Podemos offers to help WikiLeaks founder Julian Assange

ampliar foto

Podemos representatives with Julian Assange at the embassy of Ecuador.

Podemos, Spains new left-wing party, has offered its political resources to WikiLeaks founder Julian Assange.

Representatives of the grassroots party, which enjoyed surprise success at this years European elections, met Assange last Saturday at the Ecuadorian embassy in London, where he has been living since 2012 to avoid extradition to Sweden and possibly to the United States. The whistle-blowing journalist and former hacker is the target of a criminal investigation over the deliberate release of classified military and diplomatic cables, and could face a US trial for espionage and treason.

Eurodeputy Tania Gonzlez and party spokesman igo Errejn offered Assange support to resolve his serious situation and legal limbo.

Help could involve bringing initiatives to the European Parliament, where Podemos holds five seats

Podemos, which received 1.2 million votes from Spaniards at the May 25 elections on a platform of profound change, believes that Assanges situation is an attack on freedom of information and an attack on minimum legal safeguards.

Its representatives also said that it reveals the fear of governments who are used to working with their backs to the people, and who are afraid that their practices may be publicized.

The kind of specific help that Podemos has in mind could involve bringing initiatives to the European Parliament, where it holds five seats. Several eurodeputies from several parliamentary groups have expressed an interest in Assanges situation.

The half-hour meeting was part of a visit to London during which Podemos members participated in a debate co-hosted by film director Ken Loach, writer Owen Jones and sociologist Cristina Flesher Fominaya.

Read the rest here:
Podemos offers to help WikiLeaks founder Julian Assange

Cryptocurrency Round-Up: Bitcoin plummets, Peercoin Soars and Overstock Donates

Bitcoin's price has continued to fall, while peercoin, namecoin and dogecoin all experience a surge.(IBTimes UK)

The price of bitcoin has has continued to fall in the last 24 hours, bringing the cryptocurrency's total price-drop over the last three days to $30 (18, 23).

There is no clear reason for this decline. Recent positive developments would hint at its price going the other way, with news of possible PayPal integration, a new Digital Currency Council, and Coinbase extending its services internationally.

Bitcoin's market capitalisation has fallen below $6bn for the first time since May.(CoinMarketCap)

Other major cryptocurrencies have fared better, with namecoin and dogecoin both seeing their values climb since yesterday.

Most sensational of all has been peercoin, which saw its price more than double in the last two days. It has now leapt past dogecoin to become the world's third most valuable (mineable) digital currency.

Overstock to donate to cryptocurrency advocates

Online marketplace Overstock, currently the largest retailer to accept bitcoin, has announced that it is to donate 4% of its bitcoin revenue to foundations that advocate cryptocurrency adoption.

Last week the firm revealed that it was extending its acceptance of bitcoin to international customers in an effort to build on the success it had experienced in the US with bitcoin.

Its latest move will initially see the Chamber of Digital Commerce benefit from Overstock's support.

See more here:
Cryptocurrency Round-Up: Bitcoin plummets, Peercoin Soars and Overstock Donates

Why Bitcoin Is Poised To Win Big In Las Vegas

Las Vegas. Tremendous wagers are commonplace in this town, and have been for decades. Big bets on cryptocurrency--those are a bit more unusual.

This explains why a local poker players recent investment into bitcoin ATMs has turned so many heads. The entrepreneur, 29-year-old Chris McAlary, essentially has pushed all-in on the virtual currency, using the entirety of his liquid assets to found Coin Cloud, a nascent company that operates ATMs for bitcoins.

McAlary's believes in bitcoin's future as the currency of choice for gamblers. And there is a confluence of factors that might make Las Vegas the perfect place to push bitcoin into mainstream use--if McAlary and like-minded entrepreneurs prove out its use on the Strip, casinos around the world are poised to make bitcoin its currency of choice.

Theres no question that cryptocurrencies such as bitcoin have the potential to be one of the most important innovations of the 21st century, says McAlary. Las Vegas could be one of the places that really helps drive it all forward.

Specifically, McAlary's company uses ATMs that are Internet-enabled kiosks that allow users to buy or sell bitcoin. The machines that went online this summer are in a particularly prominent spot, steps from the busiest part of the Las Vegas Strip. In the first few weeks, the machine outperformed even McAlarys most liberal estimates. After 45 days, the Vegas machine overtook the a bitcoin ATM in Vancouver as the No. 1 performing bitcoin ATM in the world. McAlary wont say exactly how many transactions the machine has handled so far, but hints that volume is already has surpassed $1 million.

