ILTACON ended one week ago, are you caught up yet? 🙃

LOL. I am by no means caught up. I’ve got to-do lists and piles of sorted business cards. Plenty of follow-up yet to go. How about you?

If you were there, wasn’t ILTACON fantastic this year?

A View from a Booth

ILTACON 2019 was the first year of Joy. Not only do I mean the first year of ILTA’s vibrant new CEO, Joy Heath Rush, but the first year that ILTA felt truly back on-track.

ILTACON 2019 broke all attendance records, at over 3,500 legal techies comprised of over 1,800 members and 1,700 business partners. Over 800 members were first-timers, which is fantastic. I can imagine that some of the booth locations were poor at the Dolphin. We were fortunate to have good traffic and terrific interest in our LINK app.

Peer-to-Peer Wins

The first time we were at ILTACON in 2013, I was astonished and impressed at the level of peer-to-peer sharing in the educational sessions. Essentially, ILTACON is all about the people. The volunteers and members who create the sessions. The side meetings, the lunches and dinners, the meetups in a booth. Where else can you catch up with so many of your favorite people in legal tech?

I’m grateful for the generosity of all the ILTA community members. Thank you all for making this such a rewarding experience.

Looking ahead, don’t miss #ILTACON20 at the Gaylord Opryland Hotel. It’s like entering a lush biosphere with fountains and rivers. Be sure to visit Nashville proper, too, for music 🎸🎺 and hot chicken. 🌶🍗

-Maureen

Gaylord Opryland Hotel Atrium

We’re an official NetDocuments ISV Partner!

We’ve been a NetDocuments partner for years. Recently, with Leonard Johnson heading up their partner ecosystem, NetDocuments have formalized their NetDocuments ISV Partner Program. We have used their REST APIs to give NetDocuments users access to their documents and their email in the same encrypted container app, LINK. NetDocuments is committed to the platform approach wherein both Independent Software Vendors and NetDocuments customers can develop solutions for optimizing their workflows using the REST APIs.

It’s easy to review, compare, annotate, file, and email documents all within our LINK app. LINK also offers a managed integration with the Microsoft Office apps for editing on an iPad or smartphone.

Continue reading

Our CEO in CSO: Ripped from the headlines – are your messages secure in these encrypted apps?

In the investigations of Paul Manafort and Michael Cohen, the FBI has retrieved messages from Signal, Telegram and WhatsApp. While there are weaknesses inherent in all of these apps, the question remains: What does a good data protection scheme look like?

 

A few days ago, the FBI revealed that Michael Cohen’s messages sent with Signal and WhatsApp are now available as evidence in the on-going investigation into his various dealings. While thousands of emails and documents have already been recovered from Cohen’s devices, home, hotel room, and office, the recovery of data from messaging apps that promise end-to-end encryption is surprising. One would presume that end-to-end message encryption should ensure that those messages are unrecoverable without assistance from Mr. Cohen. However, clearly that is not the case.

Continue reading

Secure Email is Cracked; What Now?

cracked pixabay rotated broken-glass-2208593__480

By Seth Hallem, Moble Helix CEO, Co-founder, & Chief Architect

Secure email using S/MIME and OpenPGP is fundamentally broken. Our CEO explains the EFAIL vulnerability and why our LINK Email is not susceptible to EFAIL. What do we do next to protect email? 

On Sunday night, a team of researchers from Germany and Belgium dropped a major bomb on the world of encrypted email by describing a simple, widely applicable, and wildly effective technique for coercing email clients to release encrypted email contents through “Exfiltration channels.”[1] The concept is simple – by using a combination of known manipulation techniques against the encryption algorithms specified in the S/MIME and OpenPGP standards and lax security choices in a wide variety of email clients, the research team was able to intercept and manipulate encrypted emails such that large blocks of the encrypted text are revealed to a malicious server.

What is most brilliant (and most dangerous) about this attack, is that the attack does not require decrypting the email messages or stealing encryption keys. Hence, the attack can be deployed as a man-in-the-middle attack on the infrastructure of the internet itself, rather than requiring that a specific email server or email client is compromised.

The essential idea behind this attack is simple – HTML emails expose a variety of reasons to query remote servers to load parts of those emails. The simplest (and most common) example of this concept is displaying embedded images. Many marketing emails use tiny embedded images to monitor who has opened an email. This technique is so pervasive that many of us have become desensitized to clicking the “Allow images from this sender” prompt in Outlook. It is common practice for marketing emails to contain embedded images with essential content, which encourages users to allow the client to load all images in that message. However, doing so loads both visible images and tiny, single pixel images that marketing tools use to uniquely determine that we have opened the email message in question.

Continue reading

Mobile Helix LINK App at ILTACON 2016

Gaylord National Front Entrance.jpg

Where will you be on August 28th? 1,600 legal technology professionals know exactly where they will be – at the Gaylord National Harbor Hotel for ILTACON 2016.

ILTACON offers a unique opportunity for members to learn from Legal IT peers and to see the latest in legal technology. We will be demonstrating our LINK mobile app for lawyers.

Stop by booth 820 to see how easy it is to:

  • View an NRL, with redlines and comments, in LINK Email
  • Send and file-to DMS
  • Check a doc into DMS 
  • Search DMS and email a doc

And LINK’s two new features:  Continue reading

The FBI Cracks the iPhone – What Can Legal IT Do? From Mobile Helix CEO

By Seth Hallem, Mobile Helix CEO and co-founder

LegalIT Insider logoOn March 28th, the Department of Justice confirmed that it had successfully unlocked the San Bernardino shooter’s iPhone 5C without Apple’s assistance. On that same day, the US government moved to vacate a California court order that had attempted to force Apple to assist in the decryption of the device. While the legal maneuverings are fascinating in their own right, the conclusion leads to an even more fascinating technology discussion – how did the FBI crack the iPhone, and what are the implications of this successful hack? Continue reading

Biggest Challenge: Security Management – 2015 ILTA Technology Purchasing Survey

The 10th Annual 2015 ILTA / InsideLegal Technology Purchasing Survey was released at ILTACON last week. It’s a quick read and I recommend taking a look at the entire report.

As an introduction to the tech survey, I’ve highlighted the five points that I found most interesting and indicative of our times.

Continue reading