WikiLeaks reveals CIA malware for hacking Linux computers – Digital Journal (press release)

Generally, mainstream malware attacks tend to focus on consumer-oriented operating systems like Windows. It's rare that Linux is specifically targeted which makes this discovery concerning. Linux users may not be as secure as previously thought. The CIA has developed tools for every platform, letting them target all computer users. The hacking tool gives the CIA the power to redirect outbound network traffic from a target computer. It can be routed through a specially-designed gateway that allows operatives to inspect the traffic. It's a sophisticated surveillance tool that grants the CIA the ability to covertly monitor Linux PCs. It also opens the door to the scores of web servers that run on the operating system. The malware is effective but also hindered by several prerequisites needed for a successful attack. Most importantly, the CIA needs to have root access to the target machine before OutlawCountry can be deployed. This means the computer must have been previously compromised before the malware can be used. WikiLeaks said that the installation method is not fully detailed in the leaked software manual. The operator would need to use known lists of Linux exploits and backdoors to gain access to the system and set up a control chain. They could then push OutlawCountry onto the machine, allowing them to monitor its network traffic and begin surveillance of the target. Once the software is installed, the operator can remotely add traffic routing rules to the Linux kernel. These determine the path which Internet traffic takes between the computer and its destination. The new rules injected by OutlawCountry take precedence over the older ones, ensuring the CIA can snoop on any suspect traffic. The presence of the additional routing rules is hidden from the computer's user. The release of the tool is part of a wider WikiLeaks dump known as "Vault 7." The ongoing series of leaks comprises almost 9,000 secure documents sourced from an "isolated, high-security network" at the CIA's Center for Cyber Intelligence in Langley, Virginia. Many of the programs within have been described as "cyberweapons" with the potential to infiltrate individuals, opposition groups or entire states. Last week, WikiLeaks published documents on hacking tools "Elsa" and "Brutal Kangaroo." The former is a tracking tool that logs the movements of a target based on the Wi-Fi signals from their laptop. Brutal Kangaroo is an innovative approach to compromising "air-gapped" offline computers. It uses memory sticks to transfer files from closed networks that aren't connected to the web.

See more here:
WikiLeaks reveals CIA malware for hacking Linux computers - Digital Journal (press release)

Bradley Manning files for presidential pardon – Hot Air

You probably thought that the story of Bradley Manning had come to a close, and for the most part youd be right. But there are still some inevitable legal details to play out, and one of those which everyone saw coming took place this week. Mannings defense team has officially requested a pardon from the President of the United States. (Ed noted that this was going to happen several weeks ago.) The Daily Mail covers the details, using the oh so politically correct trend of referring to Manning as a lady.

Chelsea Manning is seeking a presidential pardon for handing U.S state secrets to the WikiLeaks website because it was done out of a love for my country.

According to documents released today, Mannings lawyer, David Coombs, has sent a Petition for Pardon to President Barack Obama.

The White House said last month that if Manning requested a presidential pardon she would be considered the same as anyone else.

In the petition she wrote that she had started questioning the morality of U.S. actions in Iraq and Afghanistan while reading secret military reports.

She said: When I chose to disclose classified information, I did so out of a love for my country and sense of duty to others.

Manning acknowledged she had broken the law, adding, I regret if my actions hurt anyone or harmed the United States.

Manning signed the petition Bradley Manning, not Chelsea, as her name has not legally been changed.

This was a given, and virtually anyone who finds themselves convicted in a controversial case such as this with a national spotlight will often apply for a pardon. One of the legal experts contacted by the Daily Mail rated Mannings petition as having a zero per cent chance of success. And at least for the time being, that might not be a far fetched analysis. The President has already disappointed and disillusioned his most faithful, far Left allies by being the stingiest President of the modern era when it comes to the power of the pardon. (The Oval Office approves just 2% of applications these days.)

Of course, that may change quite a bit in 2016. Presidents are famous or infamous for granting a flurry of requests during the final months of their terms. Bill Clinton is an excellent example, having granted a total of 150 pardons over his eight years in office, but 140 of those all came on January 20, 2001. Would Obama do something similar? Some may believe that he would fret over his legacy in a case like this, and by the time he leaves office Manning would have only served roughly three years or less than 10% of his sentence. Thats far less time than convicts typically serve before getting a pardon. But who knows? Stranger things have happened.

Continued here:
Bradley Manning files for presidential pardon - Hot Air

Edward Snowden On Chris Christie Sunbathing Pic: ‘The Politics Of An Era In One Frame’ – HuffPost

WASHINGTON National Security Agency whistleblowerEdward Snowdensays aphotographer managed to capture the politics of an era when he snapped a photo of New Jersey Gov.Chris Christie(R) lounging with his family and friends on an otherwise empty stretch of beach.

