YOcoin A new open-source cryptocurrency distributed by you!

Cryptocurrencyis conquering the world of currencies and finance in a way wecould not even imaginefive years ago

In this next video, Wences Casares, the founder and CEO of Xapo, a Swiss-based Bitcoin wallet and vault company takes us through a short but compelling history of money. In less than 15 minutes you will hear what is so special and monumental about Bitcoin and real cryptocurrency like YOcoin.

Take notes on the videos belowthey couldhave a big impact on your financial future!

Once you have your wallet set up, you will want toregister in anexchange.New exchange video coming soon!

Click for more details!

Check it out

Click here for two new videos, one with an English narration and one with Chinese, on how to get your account set up on DABTC!

Check it out

The blockchains uses span far beyond cryptocurrency. Check out these articles on some of the ways it is taking off in China.

Check it out Article 1

Check it out Article 2

Check it out Article 3

Please watch the following video for the latest updates!

How-to video that you wont want to miss

Check it out

Thanks Keith and Rob for all your hard work! Download YOC PP here:

FOR PC

FOR MAC

A new, simpler Yocoin wallet with an updated video!

Check it out

Digital bank WB21 announced that it has added Bitcoin as a method for its customers to transfer and deposit funds to their checking accounts.

Check it out

The Bitcoin is skyrocketing but at the expense of gold.

Check it out

The Bitcoins market capitalization surpassed the $9 billion mark.

Check it out

(more)

We want to hear from you! Send us a message in the contact box below.

Follow this link:
YOcoin A new open-source cryptocurrency distributed by you!

Florida Man Goes From Multilevel Marketing To Cryptocurrency – What Could Possibly Go Wrong? – Forbes


Forbes
Florida Man Goes From Multilevel Marketing To Cryptocurrency - What Could Possibly Go Wrong?
Forbes
About Cryptocurrencies. The best known and most used cryptocurrency is bitcoin. A website that tracks the cryptocurrency market indicates that the value of the over 700 currencies that it tracks is just shy of $27 billion. Of that over $18 billion is ...

More here:
Florida Man Goes From Multilevel Marketing To Cryptocurrency - What Could Possibly Go Wrong? - Forbes

Cambridge Centre for Alternative Finance Publishes First Global Cryptocurrency Study – Crowdfund Insider

The Cambridge Centre for Alternative Finance (CCAF) has published its first study on digital currencies, its usage and the emerging ecosystem supporting the new type of currency. As the report explains, the world of money and finance is transforming before our eyes.

The Global Cryptocurrency Benchmarking Study is CCAFs inaugural research focused on alternative payment systems and digital assets. Led by Dr. Garrick Hileman, the research is designed to holistically examine the global cryptocurrency market and, according to CCAF, is the first of its kind. Michel Rauchs, a Research Assistant at CCAF, co-authored the report.

Dr. Hileman told Crowdfund Insider;

The data we collected indicate that the number of people actively using cryptocurrency is much greater than many people previously thought. Many observers felt that fewer than a million individuals actively use cryptocurrency, but our data suggest that today there are likely well over a million active individuals using cryptocurrency.

The Global Cryptocurrency Benchmarking Study gathered data from more than 100 cryptocurrency companies in 38 countries around the world via secure web-based questionnaires. CCAF said they captured an estimated 75% of the cryptocurrency industry. Over 30 individual cryptocurrency miners were also surveyed. Four key areas were targeted including exchanges, wallets, mining, and payments.

Highlights of the CCAF research include:

Dr. Hileman said that digital currencies like Bitcoin are not a passing fad. The combined market value was estimated at $27 billion. Hileman compared it to the value creation of a high-profile startup like AirBnB.

While Bitcoin may be the first and best-known cryptocurrency to emerge there are now hundreds of different types of digital coinage. Bitcoin does remain the dominant cryptocurrency both in terms of market capitalisation and usage but it has conceded market share to other cryptocurrencies declining from 86% to 72% in the past two years. This was buttressed by the fact that almost 40% of wallets accept various forms of cryptocurrencies.

