Private matter? Thats rich! Edward Snowden deals Cameron a …

David Cameron has been called out for hypocrisy by NSA whistleblower Edward Snowden after the PM, who has presided over a raft of new surveillance powers, claimed his late-fathers tax affairs are a private matter.

In response, Snowden, who exposed the extent of GCHQ and NSA mass surveillance, tweeted: Oh, now hes interested in privacy.

Leaks suggest Ian Cameron did not pay British taxes on his estate for 30 years.

David Cameron insists he has no shares, no offshore trusts, no offshore funds in the wake of the Panama Leaks, but declined to answer questions about his late fathers business with disgraced law firm Mossack Fonseca.

On Monday evening, campaigners demanded Cameron come clean about his familys assets.

Labour MP Jess Phillips said: If hes not sure then he should find out and rectify it as soon as possible. While tax affairs for ordinary people are a private matter, he is a prime minister who has committed to stamping out tax avoidance.

Whistleblower Snowden also called on other world leaders to take control of their financial assets, tweeting:

With scandals in Russia, China, UK, Iceland, Ukraine, and more, perhaps a new rule: if you're in charge of a country, keep your money in it.

Snowden currently lives in Russia, where he has been granted asylum. He is a critic of the UK governments planned Investigatory Powers Bill, which plans to legalise the mass surveillance of British citizens in the name of national security.

In November 2015 he voiced his opposition to the bill, saying ministers are taking notes on how to defend the indefensible and that the powers would give access to the activity log of your life.

Read the original here:
Private matter? Thats rich! Edward Snowden deals Cameron a ...

Edward Snowden summed up David Cameron’s attitude to the …

Fugitive whistleblower Edward Snowden has perfectly summed up David Cameron's attitude to the Panama Papers revelations.

Yesterday, the Prime Minister wouldn't answer questions over his family's use of tax havens

Mr Cameron's father, Ian, paid no UK duty for 30 years on a firm run from the Bahamas.

When asked if any Cameron cash was hidden in offshore accounts, Downing St replied: Thats a private matter.

But last night, Mr Snowden, who has heavily criticised the UK's push for mass government snooping on emails and browsing histories , pointed out the PM's hypocrisy.

He tweeted, simply: "Oh, now he's interested in privacy."

Mr Cameron's father, who died in 2010, was a director of Blairmore Holdings Inc. The investment fund hired a bishop to allegedly help it avoid paying UK tax .

Furious anti-tax avoidance campaigners and critics last night demanded the PM come clean about his familys riches.

Labour MP Jess Phillips said: If hes not sure then he should find out and rectify it as soon as possible. While tax affairs for ordinary people are a private matter, he is a Prime Minister who has committed to stamping out tax avoidance.

The Live Event you are trying to watch is either unavailable or has not started

Follow this link:
Edward Snowden summed up David Cameron's attitude to the ...

The Radicalisation of Bradley Manning | National Theatre Wales

Today, one day before his 24th birthday, Bradley Manning will start the process that will determine whether he'll celebrate his next 30 birthdays behind bars. I will be watching every minute of this case, because for the past year I have been writing a play entitled The Radicalisation of Bradley Manning for National Theatre Wales.

I have been following Bradley's case since his arrest in May 2010. His story had a heady mix of espionage, geo-politics and cyber-frontierism, but it wasn't until I learned of Bradley's teenage years in Wales that my curiosity turned into obsession. This young soldier who has attempted to call the president of the US as a defence witness knows bus timetables around Haverfordwest. He knows the trials of schoolboy rugby, and speaks rudimentary Welsh. Once I realised this, Bradley became more than a news story.

We had things in common. So reading accounts of his torture in the Quantico Brig haunted me.

While his treatment shocked me, his alleged actions thrilled me. If Bradley is guilty of uploading the information to WikiLeaks then he has courageously reminded us that not only is finance, religion, media, manufacturing and politics transnational, but so is our morality.

At a meeting with NTW to discuss the production of another of my plays, I could not get the young soldier out of my head, and confessed to the theatre that I believed we were doing the wrong play. I had to write about Manning, I told them, and they had to produce it. (It wasn't as finger-snappy as that, of course I did shoe-gaze and apologise a lot.) NTW agreed, and to my eternal gratitude we switched plays.

Read the rest of Tim's Blog on the Guardian website.

Continued here:
The Radicalisation of Bradley Manning | National Theatre Wales

System.Security.Cryptography Namespace

Class Description Aes

Represents the abstract base class from which all implementations of the Advanced Encryption Standard (AES) must inherit.

Provides a Cryptography Next Generation (CNG) implementation of the Advanced Encryption Standard (AES) algorithm.

Performs symmetric encryption and decryption using the Cryptographic Application Programming Interfaces (CAPI) implementation of the Advanced Encryption Standard (AES) algorithm.

Provides a managed implementation of the Advanced Encryption Standard (AES) symmetric algorithm.

Represents Abstract Syntax Notation One (ASN.1)-encoded data.

Represents a collection of AsnEncodedData objects. This class cannot be inherited.

Provides the ability to navigate through an AsnEncodedDataCollection object. This class cannot be inherited.

Represents the abstract base class from which all implementations of asymmetric algorithms must inherit.

Represents the base class from which all asymmetric key exchange deformatters derive.

Represents the base class from which all asymmetric key exchange formatters derive.

