Remove Encryption Remove IoT Remove Surveillance Remove Technology
article thumbnail

DEEP TECH NEWS: How ‘attribute-based encryption’ preserves privacy at a fined-grained level

The Last Watchdog

The ubiquity of smart surveillance systems has contributed greatly to public safety. Enter attribute-based encryption ( ABE ) an advanced type of cryptography that’s now ready for prime time. Attribute-based encryption can be utilized to do a number of things,” Wu noted. Here are my takeaways.

article thumbnail

Policy vs Technology

Schneier on Security

Sometime around 1993 or 1994, during the first Crypto Wars, I was part of a group of cryptography experts that went to Washington to advocate for strong encryption. Markey was against forcing encrypted phone providers to implement the NSA's Clipper Chip in their devices, but wanted us to reach a compromise with the FBI regardless.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Hacktivist Tillie Kottmann is reportedly among those asserting responsibility for the incident, telling Bloomberg that their act helped expose the security holes of modern-day surveillance platforms.

article thumbnail

The Growing Presence (and Security Risks) of IoT

Thales Cloud Protection & Licensing

As most of us know, IoT devices are on the rise in enterprise networks. According to McKinsey & Company , the proportion of organizations that use IoT products has grown from 13 percent in 2014 to 25 percent today. The issue is that these tens of billions of new devices will likely amplify the inherent security risks of IoT.

IoT 122
article thumbnail

New Bill Called 'Full Frontal Nuclear Assault on Encryption in the United States'

SecureWorld News

Privacy and security advocates may be forced to battle it out on the Senate floor to stop a newly introduced bill that will help law enforcement get past encryption. New backdoor bill in Congress hits encryption debate head on. The question: should encrypted communication be out of law enforcement's reach?

article thumbnail

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature

Security Affairs

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature, a gift for APT groups and cyber crime syndicates. The flaws reside in a feature named the “XMEye P2P Cloud” that is enabled by default which is used to connect surveillance devices to the cloud infrastructure. Who controls these servers?

article thumbnail

Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke

Thales Cloud Protection & Licensing

The Internet of Things (IoT) is very crowded. Connected things are what make the IoT – sensors, cameras, wearable electronics, medical devices, automatic controls. But making the IoT work requires trust in the devices and the data they collect. The IoT is not making the job of securing networks any easier.

IoT 72