Connect with us

News

Bypassing encryption: ‘Lawful hacking’ is the next frontier of law enforcement technology

Published

on

The discussion about how law enforcement or government intelligence agencies might rapidly decode information someone else wants to keep secret is – or should be – shifting. One commonly proposed approach, introducing what is called a “backdoor” to the encryption algorithm itself, is now widely recognized as too risky to be worth pursuing any further.

The scholarly and research community, the technology industry and Congress appear to be in agreement that weakening the encryption that in part enables information security – even if done in the name of public safety or national security – is a bad idea. Backdoors could be catastrophic, jeopardizing the security of billions of devices and critical communications.

What comes next? Surely police and spy agencies will still want, or even need, information stored by criminals in encrypted forms. Without a backdoor, how might they get access to data that may help them solve – or even prevent – a crime?

The future of law enforcement and intelligence gathering efforts involving digital information is an emerging field that I and others who are exploring it sometimes call “lawful hacking.” Rather than employing a skeleton key that grants immediate access to encrypted information, government agents will have to find other technical ways – often involving malicious code – and other legal frameworks.

Decades of history

In the mid-1990s, the Clinton administration advanced a proposal called the Clipper Chip. The chip, which ultimately was doomed by its technical shortcomings, was an attempt to ensure government access to encrypted communications. After the chip’s introduction and failure, a group of cryptographers formally studied various mechanisms that might allow a trusted third party (in this case, the government) to read encrypted data in emergencies. They concluded that each approach had significant security risks.

Overall, the cryptographers’ view was that introducing this new capability into an encryption system made an already complicated process even more complex. This increased complexity made it more likely that there would be an unintentional vulnerability hidden in the encryption protocol that malicious hackers could find, gaining access to the trusted third party’s emergency system or otherwise breaking the code. The hackers could then read secret messages for their own purposes – a huge risk.

When the Clipper Chip project died and when the cryptographers’ major study came out, the idea of exceptional access for government seemed to die as well. In an environment in which cybersecurity was an increasing priority, and in which encryption was a partial defense against many data breaches and hackers, it seemed unwise to do anything that might weaken cryptographic standards.

Snowden reveals more

While the Clipper Chip effort to use public processes to create weaknesses in cybersecurity had failed, the National Security Agency had, in secret, worked to undermine certain popular encryption algorithms. In addition to direct attempts to break encryption with mathematical methods, an NSA project code-named Bullrun included efforts to influence or control international cryptography standards, and even to collaborate with private companies to ensure the NSA could decode their encryption.

This came to light when former NSA contractor Edward Snowden revealed a massive trove of files about U.S. government spying in 2013 and reignited the debate about what abilities and powers the government should have to read encrypted material.

Once again, a group of the world’s leading cryptographers studied the issue, and in 2015 came to the same conclusion: The risk of backdooring encryption to enable government access was too high. Doing so would weaken overall security too much to make up for any brief improvements in public safety or national security.

The FBI pushes back

Then came the San Bernardino attack. On Dec. 2, 2015, Rizwan Farook and his wife, Tashfeen Malik, opened fire at a social services center in San Bernardino, California. Inspired – but not directed – by foreign terrorist groups, they killed 14 people and wounded 22 more during their violent rampage.

Before the attack, Farook had physically smashed up two personal cellphones, rendering their data unrecoverable. He left untouched his work phone, an iPhone 5c issued by San Bernardino County. Investigators found the phone, but the FBI was unable to examine its data due to Apple’s encryption and security mechanisms on the device.

To get around this, the United States government used a law from the earliest days of the republic, the 1789 All Writs Act, to try to compel Apple to write software that would break the encryption and grant the FBI access. Apple refused, saying that doing so would weaken the security of every iPhone on the market, and a court showdown began.

The conflict in a nutshell

The Apple-FBI case nicely encapsulates much of the debate around encryption: a horrible incident that everyone wants investigated, the government’s stated need for access to aid the investigation, strong encryption that prevents that access and a company unwilling to risk the broader security of its products by attacking its own software.

And yet, even when the stakes were as high as the government said they were in the San Bernardino case, encryption would remain secure.

Faced with Apple’s refusal to comply and criticism from the technology and privacy industries, the FBI found another way. The bureau hired an outside firm that was able to exploit a vulnerability in the iPhone’s software and gain access. It wasn’t the first time the bureau had done such a thing.