Emerging cryptocurrencies include; Ethereum, Dash, Monero, Ripple and Litecoin.

This benchmarking study sheds light on the burgeoning cryptocurrency industry and comprehensively examines the global development of exchanges, wallets, payments and mining sectors, added Robert Wardrop, co-founder and a Director of CCAF. It demonstrates that cryptocurrencies such as bitcoin are undergoing some profound changes in how digital assets are transacted, stored, channeled and generated. The findings of this study will serve to advance useful academic and policy research into cryptocurrencies and its many implications.

A forthcoming report will focus on Blockchain or distributed ledger technology (DLT) will also be released in the next few weeks.

. Bookmark the

.

See original here:
Cambridge Centre for Alternative Finance Publishes First Global Cryptocurrency Study - Crowdfund Insider

Top 6 Major Cryptocurrencies and the Differences Between Them … – The Merkle

As most cryptocurrency enthusiasts are well aware of, there are different groups of currencies to take into account. The major cryptocurrencies are all offering something seemingly different, whereas the rest are mostly copy-and-paste clones. However, there are some big differences between the major cryptocurrencies, otherwise there would be very little point in distinguishing between them.

One of the main thing that Dash does well is providing its users with additional privacy when completing transactions. The network of Dash Masternodes provides these services, while also incentivizing users to not spend their wallet balance. Additionally, Dash is making quite an impact in the point-of-sale industry, through strategic partnerships. All things considered, Dash provides a valuable service to people looking for those specific traits.

When it comes to finding anonymous cryptocurrencies, one has to look well beyond bitcoin and others. Monero is leading the charge in the anonymity race due to some innovative concepts. Monero has also been embraced by darknet markets because it provides privacy and anonymity one cannot find in bitcoin. Other use cases for Monero are somewhat limited, though.

Although many have quite contrasting opinions regarding Ripple, one cannot ignore the benefits it brings to the table. Unlike other cryptocurrencies, Ripple is not about speculation, but strongly focuses on transactional utility. Dozens of banks around the world are looking at Ripple to improve their transactions and other day-to-day operations moving forward. Over the past few days, Ripples XRP token saw its price increase significantly due to a new banking partnership.

Over the past year or so, many people have compared Ethereum to bitcoin. That is like comparing apples and oranges, since both ecosystems are nothing alike. Ethereum focuses on the technical side of blockchain development, including native tokens, smart contracts, and decentralized applications. It is possible all of these features will come to bitcoin in the future, but it is good to have some competition among cryptocurrency ecosystems.

To a lot of people, litecoin is either a bitcoin cloneor one of the first original outcomes to gain traction. Litecoin offers a different mining algorithm and faster transactions. Interestingly enough, there are some development similarities between bitcoin and litecoin. Segregated Witness, for example, may very well activate on the litecoin network first before it will go into effect among bitcoin users. Litecoin is accepted as a payment solution in various places, although it is nowhere near bitcoins level of acceptance.

It is impossible to deny the success bitcoin has had. Even though bitcoin has some problems that need addressing, such as scalability and privacy, it has become the worlds leading cryptocurrency with relative ease. Bitcoin is designed to make global transactions possible and boost financial inclusion. Moreover, thousand of merchants all over the world have started accepting bitcoin payments, both in the online and offline world.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

Read this article:
Top 6 Major Cryptocurrencies and the Differences Between Them ... - The Merkle

Ukrainian Bitcoin Exchange Kuna Partners Dedicated … – Finance Magnates

TaaS, a tokenized closed end fund dedicated to blockchain assets, has partnered with two cryptocurrency exchanges, Livecoin and Ukraines Kuna, to offer its tokens for trading. Userswill be able to trade the tokens after the conclusion of TaaS Initial Coin Offering (ICO), which will run untilApril 27, 2017.

The London Summit 2017 is coming, get involved!

So far, the TaaS ICO has raised more than BTC 2,873 ($3.3 million) from 1539 investors with twenty days left to go.

