Bitcoin in the Palm of Your Hand Crypto Hardware Wallets Review – Cointelegraph

A hardware wallet may just be the safest way to store cryptocurrency for average users. Nowadays, many different devices are trying to tackle the challenges of secure crypto asset storage. In this article, Cointelegraph will review some of the most well-known hardware wallets and compare their features.

The cryptocurrency wallets that will be covered in this article are Ledgers Nano X and Nano S, SatoshiLabss Trezor One and Trezor Model T, ShapeShifts KeepKey, and Coinkites Coldcard and Opendime. It is also important to point out that all the wallets tested in this article, other than the Ledger Nano S (which was already owned), have been provided by the producers, free of charge.

Ledgers Nano S and Nano X are similar devices when it comes to their functionality. Both interact with the same software, run the same applications and support the same cryptocurrencies, according to the firms official website.

The Nano X is different from all the other devices in this article because it is the only one that is rechargeable and works wirelessly via Bluetooth. However, during the tests, the devices wireless connectivity was only functional with the Ledger Live mobile application.

Ledger Live allows users to update the device and to manage a significant portion of the crypto assets supported by the device. The rest of the assets are accessible through third-party software that is compatible with the hardware wallet.

Another advantage that the Nano X has over the Nano S is the larger and higher resolution screen. While no one will be watching movies on either device, the fact that an entire wallet address fits on the screen helps when checking where the assets are being sent.

The Nano S can hold fewer under 10 in the tests applications than the Nano X, which is advertised to hold up to 100. Not having the app of a crypto asset installed precludes the ability to manage it, but uninstalling and reinstalling the application does not imply a loss of cryptocurrency. Consequently, the limitation in the number of installed apps of the Nano S results only in a minor inconvenience.

Both wallets can be used on mobile devices, but the Nano S only works with a USB on-the-go cable. Third-party mobile apps also support both the Nano X and S. The Nano X is available on the official Ledger website for around $120, while the Nano S is just short of $60.

The SatoshiLabss Trezor One and Trezor Model T hardware wallets, on the other hand, share fewer similarities than the Ledger devices. The Model T has a larger color touch screen than the One, a micro SD card slot and a reversible USB C connector. Yet, both support about 1,000 crypto assets.

The micro SD card slot in the Model T allows for signing transactions in an offline environment and saving them onto the memory card. The transactions could then be transmitted to the network from a second device that is connected to the internet. However, this functionality has not been added to the device yet.

In order to operate Trezor, the hardware wallet needs to be connected to a computer or a mobile device that runs dedicated software. This software can be Trezor's purpose-built Google Chrome browser extension or a third-party, web-based wallet. Moreover, the device has all the expected functionalities, as well as an intuitive user interface. Like Ledgers devices, the Trezor hardware wallets are also supported by a long list of third-party software wallets.

SatoshiLabs also provides a mobile wallet that allows device initialization, recovery, label change, pin change, passphrase management, firmware upgrade and a full device wipe. Mobile wallets, such as Mycelium or Walleth, allow users to manage their crypto assets from a mobile device, although only via a cable.

Furthermore, the Trezor web-based wallet can also be accessed through the Android version of Google Chrome when the wallet is connected to the mobile device. According to the companys website, the Trezor One is available for $55, while the Trezor T is just a little short of $170. The Corazon Titanium Trezor Model T sold by Gray in a partnership with Trezor costs about four times more than the standard version, which was also tested.

Although its lesser-known but is still a major player on the market, the KeepKey surprises with its large black and white screen and premium feel. The materials used for the front of the device make it hard to clean and can be easily scratched.

The device is significantly larger than the other ones in this list, and the number of digital assets supported is severely limited when compared with Trezor and Ledger hardware wallets. The KeepKey supports eight cryptocurrencies but also allows users to manage all their Ethereum-based tokens compliant with the ERC-20 standard.

During the testing phase of the review, some bugs were encountered in the dedicated software. The application stopped during an attempt to add an account, and it ran into multiple issues when unlocking the wallet.

Fortunately, no such bugs interfered when testing the beta version of the cryptocurrency management and trading interface developed by ShapeShift. It is worth pointing out that the ShapeShift service is not a KeepKey exclusive but is also supported in Ledger and Trezor devices.

ColdCard is an open-source hardware wallet that closely resembles a calculator and targets more tech-savvy users. The Opendime, on the other hand, is closer to a real-life version of the cyberpunk credit chips or a piggy bank than a traditional hardware wallet.

The Coldcard wallet only supports Bitcoin (BTC) and is the only wallet in this review that supports the Partially Signed Bitcoin Transactions format. This feature allows users to sign transactions, save them onto the SD card, and broadcast them at a later time and co-sign them in the case of a multi-signature wallet.

The Opendime wallet is a single-use device that needs to be physically altered in order to spend the cryptocurrency. When it is first activated by inserting the device into the computers USB port, the user has to input random data onto its drive. The wallet then uses this data to generate a privatepublic key pair.

Once the device is initiated, users can see their public keys and send cryptocurrencies to it. What users cannot do is access the private key, which means they cannot move the coins.

In order to access the private key, the device's owner has to puncture the device in an indicated spot, permanently altering its electronic circuit. After piercing the Opendime device, users gain access to the private key that can be used to move the cryptocurrency to a software wallet.