Represents the abstract base class from which all implementations of asymmetric signature deformatters derive.

Represents the base class from which all implementations of asymmetric signature formatters derive.

Encapsulates the name of an encryption algorithm.

Encapsulates the name of an encryption algorithm group.

Defines the core functionality for keys that are used with Cryptography Next Generation (CNG) objects.

Specifies a key BLOB format for use with Microsoft Cryptography Next Generation (CNG) objects.

Contains advanced properties for key creation.

Provides a strongly typed collection of Cryptography Next Generation (CNG) properties.

Encapsulates the name of a key storage provider (KSP) for use with Cryptography Next Generation (CNG) objects.

Encapsulates optional configuration parameters for the user interface (UI) that Cryptography Next Generation (CNG) displays when you access a protected key.

Performs a cryptographic transformation of data. This class cannot be inherited.

Accesses the cryptography configuration information.

Contains a type and a collection of values associated with that type.

Contains a set of CryptographicAttributeObject objects.

Provides enumeration functionality for the CryptographicAttributeObjectCollection collection. This class cannot be inherited.

The exception that is thrown when an error occurs during a cryptographic operation.

The exception that is thrown when an unexpected operation occurs during a cryptographic operation.

Defines a stream that links data streams to cryptographic transformations.

Provides additional information about a cryptographic key pair. This class cannot be inherited.

Contains parameters that are passed to the cryptographic service provider (CSP) that performs cryptographic computations. This class cannot be inherited.

Provides the base class for data protectors.

Represents the abstract base class from which all classes that derive byte sequences of a specified length inherit.

Represents the base class for the Data Encryption Standard (DES) algorithm from which all DES implementations must derive.

Defines a wrapper object to access the cryptographic service provider (CSP) version of the Data Encryption Standard (DES) algorithm. This class cannot be inherited.

Provides simple data protection methods.

Represents the abstract base class from which all implementations of the Digital Signature Algorithm (DSA) must inherit.

Provides a Cryptography Next Generation (CNG) implementation of the Digital Signature Algorithm (DSA).

Defines a wrapper object to access the cryptographic service provider (CSP) implementation of the DSA algorithm. This class cannot be inherited.

Verifies a Digital Signature Algorithm (DSA) PKCS#1 v1.5 signature.

Creates a Digital Signature Algorithm (DSA) signature.

Provides an abstract base class that Elliptic Curve Diffie-Hellman (ECDH) algorithm implementations can derive from. This class provides the basic set of operations that all ECDH implementations must support.

Provides a Cryptography Next Generation (CNG) implementation of the Elliptic Curve Diffie-Hellman (ECDH) algorithm. This class is used to perform cryptographic operations.

Specifies an Elliptic Curve Diffie-Hellman (ECDH) public key for use with the ECDiffieHellmanCng class.

Provides an abstract base class from which all ECDiffieHellmanCngPublicKey implementations must inherit.

Provides an abstract base class that encapsulates the Elliptic Curve Digital Signature Algorithm (ECDSA).

Provides a Cryptography Next Generation (CNG) implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA).

Converts a CryptoStream from base 64.

Represents the base class from which all implementations of cryptographic hash algorithms must derive.

Represents the abstract class from which all implementations of Hash-based Message Authentication Code (HMAC) must derive.

Computes a Hash-based Message Authentication Code (HMAC) by using the MD5 hash function.

Computes a Hash-based Message Authentication Code (HMAC) by using the RIPEMD160 hash function.

Computes a Hash-based Message Authentication Code (HMAC) using the SHA1 hash function.

Computes a Hash-based Message Authentication Code (HMAC) by using the SHA256 hash function.

Computes a Hash-based Message Authentication Code (HMAC) using the SHA384 hash function.

Computes a Hash-based Message Authentication Code (HMAC) using the SHA512 hash function.

Represents the abstract class from which all implementations of keyed hash algorithms must derive.

Determines the set of valid key sizes for the symmetric cryptographic algorithms.

Computes a Message Authentication Code (MAC) using TripleDES for the input data CryptoStream.

Provides information for a manifest signature.

Represents a read-only collection of ManifestSignatureInformation objects.

Represents the abstract class from which all mask generator algorithms must derive.

Represents the abstract class from which all implementations of the MD5 hash algorithm inherit.

Provides a CNG (Cryptography Next Generation) implementation of the MD5 (Message Digest 5) 128-bit hashing algorithm.

Computes the MD5 hash value for the input data using the implementation provided by the cryptographic service provider (CSP). This class cannot be inherited.

Represents a cryptographic object identifier. This class cannot be inherited.

Represents a collection of Oid objects. This class cannot be inherited.

Provides the ability to navigate through an OidCollection object. This class cannot be inherited.

Derives a key from a password using an extension of the PBKDF1 algorithm.

Computes masks according to PKCS #1 for use by key exchange algorithms.

Provides methods for encrypting and decrypting data. This class cannot be inherited.

Provides methods for protecting and unprotecting memory. This class cannot be inherited.

Represents the abstract class from which all implementations of cryptographic random number generators derive.

Represents the base class from which all implementations of the RC2 algorithm must derive.

Defines a wrapper object to access the cryptographic service provider (CSP) implementation of the RC2 algorithm. This class cannot be inherited.

Implements password-based key derivation functionality, PBKDF2, by using a pseudo-random number generator based on HMACSHA1.