As this all unfolded, and in the face of a wide range of significant opposition, a bill to mandate backdoors was introduced and failed in the United States Congress.

Encryption backdoors remain largely viewed as weakening everyone’s protections all the time for the sake of some people’s protections on rare occasions. As a result, workarounds like the FBI found are likely to be the most common approach going forward. Indeed, in recent years, law enforcement agencies have greatly expanded their hacking capabilities.

A look to the future

The details matter, though, and how this fledgling field develops remains to be seen. Technologists and lawyers studying the issue have identified several key questions, but not their answers. These include:

  • What kinds of vulnerabilities can law enforcement use to gain access, technologically, legally and ethically?
  • Should they report those vulnerabilities to the software vendors for fixing, even if it means it is less likely that either police or hackers will be able use the weaknesses in the future?
  • What do they need to tell a judge in order to get permission to hack a device?
  • Can they hack devices outside of their jurisdiction, and what happens if they hack computers in other countries?
  • Do they need to tell a defendant at trial how they hacked his or her device?

While some details depend on specific certain answers to these legal and technical questions, a lawful hacking approach offers a solution that appears to gain greater favor with experts than encryption backdoors. A group of scholars proposed some ways we should begin thinking about how law enforcement could hack. Agencies are already doing it, so it’s time to turn from the now-ended debate about encryption backdoors and engage in this new discussion instead.

News

Is DuckDuckGo Safe? Your Comprehensive Privacy Guide

Published

on

Is DuckDuckGo Safe? Your Comprehensive Privacy Guide

Explore the safety and privacy features of DuckDuckGo with this comprehensive guide. Learn how DuckDuckGo protects your online activities and keeps your information secure. Discover why DuckDuckGo is a trustworthy option for privacy-conscious users.

Introduction

In an age where online privacy is paramount, users are constantly seeking secure and private alternatives to traditional search engines. DuckDuckGo, a privacy-focused search engine, has gained significant attention for its commitment to user confidentiality. This article delves deep into the question: “Is DuckDuckGo safe?” We’ll explore the features that make DuckDuckGo a reliable choice for safeguarding your online activities.

Is DuckDuckGo Safe?

DuckDuckGo is a secure and private search engine that emphasizes protecting users’ personal information and search history. It employs several features to ensure your online activities remain confidential and shielded from prying eyes.

Privacy Protection Mechanisms

DuckDuckGo employs a range of privacy protection mechanisms to keep your information safe:

  • No Tracking: Unlike mainstream search engines, DuckDuckGo does not track your search queries, ensuring that your search history remains private.
  • Anonymous Searches: DuckDuckGo does not associate your searches with your IP address or create user profiles, guaranteeing anonymous searches.
  • Secure Connection: The search engine enforces HTTPS encryption, adding an extra layer of security to your online interactions.
  • Minimal Data Retention: DuckDuckGo retains minimal data related to your searches, and the data that is retained is not personally identifiable.

Search Result Quality

Despite its strong emphasis on privacy, DuckDuck-Go provides high-quality search results using its unique search algorithm. The search engine utilizes aggregated data from various sources, including Bing and Wikipedia, to deliver relevant results without compromising your privacy.

How Does DuckDuck-Go Ensure Safety?

DuckDuck-Go implements several measures to ensure safety while using its services:

  • Smarter Encryption: DuckDuck-Go uses Smarter Encryption to establish a secure connection between your device and its servers, reducing the chances of data interception.
  • Privacy Browser Extension: The privacy browser extension provided by DuckDuck-Go blocks third-party trackers, enhances encryption, and enforces secure connections, creating a safer browsing experience.
  • Instant Answers: DuckDuck-Go’s Instant Answers feature provides direct answers to your queries, reducing the need to click on potentially unsafe links.

FAQs About DuckDuck-Go’s Safety

Can I trust DuckDuck-Go with my search queries?

Absolutely. DuckDuck-Go’s no-tracking policy and emphasis on privacy ensure that your search queries are not stored or tied to your identity.

Is DuckDuck-Go’s search algorithm effective despite not tracking users?

Yes, DuckDuck-Go’s search algorithm aggregates data from various sources to provide relevant search results without compromising user privacy.

Can I use DuckDuck-Go as my default search engine?