While the cryptocurrency has yet to find a home in the average Americans wallet (so to speak), businesses appear to be getting more serious about it. In early September, Braintree, the online and mobile payments platform owned by PayPal, announced it would integrate bitcoin into its business. Other companies, including Expedia, Overstock.com, and Amazon.com also have announced they will accept bitcoin as a method of payment. (Full disclosure: I run a travel blog for Expedia.)

In Vegas, however, especially on the Strip, bitcoin has even more going for it. First of all, because so many people visit Sin City every year, the market attracts a high volume of people looking to spend money. The Viva Vegas souvenir shop, in which McAlary has placed his first ATM (he calls it the Bitcoin Bodega"), sees more than 100,000 people a day in foot traffic. Las Vegas also draws an international clientele who want to access their money instantaneously, and to gamble without paying transfer fees to centralized banks.

In other words, Vegas is primed for a bitcoin run.

What is bitcoin? The answer is more complicated than you think (and more complicated than we journalists usually report). Unveiled in 2009 (the identity of the creator is up for debate), the cryptocurrency is an online payment system that was introduced as open-source software. Under the protocols of this technology, payments are recorded in a public database, which is known as the blockchain. Because these payments work without a central repository or single administrator (a.k.a., a bank), the U.S. Treasury considers the currency to be decentralized and virtual.

(Also, because the currency is virtual, users must obtain a virtual wallet to help record transactions and securely buy, use, and accept the stuff.)

Continue reading here:
Why Bitcoin Is Poised To Win Big In Las Vegas

Wikileaks outs latest FinFisher ‘government spyware’ that anti-virus can’t spot

John E. Dunn | Sept. 17, 2014

Berates Germany for allowing makers to operate.

Wikileaks has released what it claims are previously unknown fourth-generation versions of the controversial 'government' FinFisher spyware, lambasting the German Government for allowing it to be sold to "some of the most abusive regimes in the world."

In a media announcement fronted with statements from Ecuadorian embassy refugee and editor in chief Julian Assange himself, Wikileaks offered the files for a number of the spyware's components, including Relay 4.3, Proxy 2.1, and Master 2.1, and zips containing 'weaponised' executables for the Windows FinSpy client used to monitor events such as a Skype conversation.

The organisation said its motivation for releasing the files was to "challenge the secrecy and the lack of accountability of the surveillance industry," a reference to the fact that this malware is legally used by a wide variety of governments, including repressive ones.

"FinFisher continues to operate brazenly from Germany selling weaponised surveillance malware to some of the most abusive regimes in the world," wrote Assange.

"The Merkel government pretends to be concerned about privacy, but its actions speak otherwise. Why does the Merkel government continue to protect FinFisher? This full data release will help the technical community build tools to protect people from FinFisher including by tracking down its command and control centers."

Releasing files of malware looks more like a publicity stunt than a major help to the security industry, although it's unlikely that many or even any of them would have detected it. That said, even if they now do, the makers of FinFisher can simply produce a new iteration if they haven't already done so.

Also released by Wikileaks is a bundle of mostly old and known documents, including cheap-looking Videos, dull brochures and support details. However, one eye-catching one is a spreadsheet from April 2014 laid out like a perverse antivirus test where almost every single product fails on almost every single count. For these anti-testers, a failure happens when a program detects FinFisher.

This stands to underline how easy it now is to get past more or less any antivirus program going as long as the malware is new enough or the antivirus older. It is in fairness a tough job for security firms. FinFisher isn't like conventional malware in that it is directed against tiny numbers of people spread across the globe. Spotting malware this rare is a task.

Read the rest here:
Wikileaks outs latest FinFisher 'government spyware' that anti-virus can't spot

From prison, Manning offers punditry on Iraq

The Guardian

The Guardian's portrait of Chelsea Manning.

The simmering debate about the evolving US military strategy in Iraq and Syria has been joined by an unlikely pundit: Army Private Chelsea Manning.

Manning, a former US intelligence analyst convicted last year of leaking classified US information to the anti-secrecy group WikiLeaks, argues in a new piece for the Guardianthat the United States cannot defeat the Islamic State militant group by bombing them, and should focus on containing them instead.

The piece says only that the writer, who joined the Army as a man known as Bradley Manning, was "in Fort Leavenworth," and does not mention her conviction or passing of military secrets. In a separate piece, the Guardian reports Tuesday that "Manning wrote the Guardian article in Fort Leavenworth, Kansas, where she is in military custody".