Rarely does a photographer capture the politics of an era in one frame, Snowden posted Monday on Twitter, along with The Star-Ledgers front page showing Christiekicked back on a state beachthat hed ordered closed to the public amid a state government shutdown.

Snowden also retweeted a post from Steve Politi, the newspapers sports columnist, showing throngs of beachgoers crowded at one end of a long stretch of sandy shore.

On Sunday,NJ Advance Mediapublished several aerial photostaken by Andrew Mills showing Christie, along with family and friends, at New Jerseys Island Beach State Park, the site of an official governors residence.The park was one ofseveral closedover the holiday weekend after lawmakers failed to pass a state budget.

Inan interview with Fox 5in New York on Monday, Christie mocked local media, saying, What a great bit of journalism by The Star-Ledger and I really wonder about journalists who spend money flying planes to look whether people are actually where they said they would be. He said he announced his plans to vacation at the New Jersey residence regardless of whether a shutdown occurred and dismissed the idea that the beach closure was in any way his fault.

In a separate interview Monday withFox 29in Philadelphia, Christie was asked about people who are upset about not being able to enjoy the beach over the holiday weekend.

Im sorry theyre not the governor, he said. This is a residence.

See original here:
Edward Snowden On Chris Christie Sunbathing Pic: 'The Politics Of An Era In One Frame' - HuffPost

Risk’s Laura Poitras on her new Julian Assange documentary, Chelsea Manning and being under surveillance – The Independent

I think hes brilliant, I think you can say hes a visionary in terms of understanding the internet, journalism and mass surveillance, Oscar-winning director Laura Poitras says of WikiLeaks founderJulian Assange, the subject of her new film Risk. It seems an enthusiastic enough endorsement but anyone expecting a hagiography of Assange will be surprised. As Poitrasquickly adds: I think he is a very flawed person in other ways.

At times, the documentary is extremely jarring. You think youre watching a film about whistleblowers, freedom of speech and hacking. Then, in footage of a meeting between Assange and lawyer Helena Kennedy, Assange uses casually sexist language. We see him having his hair cut, looking almost as if he is the Sun King in the Court of Versailles as followers and journalists scurry around him. His egotism becomes increasingly evident.

As Poitras points out, it is not only his attitudes toward women and gender that rankle. I think he can hold views that are incredibly philosophical and complex and then others that are very reductive. Assange is manipulative and (as he puts it himself) ruthlessly pragmatic. Hes a strategist whose alliances will shift depending on who can best help him achieve his long term goals. Personally, I think its public that I have fallen out with him. I mean, we have it in the film where he says the film is a threat to his freedom and he is forced to treat it accordingly.

Assange asked Poitras to take out the scene in which he talks disparagingly about the Swedish women who made allegations of sexual assault against him. She refused. As she argues, she is only using his own words. There is the obvious irony in the fact that Assanges fame and notoriety rest on his willingness to disclose information others would rather see suppressed and yet he wants his own secrets to be protected.

A still from Riskabout WikiLeaksJulian Assange (above), in which his egotism becomes very apparent

Risk is in no way a hatchet job. Its portrayal of Assange is nuanced and complex. On camera, he is philosophical, articulate and charismatic. He is vain too but he is generally very measured. Just occasionally, we see glimpses of his volatility. There were a couple of times when he lost his temper and started yelling at me, Poitras remembers the moments her subject flew off the handle.

Poitras started filming Assange and WikiLeaks in 2011, two years before she was contacted anonymously by Edward Snowden, who leaked her thousands of National Security Agency documents.

At first, Poitras thought that Snowden and Assange might have fitted into the same documentary. Then, she realised there was no way theyd work together they were two separate stories. She set aside the Assange and WikiLeaks material and concentrated on the Snowden project, CitizenFour (2014) which won her an Oscar.

That left her with the problem of what to do with the earlier footage. By then, Assange, who had been frustrated that she hadnt entrusted him with the Snowden material, had already been living for several years inside the Ecuadorian embassy in Knightsbridge. (He took refuge there in the summer of 2012 after he was threatened with deportation to Sweden to answer the allegations of sexual assault.)

An early version of Risk (one broadly sympathetic to Assange) was screened in Cannes in 2016 but the story was continuing to grow. Last year, WikiLeaks published emails from the Democratic National Committee and from former White House Chief of Staff John Podesta.

Poitras,who directed'Risk' about Assange(above), is now working on a Chelsea Manning documentary

Of course, I knew I had to keep filming, the director says of how Risk has kept on growing.

