consequences.It s professionally valuable.
Many of the big-name websites and companies will track your activities to deliver targeted advertising, and can build up an astonishingly detailed profile including your interests, spending habits, age, location and more.If you would prefer to keep your personal details private, a VPN or proxy tool will help.As well as preventing third parties building up a profile of you, these privacy tools can open up the web, granting you access to sites blocked in your country, to access region-locked content when you're travelling away from home, and to add a layer of protection when you use a public Wi-Fi network.Tor The Onion Router works by bouncing your data between encrypted nodesTor is available for Windows, OS X and Linux, and has a large following in the privacy and security communities.It's based on the same code as Firefox, and guides you through the process of getting online.Read on to discover four more of the best proxy and VPN tools for anonymous browsing.
The deep web is actually several times bigger than the indexed web, and it encompasses a lot more than the illegal or otherwise questionable activities that it is often associated with -- though there's certainly a lot of that going on, too.The Dark Web on the other hand merely represents a smaller portion of the deep web that has been intentionally hidden and is inaccessible through standard web browsers.For example content posted on Facebook that is only available to the poster's friends, not the general public, or results for specific queries on a travel booking website -- you simply can't get to the content by clicking through links like a search engine would.This anonymous network consists of thousands of servers located all over the world run by volunteers and online privacy advocates.Its name is an acronym for The Onion Router in reference to its namesake routing technique, which creates a path through randomly assigned Tor servers, or nodes, before reaching whatever website you are visiting.During this process data packets are wrapped in successive layers of packets that get "peeled off" at each node until reaching the destination.
A MAC address is an identification code.It s used to define physical devices in a network, so that the network knows exactly which devices it is in communication with.There are plenty of practical reasons to have MAC addresses.It helps prevent criminals from imitating devices they don t actually have, and is useful in creating a number of network filters for protection or organization.Typically a MAC address remains unchanged forever, defining a specific network interface card for as long as it lasts that s sort of the point .The big one is that companies often have security filters in place that only allow certain employee devices to access their networks.
The text-based messaging service launched at Google's I/O 2016 gabfest last week is linked to phone numbers and sports Chrome's porn browser incognito mode which hides sender names, deletes messages, and employs end-to-end encryption.But the encryption is not used by default, a decision decidedly at odds with Google's privacy position as expressed by its decision to encrypt all searches.Duong says he removed a paragraph in which he called into question the lack of end-to-end encryption - an Allo feature he developed - by default "because it's not cool to publicly discuss or to speculate the intent or future plans for the features" of his employer.Basically with one touch you can tell Allo that you want to "Always chat in incognito mode going forward," and from that moment on all your messages will be end-to-end encrypted and auto-deleted.Google says if encryption were enabled it would would hinder its eponymously-named Assistant, which combs through conversations to help lazy texters be lazier."Making encryption opt-in was a decision made by the business and legal teams," he says.
The FBI used NIT to identify and arrest thousands of child pornographers on the dark webThe FBI used its Tor exploiting malware, titled Network Investigative Technique NIT , to identify and bring down the members of a child pornography website called Playpen, on the dark web in January.In the case of US vs Jay Michaud, FBI special agent Daniel Alfin provided testimony, in which he stressed that NIT, which was used to identify the activities of Michaud and thousands of others who used Playpen, is not malware as the FBI had a warrant to use it and because NIT caused no security damage to Michaud's computer.Although security experts are yet to reach an agreement on how best to define malware, it is commonly accepted that it is a code that is surreptitiously installed in systems and runs without the knowledge of the owner and in most cases, gains access to data within the system.In this regard, the NIT could be classified as a malware, given that it was covertly installed onto the systems of anyone using the Playpen website, which could only be accessed using the Tor browser.However, the FBI's interpretation of malware does not align with its generally understood meaning.However, Senator Ron Wyden recently introduced a bill, the Stop Mass Hacking Act, which would prevent the FBI from mass hacking with just a single warrant, like it did in the Playpen case.
