Tim Berners-Lee has publicly called for programmers to develop better, more user-friendly cryptography. That way, he …

At a time of heightened national security and privacy paranoia, Switzerland holds all the aces. Not only does it have a culture of keeping secrets, but it is also home to a group of physicists who appreciate the universes predilection for privacy.

Tim Berners-Lee, the man widely credited with creating the internet during his time working at Cern, the particle physics facility in suburban Geneva, has publicly called for programmers to develop better, more user-friendly cryptography. That way, hesays, we can all get back to living private lives again.

Interestingly, it is out of Cern that the best hope for the fulfilment of that vision may arise. A gaggle of its particle physicists became so concerned at last years revelations of mass surveillance by the US National Security Agency (NSA) that they decided to do something about it. The result is ProtonMail, an email encryption service that Forbes describes as the only email system the NSA cant access.

That inaccessibility is partly because ProtonMails servers are in Switzerland, where the law prevents government agencies from gaining access to them. It is also partly because the servers wont even contain decryption keys. But mostly its because maths shows that its not hard to conceal information if you know what youre doing.

There are ways to perform reversible mathematical operations on data that will render it indecipherable to prying eyes. As long as you have the key that is, you know exactly what the mathematical operation was you can undo the obfuscation. If you dont have the key, there is no way to winkle out the original data. In many ways, it is astonishing how reluctant we are to take advantage of this. But things do seem to be changing.

ProtonMail was quickly oversubscribed there is a waiting list for accounts even though the system is still in its beta-testing phase. The company has rejected offers of investment from venture capital firms. Instead, it raised more than $500,000 through crowdfunding.

In August, ProtonMail held a hackathon at the Massachusetts Institute of Technology. The idea was to improve security by allowing the experts to look for weaknesses. Now, with that exercise complete, a more secure version will be released. The aim is to make it open-source, so that its code can be checked and strengthened.

The laws of physics actually allow researchers to go much further than maths-based encryption. The technology known as quantum cryptography uses a fundamental rule, one that governs the smallest scales of the natural world, to achieve the ultimate freedom from eavesdropping.

When natures basic particle building blocks interact,in the right circumstances, theycan become entangled. Information encoded on entangled particles is shared between them. In a weird twist of nature, these particles can retain a link even when separated physically. Its almost like a telepathic connection: reading the information on one can affect the other in ways that allow monitoring of any eavesdropping activity.

Physicists have exploited this to create tamper-proof seals for information encoded on photons, the particles that make up light. The technology is not yet perfect, but its good enough that it is starting to be used for financial transactions and various other sensitive communications. The market leader, ID Quantique, was developed at a fundamental physics lab based in you guessed it Switzerland.

Read the rest here:
Tim Berners-Lee has publicly called for programmers to develop better, more user-friendly cryptography. That way, he ...

Volokh Conspiracy: Apple’s dangerous game

Apple has announced that it has designed its new operating system, iOS8, to thwart lawful search warrants. Under Apples old operating system, if an iPhone is protected by a passcode that the government cant bypass, the government has to send the phone to Apple together with a search warrant. Apple will unlock at least some of the contents of the phone pursuant to the warrant. Under the new operating system, however, Apple has devised a way to defeat lawful search warrants. Unlike our competitors, Apples new privacy policy boasts, Apple cannot bypass your passcode and therefore cannot access this data. Warrants will go nowhere, as its not technically feasible for [Apple] to respond to government warrants for the extraction of this data from devices in their possession running iOS 8. Anyone with any iPhone can download the new warrant-thwarting operating system for free, and it comes automatically with the new iPhone 6.

I find Apples new design very troubling. In this post, Ill explain why Im troubled by Apples new approach coded into iOS8. Ill then turn to some important legal issues raised by Apples announcement, and conclude by thinking ahead to what Congress might do in response.

Lets begin with a really important point: In general, cryptography is an awesome thing. Cryptography protects our data from hackers, trespassers, and all sorts of wrongdoers. Thats hugely important. And under Apples old operating system, cryptography protects iPhones from rogue police officers, too. Thanks to the Supreme Courts recent decision in Riley v. California, the Fourth Amendment requires a warrant to search a cell phone. Apples old operating system effectively enforced the warrant requirement technologically by requiring the government to serve a warrant on Apple to decrypt the phone.