TaaS Co-founder and President Ruslan Gavrilyuk said: TaaS is proud to partner with Livecoin and Kuna, helping early adopters capitalize on the surging blockchain and cryptocurrency spaces. With the TaaS token tradable on the Livecoin and Kuna exchanges, more investors can gain easy, fully transparent and convenient access to the vast cryptocurrency market.

Livecoin CEO Svetlana Geller said: The partnership with TaaS will aid us in our mission to provide a modern and easy-to-use service for accessing cryptocurrency exchange markets. Our agreement with TaaS will prove mutually beneficial in allowing both companies to bring even more people into the burgeoning space of digital currency investments.

Kuna Founder Michael Chobanian added: Kuna is delighted to add TaaS, an innovator in blockchain technology investment, to the Kuna cryptocurrency exchange. We believe Kunas customers will greatly appreciate the opportunity to take advantage of TaaS groundbreaking offering and that the partnership will help to grow and strengthen Kunas platform.

Go here to read the rest:
Ukrainian Bitcoin Exchange Kuna Partners Dedicated ... - Finance Magnates

Contact – wikileaks.org

2. Act normal

If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. In particular, you should try to stick to your normal routine and behaviour.

If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.

In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media (USB sticks, memory cards and SSD drives) retain data even after a secure erasure. If you used flash media to store sensitive data, it is important to destroy the media.

If you do this and are a high-risk source you should make sure there are no traces of the clean-up, since such traces themselves may draw suspicion.

If a legal action is brought against you as a result of your submission, there are organisations that may help you. The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. You can find more details at https://www.couragefound.org.

Continue reading here:
Contact - wikileaks.org

WikiLeaks shows CIA hijacked Russian mafia malware – TRUNEWS

On Friday WikiLeaks released part 4 of their Vault 7 series detailing Russian mafia malware believed to have been weaponized by the CIA

(WASHINGTON, DC) WikiLeaks has released the fourth part of their Vault 7 CIA series.

The package set free to the world today is pointedly named Grasshopper, and details alleged CIA hacking techniques involving malicious software WikiLeaks claims was taken from suspected Russian organized crime.

The latest release consists of 27 documents WikiLeaks claims come from the CIAs Grasshopper framework, a platform for building malware for use on Microsoft Windows operating systems.

In a statementfrom WikiLeaks, Grasshopper was described as providing the CIA with the ability to build a customized implant which will behave differently, depending on the security capabilities of a computer.

According to WikiLeaks, Grasshopper performs a pre-installation survey of the target device, assuring that the payload will only [be] installed if the target has the right configuration."

This allows CIA operators to detect if a target device is running a specific version of Microsoft Windows or if an antivirus is running, according to the statement.

Grasshopper allows tools to be installed and run on a machine without detection using PSP avoidance, allowing it to avoid Personal Security Products such as 'MS Security Essentials', 'Rising', 'Symantec Endpoint' or 'Kaspersky IS'.

One of the so-called persistence mechanisms, which allows malware to avoid detection and remain on a computer system indefinitely, is known as Stolen Goods.

In the WikiLeaks release, it is creditedto Umbrage, a group within the CIAs Remote Development Branch (RDB) which was linked in the Year Zero release to collecting stolen malware and using it to hide its own hacking fingerprints.

The components of the Stolen Goods mechanism were taken from a malware known as Carperb, a suspected Russian organized crime rootkit," alleges WikiLeaks.

Stolen Goods targets the boot sequence of a Windows machine, loading a driver onto the system that allows it to continue executing code when the boot process is finished.

WikiLeaks confirmed that the CIA did not merely copy and paste the suspected Russian malware but appropriated "[the] persistence method, and parts of the installer, which were then modified to suit the CIAs purposes.

The latest release came with an emblem containing a grasshopper and the words: Look before you leap, a possible reference to how the latest leaked tools would allow the CIA to prepare a machine for future hacking, without raising suspicion.

The rootkits can be installed and used as a 'man on the inside' who can allow more malicious software through undetected in future, if the CIA felt it necessary. If suspicions were raised on initial installation, they would know not to proceed with a more extensive operation.