Poitras had long since lost her status as simply an observer, making fly on the wall documentaries. In the last two films, I have become more of a participant, a protagonist, because of the reporting I have done, she says of CitizenFour and Risk. It is very uncomfortable.

Thanks to her reporting on NSA mass surveillance and her famous, clandestine meeting with Snowden in Hong Kong in 2013, she is now a celebrity of sorts herself. She has also been targeted by the US authorities for well over a decade. in 2006, she was placed on a secret watch list by the US government. Underlining her new found fame, she was played on screen by Melissa Leo in Oliver Stones film Snowden (2016). No, she hasnt seen the movie and certainly doesnt sound too enthused by it.

Oliver Stone approached me when he was developing the project and I was still editing CitzienFour. He was trying to urge me to delay the release of my film because he was making a real movie, she says. He had been drinking. It wasnt a nice encounterand then they didnt invite me to any of the screenings - and I wasnt going to pay to see it.

The director insists that her films are always looking at the human factor as well as at the political dimension. CitizenFour may have caused a huge media furore but on one level it was a story about why a young person would risk his freedom to reveal information about mass surveillance. Risk isa character study as much as it is a political treatise. It can also be read as a film about everyday sexism. Assange isnt the only one whose behaviour toward women is called into question. It emerges that another charismatic figure in the story, journalist and hacker Jacob Appelbaum, has been accused of bullying and sexual harassment.

Thats one of the things I hope the film raises, what happens within organisations or movements or work environments when certain types of behaviour is tolerated over long periods of time, Poitras says. I think its something we see a lot of, right, baseline sexism I would call it and that I wanted to draw attention to. Weve heard stories about social movements in the past where we have contradictions between the larger philosophical and ideological goals and the internal politics, dynamics and power structures.

Poitras is currently executive-producing a new film about Chelsea Manning, the transgender US soldier formerly known as Bradley Manning who leaked documents to WikiLeaks. Chelsea is a hero and she risked her freedom to inform the public very much in the way that Edward Snowden did, Poitras suggests. The film will allow her for the first time to speak in her own voice."

She is also executive-producing a film about Peter Thiel, the billionaire who brought down celebrity blog Gawker in a case that many saw as an attack on the free press.

These days, Poitras is back in the US and based in New York, having lived for over two years in Berlin. She doesnt know how long she will be able to stay, though.

I know I am on a watchlist. With the Snowden material, I dont think they are ever going to stop paying attention. Its something you learn to live with, she says of the surveillance she is still subject to. I came back [to the US]largely because of the work that I do. As a documentary filmmaker, Ive been focusing on what the US is doing politically and globally. I think it is something important as a US citizen to document what my own country is engaged in. For now, it is OK for me to be here but the situation could change. The Trump Administration is no friend of the press and I might feel it is necessary to leave again.

On this slightly chilling note, with the thought that she may be forced to quit her homeland, the interview is brought to an end.

'Risk' is out now

Read the original:
Risk's Laura Poitras on her new Julian Assange documentary, Chelsea Manning and being under surveillance - The Independent

Lindsay Mills Wiki: Everything You Need to Know about Edward Snowden’s Girlfriend – Earn The Necklace

No matter how much time has passed, Edward Snowden will always be a person of interest. While he has taken asylum in Russia, what about his girlfriend? Is Edward Snowdens girlfriend living with him in Russia? Lets find out.

Who doesnt know Edward Snowden? Call him a hero or a traitor; the man has to live like a fugitive on the run. He has taken asylum in Russia, but we do see him live a normal life. He pops up on his girlfriend Lindsay Mills Instagram now and then doing regular couple stuff together. Their relationship looks just as amazing as in the movie Snowden if not better. Are they together in Snowdens Russian asylum? Heres everything to know about Snowdens girlfriend in our Lindsay Mills wiki.

Both Mills and Snowden are from Maryland. She graduated from Laurel High School in Maryland in 2003 and the Maryland Institute College of Art in 2007. Shes a photographer, and her Instagram has several of her artistic self-portraits. Many of her self-portraits often have a deep meaning with political and social interpretations. One of her photographs Flecks has her posing in the dress she wore to the Oscars when Citizenfour won the best documentary feature.

Aside from being a photographer, shes also a pole dancer and acrobat. When she and Snowden were in Hawaii, she picked up pole-dancing. She posted a video of her dancing at the Honolulu Fringe Festival and was also part of a local acrobatic troupe. She travels all over the world to perform while continuing to photograph more self-portraits.