Represents the base class from which all implementations of the Rijndael symmetric encryption algorithm must inherit.

Accesses the managed version of the Rijndael algorithm. This class cannot be inherited.

Performs a cryptographic transformation of data using the Rijndael algorithm. This class cannot be inherited.

Represents the abstract class from which all implementations of the MD160 hash algorithm inherit.

Computes the RIPEMD160 hash for the input data using the managed library.

Implements a cryptographic Random Number Generator (RNG) using the implementation provided by the cryptographic service provider (CSP). This class cannot be inherited.

Represents the base class from which all implementations of the RSA algorithm inherit.

Provides a Cryptography Next Generation (CNG) implementation of the RSA algorithm.

Performs asymmetric encryption and decryption using the implementation of the RSA algorithm provided by the cryptographic service provider (CSP). This class cannot be inherited.

Specifies the padding mode and parameters to use with RSA encryption or decryption operations.

Decrypts Optimal Asymmetric Encryption Padding (OAEP) key exchange data.

Creates Optimal Asymmetric Encryption Padding (OAEP) key exchange data using RSA.

Decrypts the PKCS #1 key exchange data.

Creates the PKCS#1 key exchange data using RSA.

Verifies an RSA PKCS #1 version 1.5 signature.

Creates an RSA PKCS #1 version 1.5 signature.

Specifies the padding mode and parameters to use with RSA signature creation or verification operations.

Computes the SHA1 hash for the input data.

Provides a Cryptography Next Generation (CNG) implementation of the Secure Hash Algorithm (SHA).

Computes the SHA1 hash value for the input data using the implementation provided by the cryptographic service provider (CSP). This class cannot be inherited.

Computes the SHA1 hash for the input data using the managed library.

Computes the SHA256 hash for the input data.

Provides a Cryptography Next Generation (CNG) implementation of the Secure Hash Algorithm (SHA) for 256-bit hash values.

Defines a wrapper object to access the cryptographic service provider (CSP) implementation of the SHA256 algorithm.

View post:
System.Security.Cryptography Namespace

Cryptography – The New York Times

Latest Articles

A British spy agency is looking for recruits in a group suspicious of government: hackers.

A team of linguists applied statistics-based techniques to translate one of the most stubborn of codes, a German mix of letters and symbols.

A computer scientist discovered that a form of cryptography, believed to have been invented in the 20th century, actually has older roots.

A sculpture at the C.I.A.s headquarters has a secret code in it, and the artist is now offering a bit of help.

A claimed proof for one of the most vexing mathematical problems, P versus NP, set off shock waves online, demonstrating the potential of Web-based collaboration.

Such technical jousting matches are at the heart of the fields of computer security and cryptography.

One of the worlds most prominent cryptographers warned about a hypothetical scenario that could place the security of the global electronic commerce system at risk.

An anonymous computer programmer claims to have hacked the copy protection used in both the HD-DVD and Blu-ray high-definition DVD formats.

The United States Army has for the last month been training detectives of the bomb squad in cryptography to facilitate their work in tracking down the writers of kidnap and threatening letters, it was disclosed yesterday at police headquarters.

A Silicon Valley start-up company on Tuesday plans to unveil a new approach to sending secure electronic messages and protecting data, a simpler alternative to current encryption systems, which use long digital numbers, called public keys. The new company, Voltage Security, which is based here, instead uses another unique identifier as the public key: the message recipient's e-mail address.

LEAD: MOST people even vaguely familiar with computers are aware of two varieties of disks, hard and floppy, on which programs and data are stored. But the lesser-known cartridge disk has lately been gaining popularity with computer users.

Government attempts to control the export of data-scrambling software are an unconstitutional restriction on free speech, a Federal judge said in a ruling made public today. The ruling by Judge Marilyn Hall Patel of Federal District Court in San Francisco is a setback for the Clinton Administration, which has tried to orchestrate a compromise with technology companies that oppose its efforts to control such exports. The Administration seeks to require American companies that develop data-encryption systems to give Government agencies the ability to eavesdrop on data and voice communications.

A serious security flaw has been discovered in Netscape, the most popular software used for computer transactions over the Internet's World Wide Web, threatening to cast a chill over the emerging market for electronic commerce. The flaw, which could enable a knowledgeable criminal to use a computer to break Netscape's security coding system in less than a minute, means that no one using the software can be certain of protecting credit card information, bank account numbers or other types of information that Netscape is supposed to keep private during on-line transactions.

Last month the United States and 32 other countries agreed to create new international controls on the export of data-scrambling hardware and software. Many nations fear that the most advanced scrambling, which makes it impossible for anyone without the key to decode the data, could thwart efforts by intelligence agencies to track terrorists. Though the issue is a product of the information age, battles over secret coding have far older precedents. Below are excerpts from ''The Victorian Internet'' (Walker & Company, 1998), by Tom Standage, in which he writes about what he calls the ''19th-century precursor'' to the Internet: the electric telegraph invented by Samuel Morse and Charles Wheatstone. Cryptography -- tinkering with codes and ciphers -- was a common hobby among Victorian gentlemen. Wheatstone and his friend Charles Babbage, who is best known for his failed attempts to build a mechanical computer, were both keen crackers of codes and ciphers -- Victorian hackers, in effect. ''Deciphering is, in my opinion, one of the most fascinating of arts,'' Babbage wrote in his autobiography, ''and I fear I have wasted upon it more time than it deserves.''