Also detailed in the release are Buffalo and Bamboo, modules that hide malware inside DLLs, a collection of shared libraries, on a Windows system.

The two modules operate in slightly different ways: Buffalo runs immediately on installation whereas Bamboo requires a reboot to function properly.

The goal of todays release is to help users seeking to defend their systems against any existing compromised security systems, Wikileaks stated.

Also detailed in the release is ScheduledTask, a component of Grasshopper that allows it to utilize Windows Task Scheduler to schedule executables.

The component would allow the executables to automatically run at startup or logon, before killing it at the end of its duration. Included in ScheduledTask are commands that allow the executables names and description to be hidden.

The release is the fourth in a series called Vault 7 which WikiLeaks claims contains documents taken from within the CIA. Releases so far include Zero Days which detailed the CIAs hacking of Samsung smart TVs and Marble, which allowed the CIA to disguise their hacks and attribute them to someone else, including Russia.

RT copy, TRUNEWS contribution

Donate Today!

We believe Christians need and deserve their own global news network to keep the worldwide Church informed, and to offer Christians a positive alternative to the anti-Christian bigotry of the mainstream news media

Originally posted here:
WikiLeaks shows CIA hijacked Russian mafia malware - TRUNEWS

CIA operations may be disrupted by new Wikileaks’ data release – BBC – BBC News


BBC News
CIA operations may be disrupted by new Wikileaks' data release - BBC
BBC News
Current spying campaigns run by the CIA could be disrupted, say experts, after more data on the agency's hacking techniques was released by Wikileaks.
WikiLeaks exposes more alleged CIA cyber tools -- FCWFCW.com
Wikileaks' Most "Technically Damaging" Leak Reveals CIA Source ...Fossbytes

all 7 news articles »

Read more:
CIA operations may be disrupted by new Wikileaks' data release - BBC - BBC News

New York Times reporter talks WikiLeaks, national security at UNM – UNM Daily Lobo

New York Times national security reporter Scott Shane visited UNM to give insight from his illustrious career as a journalist.

In his career Shane has covered the Russian hacking during the 2016 election, the recent Vault 7 CIA leak and other incidents, and also served as Moscow correspondent for the Baltimore Sun. He is the author of Objective Troy: A Terrorist, A President, and the Rise of the Drone, which describes Anwar al-Awlakis participation in al-Qaida and his death by a drone strike ordered by former President Barack Obama.

A reporter for 37 years, Shane spoke at UNMs National Security Studies Programs eighth annual symposium on Monday. He then gave a presentation about Anwar al-Awlaki at the SUB and later, gave a Q&A on WikiLeaks on Tuesday.

He began the Q&A by taking the audience back to 2010, when the New York Times was given over 25,000 diplomatic cables to sort through and report on after they were leaked by Chelsea Manning.

Although federal agencies asked the Times to return the documents, the stories were still published, with harmful information such as full names removed as needed.

Shane used this introduction to paint WikiLeaks as an organization with a gyrating philosophy between rebellion and operating as a true news organization.

For decades, one document was released at a time to news organizations, revealing some sort of wrongdoing on a micro scale, Shane said. Eventually, WikiLeaks established the model of the mega leak. Shane emphasized the impact of technology that allows individuals to save information electronically, rather than relying on only a photocopier or the like.

The Q&A went on to discuss questions ranging from the relationship between the press and the current presidential administration, incorrect information found in other news outlets, the security of the Times information and other topics.

Communications and Journalism adviser Dr. Richard Schaefer, who met Shane last year, said he felt the WikiLeaks Q&A went well and that Shanes entire visit to UNM was beneficial to faculty and students.

"(Shanes) work is a really good form of journalism thats ethical, Schaefer said, calling him a great storyteller who is able to research, interpret and report on a series of documents accurately and in an engaging way.

Schaefer said he wouldnt be surprised if Shane returns to UNM and hopes to see more inspiring guest speakers provided by the New Mexico News Port and Investigative Reporters and Editors.