Snowden had moved to Hawaii with his girlfriend before he came forward to the press. Though they were living together, Mills had no idea about his whistleblowing plans. In the Oscar-winning documentary, Citizenfour, Snowden said he intentionally kept his plans a secret so he could protect her and their family.

Hours after Snowden came out to the press, Mills hinted she was blindsided by his move on her earlier blog, Adventures of a world-traveling, pole-dancing superhero. Since she did not commit any crime, she ran no risk staying in the US and was free to travel. She was portrayed as a woman abandoned in the media which he later said in an interview was unfair to her. Contrary to what was believed, Mills and Snowden are very much together and still going strong.

A couple of years ago, Snowden disappeared from the Internet scaring everyone that he had died. But Glenn Greenwald, his journalist friend and Snowden himself laid those death rumors to rest. As for an explanation for his disappearance, Mills revealed where he was during that time.

As it turns out, they were on vacation together. Mills tweeted a photo of herself and Snowden on vacation and wrote on her blog, with the end of summer drawing near. the sun setting minutes earlier each day. and cooler currents whipping in. a vacay was in order. successfully hijacked this guy (sorry Twitterverse for causing such a scare.)

After the former government contractor created the biggest scandal to hit the U.S. government by disclosing classified documents, he had to leave the U.S. He has been living in asylum in Russia, at an undisclosed location. But is he alone? Mills Instagram and blog are filled with pictures of the couple together, which reveals she is with him.

While Snowden is confined to Russia for an indefinite time, he perhaps has Mills to accompany him. Shortly after he left the U.S., she followed him to spend a majority of her time in Russia. She has no travel restrictions and can go anywhere she likes as a regular U.S. citizen. However, she has not moved in permanently to Russia because of Visa restrictions. But, when she does, she makes sure to update the Internet on her boyfriend.

View original post here:
Lindsay Mills Wiki: Everything You Need to Know about Edward Snowden's Girlfriend - Earn The Necklace

You need to encrypt all your data. This is how it’s done – TNW

The increasing amount of data were all generating is everywhere: in smartphones, laptops, thumb drives, and dozens of online services. How can we secure all of them against unwarranted access?

We virtually cant.

Smartphones get stolen, thumb drives get lost, email passwords get brute-forced, cloud servers get breached, unwary users get phished, WiFi networks get tapped, and eventually, malicious users obtain access to your data.

So how do you protect your data against unwelcome parties?

You encrypt it. In case you dont know it, encryption is the science of modifying data to prevent intruders from making sense of it. When you encrypt your data, only you and anyone else holding the decryption keys will be able to unlock and read it. This means that even if an attacker gains access to your data by breaking into a server or stealing your hard drive, they wont be able to make sense of it if they dont have the keys.

As Ive argued before, encryption is your last line of defense, the one thing that can protect your data when all else goes wrong.

So without further ado, heres are some of the key ways you can encrypt the data that youre scattering everywhere.

Email has become a de facto medium for exchanges of all sorts. We use email to send business secrets, financial data, personal data and various kinds of sensitive information. There are few things that are as damaging as a hacked email account.

You should obviously do everything you can to protect your email accounts, such as choosing strong passwords or enabling two-factor authentication. But in case your account does get breached, you have a few viable options to encrypt your messages and prevent hackers from actually seeing the contents of your messages.

One is the use of Pretty Good Privacy (PGP), a tool that adds a layer of encryption to your emails. Basically, PGP generates a public and private encryption key and ties it to your email address. You publish the public key for everyone to see and keep the private key to yourself.

Anyone who wants to send you a confidential message will encrypt it with your public key before sending it to you. Only your private key will be able to decrypt the message, and as long as you keep it safe, you can rest assured that only you will be able to read those messages. This means that even the owner of the server where your emails are stored wont be able to read them.

There are a handful of free PGP tools such as Mailvelope, which work with all major webmail clients such as Gmail and Hotmail, and will get you started with encryption in a couple of easy steps.

Of course, if you want your outgoing messages to be encrypted as well, the recipient needs to have a PGP key too, so youll have to convince your friends to set up PGP accounts.

An alternative to PGP is using an end-to-end encrypted mail service such as ProtonMail or LavaBit. End-to-end encryption makes sure that anything that gets stored in your account is only viewable by you, the person who holds the key. No surveillance or massive databreach will give access to the content of your emails.

The same threats that can out your emails apply to the files you store in cloud services such as Google Drive and Dropbox. Even the biggest services you entrust with your files can get hacked, and the sensitive files youve stored in the cloud can fall into the wrong hands.

The most basic choice is to protect your files with a compression tool that supports encryption and password protection features, like zip, before storing them in your cloud server.