This device can be viewed as a way to transform a digital currency into a physical currency. When accepting an Opendime as a means of payment, its balance can be verified while users can feel confident that no one will spend the balance without accessing the device.

This unique device is the perfect choice for some atypical situations. However, the fact that physical access to the Opendime device automatically translates into access to the cryptocurrency precludes its use in most cases.

Coinkite only sells the Bitcoin version of the Opendime device, but the Litecoin Foundation has one for Litecoin (LTC) as well. Coinkites official shop sells the Coldcard for a little under $120 and the Opendime in packs of three for just short of $45.

Views and beliefs expressed in the article are of the author, Cointelegraph does not endorse any of the products or projects mentioned.

Go here to see the original:
Bitcoin in the Palm of Your Hand Crypto Hardware Wallets Review - Cointelegraph

We Implemented Cryptocurrency In Our Cannabis Business. Here’s What We Found. – Green Entrepreneur

March24, 20205 min read

Opinions expressed by Entrepreneur contributors are their own.

If youre a cannabis entrepreneur, you already know that banking and payment processing are major issues in the cannabis industry.

There are limited payment options if you sell CBD.It is magnitudes more difficult if you are selling THC-centered products.

RELATED:How To Guerilla Market Your Cannabis Brand

Last year, banking issues in the cannabis industry reached the national spotlight when NPR published the aptly-titled article Bags Of Cash, Armed Guards And Wary Banks: The Edgy Life Of A Cannabis Company CFO.

Once (or if) you can find a bank to work with, your bank account runs the risk of being shut down at a moments notice.

Then, you face the challenge of payment processing. Its more difficult for startups with no payment processing history to obtain one. And if a payment processor decides to ban you, your business will be left temporarily unable to accept credit cards.

On top of that, processing fees in the cannabis industry are significantly higher when compared to traditional commerce. We are talking between 4 percent and 6 percent, triple the average of other industries.

A solution is on the horizon.

An emerging, immature, and often misunderstood Bitcoin cryptocurrencytechnology was unleashed on the world in 2009.11 years later, it hascome a longway. Bitcoin can be bought and sold in every country. Mainstream financial channels like CNBC and Bloomberg have teams dedicated to Bitcointechnology.

The promise is appealing. You can be your own bank. No more frozen funds. Transactions cant be censored and the fees cost next to nothing. Plus, payment processing cannot be shut off, unlike traditional banking.

RELATED:Coronavirus Spikes Demand For Cannabis Delivery As People Stockpile Products

Cryptocurrencies like Bitcoin, Bitcoin Cash, and Ethereum intend to solve the problems faced by high-risk banking industries. Its worth noting that on a dark web marketplace known as the Silk Road,thenumber oneproduct sold (by far) was marijuana. The Silk Road is now defunct, but when it was still functioning back in 2011, it showed that Bitcoin has a role to play as a digital currency.

Is cryptocurrency a viable payment solution for your cannabis business?

Like many new technologies, cryptocurrency is not easy to understand. The complexity is where most people lose interest.

Heres something to think about:Most of us do not know how the internet works.Transferring data via "packets," the interaction of protocols like TCP, SMTP, and HTTPS, its all quite detailed under the hood. But this does not prevent you from shopping online, sending an email, or reading this article.

Our company hadprior experience with cryptocurrency, so it made the decision easier than it would be for other cannabis entrepreneurs.

Now that you want to enable the payment option, you have to get set up.

To acceptonline payments, we used the free tool Coinbase Commerce, which integrates with Shopify, WooCommerce and most major platforms. It took us about 30 minutes from signing up to having it live.

We were set up and ready to go, except for one thing: customers.

If you spend even 15 minutes interacting with the cryptocurrency community on Twitter, Reddit, or anywhere else, youll quickly see they are a passionate, enthusiastic (albeit tribal) group.

By sharing a few links on Reddit channels, we received cryptocurrency orders on the first day.

The most interesting and effective part was our charity initiative. By using cryptocurrency to cross borders and feed people in Venezuela and South Sudan, two countries with extremely limited banking options, it showed a fundamental advantage cryptocurrency holds over traditional banking.

RELATED:Cryptocurrency and the Allure of a Cashless Cannabis Industry

It sparked some sales and press for our startup. A few CBD stores reached out to us asking how they could accept cryptocurrency.Even our coffee supplier is open to receiving Bitcoin.There is a lot of underlying interest in the cannabis industry, but they are primarily spectators who arent sure how to participate.

After a few months of time has passed using cryptocurrency, it has been a positive experience. We think all cannabis companies should consider accepting Bitcoin at their business. Keep in mind, cryptocurrency orders are only a small fraction of our total orders. Thatshould be expected at any cannabis company. Your dollars will not turn into Bitcoin overnight.

Thats not to say there arent some drawbacks to consider. First off, if you use Coinbase Commerce, youll have to manually convert your cryptocurrency back into U.S. Dollars. There are services like GoCoin that do this for you for a 1 percentfee (still a lot cheaper than credit card processing).

Second, if you have storefront locations, the cashiers will have to know how to accept payments. AnyPay offers a free POS app, but like any software, it still takes some time to learn.

In the coming years, cryptocurrency has the potential for exponential growth, and there are perks to being an early adopter.Id encourage you to be skeptical of experts who dismiss cryptocurrency in its early days.Remember, Paul Krugman, the Nobel Prize-winning economist, once predicted: "By 2005 or so, it will become clear that the Internet's impact on the economy has been no greater than the fax machine's.