Certainly. DuckDuck-Go offers browser extensions and mobile apps that make it easy to set it as your default search engine.

How does DuckDuck-Go generate revenue if it doesn’t track users?

DuckDuck-Go generates revenue through advertising that is not based on user data. Instead, ads are contextually relevant to the search terms, ensuring privacy.

Is my personal information safe with DuckDuck-Go’s browser extension?

Yes, DuckDuck-Go’s browser extension enhances your online security by blocking trackers and encrypting connections, ensuring your personal information remains safe.

Can I use DuckDuck-Go on mobile devices?

Absolutely. DuckDuck-Go provides mobile apps for various platforms, allowing you to enjoy its privacy-focused search on your mobile devices.

Conclusion

In a digital landscape where privacy is a growing concern, DuckDuckGo stands out as a beacon of trust and security. Its commitment to privacy, no-tracking policy, and robust security mechanisms make it a reliable choice for those seeking a safer and more private online search experience. With DuckDuck-Go, you can explore the web with confidence, knowing that your personal information remains protected.

Continue Reading

News

The Significance of Proper Support in Sportswear for Exercise

Published

on

The Significance of Proper Support in Sportswear for Exercise

When purchasing exercise clothing, the aspect of support is often overlooked. Sportswear companies tend to prioritise features such as moisture-wicking materials and convenient pockets. However, we believe that support is a crucial aspect of dressing for workouts, as it ensures both comfort and optimal performance. Support can be seen as the intersection of sportswear and shapewear. Therefore, it is essential to understand the significance of appropriate support during physical activity and know where to find it.

The Shapewear Crossover

Supportive sportswear primarily functions through gentle compression. It maintains stability and keeps your body secure while you engage in physical activity. Common characteristics between Standard shapewear and sports bras can be found. Both utilise specialised, flexible materials to offer body support. They are also designed with minimal seams to prevent discomfort and ensure discreteness. Additionally, the emphasis on comfort remains consistent for both types of apparel. As a result, similar principles apply when it comes to providing optimal body support.

What kind of support should your athletic apparel provide?

When engaging in physical activities, it is important to wear clothing that provides stability, regardless of the intensity. Whether you are running a marathon or practising yoga, your Sports bras and briefs should not cause any discomfort or irritation. In this article, we will explore the areas of the body that require support from sportswear.

Breast support

A sports bra is essential for any physical activity, regardless of intensity. It serves as the ultimate supportive sportswear, providing both comfort and stability. By minimizing excessive movement, it helps prevent discomfort in the breast and back areas. With the multitude of options available, finding the perfect sports bra style depends on factors such as your breast size, the type of sport you engage in, and your preferred method of wearing and removing it.

Back support

If you’ve ever dealt with back pain, you understand the significance of a well-fitting bra. A sports bra that offers adequate support helps minimize the strain on your muscles and ligaments, preventing discomfort and soreness in your back. Additionally, it alleviates upper back and shoulder pain commonly associated with the weight of larger breasts.

Tummy support

Those who possess knowledge on the matter may opt to provide support to their waist and stomach by wearing sports underwear or leggings. Both options are equally effective. It is advisable to seek out high-waisted compression garments with a wide waistband, as they contribute to the stability and strength of your torso, which is vital in preventing injuries. By promoting stability and offering support to the abdomen, these garments also aid in preventing chafing and can boost your confidence, allowing you to elevate your performance.

In recent years we’ve definitely seen a shift in the fashion industry, with influencers and celebrities placing pressure on the high street to make plus-size fashion more accessible for all. Nowadays, Sportswear is highly demanding as demonstrated by plus size UK influencers.

The advantages of wearing supportive sportswear

The support provided by activewear has a tangible influence on your sports performance and how your body reacts to exercise. It’s no wonder that many women opt for activewear as their everyday clothing choice.

Posture

The incorporation of compression panels in clothing such as high-waisted underwear or leggings can enhance your posture. Maintaining a strong and stable posture is crucial during physical activities to prevent injuries. Whether you engage in sports like tennis, running, or weightlifting, having adequate support around your torso can significantly benefit you.

Comfort

The crucial aspect of effective sportswear is its ability to provide comfort. It is important to ensure that your sportswear does not constrict your breathing. To find comfortable and supportive garments, opt for those with extended panels made of lightweight fabrics that wick away moisture. These fabrics are not only lightweight but also provide support to your body while minimising the risk of chafing. Additionally, an increasing number of garments are being designed without hems, allowing them to sit smoothly against your skin without causing any discomfort.

