Cryptocurrency Market Update: Bitcoin needs to settle above $10,600 to avoid the sell-off – FXStreet

Bitcoin will go down before it goes up. This popular opinion is shared byBob Loukas, the founder ofThe Financial Tap. He confirmed that the first cryptocurrency may retreat to$8,800-$7,800, while a close above $10,000 would confirm the bullish trend. He also added that in the mid-term, Bitcoin looks super bullish and on the verge of.a major four-year cycle.

Action #bitcoin for intermediate term is super bullish IMO. The 4-Year Cycle is ready to begin it's 12-20 month rising trend to blow-off top. However, move back towards $7.8k-$8.8k looks needed into July Cycle Low. Unless we close above $10.6k, where I'd say bull move confirmed,he tweeted.

BTC/USD has barely moved in recent 24 hours.At the time of writing, the first digital assetis changing hands at $9,750, while the localresistance is created by $9,800. This area was rejected on several occasions earlier this week, which makes it harder for the bulls.The support comes at $9,600, which is the upper line of the broken triangle pattern.

ETH/USD is trapped in a narrowing range with the local resistance at $245.00. A sustainable move above this level will allow for an extended recovery towards a stronger barrier created by psychological $250.00. The initial support comes at $240.00. At the time of writing, the second-largest coin is changing hands at $243.00. It has stayed unchanged since the start of the day.

XRP/USD settled at $0.2030 on Wednesday after a short-lived dip to $0.2000 during early Asian hours. The support is createdthe lower line of the 1-hour Bollinger Band at $0.2010.This barrier is closely followed by psychological $0.2000. If it is broken, the sell-off may gain traction with the next focus on $0.1980 (June 7 low). On the upside, the local resistance at $0.225 limits the recovery.At the time of writing, XRP/USDis changing hands at $0.2020.

View original post here:
Cryptocurrency Market Update: Bitcoin needs to settle above $10,600 to avoid the sell-off - FXStreet

Open Source Geospatial Mapping Software to Help Solve Real-world Problems – GIM International

1904labs, a digital transformation consulting firm, and Bayer Crop Science, a division of German life sciences company Bayer AG, have jointly released a new geospatial mapping framework to the open source community. The framework, ol-kit, is a free, easy-to-use, map component toolkit built with React and OpenLayers and is compatible with many popular open source tools in the geospatial community.

Geospatial technology has captured the attention of the public eye in the current crisis with maps being created to track Covid-19 cases, essential supplies, and more. However, many existing mapping frameworks are costly or not robust enough to meet these crucial challenges. While geospatial tools are some of the most expensive and complex software, ol-kit gives anyone these comprehensive capabilities at no cost.

Bayer and 1904labs started working on this mapping framework four years ago. Internally, the ol-kit is a backbone to many of Bayers applications for managing fields and research experiments, monitoring yields, and more. These applications gather a huge amount of data. Without the interactive map, driven by ol-kit, it would be impossible to interpret the data.

This is an important piece of functionality from which small businesses, governments and community organizations will see tremendous benefit. Contributing to the open source community wasnt something that our group had done before, but it was well worth the effort, and I cant wait to see how ol-kit is used, said Shaun Diltz, principal product manager at Bayer Crop Science.

With open source software, its core code is available for anyone to view, change or use in their own way free of charge. Typically more cost effective than proprietary software, open source software also benefits from community collaboration to make it better, more secure and stable.

Robin Carnahan, fellow at Georgetown University, and previous director of the state and local practice at the federal General Services Administrations tech consultancy team, 18F, said: Its great to see a big international enterprise and a small business collaborating to create something really valuable for the larger community and to make it freely available to them. Thats the power of open source.

As the use of location plays an ever-increasing role in our global economy, open sourcing ol-kit will enable small business and community organizations alike to leverage its geospatial capabilities to study and solve critical challenges that they previously may not have been able to afford to tackle. During the pandemic, smaller municipalities with minimal IT budgets can use ol-kits fully customizable toolkit to analyse patterns within their communities to better contain the virus. It can also be applied to provide helpful insights and chart trends in areas like census tracking, election mapping and combating natural disasters such as wildfires.

Screenshot of the ol-kit map component toolkit.

Original post:
Open Source Geospatial Mapping Software to Help Solve Real-world Problems - GIM International

Open Source Initiative Presents State of the Source – Press Release – Digital Journal

Open Source Initiative (OSI) today announces it's first-ever global event, The State of the Source. The OSI invites open source communities of practice from around the world to organize and contribute to a global conversation on the current state of open source software.