In case you find it too cumbersome to manually encrypt and decrypt your files, you can use tools such as Boxcryptor or Whisply, which integrate with most popular cloud services and add an easy-to-use layer of encryption.

Another alternative is to use an encrypted storage service such as SpiderOak One, Tresorit or Cryptobox, which have end-to-end encryption incorporated into their service. This means only you and whomever you share your files with will have access to the contents.

Messaging apps are perhaps the most popular applications we use on our phones. But theyre not all equally secure. Some applications will encrypt your messages in transition, but not in storage, which means your data can become exposed in case of data breaches or compromised accounts.

The most secure messaging apps are those that have end-to-end encryption features, making messages exclusively visible to the parties taking part in a conversation. Weve discussed how to evaluate messaging apps in terms of security here on The Next Web before.

Some of the viable options include Open Whisper Systems Signal, WhatsApp and Wickr, which are end-to-end encrypted by default. Telegram and Facebook Messenger also have end-to-end encryption, though youll have to enable them manually.

You might also want check out this interesting project by two Canadian students, who are working to add strong encryption to a variety of web communication tools.

While you consider the security of your online data, you shouldnt forget about the devices you physically own. Your phone, laptop, memory cards and flash drives hold quite a lot of sensitive information.

Your smartphone in particular is very vulnerable. It has a lot of functionality, it holds your communication apps and sensitive information and pictures, among others. And you carry it everywhere with you, which means theres a greater chance you might lose it or get it stolen from you.

Fortunately, most desktop and mobile operating systems support full-disk encryption, a feature that will encrypt everything on your phone, computer or flash drive. By enabling full-disk encryption, youll protect your on-device data against physical theft. Good encryption cant be circumvented, even by device manufacturers or government agenciesat least not without spending a huge bunch of money.

Credit: Juan Buis / TNW

In iOS version 8 and later, device encryption is turned on by default if your device has a passcode. Newer Android devices also come with device encryption enabled out of the box, but with the variety of devices available out there, you might want to verify to make sure yours is encrypted.

For your laptops and removable media, depending on which operating system you have, there are always good encryption tools available. Windows has BitLocker, which can easily encrypt your hard drives or removable storage in a few easy clicks. The Mac OS has a native encryption tool as well, called FileVault.

Hackers have many ways to steal your information on the fly, especially if youre using a public WiFi network. In fact, your internet service provider too might be interested in having a look at your internet traffic.

Adding a layer of encryption to your internet traffic will make sure you enjoy full privacy while surfing the web. One of your viable options is to use a Virtual Private Network (VPN). VPN services encrypt all your traffic and redirect them through their own servers. All eavesdroppers will be able to see is a bunch on encrypted data being exchanged between you and your VPN service.

VPN services are available for both mobile devices and desktop computers.

To be fair, VPN is not a perfect solution. Your VPN provider will have full visibility over your non-HTTPS traffic. Free VPN services in particular have a tendency to use customer data for commercial purposes. But its much safer than letting hackers scrutinize your traffic.

Encryption is not a complete security solution and it doesnt obviate the need for basic security measures such as keeping your operating system and software up to date with the latest security patches. And dont forget that encryption is only as secure as you make it, which means you have to keep your keys secure.

But encryption is definitely one of your best friends in the hostile world of digital information, connected devices and online services. Encrypt your data, and stay safe out there.

Read next: 8 reasons why Berlin will outpace London as Europes Silicon Valley

Originally posted here:
You need to encrypt all your data. This is how it's done - TNW

Why India Urgently Needs A Strong Encryption Law – Huffington Post India

The world has seen an exponential growth in internet usage. Today the internet is accessed not just through browsers, but also through mobile applications and internet-enabled smart devices which collect data. The data collected is then stored on servers which may either be in India, or abroad, locally or on the cloud, and may or may not be encrypted. In most cases, users remain unaware if such data is encrypted or not. For the uninitiated, "encryption" refers to the process of using an algorithm to transform information into a secret code, thereby ensuring it remains unreadable to unauthorised users.

The storage of data on servers has not been immune to cyber security breaches. In India, several incidents of servers being compromised have been reported in the past few months alone. For instance, it was reported in May this year that a popular restaurant search and discovery service had its servers compromised resulting in the personal data of 17 million users being stolen. It was also reported that an international fast-food chain's mobile application in India allegedly exposed personal information of its 2.2 million users. India's newspapers have also carried reports in relation to personal details contained in the Aadhaar cards of citizens being stolen.