Two of Israel's leading computer scientists say they have found a way to more easily decode and then counterfeit the electronic cash ''smart cards'' that are now widely used in Europe and are being tested in the United States. The researchers have begun circulating the draft of a paper that points out higher security risks than those discovered last month by scientists at Bell Communications Research.

To try to slow the acceptance of the Linux operating system by governments abroad, Microsoft is announcing today that it will allow most governments to study the programming code of its Windows systems. Under the program, governments will also be allowed to plug their security features instead of Microsoft's technology into Windows. More than two dozen countries, including China and Germany, are encouraging agencies to use ''open source'' software -- developed by programmers who distribute the code without charge and donate their labor to debug and modify the software cooperatively. The best-known of the open source projects is GNU Linux, an operating system that Microsoft regards as the leading competitive threat to Windows.

In an important milestone toward making powerful computers that exploit the mind-bending possibilities of calculating with individual atoms, scientists at the I.B.M. Almaden Research Center, in San Jose, Calif., are announcing today that they have performed the most complex such calculation yet: factoring the number 15. The answer itself was no surprise: 3 and 5, the numbers that divide into 15, leaving no remainder. But the exercise that led to that simple result -- the first factoring of a number with an exotic device called a quantum computer -- holds the promise of one day solving problems now considered impossible, and cracking seemingly impenetrable codes.

The technology that will cashier the linguists, mathematicians and hackers who have traditionally devoted themselves to breaking codes comes with a cool name: quantum cryptography. Ordinary cryptographic systems rely on scrambling messages so thoroughly that only a recipient with a code key can unscramble them. Quantum cryptography uses random codes lacking in any pattern that might offer clues to a code breaker. More important, it allows the parties transmitting the code to send it without the fear that it might be intercepted without their knowledge. The result? Unprecedented secrecy and security -- two commodities that are increasingly rare in a world dominated by the free flow of information. For futurists, the development of quantum cryptography is a kind of cosmic victory for personal privacy. Quantum cryptography is more powerful than any computer or eavesdropping equipment that could ever be built. Its impregnability stems from one of the quantum world's weirder but better-known features: that merely observing a quantum system changes it irreversibly. In the realm of quantum mechanics, measuring any system -- coded pulses of light, for example, in a fiber-optic cable that is infiltrated by a spy -- leaves an unalterable trace that immediately betrays the presence of an eavesdropper.

In the obscure world of computer cryptography, there may be no more self-consciously ornery group of coders than the Cypherpunks, an alliance of some of Silicon Valley's best programmers and hardware designers, who preach absolute privacy in the information age. The Cypherpunks, who often communicate among themselves by electronic mail protected with an encryption system popular in the computing underground, feel certain about one thing: The Government should not be creating a national encoding standard, as the Clinton Administration has recently proposed.

A British spy agency is looking for recruits in a group suspicious of government: hackers.

A team of linguists applied statistics-based techniques to translate one of the most stubborn of codes, a German mix of letters and symbols.

A computer scientist discovered that a form of cryptography, believed to have been invented in the 20th century, actually has older roots.

A sculpture at the C.I.A.s headquarters has a secret code in it, and the artist is now offering a bit of help.

A claimed proof for one of the most vexing mathematical problems, P versus NP, set off shock waves online, demonstrating the potential of Web-based collaboration.

Such technical jousting matches are at the heart of the fields of computer security and cryptography.

One of the worlds most prominent cryptographers warned about a hypothetical scenario that could place the security of the global electronic commerce system at risk.

An anonymous computer programmer claims to have hacked the copy protection used in both the HD-DVD and Blu-ray high-definition DVD formats.

The United States Army has for the last month been training detectives of the bomb squad in cryptography to facilitate their work in tracking down the writers of kidnap and threatening letters, it was disclosed yesterday at police headquarters.

A Silicon Valley start-up company on Tuesday plans to unveil a new approach to sending secure electronic messages and protecting data, a simpler alternative to current encryption systems, which use long digital numbers, called public keys. The new company, Voltage Security, which is based here, instead uses another unique identifier as the public key: the message recipient's e-mail address.

LEAD: MOST people even vaguely familiar with computers are aware of two varieties of disks, hard and floppy, on which programs and data are stored. But the lesser-known cartridge disk has lately been gaining popularity with computer users.

Government attempts to control the export of data-scrambling software are an unconstitutional restriction on free speech, a Federal judge said in a ruling made public today. The ruling by Judge Marilyn Hall Patel of Federal District Court in San Francisco is a setback for the Clinton Administration, which has tried to orchestrate a compromise with technology companies that oppose its efforts to control such exports. The Administration seeks to require American companies that develop data-encryption systems to give Government agencies the ability to eavesdrop on data and voice communications.

A serious security flaw has been discovered in Netscape, the most popular software used for computer transactions over the Internet's World Wide Web, threatening to cast a chill over the emerging market for electronic commerce. The flaw, which could enable a knowledgeable criminal to use a computer to break Netscape's security coding system in less than a minute, means that no one using the software can be certain of protecting credit card information, bank account numbers or other types of information that Netscape is supposed to keep private during on-line transactions.