Cryptocurrency will not be a magic bullet for your business. But in an industry that has an uncertain banking future, why not offer your customers an additional payment method and get some free press in the process?

See the article here:
We Implemented Cryptocurrency In Our Cannabis Business. Here's What We Found. - Green Entrepreneur

Greg Smith on the strengths and drawbacks of open source software – Tire Technology International

There are a lot of tire models available in the world. Most are closed source (or black box), meaning the program code behind them is not available to end users. This is understandable as the code can easily be licensed and its development paid for. Everyones got to make a living! This approach, however, makes it much harder to get the best out of the models if you cant see their internal workings, its harder to maximize their usefulness.

Other models, such as Magic Formula, are effectively open source, with the equations published in books and journal papers. This means that anyone (if they invest the time) can build and use their own Magic Formula solvers and, in the process, learn the details of how the model works.

In April 2015, during a session at the 4th International Tire Colloquium at Surrey University, UK, the general idea of open sourcing was discussed. In attendance were various figures from the commercial tire model development community, representatives from car and tire companies who use the models, and a large group of academics involved in more fundamental research. Issues were raised regarding everything from intellectual property concerns and licensing through to technical advances, development strategies and training. Boiling all this down, most discussions centered on one of two approaches.

The first is the traditional licensing model. A company or organization develops a tire model, tests it, evaluates it and, when it works, compiles the model into a black box and sells licensing to use it. These licenses typically come with some training and documentation and an ongoing maintenance fee. The advantage here is the more realizable income generated by the license fee. The disadvantage is mainly on the customer side not being able to see into the black box means the only way to understand the model is via the documentation and continued evaluation. Furthermore, if the customer wants to add features or modifications, they are usually unable to do so themselves and must rely on the vendor.

The second approach supports an open-source mentality. This is where an organization, usually (but not always) academics at a university, develops a reasonably mature piece of software and then publishes the source code online. Doing so means that anyone can dig through the code and fully understand what the tire model does. Other stakeholders can also develop the code themselves and are encouraged to share any updates they make. If there are enough users invested in the project, the development work is completed across the community, reducing the overall development costs. Furthermore, if a particular user needs specific enhancements or additional features, they are able to develop these themselves and share the enhancements with the community customers get what they need, and the tire model is continually further developed.

The issue with the open-source approach is that once the code is published, it cant usually be licensed in the conventional way. After all, why would anyone pay a license for software thats available for free? One solution here is not to charge for the code, but for technical support, as the code is often complex and requires a significant time investment to get it up and running so that it can be used effectively. Therefore, offering a support license can be a commercially viable option.

Another option is for commercial companies to develop and license a user-friendly interface for the complex open-source tire model. For example, while a customer may be able to code its own Magic Formula plotter and toolset, for many it makes sense to buy some already coded software to save time. This can offer the best of both worlds, as in some cases the licensed software can be used even while the underlying open-source tire model is modified and updated. With the advantages that come with open-source code, I personally am very much in favor of this approach.

See the original post here:
Greg Smith on the strengths and drawbacks of open source software - Tire Technology International

InnerSource: A better way to work together on code – InfoWorld

With the coronavirus COVID-19 taking the world by storm, and everyone tightening down in their bunkers, it seems like a good time to think about how we work together. Because of the virus, technology conferences have shuttered and even frequent office dwellers and meeting makers are learning how to work remotely. Open source software development is usually done remotely, so maybe by borrowing some of the methods of open source development, we can all find better ways to work together and stay connected?

I spoke with Danese Cooper about InnerSource or using open source methods to develop internal or proprietary software. Cooper is a technology executive, long time open source advocate and now president of the InnerSource Commons Foundation.

(Disclosure: I served with Danese Cooper on the board of the Open Source Initiative and I have worked with her in other capacities. She describes us as frenemies.)

InnerSource is so named to distinguish itself from open source. Unlike open source, InnerSource is developed inside your company. According to Cooper, InnerSource is the use of open source methods inside the firewall in a proprietary company because its a better way to write software. Some companies who learned how to collaborate using InnerSource also find that they can collaborate more publicly in open source.

See the rest here:
InnerSource: A better way to work together on code - InfoWorld

Future scope of Global Open Source Software Market Trends, industry Analysis and Forecast To 2027 | Intel, Epson, IBM, Transcend – Skyline Gazette

A new informative report titled as the global Open Source Software Market has recently published in the extensive repository of Contrive Datum Insights. The global Open Source Software research is often attributed to several applicable business strategies to enlarge the businesses. Additionally, it offers a comparative study of key players along with their business frameworks to understand global competition among those. It offers a complete analysis of market strategies and how those strategic forces affect the market growth. Due to the rising demand of online platforms in businesses, it offers technological advancements and their impacts on businesses. Additionally, it offers insights on changing business scenario, historical records as well as futuristic developments.

For Sample Copy of Reports: http://www.contrivedatuminsights.com/Home/RequestaSample/841

The key players covered in this study: Intel, Epson, IBM, Transcend, Oracle, Acquia, Actuate, Alfresco Software Inc, Astaro Corp, RethinkDB, Canonical, ClearCenter, Cleversafe, Compiere Inc., Continuent Inc.