Although encryption has been widely debated in the Indian context, India currently does not have a dedicated legislation on encryption technology. Section 84A of the Information Technology Act, 2000 (IT Act) provides that the "Central Government may, forsecure use of the electronic medium and for promotion of e-governance and e-commerce, prescribe the modes or methods of encryption." The Information Technology (Certifying Authorities) Rules, 2000 (IT Rules) sets out the standards of encryption for digital signatures. India's central bank, the Reserve Bank of India (RBI), has mandated a minimum standard of SSL (Secure Sockets Layer) of 128 bits encryption. These minimum standards need to be used for conducting all digital financial transactions, securing passwords and connection between computer servers and browsers. In 2015, the central government had published a draft National Policy on Encryption. However, this was withdrawn shortly thereafter due to criticism from users, advocacy groups and the information technology sector.

Though there is a provision for a regulatory framework in India in relation to encryption technologies, there are no minimum standards for encryption across technologies and platforms. While there is no guarantee that a device or a server which uses the highest standard of encryption is impenetrable to a cyber attack, the risk of personal information becoming public is reduced considerably. There is an urgent need for the government of India to provide for a comprehensive policy framework if it wants to promote its "Digital India" initiative. A galloping India cannot afford to remain behind in terms of adopting the globally established best practices in encryption. In the interim, and until such time as regulatory policies are formulated, each company needs to individually ensure that it has strong encryption protocols in place to protect itself, its employees and its users from cyber security breaches.

Rafael Nadal's 10 French Open Titles

View original post here:
Why India Urgently Needs A Strong Encryption Law - Huffington Post India

Risk review serviceable portrait of Julian Assange’s vanity | Film … – The Guardian

Unembarrassable Julian Assange in Risk. Photograph: Praxis Films

No one has gone from hero to zero quite as quickly or as embarrassingly as Julian Assange, and by embarrassingly I mean for those of us who once rather admired him. The man himself is unembarrassable.

It seems clear that Laura Poitrass film was originally designed in form and content for hero, like her Snowden documentary, and the movie tries to wriggle away from Assange a bit. (I should say that I have not seen the earlier cut, which was reportedly more sympathetic; the re-edit itself arguably an admission of error should perhaps have been far more radical and self-questioning, or perhaps this documentary should have been dumped entirely in favour of a new one about Chelsea Manning.) At any rate, its a serviceable portrait of vanity.

The founder of the whistle-blowing website WikiLeaks, once feted for challenging official secrecy and arrogance, is now absurd in his creepy conceit, paranoia and celebrity hauteur, holed up in Londons Ecuadorian embassy to avoid a rape allegation in Sweden. Hes keeping in shape with boxercise, doing interviews with Lady Gaga and waffling interminable double-talk in a conspiratorial murmur. His relationship with Pamela Anderson isnt touched on, and neither is his apparent sympathy for Marine Le Pen. Is he just another liberal who shuffled to the right or alt-right in middle age? Or is he someone for whom a clinical diagnosis is in order, addicted to the thrill of seeming to manipulate global, digital forces?

Poitrass film begins as the rape allegations have been made public, with Assange staying with his entourage in a Norfolk country house. Amal Clooney is glimpsed at his side on the courtroom steps but invisible thereafter, and Assange takes cover on Ecuadorian soil within sight of Harrods department store in west London. He says the whole rape allegation is a scam to extradite him to the US; but why wasnt he extradited from Britain? Arent we supposed to be Americas poodle? Its an obvious question Poitras never asks.

We do see Helena Kennedy QC trying to get him to play the game, say hes innocent but that women are naturally entitled to bring rape allegations if they wish but Assange airily sticks to his conspiracy theory, to Kennedys obvious mortification and dismay.

During the US election, he became hated for releasing emails that embarrassed Hillary Clinton. Of course if he had released documents that undermined Donald Trump that might well have restored his heroic reputation. But the question never arose. It suited Julians hackers and backers to damage Hillary. And still there is no end in sight. Perhaps Assange will die of old age in his tiny embassy cell convinced of his martyrdom to the last.

See original here:
Risk review serviceable portrait of Julian Assange's vanity | Film ... - The Guardian

A golden crypto currency you can invest in for as little as $45 – Sun … – The National

Ibrahim Mohammed is the founder and chief executive and OneGram, a new digital currency, at the company's offices in Emirates Financial Towers in the DIFC area of Dubai. OneGram is partnering with GoldGuard, a Dubai-based online gold trading platform to build one of worlds largest gold vaults inside the Dubai Airport Free Zone. Christopher Pike / The National

As the founder and chief executive of OneGram the Dubai-based technology company behind the first digital currency completely backed by gold - Ibrahim Mohammed is confident his cryptocurrency will be a success, even as competition in the digital currency sphere hots up.