Last month the United States and 32 other countries agreed to create new international controls on the export of data-scrambling hardware and software. Many nations fear that the most advanced scrambling, which makes it impossible for anyone without the key to decode the data, could thwart efforts by intelligence agencies to track terrorists. Though the issue is a product of the information age, battles over secret coding have far older precedents. Below are excerpts from ''The Victorian Internet'' (Walker & Company, 1998), by Tom Standage, in which he writes about what he calls the ''19th-century precursor'' to the Internet: the electric telegraph invented by Samuel Morse and Charles Wheatstone. Cryptography -- tinkering with codes and ciphers -- was a common hobby among Victorian gentlemen. Wheatstone and his friend Charles Babbage, who is best known for his failed attempts to build a mechanical computer, were both keen crackers of codes and ciphers -- Victorian hackers, in effect. ''Deciphering is, in my opinion, one of the most fascinating of arts,'' Babbage wrote in his autobiography, ''and I fear I have wasted upon it more time than it deserves.''

Two of Israel's leading computer scientists say they have found a way to more easily decode and then counterfeit the electronic cash ''smart cards'' that are now widely used in Europe and are being tested in the United States. The researchers have begun circulating the draft of a paper that points out higher security risks than those discovered last month by scientists at Bell Communications Research.

To try to slow the acceptance of the Linux operating system by governments abroad, Microsoft is announcing today that it will allow most governments to study the programming code of its Windows systems. Under the program, governments will also be allowed to plug their security features instead of Microsoft's technology into Windows. More than two dozen countries, including China and Germany, are encouraging agencies to use ''open source'' software -- developed by programmers who distribute the code without charge and donate their labor to debug and modify the software cooperatively. The best-known of the open source projects is GNU Linux, an operating system that Microsoft regards as the leading competitive threat to Windows.

In an important milestone toward making powerful computers that exploit the mind-bending possibilities of calculating with individual atoms, scientists at the I.B.M. Almaden Research Center, in San Jose, Calif., are announcing today that they have performed the most complex such calculation yet: factoring the number 15. The answer itself was no surprise: 3 and 5, the numbers that divide into 15, leaving no remainder. But the exercise that led to that simple result -- the first factoring of a number with an exotic device called a quantum computer -- holds the promise of one day solving problems now considered impossible, and cracking seemingly impenetrable codes.

The technology that will cashier the linguists, mathematicians and hackers who have traditionally devoted themselves to breaking codes comes with a cool name: quantum cryptography. Ordinary cryptographic systems rely on scrambling messages so thoroughly that only a recipient with a code key can unscramble them. Quantum cryptography uses random codes lacking in any pattern that might offer clues to a code breaker. More important, it allows the parties transmitting the code to send it without the fear that it might be intercepted without their knowledge. The result? Unprecedented secrecy and security -- two commodities that are increasingly rare in a world dominated by the free flow of information. For futurists, the development of quantum cryptography is a kind of cosmic victory for personal privacy. Quantum cryptography is more powerful than any computer or eavesdropping equipment that could ever be built. Its impregnability stems from one of the quantum world's weirder but better-known features: that merely observing a quantum system changes it irreversibly. In the realm of quantum mechanics, measuring any system -- coded pulses of light, for example, in a fiber-optic cable that is infiltrated by a spy -- leaves an unalterable trace that immediately betrays the presence of an eavesdropper.

In the obscure world of computer cryptography, there may be no more self-consciously ornery group of coders than the Cypherpunks, an alliance of some of Silicon Valley's best programmers and hardware designers, who preach absolute privacy in the information age. The Cypherpunks, who often communicate among themselves by electronic mail protected with an encryption system popular in the computing underground, feel certain about one thing: The Government should not be creating a national encoding standard, as the Clinton Administration has recently proposed.

Read the original here:
Cryptography - The New York Times

Edward Snowden scorns David Cameron, other leaders on Panama …

Here are the basics of what the Panama Papers leak is all about. Video by Jasper Colt, USA TODAY

Britain's Prime Minister David Cameron speaks during a question and answer session on the forthcoming European Union referendum with staff of PricewaterhouseCoopers in Birmingham, England, on April 5, 2016.(Photo: Christopher Furlong, AFP/Getty Images)

Edward Snowden, the National Security Agency whistle-blower, has been quite vocal on social media about the Panama Papers leak and theinternational fallout from the millions of documents released.

He's commented on global leaders involved withthe documents, mockingBritish Prime Minister David Cameron andIcelandPrime Minister Sigmundur David Gunnlaugsson, who stepped aside amid the fallout.

"If you're in charge of a country, keep your money in it,"Snowden tweeted Tuesday,

Cameronwas dragged into the scandal about offshoretax havens this weekover his late father's connections to an investment fund thatavoided paying tax in theUnited Kingdomby having its directors hold board meetings in Switzerland and the Bahamas rather than in London.

Ian Cameron, a stock brokerwho died in 2010, was named inthe documents stolen from the Panamalaw firmMossack Fonseca.The company set up for Ian Cameron was calledBlairmore.

USA TODAY

'Panama Papers' law firm says it is a hacking 'victim'

Downing Streetinitiallycalled the discovery a "private matter."

On Monday, Snowden tweeted a snarkyresponse after DavidCameron's spokeswoman calledfamily investments private.