The report also outlines the sales and revenue generated by the global Open Source Software market. It is broken down in many segments, such as regional, country level, by type, application, and others. This enables a granular view of the market, focusing on the government policies that could change the dynamics. It also assesses the research and development plans of the companies for better product innovation.

This research report also covers:

-Analysis of established and new entrants

-Financial management

-Strategic planning of business resources

-Different case studies and practical evolution from c level professionals

-Applicable tools, methodologies, and standard operating procedures

-Global market forecast

-A detailed elaboration of market segments and sub-segments

-Different risks, challenges, threats and weaknesses in front of the market

-Approaches to discovering global opportunities, customers and potential customers.

The report presents a thorough overview of the competitive landscape of the global Open Source Software Market and the detailed business profiles of the markets notable players. Threats and weaknesses of leading companies are measured by the analysts in the report by using industry-standard tools such as Porters five force analysis and SWOT analysis. The Open Source Software Market report covers all key parameters such as product innovation, market strategy for leading companies, Open Source Software market share, revenue generation, the latest research and development and market expert perspectives.

Get Special Discount: http://www.contrivedatuminsights.com/Home/GetSpecialPricing/841

To identify the market needs across the global regions, it offers an analytical survey into North America, Latin America, Africa, Europe and Asia-Pacific have been examined to get a clear idea. The global Open Source Software market registers the highest market share in the region. Asia Pacific has a large population, which makes its market potential a significant one. It is the fastest-growing and most lucrative region in the global economy. This chapter specifically explains the impact of population on the global Open Source Software market. Research views it through a regional lens, giving the readers a microscopic understanding of the changes to prepare for.

Table of Contents (TOC):

Part 1 Market Overview

1.1 Market Definition

1.2 Market Development

1.3 By Type

1.4 By Application

1.5 By Region

Part 2 Key Companies

Part 3 Global Market Status and Future Forecast

3.1 Global Market by Region

3.2 Global Market by Company

3.3 Global Market by Type

3.4 Global Market by Application

3.5 Global Market by Forecast

Part 4 Asia-Pacific Market Status and Future Forecast

4.1 Asia-Pacific Market by Type

4.2 Asia-Pacific Market by Application

4.3 Asia-Pacific Market by Geography

4.3.1 China Market Status and Future Forecast

4.3.2 Southeast Asia Market Status and Future Forecast

4.3.3 India Market Status and Future Forecast

4.3.4 Japan Market Status and Future Forecast

4.3.5 Korea Market Status and Future Forecast

4.3.6 Oceania Market Status and Future Forecast

4.4 Asia-Pacific Market by Forecast

Part 5 Europe Market Status and Future Forecast

5.1 Europe Market by Type

5.2 Europe Market by Application

5.3 Europe Market by Geography

5.3.1 Germany Market Status and Future Forecast

5.3.2 UK Market Status and Future Forecast

5.3.3 France Market Status and Future Forecast

5.3.4 Italy Market Status and Future Forecast

5.3.5 Russia Market Status and Future Forecast

5.3.6 Spain Market Status and Future Forecast

5.3.6 Netherlands Market Status and Future Forecast

5.3.7 Turkey Market Status and Future Forecast

5.3.6 Switzerland Market Status and Future Forecast

5.4 Europe Market by Forecast

Part 6 North America Market Status and Future Prospects

6.1 North America Market by Type

6.2 North American Market by Application

6.3 North American Market by Region

6.3.1 US Market Status and Future Prospects

6.3.2 Canadian Market Status and Future Prospects

6.3.3 Mexico Market Status and Future Prospects

6.4 North American Market by Forecast

Part 7. South America Market Status and Future Prospects

7.1 South America Market by Type

7.2 South American Market by Application

7.3 South America Market

7.3.1 Brazil Market Status and Future Prospects

7.3.2 Argentina Market Status and Future Prospects

7.3.3 Columbia Market Status and Future Forecast

7.3.4 Chile Market Status and Future Prospects

7.3.5 Peru Market Status and Future Prospects

7.4 South American Market Forecast

Part 8 Middle East and Africa Market Status and Future Prospects

8.1 Middle East and Africa Market by Type

8.2 Middle East and Africa Market by Application

8.3 Middle East and Africa Markets by Region

8.3.1 GCC Market Status and Future Prospect

8.3.2 North Africa Market Status and Future Prospects

8.3.3 South Africa Market Status and Future Forecast

8.4 Middle East and Africa Market Forecasts

Part 9 Market Features

9.1 Product Features

9.2 Price Features

9.3 Channel Features

9.4 Purchasing Features

Part 10 Investment Opportunity

10.1 Regional Investment Opportunity

10.2 Industry Investment Opportunity

Part 11 Conclusion

2019 by Product Segment, Technology, Application, End User, Future Opportunities and Region till 2026

For More Information: http://www.contrivedatuminsights.com/Home/ProductReport/Global-Open-Source-Software-Market-Size,-Growth,-Analysis-Research-Report-2018-To-2025=841

Any special requirements about this report, please let us know and we can provide custom report.

Read the original post:
Future scope of Global Open Source Software Market Trends, industry Analysis and Forecast To 2027 | Intel, Epson, IBM, Transcend - Skyline Gazette

What is WikiLeaks? – CNET

Recent US history is dotted with major government leaks. There's the Pentagon Papers, which revealed a secret bombing campaign led by the US during the Vietnam War. Then there's Deep Throat, a pseudonym for the government informant who leaked information about the Watergate Scandal and helped bring down the Nixon administration. (It was revealed 30 years later that Deep Throat was former FBI Deputy Director Mark Felt.)

