The Majority of IT Security Professionals Believe Encryption Backdoors are Ineffective and Potentially Dangerous

In a recent Venafi survey of 296 IT security pros, 91 percent of those surveyed said cybercriminals could take advantage of government-mandated encryption backdoors. 72 percent of the respondents do not believe encryption backdoors would make their nations safer from terrorists.

Only 19 percent believe the technology industry is doing enough to protect the public from the dangers of encryption backdoors. 81 percent feel governments should not be able to force technology companies to give them access to encrypted user data. 86 percent believe consumers don’t understand issues around encryption backdoors.

“Giving the government backdoors to encryption destroys our security and makes communications more vulnerable,” said Kevin Bocek, chief security strategist for Venafi.

Continue reading

ProtonMail Professional – Encrypted Email for Organizations

This blog has always focused on privacy problems and solutions for individuals. However, many organizations also have a need for privacy. ProtonMail, already well known for private email services for individuals, has now introduced a related product for corporations, non-profits, and any other organizations that feel a need for privacy.

You can read the announcement for ProtonMail Professional at:

Data Shredder for Mac 2017 Offers Military Grade Data Deletion

Miami-based security solutions company, ProtectStar today announced Data Shredder for Mac 2017, their new military grade data deletion tool for macOS computers. The app securely and efficiently deletes data using methods that meet and exceed government, military, and industry standards. Users simply drag-and-drop files, folders, or drives to the app and press the “Shred” button. Data Shredder then completely eliminates any chance for data reconstruction, even by government agencies.

Data Shredder for Mac 2017 sells for $19.90.

The new Data Shredder for Mac 2017 joins several other, related products that have been available from ProtectStar for some time, including:

Continue reading

Hackers are Using Hotel Wi-Fi to Spy on Guests and Steal Data and Money

This is one more reason why you always want to use a VPN, especially when traveling.

An advanced hacking and cyberespionage campaign against high-value targets has returned. The so-called ‘DarkHotel’ group has been active for over a decade, with a signature brand of cybercrime that targets business travellers with malware attacks, using the Wi-Fi in luxury hotels across the globe.

In short, the hackers find ways to infiltrate the hote’s wi-fi system so that they can see every bit of information that hotel guests are sending and receiving on (unencrypted) connections.

The hackers have much more sophisticated methods than just “wiretapping” into the wi-fi network. The usual method for the attack is to send carefully crafted phishing emails. When the recipient clicks on the email message, a self-extracting archive package, called winword.exe, is then executed and begins the Trojan downloader process.

Luckily, the problem is easy to avoid.

Continue reading

RSA Says You Can’t Force the Private Sector to Break Encryption

RSA’s VP and GM of Global Public Sector Practice Mike Brown believes there’s a better way to thwart terrorism than breaking end-to-end encryption, as recently proposed by the Australian government.

Australian Prime Minister Malcolm Turnbull, along with Attorney-General George Brandis, announced plans last week to introduce legislation that would force internet companies to assist Australian law enforcement in decrypting messages sent with end-to-end encryption. (See my earlier article at

During a question-and-answer session, Turnbull was asked about the difficulty of using legislation in an attempt to defeat the laws of mathematics. Turnbull replied, “”I’m not a cryptographer, but what we are seeking to do is to secure their [the tech companies] assistance. They have to face up to their responsibility. They can’t just, you know, wash their hands of it and say it’s got nothing to do with them.”

Well, Turnbull obviously is “not a cryptographer.” I have to agree.

NOTE: I am a former cryptographer. These days I am simply a crypto hobbyist.

Continue reading

Prime Minister of Australia Malcolm Turnbull Displays Shocking Lack of Understanding of Encryption

The Prime Minister of Australia, Malcolm Turnbull, has indicated that the laws produced in Canberra are able to trump the laws of mathematics and also will apply to all citizens of all countries worldwide. Say what?

“The laws of Australia prevail in Australia, I can assure you of that,” he said on Friday. “The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia.”

In short, he stated that all encryption products used worldwide must have a not-so-secret “back door” that will allow Australian officials to monitor everything.

Here is an excerpt from an interview with Turnbull on July 5:

Continue reading

The Encryption Debate Should End Right Now

An interesting article by Brian Barrett in the Wired web site perfectly describes why a ban on encryption will never work and can even be harmful. While law enforcement officials keep asking for a “backdoor” into encrypted documents and messages, Barrett asks, “Why entrust a key to someone who gets robbed frequently?”

In this case, the “someone who gets robbed frequently” is the US government, specifically the US intelligence services. However, I am sure the same thoughts apply to other governments as well.

Continue reading