"We are so very excited to host our first-ever conference, with a global approach," said OSI Board President, Josh Simmons. "State of the Source provides an opportunity for both the open source software community and the OSIall those who have contributed so muchto reflect on how we got here, why we have succeeded, and what needs to happen now."

Call for ProposalsThe Call for Proposals for sessions is open and accepting proposals through Friday, July 10, 2020! Tracks include:

For more information about State of the Source, the Call for Proposals, and Sponsorship opportunities, you're invited to visit https://opensource.org/StateOfTheSource

About Open Source InitiativeThe Open Source Initiative (OSI) are the stewards of the Open Source Definition (OSD) and the community-recognized body for reviewing and approving licenses as OSD-conformant. The OSI is also actively involved in Open Source community-building, education, and public advocacy to promote awareness and the importance of non-proprietary software. The mission of the OSI is to educate about and advocate for the benefits of open source and to build bridges among different constituencies in the open source community.

The Open Source Initiative (OSI) is a California public benefit corporation, with 501(c)3 tax-exempt status, founded in 1998. For more information, visit https://opensource.org/about

Follow the full story here: https://przen.com/pr/33347399

Read the rest here:
Open Source Initiative Presents State of the Source - Press Release - Digital Journal

OPPO became the first platinum member of the OpenChain Project from Mainland China, in Support of OpenChain becoming an ISO Standard for open source…

SAN FRANCISCO, June 10, 2020 /PRNewswire/ -- In May, 2020 in San Francisco, OPPO officially joined the ranks of the OpenChain Project as a platinum member. OPPO is the first Mainland China company to join the OpenChain Project, together with industry leaders from other countries and regions such as Google, Microsoft, Toyota, BOSCH among others.OPPO will support building a greater, globally-adapted open source ecosystem by participating in the development of the open source ISO standards.

The OpenChain project is held by The Linux Foundation and was founded in October 2016. The main objective of the project is to build trust in using open-source software. The OpenChain Project makes the process of compliance with licensing open source software a simpler and more consistent process.

"With their help we are looking forward to inspiring and leading a diverse range of Chinese innovators, international manufacturers and global supply chain companies towards adoption of our industry standard", says Shane Coughlan, OpenChain General Manager. "I am looking forward to working with the team at OPPO to help ensure that companies of every size and in every market can continually have access to the most efficient, effective and appropriate approaches to managing open source."

As one of the few selected platinum members and the first one from Mainland China, OPPO was chosen not only because of its Worldwide R&D strength in the consumer electronics tech sector, but also the huge supply chain network it has built over the years. This will be beneficial to promote both open source technologies and the standards to both suppliers and end consumers, accelerating openness in technology development.

"OPPO values openness and collaboration greatly,ColorOS - its mobile operating system - is in the making to build a more open and collaborative ecosystem to developers and partners by opening source and integrating APIs." Andy Wu, Vice President and President of Software Engineering Business Unit, OPPO. "We aredelighted to join the OpenChain Project and establish a deeper engagement with the global open source community, trust with OPPO'spresence in more than 40 global markets and research institutes across the world, we will be an active member in OpenChain Project to contribute to its long-term success and adoption with fellow partners."

As the first platinum member in Mainland China, OPPO isan important company in the consumer electronics sector. From the many smartphones, they pioneered in bringing to the market like the Find X, and Reno line of devices, to the ColorOSoperating system and internet services like Heytap. OPPO strives to promote open source compliance globally, as well as in the smartphone and IoT industries.

In the future, OPPO is committed to provide strategic oversight on the governing board as well as actively assisting in steering the open source community towards continuous innovation by providing the combined experience of the over 40,000 employees in more than 40 counties and regions.

About ColorOS

ColorOS is a highly customized, efficient, intelligent, and richly designed Android-based mobile OS from OPPO. With over 350 million global users, ColorOS supports more than 80 languages, including English,Spanish, Dutch, Italian,Hindi, and Thai.

About OPPO

OPPO is a leading global smart device brand. Since the launch of its first smartphone - "Smiley Face" - in 2008, OPPO has been in relentless pursuit of the perfect synergy of aesthetic satisfaction and innovative technology. Today, OPPO provides a wide range of smart devices spearheaded by the Find and Reno series. Beyond devices, OPPO provides its users with ColorOS and internet services like HeyTap and OPPO+. OPPO operates in more than 40 countries and regions, with 6 Research Institutes and 4 R&D Centers worldwide, as well as an International Design Center in London. The recently opened, first-ever R&D centre outside of China, in Hyderabad, is playing a pivotal role in the development of 5G technologies. In line with OPPO's commitment to Make in India, the manufacturing at Greater Noida plant has been increased to 50 million smartphones per year. According to IDC, OPPO has ranked 4th among the top 5 smartphone brands in India with an 88.4% year on year growth in Q4 2019.