He says with 100s of new coins releasing every day, it is OneGrams unique selling point - the fact that the currency is fully Sharia-compliant - that will set it apart.

The company has already launched an Initial Coin Offering (ICO) offering, which aims to raise more than US$500 million in capital; the tokens were launched on May 21 and will be available to buy until September 22.

OneGram has partnered with GoldGuard, a Dubai-based online gold trading platform, for the offering, with each token backed by one gram of gold, held in a vault at Dubai Airport Free Zone. Only 12.5 million tokens are available to buy in total.

The OneGram currency was created using blockchain technology, a digital method of recording data that underpins the digital currency bitcoin.

While one bitcoin today is currently worth about US$2,500 (or $2,438 at the time of writing), to buy a OneGramCoin would set you back $45 at current market prices.

Almost six weeks after the OneGram coin first went on sale, Mr Mohammed, a British Dubai resident with 10 years of experience running companies whose specialisms have included debt collection and business formation, explains how the new digital currency works and how investors can get on board:

Why did you set up OneGram?

Because of the ruling that happened in November 2016 from the Accounting and Auditing Organisation for Islamic Financial Institutions (AAOIFI) with regards to the gold standard. It was the first time gold was deemed to be a sharia-compliant product and it got us thinking. It evolved into digitisation ofgold but then having bigger returns rather than just waiting for the market to go up - so we combined it with a digital currency.

How does OneGram work?

Its like bitcoin; its a digital currency but the major difference to any other crypto is that its backed with physical gold. Putting it very simply, if you have one bitcoin today thats worth about US$2,500 and if it crashes and went to zero youd lose all your money. With OneGram, if you buy today you pay about $45; $41 of that is in physical gold but $4 is in the coin, so if OneGram crashed you would potentially lose $4 and still have $41. Essentially its a digital token - a digital form of payment.

So how can you use this form of payment?

Globally, these kinds of tokens are mainly used in the crypto community by people that believe in [the concept] and are willing to hold it. What we are trying to develop over the next 12 months or so is a payment solution that retailers can adopt to accept payment. At this stage (until the OneGram coin is listed in September), its like holding stocks or shares. The demand is there and the prices are increasing; if you follow the crypto market at all it was worth $20 billion in 2016 and this year its worth $100bn as we speak. Most of that jump has happened in the last five months.

What is driving that?

People see the potential in it. Most governments now are talking about how to regulate the market and control it and bring it into mainstream. The growth is phenomenal. I dont think investors are risk takers because the model of crypto currencies has been proven. Japan has legalised bitcoin; its inevitable that others will follow suit.

How does OneGram work?

Register at GoldGuard.com and where you go to buy you will see the live spot price of gold and it will be a live spot buy. Underneath it you will see the coin value of $4 - thats 10 per cent of the actual transaction and thats the coin fee. You will see a total price of $45; its approximate on the site as its linked to the Allocated BullionExchange's live gold fee. You can transfer funds or buy through bitcoin but we wont accept bitcoin directly as we dont know the source of funds, so we use a company called BitPay in the United States. They do all the verifications, as they are regulated by the US government and they will accept the bitcoin and wire us US dollars.

Is the $4 a fee then?

Its a kind of administration fee because typically in crypto currencies you are paying the whole amount - so if we didnt have gold youd be paying $45 and wed have all money. But we only take 10 per cent which covers operations, staffing, support, marketing, development, blockchain etc. With typical cryptos, if they are selling at $45 they may pay 30 to 40 per cent commission on transactions and theyll sell out in a day or two. Weve adopted a real business model as opposed to a "lets loot type of crypto." So there is a 10 per cent mark up on the price to give our investors the best possible chance of higher returns and that 10 per cent will cover our costs to operate.

What happens when you list?

Then you will have your own wallet and you will hold it on your own iPad, phone or desktop. The coin will be listed on a few digital currency platforms, so any buying or selling happens through those platforms and it goes into the secondary market. In terms of where the price can be at launch and where it can be in 24 months is completely beyond our control. Some analysts have said OneGram is the closest coin that has ever come to knocking bitcoin off its pedestal.

Who are your investors?

As well as crypto tech investors, were getting people that have never invested in cryptoor digital currencies before but because of the gold aspect and the sharia regulatory aspect they are very comfortable. We get customers buying for $100 and in the same day someone will buy $200,000. There is massive interest from Africa and Pakistan, countries we never expected. We now have 4,000 to 5,000 registered users and the majority are non-Muslims;another surprise.