These days, one of the biggest leakers of classified information in the world is WikiLeaks.

Over the past 11 years, the group claims to have released over 10 million secret government documents through its website. The leaks range from a video showing an American Apache helicopter in the Iraq War shooting and killing two journalists to emails from the Democratic National Committee exposing alleged misconduct during the 2016 presidential campaign.

On March 7, 2017, the organization released thousands of documents that allegedly detail the methods and tools that the CIA uses to break into phones, TVs and cars, including how key software from the world's top tech companies, including Apple, Google and Microsoft, could be breached by the CIA.

While the authenticity of these documents has yet to be confirmed or denied by the CIA, a spokesman said, "It is [the] CIA's job to be innovative, cutting edge and the first line of defense." All this raises questions about what devices and software the CIA could break into.

But what about WikiLeaks? What is it? How does the group work? What is its motivation for leaking supposed classified material? Details about the group are tightly controlled, but here's what we know.

WikiLeaks didn't immediately respond to CNET's request to comment for this article.

WikiLeaks is an international nonprofit organization founded in 2006. Its purpose is to vet and publish first-source, restricted documents. As of this writing, WikiLeaks claims to have released over 10 million documents, but the organization hasn't revealed how many more documents it has in its possession.

One of the most high profile releases was a video of a US military helicopter gunning down journalists and civilians in Iraq in 2007. An outside source revealed that the leak came from former US Army intelligence analyst Chelsea Manning (formerly known as Bradley).

Think of WikiLeaks as a middleman. As opposed to a whistleblower leaking information directly to the press, someone instead gives it to WikiLeaks, which then vets and distributes the information. Sources are kept anonymous, with WikiLeaks protecting the whistleblower from retaliation.

WikiLeaks' website states, "Although no organization can hope to have a perfect record forever, thus far WikiLeaks has [been] perfect in document authentication and resistance to all censorship attempts."

WikiLeaks publisher Julian Assange speaks from the Ecuadorian embassy in London.

The site's publisher is Julian Assange, 45, from Australia. Assange has said that before WikiLeaks, he worked as a computer programmer and as an activist -- he avoids the label "hacker."

In 2006, he helped found WikiLeaks. During its early years, Assange toured the world giving lectures and interviews fashioning himself as the face of the organization. His story was turned into the 2013 film "The Fifth Estate," with Benedict Cumberbatch playing Assange.

Four years ago, Assange sought asylum in the Ecuadorian embassy in London to avoid extradition to Sweden, where he was accused of rape. Assange hasn't been formally charged and he's denied the allegation. Other charges against him have since been dropped because of statutes of limitation. He has been holed up in the embassy since June 19, 2012.

On February 24, 2011, a British court agreed to honor Sweden's request for Assange's extradition. If Assange leaves the embassy, he would immediately be taken into custody by British police and extradited.

During a 2013 press conference, President Obama addressed the topic of Assange and WikiLeaks, saying that leaks related to national security put people at risk. "I make no apologies and I don't think the American people will expect me as commander in chief not to be concerned about information that might compromise their missions or get them killed."

Assange said that he fears Swedish officials will extradite him to the US to face prosecution over leaked government and military documents -- even though there's been no public request for extradition from the US.

In a tweet posted to the WikiLeaks Twitter account on January 12, 2017, Assange offered to agree to extradition to the US if President Obama released Chelsea Manning, who was serving a 35-year sentence for leaking thousands of US Army classified documents.

Five days later, President Obama commuted Manning's sentence. Shortly after, in a press conference streamed on Periscope on January 19, Assange said he was willing to hold up his end of the bargain, but hasn't settled on a date. Manning is expected to be freed on May 17, 2017.

This is where things get tricky. On its website and social media pages, WikiLeaks states, "We open governments."

Certainly the publication of classified documents, emails and videos does give an unusual inside look into a government's dealings and actions. And while this has made WikiLeaks popular among some open government advocates, not everyone is convinced WikiLeaks' intentions are pure.

Critics like documentary maker Alex Gibney question WikiLeaks' motivation, especially when the organization released emails from the Democratic National Committee and Hillary Clinton's presidential campaign manager John Podesta, apparently to hurt Clinton's campaign. In an interview with ITV on June 12, 2016, Assange said, "We do see her as a bit of a problem for freedom of the press."

There's the possibility WikiLeaks could have been given these documents by the Russian government in order to affect the outcome of the 2016 US presidential election. In a combined report released on January 6, 2017, the CIA, FBI and NSA said Russian hackers used WikiLeaks to distribute documents and emails from the DNC.

"WikiLeaks sources in relation to the John Podesta emails and the DNC leak are not members of any government," Assange said in response shortly after.

So far no one has been able to publicly corroborate Assange's statement.

We don't.

As much as WikiLeaks aims to bring transparency to government, the organization itself is not transparent about its own processes and procedures. It's still up to news organizations to verify and authenticate any documents released.

In WikiLeaks' early years, Assange refused to redact any information, including names that would have normally have been redacted by most news organizations. The New York Times reported that when it collaborated with WikiLeaks alongside The Guardian and Der Spiegel on the Afghanistan war logs -- a collection of internal US military logs from that conflict -- Assange disagreed with the paper's decision to redact the name of an Afghan informant.

