. | . |
Encryption firm tightens access following Paris attacks by Staff Writers Washington (AFP) Nov 19, 2015 The encrypted communications firm Silent Circle said Thursday it was tightening access to its mobile apps and secure smartphone to make them harder for terrorists and criminals to use. The company which makes the encrypted Blackphone handset and Silent Phone applications for private messaging said it took the steps after learning that it had been recommended by the Islamic State group which has claimed credit for the deadly attacks in the French capital. "We are enacting more aggressive back-end payment technology to reduce the likelihood of evildoers like (the Islamic State group) ISIS," said Mike Janke, co-founder and chief executive of the company which is headquartered in Switzerland with offices in Washington. Janke told AFP that he expects this move to curb use of his company's products because criminals and terrorists often use stolen credit cards or fake addresses. "Since ISIS labeled us as the strongest product, we are going to implement what we feel is responsible and morally acceptable procedures to make it harder for the bad element to get our technology," he said. Janke said Silent Circle's outside payment processor would implement steps "that can detect stolen credit cards, fake address and other black market means of acquiring our Blackphone or software." At the same time, Janke said the company would resist efforts and laws that would weaken encryption or allow law enforcement access to private data. "Nobody wants to see their name at the top of an ISIS list," he said. At the same time, he noted that these encryption and private messaging services are vital for government officials, corporations and democracy activists. "In some parts of the world secure communications literally means the difference between life and death," he said, adding that intelligence agencies, heads of state and major corporations use the company's products. Janke said Silent Circle stores no customer data and thus cannot be compelled by subpoena to identify its users. He added that any type of technology may be used for good or evil purposes. "Whether it's a cricket bat or a car, one percent of the human population will use it for evil," he said. "You can't penalize the other 99 percent of the world."
Related Links Cyberwar - Internet Security News - Systems and Policy Issues
|
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us. |