Learn about open source software in Bernardsville

BERNARDSVILLE - The Bernardsville Public Library will present a program on open source software and who can benefit from using it at 7 p.m. on Thursday, Dec. 4, at the library, 1 Anderson Hill Road.

Open source programs can be obtained at no cost or at a very low cost, while purchasing software and upgrades can be expensive.

Open source can be used for word processing, spreadsheet and web design needs. It is reliable, free and has a history of being secure because its developers and volunteer collaborators are constantly fixing flaws.

The program is taught by Programs Plus, a software training company. Attendees will learn how to take advantage of easily accessible open source software.

There is no charge to attend the program, but advance sign-up is requested.

Register online at http://www.bernardsvillelibrary.org and follow the link from Adult Programs, or call the library at (908) 766-0118 to sign up.

Link:
Learn about open source software in Bernardsville

Icelandic hacker pleads guilty for stealing $240k from WikiLeaks

An Icelandic computer hacker and former associate of Wikileaks founder Julian Assange unexpectedly pleaded guilty on Wednesday to embezzling 30 million Icelandic crowns ($240,000) from the organisation.

Sigurdur Thordarsson's courtroom plea is the latest twist in the saga of Wikileaks, which released thousands of secret U.S. embassy cables in 2010 and 2011, deeply embarrassing Washington.

Known as 'Siggi the Hacker', Thordarsson has previously said that he turned an informant for the U.S. Federal Bureau of Investigation (FBI) in 2011, a year before Assange fled to the Ecuadorian embassy in London to avoid extradition to Sweden over sexual assault accusations that he has denied.

In the run up to his Iceland trial, Thordarsson rejected charges that he stole the proceeds of the sales of Wikileaks-branded items, and his U-turn on Wednesday was a surprise.

Thordarsson's lawyer, Vilhjalmur Vilhjalmsson told the court, "After going over the charges thoroughly and speaking with my client, he has decided to plead guilty to all charges,"

The lawyer would not make any comment after the court session, including why Thordarsson had changed his mind.

Thordarsson posted a long description of his ties to Wikileaks including photos of him with Assange, his dialogue with the FBI and his defense against the fraud charges, on an Icelandic news website in June 2013.

He originally said his own bank account had to be used to take in money for Wikileaks merchandise because a block had been imposed on company credit cards after the release of the cables.

Wikileaks said it believed Thordarsson had talked to the FBI in Denmark.

"He was a volunteer who abused his position through fraud to obtain money from T-shirts and coffee mugs just after we were imposed with the banking blockade," Wikileaks representative Kristinn Hrafnsson, himself Icelandic, said by telephone.

Follow this link:
Icelandic hacker pleads guilty for stealing $240k from WikiLeaks

Der Stuttgarter Friedenspreis 2014 – Edward Snowdens Worte des Dankes! – Deutsch – Video


Der Stuttgarter Friedenspreis 2014 - Edward Snowdens Worte des Dankes! - Deutsch
http://www.Wahrheitsbewegung.TV - Die Dankesrede von Edward Snowden, die am 23. November 2014 per Liveschalte ins Stuttgarter Theaterhaus bertragen wurde. In seiner Rede erinnert Snowden ...

By: Wahrheitsbewegung

Follow this link:
Der Stuttgarter Friedenspreis 2014 - Edward Snowdens Worte des Dankes! - Deutsch - Video

The Question of Edward Snowden by David Bromwich | The New …

Citizenfour

a film directed by Laura Poitras

At some point in the chase that led the documentary filmmaker Laura Poitras from America to Berlin and finally to the hotel room in Hong Kong where she would meet the whistle-blower who identified himself as Citizenfour, her unnamed informant sent this warning: I will likely immediately be implicated. This must not deter you.