Up to that point, I think its all good. But the design of Apples new operating system does something really different.

If I understand how it works, the only time the new design matters is when the government has a search warrant, signed by a judge, based on a finding of probable cause. Under the old operating system, Apple could execute a lawful warrant and give law enforcement the data on the phone. Under the new operating system, that warrant is a nullity. Its just a nice piece of paper with a judges signature. Because Apple demands a warrant to decrypt a phone when it is capable of doing so, the only time Apples inability to do that makes a difference is when the government has a valid warrant. The policy switch doesnt stop hackers, trespassers, or rogue agents. It only stops lawful investigations with lawful warrants.

Apples design change one it is legally authorized to make, to be clear. Apple cant intentionally obstruct justice in a specific case, but it is generally up to Apple to design its operating system as it pleases. So its lawful on Apples part. But heres the question to consider: How is the public interest served by a policy that only thwarts lawful search warrants?

The civil libertarian tradition of American privacy law, enshrined in the Fourth Amendment, has been to see the warrant protection as the Gold Standard of privacy protections. The government cant invade our private spaces without a showing that the invasion is justified by the expectation that the search will recover evidence. And the government must go to a neutral magistrate and make that case before it conducts the search. When the government cant make the showing to a neutral judge, the thinking runs, the public interest in privacy outweighs the public interest in solving crime. But when the government does make that showing, on the other hand, the public interest in solving crime outweighs the privacy interest. Thats the basic balance of the Fourth Amendment, most recently found in the stirring civil libertarian language in Riley just a few months ago.

Apples new policy seems to thumb its nose at that great tradition. It stops the government from being able to access the phone precisely when it has a lawful warrant signed by a judge. Whats the public interest in that?

One counterargument I have heard is that there are other ways the government can access the data at least some of the time. With the warrant required under Riley, agents could take a stab at guessing the passcode. Perhaps the phones owner used one of the popular passwords; according to one study, the top 10 most often-used passcodes will unlock about 15% of phones. Alternatively, if the phones owner has backed up his files using iCloud, Apple will turn over whatever has been backed up pursuant to a lawful warrant.

These possibilities may somewhat limit the impact of Apples new policy. But I dont see how they answer the key question of whats the public interest in thwarting valid warrants. After all, these options also exist under the old operating system when Apple can comply with a warrant to unlock the phone. And while the alternatives may work in some cases, they wont work in other cases. And that brings us back to how its in the public interest to thwart search warrants in those cases when the alternatives wont work. Id be very interested in the answer to that question from defenders of Apples policy. And Id especially like to hear an answer from Apples General Counsel, Bruce Sewell.

Read more:
Volokh Conspiracy: Apple’s dangerous game

Julian Assange on Snowden, disliking Google, and his …

It would be too much to say that WikiLeaks founder Julian Assange feels optimistic. He's been holed up in the Ecuadorean embassy in London for more than two years now, withcameras and police"a 3 million surveillance operation," he calls itjust meters away.

"There's a sense of inevitability now," Assange saidwhen we asked if his situation mightchange.

Assange: "Thesituation is clarifying politically and legally."

Ars: "I just want to be clear on this pointare you saying you're hopeful you'll be free soon?"

Assange: "I wouldn't say hopeful. I would say it's inevitable. It's inevitable that we will win the diplomatic standoff we're in now."

It's getting late in London, where Assange is doing a barrage of press interviews on the eve of his new book, When Google Met Wikileaks(it goes on sale in the US later this week). We called at the agreed upon time, and a man who didn't identify himself answered the number, which was for a Londoncell phone. He saidcall back in five minutes, and onlythen was the phone finally handedto Assange.

We're supposed to focus on thebook.But first, we want to know whatlife trapped in the embassy involveswhere doeshe eat, sleep, do laundry?What isthe roomhe's in now like?

"For security reasons, I can't tell you which sections of the embassy I utilize," he said. "As to the rest, in a way, it's a perfectly normal situation. In another way, it's one of the most abnormal, unusual situationsthat someone can find themselves in."

Assange usheredWikiLeaks through severalmassive leaks of secret US government reports and a tumultuous relationship with some prominent newspapers. first came the disclosure of hundreds of thousands of military reportsonthe Iraq and Afghanistan conflicts, thena leak of more than 250,000 diplomatic cables from the State Department.