"If an Afghan civilian helps coalition forces, he deserves to die," Assange allegedly told the Guardian's Nick Davies.

WikiLeaks still doesn't appear to redact names or information. Last year's DNC email leak included social security numbers and credit card information. Assange claims deleting such info would harm the integrity of the archive.

The organization didn't respond to a request for comment about its practices.

DNC Chairperson Debbie Wasserman Schultz, attending a campaign rally a day before she resigned.

WikiLeaks has been both praised and criticized for the work it does. Releasing classified documents violates national security laws.

Classified documents also contain sensitive information that could endanger people. There's no evidence that any of WikiLeaks' disclosures have led to anyone's death so far.

But there are numerous examples of the disclosures hurting reputations. Former DNC Chairperson Debbie Wasserman Shultz, for example, resigned after the party's emails were released and showed her alleged bias against Clinton's primary opponent, Senator Bernie Sanders.

According to its website, WikiLeaks has a staff of over 100 people working for it around the world. It doesn't specify whether those people are paid or volunteers, nor does it say what roles they serve.

Edward Snowden's leak of classified information revealed numerous global surveillance programs.

No. Edward Snowden, 33, a former US government contractor and CIA employee, leaked thousands of classified NSA documents detailing surveillance programs to reporters Glenn Greenwald, Ewen MacAskill, Laura Poitras and Barton Gellman. This is is documented in Poitras' film "Citizenfour."

Yes, sometimes. On its website, WikiLeaks names dozens of news and research organizations as "partners," including the Associated Press, Rolling Stone, The New York Times, The Guardian, The Washington Post and The Wall Street Journal.

WikiLeaks also says it has contractual relationships and secure communications paths to more than 100 major media organizations around the world. "This gives WikiLeaks sources negotiating power, impact and technical protections that would otherwise be difficult or impossible to achieve."

When Manning was an intelligence analyst for the US Army, she anonymously leaked classified information to WikiLeaks. Manning confided what she had done to an online acquaintance, who then reported her to the FBI. She was later convicted of espionage as well as theft, and sentenced to 35 years in prison. In January, President Obama commuted Manning's sentence.

No. Though the WikiLeaks website was initially set up as a wiki, a communal publishing service, the platform was abandoned by the organization in 2010 when the website went dark for a fundraising drive.

According to its website, WikiLeaks is funded by "its publisher, its publication sales and the general public."

WikiLeaks has been nominated for the Nobel Peace Prize six times (hundreds of people and organizations are nominated each year). It's received humanitarian and journalism awards including:

CNET Magazine: Check out a sampling of the stories you'll find in CNET's newsstand edition.

Special Reports: All of CNET's most in-depth features in one easy spot.

The rest is here:
What is WikiLeaks? - CNET

Just Like Bitcoin Before It, Cardano Is Banned From Wikipedia – Cointelegraph

On March 24, Cardano (ADA) founder, Charles Hoskinson, streamed a YouTube video titled On Wikipedia, in which he berated Wikipedia for applying arbitrary commercial censorship against Cardano.

Censorship of cryptocurrency projects is as old as the industry itself. Back in 2010, even Satoshi Nakamoto was frustrated with Wikipedias editors for removing Bitcoins wiki entry several times.

After PayPal severed ties with WikiLeaks, one of Bitcoins supporters suggested that becoming the site's new source of donations would generate enough publicity to gain entry into Wikipedia. Satoshi strongly opposed WikiLeaks adoption of the cryptocurrency, but it was too late:

No, don't "bring it on". The project needs to grow gradually so the software can be strengthened along the way. I make this appeal to WikiLeaks not to try to use Bitcoin. Bitcoin is a small beta community in its infancy. You would not stand to get more than pocket change, and the heat you would bring would likely destroy us at this stage.

Hoskinson states that he does not know the rationale behind Wikipedias hostility towards his project, despite it being the most cited of all of the peer reviewed coins:

We don't know why there's hostility where coins like SpankChain can have an article on Wikipedia. A lot of other cryptocurrencies and top 15, top 20 apparently have articles and that's perfectly fine. But then we're not allowed to have an article for some reason, even though we've been mentioned by the U.S. Congress.

Cointelegraph could not find a Wikipedia article for SpankChain (SPANK). Other projects like Dogecoin (DOGE), GridCoin (GRC), and PotCoin (POT) do have one, however. Most of the top ten projects, including Bitcoin Cash (BCH), have one too.

Source: Cointelegraph

Hoskinson confirmed to Cointelegraph that the censorship comes exclusively from Wikipedias English language editors, noting that there are Cardano wiki entries in German, Estonian, Italian, Japanese, Dutch, Portuguese, Romanian and Russian.

Crypto censorship has recently been on the rise. In Wikipedias case, it is an especially surprising move, considering that the site accepts Bitcoin to help fund its mission of providing a free online encyclopedia, created and edited by volunteers around the world

Read this article:
Just Like Bitcoin Before It, Cardano Is Banned From Wikipedia - Cointelegraph

Google and the Oxford Internet Institute explain artificial intelligence basics with the A-Z of AI – VentureBeat

Artificial intelligence (AI) is informing just about every facet of society, from detecting fraud and surveillanceto helping countries battle the current COVID-19 pandemic. But AI is a thorny subject, fraught with complex terminology, contradictory information, and general confusion about what it is at its most fundamental level. This is why the Oxford Internet Institute (OII), the social and computer science department of the U.K.s University of Oxford, has partnered with Google to launch a portal with a series of explainers outlining what AI actually is including the fundamentals, ethics, its impact on society, and how its created.