What happens if you dont sell all the 12.5 million coins?

Anything that is left will be burnt wiped away. If we dont sell all of them then it's likely the price will go up as there will be less in circulation. We left the first month open for anyone to buy. Now we have our affiliates, partners that will also sell the coin. The first affiliate is $100m, there are a couple more after that. We are not in any doubt that the coin will sell out.

How many have you sold so far?

Twenty-two per cent of the ICO has already been assigned thats about 2 million coins.

Once the coin is listed what happens to OneGram?

Our ongoing role is to maintain the blockchain and security of it so that the coins can trade. And we make 1 per cent of every trade, the typical fee within blockchain.

Who are you licensed by?

Cyptos are not licensed but the part that needs licensing is GoldGuard, which is a gold trading platform. That is licensed by Dubai Airport Free Zone so we are licensed to trade gold.

Can investors see the gold?

Our vaulting partner may have security issues with that but once we have our own vaulting systems we will be open to anyone that wants to inspect. For verification that the gold exists, our auditors PwC have to physically go and count the gold along with our sharia advisers so I think the investors can rest assured that the gold exists. We buy through ABX and within three days they physically store it for us.

How could it all go wrong?

Its very difficult to go wrong because the exposure is very limited its 90 per cent in gold, 10 per cent in the coin. The demand is there and the market is there so unless someone turns the internet off

Whats next?

Were in discussions about ATM machines. You could have an ATM machine in Dubai, Hong Kong or London where OneGram can be bought and sold across the globe.

ahaine@thenational.ae

Read the rest here:
A golden crypto currency you can invest in for as little as $45 - Sun ... - The National

Ethereum Price Drops Below $300 Amid Technical Issues and … – The Merkle

Things are not looking all that great for Ethereum right now. The popular cryptocurrency suffereda major crash not too long ago and it remains the market is still recovering. The past two days have heralded another downturn for Ether, making it highly doubtful Ethereum will pass Bitcoin in market cap anytime soon. It seems safe to say more volatility is on the horizon for Ethereum holders.

Looking over the Ethereum price charts leaves traders and investors disappointed, as their hopes for challenging Bitcoins crown subside. More specifically, the ETH price has taken another beating, as it declined by 7.65% over the past 24 hours. This puts the value of one Ether well below the US$300 mark and it is possible this value will keep heading toward US$270 or lower over the coming days. This momentum is not entirely surprising given Ethereums bullish trend throughout the first half of 2017.

It is not hard to forget once ETH was worth under US$11 back in early January of this year. Things have certainly picked up over the past few months, culminating in an Ether price peak of nearly US$400, according to Coinmarketcap. Such a spectacular price increase can only be met with future price volatility, which is what we are seeing on a daily basis right now. Even so, the Ether value increase has been nothing short of impressivethis year.

Ethereum enthusiasts have referred to a phenomenon known as the flippening all year. This trend would occur once Ethereums market cap surpasses that of Bitcoin. Although both currencies were only separated by just US$8bn, the gap has widened once again. More specifically, Bitcoins market cap is close to US$41bn right now, whereas Ethereums is only US$26.32bn. The flippening will not be happening anytime soon at this rate.

The bigger question is why Ethereum is facing such a setback right now. Shifting market conditions are likely the culprit. Moreover, the Ethereum blockchain and its technology are weighed down by the influx of cryptocurrency ICOs. Transactions are confirmed far slower when a big ICO happens, and smart contracts used by these projects often contain issues which need to be fixed later on. The technology is still premature, yet investors also see this can become a much bigger problem if things arent resolved quickly.

Speaking of cryptocurrency ICOs, they have quickly become the main use case of the Ether currency. That is not necessarily a positive development either. With so many projects raising funds in Ether, the chances of a market dump will increase as well. When teams need funding, they will convert ETH to fiat currency, creating negative pressure across the exchanges. When more projects sell off their raised funds, the price per ETH will undoubtedly continue to go down quite quickly. It is unclear if that is part of the ongoing price drop right now, but it is something to keep in mind.

It is unclear what the future will hold for Ethereum right now. The Ethereum price is very volatile, which is only to be expected at this point. However, Ethereum is not a store-of-value by any means. With so many dumb money flowing into Ethereum to participate in cryptocurrency ICOs, it is virtually impossible to determine the real value of the existing coin supply. Technical issues are becoming a major problem as well. If this trend keeps up, the flippening may never happen at all. These are interesting times for Ethereum to prove its value, but so far, the projectleaves quite a bit to be desired.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

View post:
Ethereum Price Drops Below $300 Amid Technical Issues and ... - The Merkle