Hesought asylum from Ecuador when he was on theverge of being extraditedto Sweden to face sexual-assault charges in that nation. If he leaves the embassy, he'll be arrested, although it isn't clear where he'll be sent first. It'swidely assumed the US has an ongoing investigation intoAssange over the leaks.

See more here:
Julian Assange on Snowden, disliking Google, and his ...

WikiLeaks founder Julian Assange talks about Bitcoin …

1 day ago Sep. 18, 2014 - 3:27 PM PDT

WikiLeaks founder Julian Assange doesnt normally give a lot of interviews from his sanctuary in the Ecuadorian embassy in London but when he is promoting a new book, exceptions can be made. So the Australian freedom-of-information activist did one of Reddits trademark Ask Me Anything interviews on ** about some of the topics he writes about in the book, including Google chairman Eric Schmidt, the future of Bitcoin and the terrorist group ISIS. What follows is a heavily condensed version of that interview.

On the potential of decentralized data protocols like Bitcoin:

Bitcoin is an extremely important innovation, but not in the way most people think. Bitcoins real innovation is a globally verifiable proof publishing at a certain time. The whole system is built on that concept and many other systems can also be built on it. The blockchain nails down history, breaking Orwells dictum of He who controls the present controls the past and he who controls the past controls the future.

On Bitcoins long-term value as a currency:

Heres footnote 185 [from Assange's book]: On the day of the conversation [with Eric Schmidt], Bitcoin had risen above the US dollar and reached price parity with the Euro. By early 2014 it had risen to over $1,000, before falling to $430 as other Bitcoin-derived competing crypto-currencies started to take off. WikiLeaks strategic investments in the currency saw more than 8,000 percent return in three years, seeing us through the extralegal US banking blockade.

On what Google could be doing to fight surveillance culture:

I think it is misguided to be looking to Google to help get us out of this mess. In large part, Google has us in this mess. The companys business model is based on sucking private data out of parts of human community that have never before been subject to monitoring, and turning that into a profit. I do not think it is wise to try to reform something which, from first premises, is beyond reform.

On Assanges personal relationship with Eric Schmidt:

Eric Schmidt is personally likeable in the sense that most billionaires are. You cant get there without making friends. Obamas also likable, but runs an extrajudicial kill list each tuesday and has prosecuted more whistleblowers than all previous presidents combined. The problem with Google, as in the US administration is not the personalities. It is the structure, the business model and social and ideological matrix in which its decision makers are embedded.

Go here to see the original:
WikiLeaks founder Julian Assange talks about Bitcoin ...

013 Bitcoin Conferences SL SecondLife 3D Virtual Worlds Cryptocurrency Game – Video


013 Bitcoin Conferences SL SecondLife 3D Virtual Worlds Cryptocurrency Game
http://www.twitter.com/VanosEnigmA + @SoulTradeGame #FollowBack 😉 http://www.facebook.com/VanosEnigmA http://www.youtube.com/user/EnigmaislandVanos/videos http://www.plus.google.com/+V...

By: VanosEnigmA Enigmaisland

Link:
013 Bitcoin Conferences SL SecondLife 3D Virtual Worlds Cryptocurrency Game - Video

018 Cat-Women in Bitcoin Furry BitcoinDog Cats vs Dogs CryptoCurrency – Video


018 Cat-Women in Bitcoin Furry BitcoinDog Cats vs Dogs CryptoCurrency
http://www.twitter.com/VanosEnigmA + @SoulTradeGame #FollowBack 😉 plus.google.com/+VanosEnigmaisland/about http://www.facebook.com/VanosEnigmA http://www.youtube.com/user/Enigma...

By: VanosEnigmA Enigmaisland

Read more from the original source:
018 Cat-Women in Bitcoin Furry BitcoinDog Cats vs Dogs CryptoCurrency - Video

Wikileaks: ‘Weaponised malware’ hacking software spying on us – Truthloader – Video


Wikileaks: #39;Weaponised malware #39; hacking software spying on us - Truthloader
Wikileaks latest report was published earlier this week telling us of #39;weaponised malware #39; that #39;s been used by governments worldwide to pry in on our passwords, bank details, messages...

By: Truthloader

Read more from the original source:
Wikileaks: 'Weaponised malware' hacking software spying on us - Truthloader - Video