What did he offer in return for the risk he hoped she would take? The answer was compelling. He knew things that the American public ought to know. The director of the National Security Agency, General Keith Alexander, had lied to Congress, which I can prove. Alexander denied under oath that the NSA had ever engaged in the mass surveillance of Americans that was then going forward under the codenames PRISM and XKeyscore. Citizenfour could also demonstrate that General James Clapper, the director of national intelligence, came no closer than General Alexander to telling the truth. When asked, under oath, by Senator Ron Wyden of Oregon whether the NSA collects data on millions or hundreds of millions of Americans, Clapper had answered: Not wittingly.

Clappers statement was false in every possible sense of the words not and wittingly. The agency was indeed collecting data, it was doing so in accordance with a plan, and the director had ordered no halt to the mass collection. The extraction of private information about Americans without our consent seems to have troubled Edward Snowden far back in his employment by the NSA. But there were other things that gave him pause: the astonishing license for ad hoc spying, for example, that was granted to those NSA data workers who had been awarded the relevant authoritiesa bureaucratic synonym for permissions. We could watch drone videos [of the private doings of families in Yemen, Afghanistan, and Pakistan] from desktops. This, Snowden has said, was one of those things that really hardened me.

Citizenfour, a documentary about the rise of mass, suspicionless surveillance and about the dissidents who have worked to expose it, naturally centers on Snowden; and most of the film concentrates on eight days in Hong Kong, during which Poitras filmed while the Guardian reporters Glenn Greenwald and Ewen MacAskill introduced themselves, conducted searching interviews and conversations with Snowden, and came to know something of his character. The focus on a single person is consistent with the design of all three of the extraordinary films in the trilogy that Poitras has devoted to the war on terror.

The first, My Country, My Country (2006), covered a short stretch in the life of an Iraqi doctor, Riyadh al-Adhadh, during the American occupation of Baghdad. In the months before the election of January 2005, al-Adhadh was beset by a family in bad straits and by patients whose physical and emotional state had suffered terribly in the war. He resolved at that exigent moment to help his country by standing as a candidate for the assembly. When his Sunni party withdrew from participation, he was left disappointed and uncertain, his commitment invalidated by the very people he hoped to serve.

The Oath (2010) offered a portrait of Abu Jandal, a taxi driver in Yemen, initially famous only by association as the brother-in-law of Osama bin Ladens driver Salim Ahmed Hamdan. It was Hamdan who suffered five years of imprisonment in Guantnamo before being tried on charges of conspiracy and material support of al-Qaeda. A deeply religious man, he was cleared by a military tribunal of the charge of conspiracy and transferred to Yemen, where he secluded himself and maintained an ascetic silence. (On October 16, 2012, the D.C. Circuit Court threw out Hamdans conviction on the remaining count, material support for terrorism, on the ground that it violated the constitutional ban on ex post facto prosecutions: the acts for which he was charged and convicted were not yet crimes when he performed them.)

As if between the lines of the film, it emerges that Abu Jandal himselfcharismatic, masculine, a hero to the intellectual Muslim radicals who seek him out, yet touchingly gentle in the work of raising his five-year-old sonhad been closer to bin Laden than the relative who was sent to Guantnamo. And even that is not the end: the protagonist is not what he seems at second glance any more than at first. He was once a committed jihadist, yet he was also full of doubts and capable of acting on his doubts. The film leaves him, as the earlier film had left the Iraqi doctor, uncertain and in suspense.

In the same way, we are left without a finished story at the end of Citizenfour. Snowden departs Hong Kong for Moscow, under the protection of human rights lawyers, hoping to fly from there to a Latin American country that will offer him refuge (probably Ecuador). But as we now know and the film reminds us, the US State Department revoked his passport and Snowden in Moscow is still in limbo. Though the film, in a kind of denouement, shows him reunited with his American girlfriend, visited by a political ally, Glenn Greenwald, and encouraged to hear that another whistle-blower has cropped up and disclosed the exorbitant scale of the American watch list, it is hard to know where his story will end.

The rest is here:
The Question of Edward Snowden by David Bromwich | The New ...

