by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : July 2013
Mobile devices are leading the shift to IPv6, with a higher proportion of connec- tions to sites optimized for smart phones and tablets using the new protocols, according to measurements from content delivery company Akamai. Where is the IPv6 traf c coming from? GCN JULY 2013 • GCN.COM 9 Silent Circle, the company that provides end-to-end BYOD encryption, has introduced a Web-based management console to support large deployments of crypto licenses. It was developed largely in response to government demand for a tool to manage enterprisewide licensing. Government was always a primary market for Silent Circle, but the speed of adoption has caught the company by surprise. "We had no idea that govern- ment customers would need a thousand subscriptions," said , said CEO Mike Janke, a former Navy SEAL. "We didn t see any of this coming. We envisioned 10 special ops guys, reporters in Sudan or some individuals around the world." Silent Circle s secure voice, text, mail and video communications have gone in less than a year from being a point- to-point solution to an enterprise tool. There has been strong adoption in the nancial industry and with oil companies, but "most of it was from [the Defense Department] and other government agencies," Janke said. The company has bene ted from current events, particularly recent revelations about the National Security Agency s surveillance of Internet and telephone communications. Growth, already a strong 100 percent month- over-month, rocketed to 420 percent in the last two-and-a-half weeks. Agencies that were buying 50 subscriptions now are buying hundreds as concerns grow not only about government snooping, but also of government leaking. Encrypted communications is not new. What Silent Circle has done is make it practical for bring-your-own-device en- vironments by harnessing the computing power of smart phones for crypto key management, cutting the middle man out of the security equation. Keys remain in the hands of the end users rather than a server, eliminating the need for trust in a third party. Secure peer-to-peer connections with Silent Circle Android and iOS apps use the Zimmermann Real Time Transport Protocol, a crypto key agreement proto- col for voice over IP that uses the Dif e- Hellman key exchange and the Secure Real Time Transport Protocol. Encryption is done with NSA Suite B cryptography, a public interoperable set of crypto tools that include the Advanced Encryption Standard, Secure Hash Algorithm 2 and elliptic curve digital signature and key agreement algorithms. The company operates its own network with SIP serv- ers and codecs, but all encryption and security remain on endpoint devices. Just 35 percent of the company s business is in North America, with the rest of it off-shore in countries where security has long been a bigger issue than here. "We look at things in a bit of a bubble here compared to the rest of the world," Janke said. • Agencies showing sudden interest in encrypted comm BY WILLIAM JACKSON Percentage of Web requests using IPv6 for each mobile operating system 12% Windows Phone OS8 5.9% BlackBerry OS 10 10.8% Android 4.1/4.2 (Jelly Bean) 1.1% Apple iOS 3 and iOS 4 1.4% Apple iOS 5 1.8% Apple iOS 6 1.6% Android 2.3 (Gingerbread) 3.2% Android 4.0 (Ice Cream Sandwich) Source: New Vantage Partners