At launch, the A-Z of AI covers 26 topics, including bias and how AI is used in climate science, ethics, machine learning, human-in-the-loop, and Generative adversarial networks (GANs).

Googles People and AI Research team (PAIR) worked with Gina Neff, a senior research fellow and associate professor at OII, and her team to select the subjects they felt were pivotal to understanding AI and its role today.

The 26 topics chosen are by no means an exhaustive list, but they are a great place for first-timers to start, the guides FAQ section explains. The team carefully balanced their selections across a spectrum of technical understanding, production techniques, use cases, societal implications, and ethical considerations.

For example, bias in data sets is a well-documented issue in the development of AI algorithms, and the guide briefly explains how the problem is created and how it can be addressed.

Typically, AI forms a bias when the data its given to learn from isnt fully comprehensive and, therefore, starts leading it toward certain outcomes, the guide reads. Because data is an AI systems only means of learning, it could end up reproducing any imbalances or biases found within the original information. For example, if you were teaching AI to recognize shoes and only showed it imagery of sneakers, it wouldnt learn to recognize high heels, sandals, or boots as shoes.

You can peruse the guide in its full A-Z form or filter content by one of four categories: AI fundamentals, Making AI, Society and AI, and Using AI.

Those with a decent background in AI will find this guide simplistic, but its a good starting point for anyone looking to grasp the key points they will be hearing about as AI continues to shape society in the years to come.

Its also worth noting that this isnt a static resource the plan is to update it as AI evolves.

The A-Z will be refreshed periodically as new technologies come into play and existing technologies evolve, the guide explains.

Read more:
Google and the Oxford Internet Institute explain artificial intelligence basics with the A-Z of AI - VentureBeat

As adoption of artificial intelligence accelerates, can the technology be trusted? – SiliconANGLE News

The list of concerns around the use of artificial intelligence seems to grow with every passing week.

Issues around bias, the use of AI for deepfakevideos and audio,misinformation, governmental surveillance, securityand failure of the technology to properly identify the simplest of objects have created a cacophony of concern about the technologys long-term future.

One software company recently released a study which showed only 25% of consumers would trust a decision made by systems using AI, and another report commissioned by KPMG International found that a mere 35% of information technology leaders had a high level of trust in their own organizations analytics.

Its a bumpy journey for AI as the technology world embarks on a new decade and key practitioners in the space are well aware that trust will ultimately determine how widely and quickly the technology becomes adopted throughout the world.

We want to build an ecosystem of trust,Francesca Rossi, AI ethics global leader at IBM Corp., said at the digitalEmTech Digital conference on Monday. We want to augment human intelligence, not replace it.

The EmTech Digital event, restructured into a three-day digital conference by MIT Technology Review after plans to hold it this month in San Francisco were canceled, was largely focused on trust in AI and how the tech industry was seeking to manage a variety of issues around it.

One of those issues is the use of deepfake AI tools to create genuine appearing videos or audio to deceive users. The use of deepfake videos has been rising rapidly, according to recent statistics provided by Deeptrace, which found an 84% rise in false video content versus a year ago.

Today more than ever we cannot believe what we see, and we also cannot believe what we hear,Delip Rao, vice president of research at AI Foundation, said during an EmTech presentation on Tuesday. This is creating a credibility crisis.

To help stem the flow of deepfakes into the content pool, the AI Foundation has launched a platform,Reality Defender, thatuses deepfake detection methods provided by various partners, including Google LLC and Facebook Inc. The nonprofit group recently extended its detection technology to include 2020 election campaigns in the U.S. as well.

As a generation, we have consumed more media than any generation before us and were hardly educated about how we consume it, Rao said. We cannot afford to be complacent. The technology behind deepfakes is here to stay.

AI has also come under fire for its use in facial recognition systems powered by a significant rise in the installation of surveillance cameras globally. A recent report by IHS Markit showed that China leads the world with 349 million surveillance cameras. The U.S. has 70 million cameras, yet it is close to China on a per capita basis with 4.6 people per camera installed.

The rise of AI-equipped cameras and facial recognition software has led to the development of a cottage industry on both sides of the equation. One Chinese AI company SenseTime has claimed the development of an algorithm which can identify a person whose facial features are obscured by a surgical mask and use thermal imaging to determine body temperature.

Meanwhile, a University of Maryland professor has developed a line of clothing, including hoodies and t-shirts, emblazoned with patterns specially designed to defeat surveillance camera recognition systems. All of that underscores the growing societal challenges faced by practitioners in the AI field.

The other complex problem affecting the AI industry involves cybersecurity. As adoption grows and the tools improve, the use of AI is not limited to white hat users. Black hat hackers have access to AI as well and they have the capability to use it.

Cybersecurity vendor McAfee Inc. has seen evidence that hackers may be employing AI to identify victims likely to be vulnerable to attack, according to Steve Grobman, senior vice president and chief technology officer at McAfee. Malicious actors can also use the technology to generate customized content as a way to sharpen spear phishing lures.