OSSMETER FP7 Project: Open Source Software Analysis – Alessandra Bagnato (Softeam) – Video


OSSMETER FP7 Project: Open Source Software Analysis - Alessandra Bagnato (Softeam)
Alessandra Bagnato Research Scientist Project Manager, SOFTEAM OSSMETER aims to extend the state-of-the-art in the field of automated analysis and measurement of open-source software ...

By: OpenWorldForum

Follow this link:
OSSMETER FP7 Project: Open Source Software Analysis - Alessandra Bagnato (Softeam) - Video

Global quantum communications: No longer the stuff of fiction?

Neither quantum computers nor quantum cryptography will become prevalent technologies without memory systems able to manipulate quantum information easily and effectively. The Faculty of Physics at the University of Warsaw has recently made inroads into popularizing quantum information technologies by creating an atomic memory with outstanding parameters and an extremely simple construction.

Following years of tests in physics laboratories, the first quantum technologies are slowly emerging into wider applications. One example is quantum cryptography - an encryption method providing an almost full guarantee of secure data transmission, currently being introduced by military forces and banking institutions. Processing quantum information and sending it over long distances has so far been severely limited due to a lack of adequate memories. A solution is now within reach: the Faculty of Physics at the University of Warsaw (FUW), Poland, has created a fully-functioning atomic memory with a simple, reliable construction and numerous potential applications, including in telecommunications.

"The greatest challenge in the construction of our quantum memory was the precise selection of system parameters that would allow it to save, store and read quantum information effectively. We have also found a novel way of reducing noise during detection," says Dr. Wojciech Wasilewski (FUW).

Contemporary fiber-optic communications involve the transmission of classical information using laser light propagated inside optical fiber cables. Attenuation causes the light signal in the optical fiber cable to weaken as the distance it travels increases. When long optical fiber cables are used, laser amplifiers multiplicating photons are placed along them at intervals of approximately 100 km. These turn a weak signal comprising a low number of photons into a strong signal with high numbers of photons.

However, in quantum communications it is the individual photons and their quantum states that are important. Here signal amplification of the signal does not simply mean increasing the number of photons, but rather preserving their original, undisturbed quantum states. Unfortunately, quantum information cannot be duplicated with impunity: performing any measurement of the quantum state of the photon will inevitably affect its original state. The impossibility of quantum cloning, co-discovered by the Polish physicist Prof. Wojciech urek, places fundamental limitations on the operations that can be conducted on quantum information.

In 2001, a team of physicists from the University of Innsbruck and Harvard University proposed the DLCZ quantum transmission protocol, making it possible to send quantum information over long distances. Under this protocol, quantum information reaching each relay point along the channel must be stored there for a sufficiently long time to ensure that attempts at transmitting it to the next node are successful, as confirmed via a normal signal. In such a protocol, therefore, a key role is played by quantum memory in which quantum information needs to be stored for a sufficiently long time.

"Until now, quantum memory required highly sophisticated laboratory equipment and complex techniques chilling the systems to extremely low temperatures approaching absolute zero. The atomic memory device we have been able to create operates at far higher temperatures, in the region of tens of degrees Celsius, which are significantly easier to maintain," notes Radek Chrapkiewicz, doctoral student at the Faculty and co-author of the paper in the journal Optics Express.

The main element of the memory device constructed by the University of Warsaw physicists is a glass chamber 2.5 cm in diameter and 10 cm long, with rubidium-coated sides, filled with a noble gas. When the tube is heated gently, rubidium pairs fill the inside, with the noble gas restricting their movement and thereby reducing noise. When quantum information is stored in such a memory, photons from the laser beam "imprint" quantum states on many rubidium atoms. Other photons are emitted at the same time; their detection confirms that the information has been saved. Information stored in the memory can then be retrieved using another specially selected laser pulse.

