Cryptography https://truthvoice.com Wed, 22 May 2019 10:28:33 +0000 en-US hourly 1 https://wordpress.org/?v=6.1 https://i0.wp.com/truthvoice.com/wp-content/uploads/2019/05/cropped-truthvoice-logo21-1.png?fit=32%2C32&ssl=1 Cryptography https://truthvoice.com 32 32 194740597 Cell 411 Inc. Receives $200,000 Seed Capital, Announces Version 3 Release https://truthvoice.com/2016/03/cell-411-inc-receives-200000-seed-capital-announces-version-3-release/?utm_source=rss&utm_medium=rss&utm_campaign=cell-411-inc-receives-200000-seed-capital-announces-version-3-release Thu, 17 Mar 2016 09:52:08 +0000 http://truthvoice.com/2016/03/cell-411-inc-receives-200000-seed-capital-announces-version-3-release/

Screen Shot 2016-03-17 at 2.45.11 PM

Cell 411 Inc., creator of the free mobile app that allows individuals to issue emergency alerts and respond to alerts from members of their communities, friends and neighbors in near real time, received the investment of 10 Million NXT and 300 BTC, worth $200,000, from crypto- currency investor and entrepreneur Marc De Mesel.

Cell 411 empowers communities across the world to eliminate the need for slow government services and build solutions tailored to their own needs. The investment allows the 6-month old startup to boost its workforce and pursue the release of version 3 of its emergency management platform.

“This first round of funding is a huge boost to the development efforts going into Cell 411. We have a long list of features demanded by users and explicit demands from commercial clients like security firms, which are very strong market signals indicating that we are not only filling a need in the marketplace but also creating and shaping a brand new market in personal safety and security,” said Virgil Vaduva, founder of Cell 411.

The Cell 411 platform is now ranked at number 15 in the social marketing category of mobile apps in South Africa, following closely behind applications like Facebook and Google. Markets like South Africa, Western Europe and the United States have been particularly receptive to the increased need of tailored personal safety services for individual users and owners of smart phones.

“Our customers are always the users, and the development of the platform will always have them at the center, but now we can focus on the long-term improvement and strategic growth of the platform which will lead to better user experience, a better product and ultimately a safer world,” said Vaduva.

Version 3 of Cell 411 will be released later this summer with a greatly improved UI, improvements to the back-end infrastructure and improved support for live video streaming and other features demanded by users.

Cell 411 Inc. is at http://getcell411.com

]]>
2238
Why The FBI’s Encryption Backdoor Plans Will Never Become Reality https://truthvoice.com/2015/04/why-the-fbis-encryption-backdoor-plans-will-never-become-reality/?utm_source=rss&utm_medium=rss&utm_campaign=why-the-fbis-encryption-backdoor-plans-will-never-become-reality Wed, 29 Apr 2015 10:28:32 +0000 http://truthvoice.com/2015/04/why-the-fbis-encryption-backdoor-plans-will-never-become-reality/

android_backdoor_9

The FBI wants backdoors in all your crypto, and UK Prime Minister David Cameron made backdoors an election promise, but as Stanford lawyer/computer scientist Jonathan Mayer writes, there’s no way to effectively backdoor modern platforms without abolishing the whole idea of computers as we know them, replacing them with an imaginary and totalitarian computing ecosystem that does not exist and probably never will.

Mayer gives the example of how stopping Android users from using crypto would require the abolition of third-party app stores, rolling back the state of the art in Web-based apps, introducing kill-switches to the platform that lets Google delete your apps and the data associated with them, and preventing jailbreaking at all costs.

He mentions that the same is true for Ios, though that’s not exactly right — it’s a felony to jailbreak many Ios devices (Iphones, but not Ipads, are temporarily exempted from this thanks to a Copyright Office ruling that expires this year), and it’s a felony to run a third-party Ios app store and supply jailbreaking tools for Ios.

DRM-locked ecosystems are already designed to prevent users from running code that their users desire, and so it’s conceptually a lot easier to understand how a government could simply say to all those companies — Sony, Nintendo, Apple, Nest, John Deere, etc — that the law required them to only approve apps with backdoors and then help the companies with their existing project of vigorously prosecuting jailbreak tool-makers, and get a much more airtight seal around users’ ability to use good crypto.

One option: require Google to police its app store for strong cryptography. Another option: mandate a notice-and-takedown system, where the government is responsible for spotting secure apps, and Google has a grace period to remove them. Either alternative would, of course, be entirely unacceptable to the technology sector—the DMCA’s notice-and-takedown system is widely reviled, and present federal law (CDA 230) disfavors intermediary liability.

This hypothetical is already beyond the realm of political feasibility, but keep going. Assume the federal government sticks Google with intermediary liability. How will Google (or the government) distinguish between apps that have strong cryptography and apps that have backdoored cryptography?

There isn’t a good solution. Auditing app installation bundles, or even requiring developers to hand over source code, would not be sufficient. Apps can trivially download and incorporate new code. Auditing running apps would add even more complexity. And, at any rate, both static and dynamic analysis are unsolved challenges—just look at how much trouble Google has had identifying malware and knockoff apps.

Continue with the hypothetical, though. Imagine that Google could successfully banish secure encryption apps from the official Google Play store. What about apps that are loaded from another app store? The government could feasibly regulate some competitors, like the Amazon Appstore. How, though, would it reach international, free, open source app repositories like F-Droid or Fossdroid? What about apps that a user directly downloads and installs (“sideloads”) from a developer’s website?

The only solution is an app kill switch.3 (Google’s euphemism is “Remote Application Removal.”) Whenever the government discovers a strong encryption app, it would compel Google to nuke the app from Android phones worldwide. That level of government intrusion—reaching into personal devices to remove security software—certainly would not be well received. It raises serious Fourth Amendment issues, since it could be construed as a search of the device or a seizure of device functionality and app data.4 What’s more, the collateral damage would be extensive; innocent users of the app would lose their data.

Designing an effective app kill switch also isn’t so easy. The concept is feasible for app store downloads, since those apps are tagged with a consistent identifier. But a naïve kill switch design is trivial to circumvent with a sideloaded app. The developer could easily generate a random application identifier for each download.5

Google would have to build a much more sophisticated kill switch, scanning apps for prohibited traits. Think antivirus, but for detecting and removing apps that the user wants. That’s yet another unsolved technical challenge, yet another objectionable intrusion into personal devices, and yet another practice with constitutional vulnerability.

You Can’t Backdoor a Platform [Jonathan Mayer]

]]>
3041