Downing Street laterconfirmed the prime minister does not hold any shares in the company. Cameron released another statement, saying,"In terms of my own financial affairs, I own no shares. I have a salary as prime minister and I have some savings, which I get interest from and I have a house, which we used to live in, which we now let out while we are living in Downing Street and that's all I have."

USA TODAY

Panama Papers vs NSA: How big is the latest leak?

Cameron added: "I have no shares, no offshore trusts, no offshore funds, nothing like that. And, so that, I think, is a very clear description." His office added that Cameron, his wife and children do not benefit from any offshore funds.

Former National Security Agency systems analyst Edward Snowden(Photo: Uncredited, AP)

On Tuesday, Snowden tweeted that the "resignation of Iceland's PMmay explain why the U.K. PM is so insistent public has no right to know a PM's 'private'finances."

According to German newspaperSuddeutsche Zeitung, whichfirst shared newsof the Panama Papers, theleak consisted of 11.5 million documents, including 4.8 million emails.

That compares to about1.7 million documents leaked by Snowden, aformerNSA contractor, in 2013 aboutthe agency's surveillance efforts. The NSA release amounted to just15% of the number of documents with the Panama Papers investigation.

USA TODAY

The story behind the massive Panama Papers leak

Snowden noted on Twitter that the Panama Papers represent "the biggest leak in the history of data journalism."

Read or Share this story: http://usat.ly/1MSFnBr

Link:
Edward Snowden scorns David Cameron, other leaders on Panama ...

Edward Snowden calls on British people to rise up and demand …

Edward Snowden has called on the British people to rise up and demand that David Cameron resign.

The fugitive whistleblower urged voters to attend a protest outside Downing Street to force the Prime Minister from office.

In a series of tweets, Mr Snowden , said the next 24 hours "could change Britain."

He suggested the outrage at Mr Cameron's admission that he trousered thousands in profits from his father's offshore fund could spark the same kind of protests that yesterday forced Icelandic PM Sigmundur David Gunnlaugsson to quit.

An estimated 10% of Icelandic voters took to the streets on Tuesday night, furious at the revelation that Mr Gunnlaugsson had hidden millions in an offshore fund.

Mr Snowden tweeted: "It's up to the British people, not us. In Iceland, 10% of all voters were in the streets within 24 hours, and for less."

Responding to people on Twitter saying they "hope Cameron resigns," he said: "With respect, hope is not a strategy."

Watch this video again

The Live Event you are trying to watch is either unavailable or has not started

Read more: David Cameron should 'resign immediately' over offshore revelations

He pointed his 2 million followers towards the Facebook page of a protest planned for midday on Saturday outside Downing Street.

Earlier this week, Mr Snowden took issue with David Cameron 's insistence that his family's tax affairs were a "private matter."

Mr Snowden, who has heavily criticised the UK's push for mass government snooping on emails and browsing histories , pointed out the PM's hypocrisy.

He tweeted, simply: "Oh, now he's interested in privacy."

1 of 10

Read more:
Edward Snowden calls on British people to rise up and demand ...

Cryptography | Define Cryptography at Dictionary.com

Historical Examples

The same with cryptography, which we've both run up against, no doubt, in course of business.

They are much more difficult to decipher than was the cryptography left by the pirate Kidd.

He is the author of a work on cryptography, I believe, though I am ashamed to say I haven't yet read it.

In cryptography it's a number, or letter, thrown in for the sake of appearance, or to confuse.

In this work the different methods of cryptography are classified.

I am not altogether ignorant of cryptography; it was Trevisa's favorite pursuit when we were at college.

If they retained the name of some god or hero of mythology, the only way they dared to write it was by cryptography.

cryptography, krip-togra-fi, n. the art of secret writing: the character or cipher so used.

British Dictionary definitions for cryptography Expand

the science or study of analysing and deciphering codes, ciphers, etc; cryptanalysis

Derived Forms

cryptographer, cryptographist, cryptologist, nouncryptographic (krptrfk), cryptographical, adjectivecryptographically, adverb

Word Origin and History for cryptography Expand

1650s, from French cryptographie or directly from Modern Latin cryptographia, from Greek kryptos "hidden" (see crypt) + -graphy. Related: Cryptograph; cryptographer.

cryptography in Culture Expand

The science of coding and decoding messages so as to keep these messages secure. Coding (see encryption) takes place using a key that ideally is known only by the sender and intended recipient of the message.

cryptography in Technology Expand

Go here to read the rest:
Cryptography | Define Cryptography at Dictionary.com

Secret Language: Cryptography & Secret Codes | Exploratorium

Ron Hipschman

When you were a kid, did you have a "Captain Midnight" decoder ring? With it, you could send messages to a friends that no one else could read. Or perhaps you remember using special symbols to write notes to your "squeeze" in class. If the note was intercepted , your teacher, could learn nothing about your romance.

In more serious uses, codes and ciphers are used by our military and diplomatic forces to keep confidential information from unauthorized eyes. Businesses also send data that has been encoded to try and protect trade secrets and back-room deals. After all, you wouldn't want your competitor to know that you were about to acquire their company with a leveraged buy-out.

The study of enciphering and encoding (on the sending end), and deciphering and decoding (on the receiving end) is called cryptography from the Greek (kryptos), or hidden and (graphia), or writing. If you don't know Greek (and not many of us do) the above letters could be a form of code themselves! Although the distinction is fuzzy, ciphers are different from codes. When you substitute one word for another word or sentence, like using a foreign language dictionary, you are using a code. When you mix up or substitute existing letters, you are using a cipher. (I told you the difference was fuzzy, and you can combine codes and ciphers by substituting one word for another and then mixing up the result.) We'll concentrate on ciphers.