Because it appears to have become easier to share confidential and classified information, it is likely that this sharing will continue to happen, Shane said during an interview with the Daily Lobo.

Its going to be a permanent feature of journalism and present a lot of challenges that I dont think have been fully grappled with, he said, such as prizing secrecy and immediately feeling the information should be published.

In a thoughtless way, we kind of become tools for whoever gives us those documents, and that makes us vulnerable to political manipulation of all kinds, Shane said.

Shane did not pursue journalism during college, and said he feels younger generations may be better able to gauge how they will follow a career in the world of journalism, especially when considering technological advances.

I consider myself a curious person, he said. Things strike me, and I wonder about them, or people strike me, and Id like to learn more about them. The great thing about being a journalist is it gives you the excuse to do that. Its a license that society gives you to look into things, and its a great privilege to have.

With that in mind, Shane gave his best wishes to aspiring journalists.

I didnt think a guy like him could actually come to UNM, said Maya Holt, a senior C&J major.

Holt said she attended the event as part of one of her courses, and although the Q&A helped her solidify the information she already knew about WikiLeaks, it also moved her a bit too.

Its people like him that make me proud to be a journalism major because of the things he does, Holt said, calling his in-depth investigations admirable (and) what I want to imagine a journalist to be.

Holt said she hopes more guest speakers will visit campus to inspire more students.

Elizabeth Sanchez is a reporter for the Daily Lobo. She can be reached at news@dailylobo.com or on Twitter @Beth_A_Sanchez.

See the original post here:
New York Times reporter talks WikiLeaks, national security at UNM - UNM Daily Lobo

Hoekstra: Assange should face punishment – Online Athens

The United States may soon have the opportunity to request the extradition of WikiLeaks leader Julian Assange to its shores, which would allow criminal proceedings against him to finally begin.

Given his focused mission to cause momentous damage to the United States by disclosing secret and highly classified information, prosecution would be totally justified.

Lets put this in context.

I am a strong supporter of exposing government corruption and wrongdoing. I also believe whistleblowers are the appropriate mechanism of last resort for accomplishing that goal.

But theres a process whistleblowers must follow. It may not be perfect, but it allows abuses to be identified without compromising national security interests.

Whistleblowers in the intelligence community, including those working in the Defense Intelligence Agency, National Security Agency and the Central Intelligence Agency, have such paths outlined in a precise manner.

The process allows for the exposure of corruption while protecting classified information and ensuring that whistleblowers do not face retaliation. This is a balanced approach that protects all parties.

Those who operate outside of the process Chelsea Manning, Edward Snowden, the recent leakers at the CIA and those who leaked the information on former National Security Adviser Mike Flynn are criminals. They broke the law and blatantly ignored the avenues established for whistleblowers.

Manning was accordingly charged and convicted. Snowden, still hiding abroad, should be tried and convicted. The more recent leakers must be, too.

These leakers all assumed roles well beyond their job descriptions. They perceived themselves as singularly possessing the authority and the judgment to determine right and wrong and, in turn, jeopardized the security of the country not to mention their colleagues.

Assange is no different. While he may not have actually physically stolen information, Assange has claimed possession of stolen materials and published them for the world to see. His public comments and actions clearly outline his motives and desire to fundamentally damage the West, the United States in particular.

There will be thousands of pages of legal debate written about Assange. The back-and-forth will focus on whether his actions constitute a new type of newsgathering and are thereby sheltered free speech.

Theyre clearly not, though, and he ought to be tried and found guilty.

Moving forward, Congress must strengthen whistleblower protections, direct our intelligence agencies to better secure sensitive and classified data, and put in place a modern legal framework to prosecute those who leak and make available classified information. These measures will ultimately protect the United States and its citizens from traitors and individuals seeking its demise.

A former chairman of the U.S. House intelligence committee, Pete Hoekstra is a senior fellow at the Investigative Project on Terrorism.

Go here to see the original:
Hoekstra: Assange should face punishment - Online Athens