AI is a powerful tool for both the defenders and the attackers, Grobman said. AI creates a new efficiency frontier for the attacker. Were seeing a constant evolution of attack techniques.

The trust issues surrounding AI represent an important focus right now because the AI train has left the station and a lot of passengers are on board for the ride. AI has become a key element in improving operational efficiency for many businesses and a number of speakers at the event outlined how enterprises are employing the technology.

Frito Lay Inc. uses AI to analyze weather patterns and school schedules to determine when its corn chip inventory should be increased on store shelves. Global healthcare provider Novartis AG is using AI to support clinical trials and determine injection schedules for people with macular degeneration.

And when engineers at shipping giant DHL International saw how AI could be used to detect cats in YouTube videos, they wondered if the same approach could be taken to inspect shipping pallets for stackability in cargo planes.

These are small decisions were doing for load efficiency on over 500 flights per night, said Ben Gesing, DHLs director and head of trend research. At DHL, no new technology has been as pervasive or as fast-growing as AI.

Perhaps even more intriguing was the recent news that Salesforce Inc. has employed AI to undertake major research on protein generation. Earlier this month, Salesforce published a study which detailed a new AI system called ProGen that can generate proteins in a controllable fashion.

In a presentation Tuesday, Salesforce Chief ScientistRichard Socherdescribed how the company viewed AI as a double-edged strategy. One is the science fiction state, in which dreams of self-driving cars and big medical breakthroughs reside. The other is the electricity state, which uses technology such as natural language understanding to power chatbots.

AI is in this dual state right now, Socher said. At Salesforce, were trying to tackle both of those states. I truly believe that AI will impact every single industry out there.

If Socher is right, then every industry is going to have to deal with a way to engender trust in how it uses the technology. One EmTech speaker presented results from a recent Deloitte study which found that only one in five CEOs and executives polled had an ethical AI framework in place.

There are challenges ahead of us, said Xiaomeng Lu, senior policy manager at Access Partnership. We cant run away. We have to tackle them head on.

Show your support for our mission with our one-click subscription to our YouTube channel (below). The more subscribers we have, the more YouTube will suggest relevant enterprise and emerging technology content to you. Thanks!

Support our mission: >>>>>> SUBSCRIBE NOW >>>>>> to our YouTube channel.

Wed also like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we dont have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary onSiliconANGLE along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams attheCUBE take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.

If you like the reporting, video interviews and other ad-free content here,please take a moment to check out a sample of the video content supported by our sponsors,tweet your support, and keep coming back toSiliconANGLE.

The rest is here:
As adoption of artificial intelligence accelerates, can the technology be trusted? - SiliconANGLE News

Discover Breakthroughs in Automation and Artificial Intelligence on an Upcoming Episode of Advancements Television Series – Yahoo Finance

DMG Productions explores innovations in artificial intelligence for precision medicine.

JUPITER, Fla., March 26, 2020 /PRNewswire-PRWeb/ --During Q3/2020, Advancements with Ted Danson will focus on how technology is transforming precision medicine. Check your local listings for more info.

This segment of Advancements will discover how Ninety One Holdings, Inc. (Ninety One) aspires to advance precision medicine by combining state-of-the-art software technology with modern mathematical methods of data science, machine learning, and artificial intelligence.

"Ninety One is a cloud-native and AI technology company aspiring to lead the transformation into digital healthcare and Precision Medicine. It was founded on the conviction of fusing medical science with advanced mathematical modeling and big data technology. The first solution is an augmented intelligence, SaaS ecosystem automating and redesigning remote monitoring of implanted cardiac devices and wearables," said Dr. Eleonora Gashi, Co-founder and Medical Director at Ninety One.

Viewers will learn how Ninety One digitizes and transforms unstructured data from multiple sources into an error-free, efficient, and easy to use model. The show will also focus on Ninety One's ability to automate remote monitoring of CIEDs into a single-point, cloud-native application.

"Ninety One strongly believes that pursuing this mission with vigorous commitment and passion, while leveraging innovations in science, will have a material impact on disease diagnosis, treatment, and prevention," said Richard Simon, producer for the Advancements series.

About Ninety One: Ninety One Holding, Inc. is a privately-held, data science and cloud-native technology company, focusing on clinical advancements in predictive analytics and Precision Medicine. Ninety One automates the collection of data and reports from implanted cardiac devices and wearables digitizes, structures, and analyzes them with applied data science in a single-point, easy-to-use interface for patient care and innovation in research.

Ninety One's Global team of data scientists, software engineers, and modern mathematicians utilize artificial intelligence on vast amounts of data produced by these devices to predict disease episodes and disease progression.For more information please visit https://www.91.life.

About Advancements and DMG Productions: The Advancements series is an information-based educational show targeting recent advances across a number of industries and economies. Featuring state-of-the-art solutions and important issues facing today's consumers and business professionals, Advancements focuses on cutting-edge developments, and brings this information to the public with the vision to enlighten about how technology and innovation continue to transform our world.

Backed by experts in various fields, DMG Productions is dedicated to education and advancement, and to consistently producing commercial-free, educational programming on which both viewers and networks depend.

For more information, please visit http://www.AdvancementsTV.com or call Richard Simon at 866-496-4065.

SOURCE Advancements with Ted Danson

Visit link:
Discover Breakthroughs in Automation and Artificial Intelligence on an Upcoming Episode of Advancements Television Series - Yahoo Finance