KEVIN LAMARQUE / Reuters

FACING JUSTICE: Private Chelsea Manning at her sentencing in August 2013. (The Army began providing her gender identity treatment this past July.)

Manning's piece was published as Defense Secretary Chuck Hagel and Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, appeared on Capitol Hill for a hearing on the USstrategy against the Islamic State in Iraq and Syria. Dempsey said that US military advisers could find themselves involved in ground combat missions if needs dictate it.

Conversely, Manning argues in her piece that the Islamic State should be allowed to set up its own region to control. Doing so is a stated goal for the militants, who want to establish a caliphate, a state under the control of strict Islamist law.

"Let Isis succeed in setting up a failed 'state' - in a contained area and over a long enough period of time to prove itself unpopular and unable to govern," Manning argues. "This might begin to discredit the leadership and ideology of Isis for good."

The rest is here:
From prison, Manning offers punditry on Iraq

School dropout codes chat program that foils NSA spying

The National Security Agency has some of the brightest minds working on its sophisticated surveillance programs, including its metadata collection efforts. But a new chat program designed by a middle-school dropoutin his spare time may turn out to be one of the best solutions to thwart those efforts.

Prompted by Edward Snowden's revelations about the government's intrusive surveillance activities, loosely knit citizen militias of technologists and security professionals have cropped up around the world to develop systems to protect us from government agencies out to identify us online and grab our communications.

John Brooks is now among them.

Brooks, who is just 22 and a self-taught coder who dropped out of school at 13, was always concerned about privacy and civil liberties. Four years ago he began work on a program for encrypted instant messaging that uses Tor hidden services for the protected transmission of communications. The program, which he dubbed Ricochet, began as a hobby. But by the time he finished, he had a full-fledged desktop client that was easy to use, offered anonymity and encryption, and even resolved the issue of metadata -- the "to" and "from" headers and IP addresses spy agencies use to identify and track communications -- long before the public was aware that the NSA was routinely collecting metadata in bulk for its spy programs. The only problem Brooks had with the program was that few people were interested in using it. Although he'd made Ricochet's code open source, Brooks never had it formally audited for security and did nothing to promote it, so few people even knew about it.

Then the Snowden leaks happened and metadata made headlines. Brooks realised he already had a solution that resolved a problem everyone else was suddenly scrambling to fix. Though ordinary encrypted email and instant messaging protect the contents of communications, metadata allows authorities to map relationships between communicants and subpoena service providers for subscriber information that can help unmask whistleblowers, journalists's sources and others. It's not just these kind of people whose privacy is harmed by metadata, however; in 2012 it was telltale email metadata that helped unmask former CIA director and war commander General David Petraeusand unravel his affair with Paula Broadwall.

With metadata suddenly in the spotlight, Brooks decided earlier this year to dust off his Ricochet program and tweak it to make it more elegant -- he knew he'd still have a problem, however, getting anyone to adopt it. He wasn't a known name in the security world and there was no reason anyone should trust him or his program.

EnterInvisible.im, a group formed by Australian security journalist Patrick Gray. Last July, Gray announced that he was working with HD Moore, developer of the Metasploit Framework tool used by security researchers to pen-test systems, and with another respected security professional who goes by his hacker handle The Grugq, to craft a secure, open-source encrypted chat program cobbled together from parts of existing anonymity and messaging systems -- such as Prosody, Pidgin and Tor. They wanted a system that was highly secure, user friendly and metadata-free. Gray says his primary motivation was to protect the anonymity of sources who contact journalists.

"At the moment, when sources contact a journalist, they're going to leave a metadata trail, whether it's a phone call record or instant message or email record [regardless of whether or not thecontentof their communication is encrypted]," he says. "And that data is currently accessible to authorities without a warrant."

When Brooks wrote to say he'd already designed a chat program that eliminated metadata, Gray and his group took a look at the code and quickly dropped their plan to develop their own tool, in favor of working with Brooks to develop his.

"He writes incredible code," Gray says, "and really thinks like a hacker, even though he doesn't have a security background."

See original here:
School dropout codes chat program that foils NSA spying

What’s Homomorphic Encryption And Why Did ItWin A MacArthur Genius Grant?

Craig Gentry, a cryptographer working at IBMs Thomas Watson Research Center in the suburbs outside New York City, recently received a phone call that changed his life. His passion, an experimental and mainly theoretical type of encryption called homomorphic encryption, just won a MacArthur Genius Grant.

