Microsoft Research develops programming language called Legalease
Share on Twitter.
Get the most reliable SMTP service for your business. You wished you got it sooner!
May 23, 2014
Workers at Microsoft Research (MSR) have implemented a new method to automatically check
code for compliance with privacy laws, and Microsoft claims that its simple to use.
Legalease is to specify restrictions on how data is handled. One of the main drivers behind
its development was that software developers and those setting companies’ privacy policies
don’t share a common language.
As an example, MSR says that more than 20 percent of the code in its Bing search engine changes
on a daily basis, with changes made by thousands of programmers.
Even some small changes in code might affect how data is used or who views it, potentially
violating company, government or regulatory privacy policies.
Keeping tabs on changes in very large systems, like the Bing search engine, using manual audits
is difficult and very time consuming.
According to MSR, automated testing is the best way to verify compliance with privacy rules
and laws on the massive scale demanded in environments like Bing.
like the U.S. Health Insurance Portability and Accountability Act (HIPPA).
Grok, meanwhile, annotates existing code using a system that cross-references information
from different sources, based on varying levels of confidence.
According to Microsoft, pattern-matching to column names across a database results in a
low-confidence score, while annotations made manually by developers are deemed to be more
trustworthy and thus get a high-confidence score.
MSR says it developed Grok for use on Bing but found writing suitable polices very difficult,
and this was what led to Legalese. Both were tested on Bing and are now running on the data analytics
MSR presented Legalese and Grok at the 35th IEEE Symposium on Security and Privacy in San Jose, California
MSR claims that a group of non-coders took less than five minutes to learn how to use Legalease and
just 15 minutes to code 9 Bing policy clauses with some tidbits of user information.
Saikat Guha, a researcher at Microsoft, said in a statement called Legalease is “the final piece of the
automated privacy compliance jigsaw puzzle."
In other IT news
Cisco is continuing the rapid expansion of its security portfolio with the acquisition of
the small malware analysis firm ThreatGRID.
The acquisition target was founded two years ago, one of the then-burgeoning number of companies
that pushed malware analysis, threat intelligence and security analytics into the cloud, supplemented
by an on-premise appliance.
This new acquisition will fit into Cisco's Advanced Malware Protection portfolio, created when it
acquired open-source IPS pioneer SourceFire.
In its announcement, Cisco says ThreatGRID “allows enhanced aggregation and correlation of data
for advanced threat intelligence across the extended network and across Cisco security solutions and
Cisco has also announced a bunch of other extensions to the AMP suite, including: AMP for Endpoints,
adding support for Mac OS X, “elastic search” to identify the scope of an attack, and remote file
analysis; the AMP Private Cloud Appliance; AMP for Networks, which includes a cloud-based sandbox to
help defend against unknown threats; and two AMP FirePOWER appliances, the AMP8150 with up to 2 Gbps of
performance and the FirePOWER AMP7150 with up to 500 Mbps of performance.
In other IT news
CERN alumni and a team or research scientists at MIT have taken another shot at cracking
the e-mail encryption scenario.
Their offering is dubbed Proton Mail and it's now available in public beta, and it proves to be
so popular that the group had to suspend new registrations while it upgrades its system.
As a concept, encrypting email goes back at least to the earliest days of PGP-– Pretty Good Privacy,
that got Phil Zimmerman of RSA Security in so much trouble back in those days. He suffered a long criminal investigation
by the U.S. Customs Service.
After a report from RSA Data Security who were in a licensing dispute with regard to use of the
RSA algorithm in PGP, the United States Customs Service started a criminal investigation of Zimmermann
for allegedly violating the Arms Export Control Act.
The United States government had long regarded cryptographic software as a munition, and thus
subject to arms trafficking export controls. At that time, the boundary between what cryptography
was permitted ("low-strength") and impermissible ("high-strength") for export from the United States
was placed such that PGP fell on the too-strong-to-export side of the boundary.