For a cipher to be useful, several things must be known at both the sending and receiving ends.

By way of analogy, to get into your home you would put a key in a lock to open the door. This process (the use of a key and a lock) is the method or algorithm. Now this method only works if you have the proper key to stick in the lock, and your key will be valid only as long as you are the resident of the particular abode. The next resident will have the locks changed to a different key to make sure that you cannot enter even though you may know the method.

The selection of the above three items - algorithm, key and period - depend on your needs. If you are in the battlefield and are receiving current tactical data, you want an algorithm that makes it easy to decipher the message in the heat of battle. On the other hand, you must also assume that your opponent has intercepted your enciphered message and is busy trying to break it. Therefore you must choose an algorithm (method) that is complicated enough so that by the time your opponent figures it out, the data will be worthless. The easier the algorithm you choose, the more often you will have to change the key that unlocks the code - if you want to keep your enemy in the dark.

Ciphers are broken into two main categories; substitution ciphers and transposition ciphers. Substitution ciphers replace letters in the plaintext with other letters or symbols, keeping the order in which the symbols fall the same. Transposition ciphers keep all of the original letters intact, but mix up their order. The resulting text of either enciphering method is called the ciphertext. Of course, you can use both methods, one after the other, to further confuse an unintended receiver as well. To get a feel for these methods, let's take a look at some ciphers.

The Captain Midnight decoder ring (which is an "encoder" ring as well) allows you to do a simple substitution cipher. It usually has two concentric wheels of letters, A through Z. You rotate the outside ring and substitute the letters in your message found on the outside ring with the letters directly below on the inside ring (see diagram). Here, the algorithm is to offset the alphabet and the key is the number of characters to offset it. Julius Caesar used this simple scheme, offsetting by 3 characters (He would have put the "A" on the outer ring of letters over the "D" on the inner ring if he had owned a Captain Midnight decoder ring.) The word "EXPLORATORIUM" thus becomes "HASORUDWRULXP." Such a scheme was easily broken and showed a certain level of naivete on Caesar's part concerning the enemy's intelligence.

Click here to download a copy of the cypher wheels (12k PDF). Copy and cut out the two wheels. Place the smaller wheel on top of the larger wheel and rotate them so your "key letter" on the small wheel is beneath the "A" of the large wheel. Now you can encipher your plaintext and pass it to your friend who knows the proper key letter.

You could make your ciphertext a little tougher to decode if you threw 26 pieces of paper into a hat, each with a letter of the alphabet written on it, drew them out one at a time, and put them side-by-side under a normal alphabet. The result might look like this (I just used the order of the keys on my keyboard, so you might call this a "Qwerty" code):

You can construct a secret message from the above table. Every time you see an "I" you would substitute the "O" beneath and so on for the other characters. The message "Meet me after school behind the gym," would read

Word lengths - especially the short words - give great clues as to the nature of the code (see frequency charts). To help conceal your message, ignore the spaces and break the message up into equal-sized chunks. Five letters are customary in the spy biz, so your message comes out like this (Note that an extra "dummy" character "M" is added at the end to make it come out with a 5-letter group. Your recipient should have no trouble with the extra character.):

Another popular system called a diagrammatic cipher, used by many children in school, substitutes symbols for letters instead of other letters. This system is, in essence, the same as the letter substitution system, but it's easier to remember than 26 randomly picked letters. It uses the tic-tac-toe boards and two X's as shown below.

The same secret message as above, using the line-shapes that surround each letter (and including a dot where needed) becomes:

Even though it looks like undecipherable outer-space alien text, this would take an arm-chair cryptologist only about 10 minutes or less to figure out. Why? Given enough ciphertext, certain patterns become obvious. Notice how often the empty four-sided box appears: six times out of a total of 29 characters or about 20% of the time. This would immediately indicate that the empty box was almost certainly the symbol for "E," the most frequently used letter in English. Other letters can also be determined by their frequency and by their association with other nearby characters (see "Frequencies"). Almost all substitution ciphers are open to this kind of analysis.

Francis Bacon created one of the more interesting substitution ciphers. He used two different type faces slightly differing in weight (boldness). He broke up his ciphertext into 5 character groups, each of which would represent one character in his plaintext. Depending on which characters of the group were bold, one could determine the plaintext character using the following table (* stands for a plain character and B for a bold character)

Our same secret message as above would appear thusly (Bacon's bold and plain characters were less obvious than those below):

To decipher, we just break the characters into groups of 5 and use the key above to find the plaintext message.

Going back way before your school days, to the 5th century B.C., the Spartans used an interesting transposition cipher called a scytale. The scytale utilized a cylinder with a ribbon wrapped helically around it from one end to the other. The message was written across the ribbons, and then unwrapped from the cylinder. Only someone with an identical diameter cylinder could re-wrap and read the message.

The scytale depended on a piece of hardware, the cylinder, which if captured by the enemy, compromised the whole system. Also, the receiver could lose or break the cylinder and therefore lose the ability to decipher any message. It would be better if the method were completely "intellectual" and could be remembered and used without resorting to a physical device.