The complicated encryption method lets users run programs without actually decrypting them. Paul Ducklin, a security researcher working for Sophos, laid out a neat summary of how this works:

Imagine, however, if I could simply take your encrypted search terms, leave them encrypted, search for them directly in the still-encrypted database, and get the same results. If I can perform calulations directly on your encrypted data, yet get the same results that you get from the unencrypted data, we both win enormously from a security and privacy point of view. You don't need to give me any decryption keys at all, so you no longer have to trust me not to lose, steal or sell your data. (You still have to trust me to tell you the truth about any results I work out for you, but that is a completely different issue.) And I no longer need your decryption keys, so I can't lose or abuse your data even if I wanted to.

For security-conscious cloud and SaaS providers, this is a very big deal. Gentry has been working on homomorphic encryption for years, and the first big steps to commercialization came out last year when IBM released an open source software package for developers called HElib. The HE stands for homomorphic encryption.

John Launchbury, a DARPA program manager, told Co.Labs that "Originally cryptography was all about keeping communications private. Then it became standard to use cryptography for securing stored data, in case someone steals your computer. Now with the prevalence of cloud computing, it is becoming clear that we also need to be serious about data confidentiality even while computing with it--in case someone is able to observe the computation as it proceeds."

"Homomorphic encryption," he added, "Is one way to enable this: it is a form of encryption that allows computations to be performed on data without having to decrypt the data. You could store information on a cloud server, have the cloud provider perform some tasks on the data, without the cloud provider ever learning anything about your data. This could have profound implications for improving our privacy. Unfortunately, the performance challenges are so serious that it cannot yet be used in practice."

Writing back in 2009, security expert Bruce Schneier explained that homomorphic encryption is important because it could potentially make security much easier for distributed software systems:

Any computation can be expressed as a Boolean circuit: a series of additions and multiplications. Your computer consists of a zillion Boolean circuits, and you can run programs to do anything on your computer. This algorithm means you can perform arbitrary computations on homomorphically encrypted data. More concretely: if you encrypt data in a fully homomorphic cryptosystem, you can ship that encrypted data to an untrusted person and that person can perform arbitrary computations on that data without being able to decrypt the data itself. Imagine what that would mean for cloud computing, or any outsourcing infrastructure: you no longer have to trust the outsourcer with the data.

Although Schneier went on to be critical about practical applications for homomorphic encryption (which, to be fair, was written years ago), IBM has been taking out patents on the method that hint at eventual commercialization.

Gentry didnt invent homomorphic encryption, but his research is going a long way to making it usable. Over the next five years, Gentry will receive a no-strings-attached grant of $625,000 from the MacArthur Foundation to follow his passions. In a few years, if his work makes its way to the marketplace, it might solve a lot of our current problems with privacy protection and data security.

Read more:
What's Homomorphic Encryption And Why Did ItWin A MacArthur Genius Grant?

Porticor Helps Healthcare Organizations Meet HIPAA Compliance and Protect Private Information …

Porticor's Data Encryption and Key Management Solution Enables Health Organizations to Secure Protected Health Information in the Cloud and Meet Safe Harbor Compliance

CAMPBELL, Calif. Porticor, a leading cloud data security company delivering the only cloud-based key management and data encryptionsolution that infuses trust into the cloud and keeps cloud data confidential, today announced growing customer traction in the healthcare industry due to its innovative solution enabling health organizations to secure cloud-based Protected Health Information (PHI) and helping them meet HIPAA and Safe Harbor compliance.

The Porticor Virtual Private Data (VPD) platform is a cloud key management and encryption solution that delivers the healthcare industry's most secure cloud encryption key management by enabling health organizations to securely maintain control of their own encryption keys. Unlike traditional data encryption solutions, which are complicated and expensive to deploy and manage, Porticor's split-key encryption and homomorphic key management system is offered as the industry's first cloud data protection service of its kind, delivering true confidentiality of data in cloud, virtual and hybrid environments by ensuring encryption keys are never exposed.

"HIPAA requires us to protect data at rest and in motion," said Kathleen Sidenblad, VP of Engineering at Amplify Health, LLC, of San Francisco. "We have found Porticor's cloud data security and performance to be very good. Managing our own data encryption keys is important to us and Porticor lets us do that. We take security very seriously, and other solutions don't allow us to easily control our own keys."