The boundary for legal export has since been raised and now allows PGP to be exported. The investigation
lasted three years, but was finally dropped without filing charges against Zimmerman.
PGP, which lives on in various open-source tools today, ran encryption alongside users' e-mail
clients and was widely seen as too difficult for the average user.
In the world of Webmail, encryption happens at the server end, and as Lavabit found to its own cost, that leaves user data subject to the demands of law enforcement.
Proton Mail even nods towards PGP-- “In truth, there is not a whole lot that ProtonMail does that
is not already accomplished by PGP, at least from a security standpoint," the MIT team notes.
"But, to quote what Bruce Schneier said to us when he visited CERN, all PGP has demonstrated is that
even one click is too much,” he added.
“What we really want to provide here is privacy for the much larger segment of the population
that isn't sophisticated enough to use PGP,” he added.
Proton Mail is a Webmail system that encrypts messages at the client-side – within the user's browser –
so that the user doesn't have to delegate encryption and trust to the provider.
The organization doesn't log user activity, so information like IP addresses and other metadata
aren't available, and that's what really makes the whole concept so interesting.
It runs AES, RSA and OpenPGP implementations on open source cryptographic libraries, while at the
server end, Proton Mail runs full disk encryption in its Switzerland data centers.
However, the system does demand that users have two passwords-- one to authenticate yourself
with its servers, and the second local password for decrypting messages. We would suggest using a
password manager for the second, since Proton Mail can't re-issue a password that it never held
in its memory to begin with.
There's also an optional self-destruct feature for messages, and users can deal with other e-mail
providers either unencrypted, or using symmetric encryption as an option.
Some of the developers remain at CERN, while others are now at MIT. There's some interviews with
the founders, Jason Stockman, Wei Sun, Andy Yen on the Forbes website.
The developers told Forbes they chose to “bootstrap” rather than seek venture capital funding
to maintain their credibility among users.
In other IT news
There are many that aren't too happy with Microsoft's decision to abandon security patch support for its aging OS Windows XP.
In direct retaliation for its decision, the Chinese government has completely banned Windows
8 from a sizeable amount of public-sector personal computers.
The ban was announced by the government's IT procurement agency in a notice posted online on May 16.
The notice was addressed to hardware vendors bidding on a contract to supply the Chinese state
with new energy-saving PCs, laptops, tablets and other similar equipment.
"All computer vendors are not allowed to install Microsoft's Windows 8 operating system," the
The Chinese government agency behind this decision-– The Procurement Center of the Central Government
Institution of the People's Republic of China has enormous power within the country as it leads
procurement for the Chinese public sector at large.
The outright ban follows a set of Chinese internet giants teaming up in February to offer
support for Windows XP for the next two years following Microsoft halting updates for the legacy
As of the end of 2013, Windows XP had a marketshare of about 50 percent in China. Last December, Chinese
officials were reported to be concerned about the potential security impact of Microsoft permanently dropping
support for the OS.
The Chinese government was also reported to have told Microsoft that halting the sale of Windows
7 and switching over to the higher-priced Windows 8 would lead to software piracy.
"This morning, the Central Government Procurement Center of China posted a notification
titled 'Bidding Process for Government Purchasing Energy-efficient IT Products.' The notification
indicated that the Windows 8 operating system is excluded in the bidding," a Microsoft spokesperson
"We were surprised to learn about the reference to Windows 8 in this notice. Microsoft has been
working proactively with the Central Government Procurement Center and other government agencies
through the evaluation process to ensure that our products and services meet all government procurement
"We have been and will continue to provide Windows 7 to government customers. At the same time, we
are working on the Windows 8 evaluation with relevant government agencies," he added.
But overall, China may not have that many alternatives to Microsoft, given that the country's
homegrown OS "Red Flag Linux" apparently shut its doors and fired all staff in February of this year.
Get the most dependable SMTP server for your company. You will congratulate yourself!
Share on Twitter.
Need to know more about the cloud? Sign up for your free Cloud Hosting White Paper.