To record and retrieve quantum information, the researchers used advanced methods of light filtering (patent pending) and an innovative camera of their own design. This camera, able to detect individual photons, is characterized by extremely low noise levels and a speed tens of times higher than existing cameras.

"The stability of the quantum information stored in our memory lasts from a few microseconds up to tens of microseconds. You'd be forgiven for asking how such short-lived memory could be useful at all, but bear in mind that it depends on the application. In telecommunications, microsecond timescales are sufficient to conduct several attempts at transmitting a quantum signal to the next relay station," stresses Micha Dbrowski, a doctoral student from the Faculty.

See the original post here:
Global quantum communications: No longer the stuff of fiction?

Bluink Adds FIDO U2F Security Key Functionality to Injector with Elliptic Technologies’ Cryptography

Ottawa, ON (PRWEB) November 26, 2014

Bluink Ltd, the leading innovator in smartphone based digital identity management and strong authentication, today achieved FIDO Alliance Universal Second Factor (FIDO U2F) Ready status for its Injector (http://password-injector.com) mobile identity product, allowing Injector users to securely login to U2F supported online services.

Bluink has partnered with Elliptic Technologies to use its portable Ellipsys cryptographic libraries in Injector to provide a robust, trusted and fully compliant FIDO U2F solution. Injector already provides users with unparalleled convenience and security by managing static and one-time passwords while automating logins to machines, applications, networks and online services. Now with FIDO U2F, the same solution will also allow public key authentication to supporting online services, making Injector a truly universal secure authenticator.

FIDO U2F represents a significant step forward in web authentication. With the number of passwords that users need to have nowadays and the increasingly massive data breaches re-sulting from cyber attacks, password-based authentication is becoming a huge risk to individuals and businesses, said Larry Hamid, CTO of Bluink. FIDO authentication eliminates the need for passwords and we want Injector users to benefit as soon as possible.

Elliptic is a big believer in, and early supporter of, the FIDO U2F standards as an effective way to eliminate the risks of weak, overused passwords so commonly exploited in web attacks. Bluinks Injector replaces weak user identities with strong cryptographically authenticated indentities, with unguessable randomly generated passwords as a fallback for legacy services. Elliptic is proud to work with Bluink to bring this product to life, said Ogi Brkic, Elliptic VP of Marketing and Business Development. Injector makes it simple for people to protect their online identities with world class cryptography. Thanks to the ready portability of Ellipsys, Bluink will be able to offer Injector support on all the popular platforms quickly, easily and reliably.

The FIDO U2F capability in Injector will be released on iOS and Android before the end of this year.

About Injector Injector is a smartphone based identity manager and Bluetooth USB dongle that provides strong authentication and logins to almost anything.

About Bluink Bluink is an Engineering and Product Development company focused on security and solutions that leverage the power of mobile devices. From Injector to the award winning Shift-IT scheduling solutions, Bluinks products make peoples lives more secure, efficient and mobile.

About Ellipsys Cryptography Middleware Ellipsys Cryptography Middleware is a CAVP certified cryptographic library that is highly configurable for size or speed optimization. Ellipsys is written in portable C code and also includes platform specific optimizations for ARM, x86, x86_64 and PowerPC. Ellipsys contains a plug-in architecture for easy integration and offload of hardware devices.

About Elliptic Technologies Elliptic Technologies is a leading provider of security solutions for the connected world for chipset vendors, device manufacturers, service and content providers. Elliptics highly integrated solutions enable the most efficient silicon design and highest security levels for some of the worlds most popular products in markets such as mobile, networking, home entertainment, automotive, and the Internet of Things (IoT). Elliptic is leading the world in DRM and link protection solutions with flagship technology tVaultTM for downloading and sharing premium content between multiple devices, including Microsoft PlayReady, DTCP-IP and HDCP SDKs built for trusted execution environments used in consumer electronics.

See the article here:
Bluink Adds FIDO U2F Security Key Functionality to Injector with Elliptic Technologies’ Cryptography