Since both the sender and receiver of a transposed ciphertext must agree on and remember this algorithm or method for enciphering and deciphering, something easy would be nice. Since geometrical figures are easy to remember, they serve as the basis for a whole class of transposition ciphers. Let's put our message into the shape of a box. Since there are 29 characters, we'll add a dummy ("O") to make 30 and write the message in a six by five box.

We can now transcribe the message by moving down the columns instead of across the rows. Once again we'll break the characters into groups of five to give no clues about word sizes. The result looks like this :

The real variety begins when you realize that you don't have to write your plaintext into the box row by row. Instead, you can follow a pattern that zig-zags horizontally, vertically or diagonally, or one that spirals in or spirals out (clockwise or counterclockwise), or many other variations (see diagram below).

Once you've put the text in the chosen form using one route, you can then encipher it by choosing a different route through the text. You and your partner just have to agree on the reading route, the transcription (enciphering) route, and the starting point to have yourselves a system. These systems are called route transcriptions.

Here's our message again. The reading route spirals counterclockwise inward, starting at the lower right corner (left diagram). The transcription route (right diagram) is zig-zag diagonal starting at the lower left corner. The ciphertext becomes:

To decipher, you fill the in box following the zig-zag route and read the message using the spiral route.

Another type of transposition cipher uses a key word or phrase to mix up the columns. This is called columnar transposition. It works like this: First, think of a secret key word. Ours will be the word SECRET. Next, write it above the columns of letters in the square, and number the letters of the key word as they would fall if we placed them in alphabetical order. (If there are duplicate letters, like the "E", they are numbered from left to right.)

Now write the columns down in the order indicated by the numbers. The resulting ciphertext looking like this:

As you can see, this is just a different arrangement of the previous ciphertext, but at least it isn't in some regular pattern. We could have easily made it a little more difficult by filling the square following a more complicated path. We could also use a geometric shape other than a rectangle and combine substitution and transposition. The only problem that might occur is that the deciphering may become so complicated that it will remain a secret at the receiving end forever! Come to think of it, she never did meet me behind the gym...

Order of frequency of digraphs (two letter combinations): th er on an re he in ed nd ha at en es of or nt ea ti to it st io le is ou ar as de rt ve

Order of frequency of trigraphs: the and tha ent ion tio for nde has nce edt tis oft sth men

Order of frequency of most common doubles: ss ee tt ff 11 mm oo

Order of frequency of initial letters: T O A W B C D S F M R H I Y E G L N P U J K

Order of frequency of final letters: E S T D N R Y F L O G H A R M P U W

One-letter words: a, I, 0.

Most frequent two-letter words: of, to, in, it, is, be, as, at, so, we, he, by, or, on, do, if, me, my, up, an, go, no, us, am...

Most frequent three-letter words: the, and, for, are, but, not, you, all, any, can, had, her, was, one, our, out, day, get, has, him, his, how, man, new, now, old, see, two, way, who, boy, did, its, let, put, say, she, too, use...

Most frequent four-letter words: that, with, have, this, will, your, from, they, know, want, been, good, much, some, time, very, when, come, here, just, like, long, make, many, more, only, over, such, take, than, them, well, were...

Smith, Laurence Dwight. Cryptography, the Science of Secret Writing. New York, NY: Dover Publications Inc., 1943. A good account of codes and ciphers with many historical examples.

Konheim, Alan G. Cryptography: A Primer. New York, NY: John Wiley & Sons, 1981. A highly technical (and mathematical) book on more modern methods of code making and breaking.

Gaines, Helen Fouch. Cryptanalysis: A Study of Ciphers and their Solution. New York, NY: Dover Publications Inc., 1956. The title says it all.

Continued here:
Secret Language: Cryptography & Secret Codes | Exploratorium

LumbridgeCity – Bitcoin & Altcoin Trading and Digital …

Join Our Private Bitcoin Trading Community Sign up for reminders about Registration Week

Registration opens in 27 days, 11 hours, 8 minutes*, that is Sat, 01 May 2016 14:50:00 UTC space is limited, and registration finish quickly so we can get right to the lessons.

Soon we open registration and bring a few more people into our Bitcoin and Altcoin Trading community.

Activities are organized to guide participants through an introduction to lending and trading Altcoins on Poloniex, writing your own personalized trading action plan, all the way through to actually micro-trading your plan and updating your trading journal!

As the lessons progress and you learn different ways to grow your cryptocurrency holdings, the private forum, live chat and community groups will provide the support and encouragement to ensure you apply the lessons you learn, and move your new knowledge about growing your money into practical experience! The community will take you from your first wealth building plan and help you build a life-long habit of growing your money!

Private tutorial videos, altcoin trading case studies, trading risk control rules and how to make a trade plan, bitcoin lending tutorials, price charts and much more. Jump right into where the cryptocurrency markets are today and at the same time, take step by step tutorials on the basics of lending and trading altcoins on Poloniex.

Our eight week, step by step approach is organized help you move through a series of short altcoin trading lessons. You will gain an introduction to eachimportant section of more than 30 private tutorials in our membership area, and quickly gain new skills and strategies for making consistent profits!

Questions? Contact Me Personally!

info@lumbridgecity.com

To Your Success!

Linkbuilder

Home Terms Contact

Read the rest here:
LumbridgeCity - Bitcoin & Altcoin Trading and Digital ...