Echoing the concerns of many US-based technology companies have about US-led surveillance programs, Yahoo Chief Information Security Officer Alex Stamos asked the director of the National Security Agency some pointed questions concerning proposed or existing backdoors placed in encryption technologies. The responses from NSA director Adm. Mike Rogers only underscored the growing divide.
Unraveling a mystery that eluded the researchers analyzing the highly advanced Equation Group the world learned about Monday, password crackers have deciphered a cryptographic hash buried in one of the hacking crew's exploits. It's Arabic for "unregistered."
Software reverse engineering, the art of pulling programs apart to figure out how they work, is what makes it possible for sophisticated hackers to scour code for exploitable bugs. It’s also what allows those same hackers’ dangerous malware to be deconstructed and neutered. Now a new encryption trick could make both those tasks much, much harder.
In June 2015, the U.N's free speech watchdog, David Kaye, intends to present a new report on anonymity and encryption before the 47 Member States of the Geneva-based Human Rights Council. Yesterday, EFF filed comments urging Mr. Kaye to reaffirm the freedom to use encryption technology and to protect the right to speak, access and read information anonymously. Mr. Kaye’s report could be one of the most significant opportunities to strengthen our fundamental freedoms in the digital age at the international level.
Werner Koch is looking at a big payday after pulling in over $150,000 to fund the continuing development of his crucial open-source GNU Privacy Guard encryption tools.
Koch, 53, is a leading light in the free software movement: in 1999, he released GPG, which uses the OpenPGP standard to safeguard the communications of millions of people around the world from eavesdroppers and other miscreants. It also provides protection for much of the multibillion-dollar technology industry.