Performance

Compression is commonly utilised in shapewear to create a desired figure, but in the context of sportswear, it can actually improve your performance. Whether it’s in the form of socks or leggings, compression technology promotes better blood circulation to targeted areas like your legs. This increased blood flow intensifies your exercise routine and contributes to faster recovery.

The finest athletic attire should not only prioritise fashion and technology. Its primary function is to provide stability to your core, enabling you to engage in activities comfortably and confidently. This underscores the significance of support, which is crucial not just during physical exertion but also in day-to-day life.

Continue Reading

News

Exploring Alternative Sentencing Options: Understanding the Potential for No Jail Time in 2nd Offense DWI Cases in Texas:

Published

on

Exploring Alternative Sentencing Options: Understanding the Potential for No Jail Time in 2nd Offense DWI Cases in Texas:

While Texas has some of the most drunk drivers in the country, the state also has some of the strictest DWI penalties. Despite how common a Texas DWI and 2nd DWI can be (with over 30% of DWI convicts reoffending), a 2nd DWI conviction will land you at least 72 hours in county jail and possibly even a year. Although many will agree that the punishment fits the crime, a 2nd DWI charge can be a telltale sign of alcohol addiction, and can often require rehabilitation that a jail sentence cannot offer. Luckily enough, there are several ways you can avoid a conviction for a 2nd DWI in Texas to receive no jail time and focus on your rehabilitation.

An Expert DWI Attorney:

Since mandatory jail time can only be avoided by avoiding conviction, a skilled DWI attorney is crucial to any option you explore. A 2nd DWI charge requires the same amount of evidence as a 1st DWI charge, and can often be defended with the same tactics. Depending on the circumstances of your case, a DWI attorney may be able to scrutinize a field sobriety test, the administration of a breathalyzer test, or the constitutionality of a traffic stop. Always inquire about the potential for a successful defense before you set your mind on other options, as dismissal or acquittal is the only way to circumvent all penalties of a 2nd DWI in Texas no jail time. If an expert attorney determines that your case won’t fare well at trial they can petition for probation or a DWI court to proceed over your case, or negotiate a plea for you.

DWI Court:

Many of Texas’ major cities offer a DWI court program as a way to avoid jail for DWI 2nd offenders or defendants who show signs of alcoholism. DWI court is similar to probation but heavily emphasizes rehabilitation. A program will typically involve common aspects of community supervision, routine attendance at outpatient programs, and meetings between you, a judge, a probation officer, and a counselor. If you do not abide by the court’s rules or mandatory programs your case can go back to court and you will likely go to jail. A DWI court program is at least a year, but the length and regimen can be augmented depending on a defendant’s progress. Upon a judge “graduating” you from DWI court your sentence will be fulfilled. DWI court not only allows you to avoid jail time but is known to reduce DWI recidivism rates by as much as 12%.

Plea Bargain:

With Texas’ criminal justice system being notoriously arduous, nearly 30% of all DWIs are reduced to lesser charges to avoid the hassle of a trial. In cases without aggravating factors such as an enhanced blood alcohol concentration, a child passenger, or an accident, a 2nd DWI charge can be bargained down to a minimum sentence or reduced charges. To be considered for a plea deal, a defendant will usually have to show personal growth and remorse. This is typically done by issuing a statement to the court, installing an ignition interlock in your vehicle, or attending DWI education courses or outpatient. If you plea to a minimum sentence you will likely still face 72 hours in jail and probation. While it’s uncommon for a 2nd DWI plea deal in Texas to receive no jail time, this is not impossible if your charges are reduced to reckless driving or obstruction of a highway.

Don’t Drink and Drive:

72 hours in jail is considered the mandatory minimum sentence for a 2nd DWI conviction and those facing charges are unlikely to see no jail time. The only guaranteed way to avoid jail is to avoid drinking and driving. With a drunk driving fatality occurring every 8.5 hours in Texas and over 10% of Texans reporting involvement in a drunk driving crash sometime in their lives, don’t fall under the impression that you are immune to the consequences of a DWI. Always make sure that you have a designated driver or extra money for an Uber when you go out drinking, it can save someone’s life and protect your future.

Continue Reading

Trending