Over the years, a variety of factors have led to an increase in healthcare organizations embracing cloud computing, including the need to do more with less money and the need to leverage data analytics to drive better care and reduce costs. Today many health apps such as EMR/EHRs are now cloud based, giving health workers computing resources available on demand, and allowing for scalable implementations, high availability and faster rollout of services.

"Porticor offers a unique blend of technical, cloud, key management and affordability features," said Christine Sublett, President of Sublett Consulting, a Porticor partner and HIPAA compliance expert assisting healthcare and technology companies with security, privacy and compliance issues. "The price point is reasonable, and their key management technology is superior to anything else we explored. Prior to Porticor we had to manage our own encryption keys, and it was something we didn't do well."

Integrating with major players such as HP, AWS and VMware, Porticor provides the industry's only software-defined, automated solution that uniquely eliminates the need for cumbersome, non-scalable, and expensive hardware security modules for the cloud. Uniquely combining data encryption with patented split-key encryption and homomorphic key management technologies, Porticor protects critical data in public, private and hybrid cloud environments. It provides the strong security needed for healthcare compliance in a convenient, cost-effective, fully cloud-based solution.

"The cloud is no less secure inherently than a traditional data center, and of primary concern from a logical standpoint would be encryption of data in the cloud," said Sublett. "There are two places where I see Porticor out in front of the competition. First, its key management solution is truly elegant. Key management is an ongoing challenge for companies, and Porticor's homomorphic key management solution solves this problem. Porticor's solution also has implications for an organization that wishes to utilize the protections afforded it under Safe Harbor."

"In the event of a security incident that is a suspected breach, and if the healthcare company is utilizing Porticor's API application-level integration for data encryption, there is a reasonable likelihood that, after performing a breach risk assessment, they could make the determination that there is a low probability that the PHI has been compromised and thereby claim safe harbor," Sublett continued. "This means that the onus of reporting a breach is largely ameliorated, with fines and reputation loss avoided."

While other solutions require encryption keys to be manually managed for every disk, distributed storage or database record, or to be owned by a cloud provider, Porticor's homomorphic split-key encryption technology eliminates both complexity and compromises. Porticor restores key ownership to customers while automatically managing customer encryption keys with maximum security. With homomorphic key management, the keys are protected at all times even while they are in use. Porticor protects the entire data layer stack, including virtual disks, distributed storage, databases, and applications. It dynamically encrypts and decrypts virtual data whenever the application needs access, and delivers a key management system that is fully hosted in the cloud, yet offers the confidentiality, security and trust of a system that is hosted inside the datacenter. Within minutes, customers can encrypt their entire data layer with the proven AES 256-bit encryption algorithm.

View post:
Porticor Helps Healthcare Organizations Meet HIPAA Compliance and Protect Private Information ...

Encryption goof fixed in TorrentLocker file-locking malware

The developers of a type of malicious software that encrypts a computers files and demands a ransom have fixed an error security experts said allowed files to be recovered without paying.

The malware, called TorrentLocker, popped up last month, targeting users in Australia, according to iSight Partners, a security consultancy. It now appears to be also geo-targeting victims in the U.K.

TorrentLockers developers ironically made a similar mistake as the creators of another ransomware program, CryptoDefense. Researchers found earlier this year that CryptoDefense left a decryption key on a persons computer, although the error was soon fixed.

Earlier this month, researchers with the consultancy Nixu found that TorrentLocker used the same keystream to encrypt all of a computers files. That was a mistake, as a keystream should never be used more than once, according to a writeup on the SANS Institute blog.

As the encryption was done by combining the keystream with the plaintext file using the XOR operation, we were able to recover the keystream used to encrypt those files by simply applying XOR between the encrypted file and the plaintext file, they wrote.

With the error out in the open, it was only a matter of time before it was fixed.

Richard Hummel, a senior technical analyst with iSight, wrote that a variant of TorrentLocker without that bug has now been found, which shows the extremely high pace of innovation of our collective adversaries.

The latest version also scans profiles in the Thunderbird email client for email addresses and passwords, he wrote. This will almost certainly be used to further the spam campaign for TorrentLocker, he wrote.

TorrentLocker asks for US$500 to unlock the files, payable in bitcoin. Hummel wrote that although the percentage of people who pay is low, a look at the bitcoin address associated with TorrentLocker showed that the attackers are making many bitcoins, he wrote.

Jeremy is the Australia correspondent for IDG News Service, which distributes content to IDG's more than 300 websites and magazines in more than 60 countries. More by Jeremy Kirk

Originally posted here:
Encryption goof fixed in TorrentLocker file-locking malware