How Much Is NSA Spying Costing In Lost Productivity?

NSA spying is costing the U.S. tech industry tens of billions of dollars. And see this and this.

It also undermines trust in U.S. companies, fellow Americans and our government. Given that trust is the foundation for a prosperous economy, this is really bad for our economy.

But there might be another big cost to mass surveillance: loss of worker productivity.

Specifically, top computer and internet experts say that NSA spying breaks the functionality of our computers and of the Internet. It reduces functionality and reduces security by for example creating backdoors that malicious hackers can get through.

Remember, American and British spy agencies have intentionally weakened security for many decades. And its getting worse and worse. For example, they plan to use automated programs to infect millions of computers.

How much time and productivity have we lost in battling viruses let in because of the spies tinkering? How much have we lost because their computer programs conflict with our programs?

Indeed, Microsofts general counsellabels government snooping an advanced persistent threat, a term generally used to describe teams of hackers that coordinate cyberattacks for foreign governments. It is well-known among IT and security professionals that hacking decreases employee productivity. While theyre usually referring to hacking by private parties, the same is likely true for hacking by government agencies, as well.

And the spy agencies are already collecting millions of webcam images from our computers. THATS got to tie up our system resources so we cant get our work done as fast.

Moreover, the Snowden documents show that the American and British spy agencies launched attacks to disrupt the computer networks of hacktivists and others they dont like, and tracked supporters of groups such as Wikileaks.

Given that the spy agencies are spying on everyone, capturing millions of screenshots, intercepting laptop shipments, creating fake versions of popular websites to inject malware on peoples computers, launching offensive cyber-warfare operations against folks they dont like, and that they may view journalism, government criticism or even thinking for ones self as terrorism and tend to re-label dissidents as terrorists its not unreasonable to assume that all of us are being adversely effected to one degree or another by spy agency operations.

More here:
How Much Is NSA Spying Costing In Lost Productivity?

Single database private information retrival fro fully Homomorphic Encryption – Video


Single database private information retrival fro fully Homomorphic Encryption
Publicly accessible databases are an indispensable resource for retrieving up-to-date information. But they also pose a significant risk to the privacy of t...

By: Susmay FOURGREENSOFT

View original post here:
Single database private information retrival fro fully Homomorphic Encryption - Video

Encrypt or decrypt a folder or file – Microsoft Windows Help

Encrypting folders and files is a way to protect them from unwanted access. Encrypting File System (EFS) is a feature of Windows that allows you to store information on your hard disk in an encrypted format. Encryption is the strongest protection that Windows provides to help you keep your information secure.

Right-click the folder or file you want to encrypt, and then click Properties.

Click the General tab, and then click Advanced.

Select the Encrypt contents to secure data check box, and then click OK.

The first time you encrypt a folder or file, you should back up your encryption certificate. If your certificate and key are lost or damaged and you do not have a backup, you won't be able to use the files that you have encrypted.

Right-click the folder or file you want to decrypt, and then click Properties.

Click the General tab, and then click Advanced.

Clear the Encrypt contents to secure data check box, and then click OK.

See the rest here:
Encrypt or decrypt a folder or file - Microsoft Windows Help

Academics Spy Weaknesses in Bitcoin’s Foundations

Game theory suggests the rules governing Bitcoin may need to be updated if the currency is to endure.

One thing cannot be disputed about the person (or persons) responsible for creating Bitcoin: they were skilled in math, and expert at coding. Five years after the Bitcoin software was first released, no major fixes have been needed to the core code, which uses cryptography to generate and transfer virtual money.

Yet signs are emerging of more subtle flaws in the vision of Satoshi Nakamoto (which may or may not be a pseudonym), with analysis suggesting the rules governing how Bitcoin operates as a currency may be far from perfect. Some researchers claim that these rules leave room for cheats to destabilize Bitcoin. Others have concluded that major changes to the currencys rules will be needed as the number of bitcoins in circulation increases.

In the real world, people dont always follow the rulesthey do whats best for them, says Joshua Kroll, a researcher at Princeton. Understanding this is the key to understanding whether and how Bitcoin survivesit tells you whether the system can last for a long time, [and] how robust is it in the face of shocks.

Kroll and others are exploring possible problems using game theory, a way to mathematically calculate how individuals might choose to coperate, compete, or cheat given the options available to them and the strategies of others.

One conclusion drawn by Kroll and his Princeton colleagues Ian Davey and Ed Felten is that those rules will have to be significantly changed if Bitcoin is to last. Their models predict that interest in mining for bitcoins, by downloading and running the Bitcoin software, will drop off as the number in circulation grows toward the cap of 21 million set by Nakamoto. This would be a problem because computers running the mining software also maintain the ledger of transactions, known as the blockchain, that records and guarantees bitcoin transactions (see What Bitcoin Is and Why It Matters).

Miners earn newly minted bitcoins for adding new sections to the blockchain. But the amount awarded for adding a section is periodically halved so that the total number of bitcoins in circulation never exceeds 21 million (the reward last halved in 2012 and is set to do so again in 2016). Transaction fees paid to miners for helping verify transfers are supposed to make up for that loss of income. But fees are currently negligible, and the Princeton analysis predicts that under the existing rules these fees wont become significant enough to make mining worth doing in the absence of freshly minted bitcoins.

The only solution Kroll sees is to rewrite the rules of the currency. It would need some kind of governance structure that agreed to have a kind of tax on transactions or not to limit the number of bitcoins created, he says. We expect both mechanisms to come into play.

That kind of approach is common in established economies, which tame things like insider trading with laws and regulatory agencies and have central banks to shape economies. But many backers of Bitcoin prize the way it currently operates without centralized control, and would likely rebel at any suggestion of changing the rules.

Researchers from Cornell claim to have found another problem with bitcoin mining. At the Financial Cryptography conference this month, they presented work suggesting that so-called selfish miners could exploit the current rules to gain more than a fair reward for their work.

Continue reading here:
Academics Spy Weaknesses in Bitcoin’s Foundations

Occupation to co-operation: P.J. Crowley on Iraq today, special relationship, and WikiLeaks – Video


Occupation to co-operation: P.J. Crowley on Iraq today, special relationship, and WikiLeaks
Watch the full episode here: http://bit.ly/1j5u6Kw Former US Assistant Secretary of State P.J. Crowley joins Going Underground host, Afshin Rattansi, to talk...

By: goingundergroundRT

Original post:
Occupation to co-operation: P.J. Crowley on Iraq today, special relationship, and WikiLeaks - Video