A fresh round of staff layoffs has reportedly hit multiple divisions of technology goliath IBM, with dozens of soon-to-be-former employees speaking out on condition of anonymity about how long years of service have been bookended by the sudden notice of termination.Meanwhile, in the UK, staff from the firm's Global Technology Services GTS have been informed that the corporate axe is expected to swing throughout the month of June, which will be the second round of redundancies to hit UK shores within three months.Our source confirmed to IBTimes UK the next round of RA notices is planned for the EMEA region next month – June 2016.Four month Work End Date and a month's severance."Just got the RA call from my manager," another person added.Move to the cloudFor its part, IBM has maintained it has "more than 20,000" open positions within the company – which is increasing looking to move its focus towards cloud computing and AI technology to stay ahead of the curve and competition .
Ashley Madison is a perfect example of that and many people were shocked at just how many real identities were contained in the data, identities that then caused a great deal of grief for their owners.I'm going to focus on what's readily accessible to the bulk of the population.Also consider how you fill out the following form when you create the account:These attributes won't show up on other sites where the address is used, but they can start to surface in other places.Thing is though, as much as I love Bitcoin (try using it for perfectly legitimate, above board purposes one day just to experience it), the mainstream, above board places you can use it are pretty limited.Not always, mind you; whilst many people have "static" IP addresses (the one IP sticks with them for the life of their time with the ISP), many others are dynamic (the ISP rotates the addresses over time).Here's what I'm seeing as I write this:The primary value proposition of a VPN for me is that it means I can use public wifi while travelling and not worry about my traffic being intercepted by an airport or the hotel.
While China's restrictive regime and censorship has Cupertino's digital content services in limbo, India's economical policies are proving to be a stumbling block to selling iPhones and iPads directly.A senior government official revealed that Apple, like other foreign companies, must sell at least 30% locally sourced goods if it wants to set up shop in India.CEO Tim Cook himself visited the country to talk to government leaders to expedite its many programs, including setting up an iOS app development center in the country's "startup scene" of Bengaluru.In order to help promote local trade and products, India instated a regulation that required foreign companies that have stores in the country to have at least 30% of their goods made in India.The decision hasn't actually been made public yet, hence all the anonymity, so naturally Apple hasn't commented on it yet either.It will, however, undoubtedly be a huge setback for Apple in its quest to establish a more permanent residence in India.
The Tor project has cooked up a new way to generate random numbers to help secure its next-generation onion router.Random numbers are essential for secure communications, because they're used to generate encryption keys.This scheme was tested last week on an 11-node Tor network that the project says ran for a week and allowed us to test scenarios that could make the protocol burp and fail in unpredictable ways.For example, we instructed our testing Tor nodes to abort at crucial protocol moments, and come back in the worst time possible ways, just to stress test the system.Things went sufficiently well that that the project's people have confirmed that our system can survive network failures that can happen on the real Internet.But the system is expected to make it into the next version of Tor, along with 55-character-long addresses up from 16 .
On Tuesday evening, the pair revealed that the powerful Silicon Valley billionaire Peter Thiel has been secretly underwriting Hulk Hogan s litigation against Gawker:According to people familiar with the situation who agreed to speak on condition of anonymity, Thiel, a cofounder and partner at Founders Fund, has played a lead role in bankrolling the cases Terry Bollea, a.k.a.Hogan is being represented by Charles Harder, a prominent Los Angeles-based lawyer.He also made a $10,000 donation to fund the efforts of right-wing sting artist James O Keefe III.In just the last month, Gawker Media s tech site Gizmodo published a series of stories on Facebook s use of news curators to manipulate the site s trending module, sparking a congressional investigation into the social network s practices.In a comment on a 2007 post by Valleywag editor Owen Thomas on the open secret of Thiel s sexuality, Denton described being threatened for his prior attempts to report on the billionaire s dating habits: He was so paranoid that, when I was looking into the story, a year ago, I got a series of messages relaying the destruction that would rain down on me, and various innocent civilians caught in the crossfire, if a story ever ran.Thiel later described Valleywag as the Silicon Valley equivalent of Al Qaeda.
More

Top