article thumbnail

Homomorphic Encryption Makes Real-World Gains, Pushed by Google, IBM, Microsoft

eSecurity Planet

The increasing mobility of data, as it ping-pongs between clouds, data centers and the edge, has made it an easier target of cybercrime groups, which has put a premium on the encryption of that data in recent years. Since then, interest in fully homomorphic encryption (FHE) has increased, largely paralleling the rise of cloud computing.

article thumbnail

Security Analysis of Threema

Schneier on Security

We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than 10 million users and 7000 corporate customers. The app uses a custom-designed encryption protocol in contravention of established cryptographic norms. It also said the researchers were overselling their findings.

Security 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Breaking RSA with a Quantum Computer

Schneier on Security

A group of Chinese researchers have just published a paper claiming that they can—although they have not yet done so—break 2048-bit RSA. Honestly, most of the paper is over my head—both the lattice-reduction math and the quantum physics. This is something to take seriously. But…wow…maybe…and yikes!

Paper 145
article thumbnail

Using Strategic Data Governance to Manage GDPR/CCPA Complexity

erwin

In light of recent, high-profile data breaches, it’s past-time we re-examined strategic data governance and its role in managing regulatory requirements. Govern PII “at rest”. Classify, flag and socialize the use and governance of personally identifiable information regardless of where it is stored. Govern PII “in motion”.

GDPR 110
article thumbnail

Consultation paper published on Hong Kong’s data protection law

Data Protection Report

Earlier this week, Hong Kong’s Panel on Constitutional Affairs (the Panel ) released its discussion paper ( LC Paper. CB(2) 512/19-20(03 ) (the Paper ) seeking views on changes to Personal Data (Privacy) Ordinance (Cap.486) Written by Partner Anna Gamvros and Associate Libby Ryan, both based in the Hong Kong office.

Paper 56
article thumbnail

Security Risks of Government Hacking

Schneier on Security

Some of us -- myself included -- have proposed lawful government hacking as an alternative to backdoors. A new report from the Center of Internet and Society looks at the security risks of allowing government hacking. From the report's conclusion: Government hacking is often lauded as a solution to the "going dark" problem.

article thumbnail

CIPL Publishes Recommendations for International Transfers Post-Schrems II

Hunton Privacy

On September 24, 2020, the Centre for Information Policy Leadership at Hunton Andrews Kurth (“CIPL”) released a new paper (the “Paper”) on the Path Forward for International Data Transfers under the GDPR after the CJEU Schrems II Decision. In this context, CIPL has conducted a survey of its members’ data transfer practices.

Paper 132