SOURCE OPPO

Read the original here:
OPPO became the first platinum member of the OpenChain Project from Mainland China, in Support of OpenChain becoming an ISO Standard for open source...

OWEAR Opens Software and Datasets to Promote Technology in Research – Parkinson’s News Today

TheOpen Wearables Initiative (OWEAR) is making public its software and database for wearable sensors and other related-health technologies to assist clinical research,Shimmer Researchannounced.

We are proud to announce the release of the OWEAR database, which includes the organizations initial index of open source software and datasets, together with validation papers, Geoffrey Gill, president of Shimmer Americas and an OWEAR co-founder, said in a press release.

OWEAR is a collaborative effort that promotes the use of high-quality, sensor-generated measures of health in research by openly sharing and comparing algorithms and datasets. Aggregating this information can help in the development of new therapies and the use of digital medicine.

To do so, OWEAR will serve as a community hub to index and distribute open source algorithms. It will also identify well-performing algorithms in areas of high interest, while acting as a neutral broker in their benchmarking in select domains.

The OWEAR database consists of various open-source software and data sets from wearables and other types of sensors, which provide valuable diagnostic and prognostic information on a variety of disorders.

Part of the initiative includes the upcoming launch of the public phase of OWEARs DREAM Challenges, the goal of which is to benchmark various measures of gait. Consistent and accurate gait measurements provide crucial diagnostic information about the state and progression of neurological disorders, including stroke, cerebral palsy, Parkinsons disease, traumatic brain injury, multiple sclerosis, and partial paralysis, as well as assessments of aging and cognitive function.

Measuring gait quality among Parkinsons patients has attracted considerable attention over the past decade, being used to monitor patient recovery, determine differences between normal and pathological physical signs, and to alert patients and caregivers to motor fluctuations related to the disease.

DREAM Challenges are crowd-sourced, collaborative science efforts aimed at overcoming challenges in biology and medicine. A few sponsorships for the OWEAR challenge are still available, Shimmer reports. More information is available by sending an email to [emailprotected]

Shimmer recently contributed its step-count algorithm to OWEAR. Measuring how many steps a person takes in one day is a common measure of healthy lifestyle, but because of the proprietary nature of many algorithms, data from different devices can be difficult to compare.

By donating this open source algorithm, we hope to enable clinical researchers to use the same algorithm across wearables and projects and so gain access to much richer datasets, Gill said.

Gill will talk about these OWEAR initiatives during a presentation called The Open Wearables Initiative: Helping Realize the Potential of Wearables to Revolutionize Clinical Trials set for Friday, June 11, at 11 a.m. EST. The talk is part of the Wearables and Medical IoT Interoperability and Intelligence Virtual Talk Series being hosted by IEEE. Registration for this free webinar is available here.

Forest Ray received his PhD in systems biology from Columbia University, where he developed tools to match drug side effects to other diseases. He has since worked as a journalist and science writer, covering topics from rare diseases to the intersection between environmental science and social justice. He currently lives in Long Beach, California.

View original post here:
OWEAR Opens Software and Datasets to Promote Technology in Research - Parkinson's News Today

Launcher moves on to develop avionics for its satellite delivery system – 3DPMN

Launcher, an NYC startup developing the worlds most efficient rocket to deliver small satellites to orbit, started by leveraging 3D printing to develop a high-performance propulsion system. In no segment like the space industry segment, 3D printing is enabling small teams to get into the game and compete with industrial giants on getting stuff into orbit. Now the company is ready to move on to the next stage: avionics, and to do so, having established a valid and credible proposition, it was able to attract NASA JPL & SpaceX veterans Kevin Watson and Rich Petras.

Avionics includes all the ground and vehicle fault-tolerant computers, electronics, wiring, and software for guidance & control, video, radio transmission, autonomous flight termination systems, and more. 3D printing may still play a role here in prototyping PCBs and in the production of custom enclosures.

Kevin Watson will head the team as Head of Avionics. He has over thirty years designing hardware and software for rockets and spacecraft. He started his career at NASA/JPL where he developed expertise in the area of space radiation effects in complex integrated circuits. Kevin then went on to work on several JPL spacecraft and development of Mars rover technologies. When he left JPL in 2008, he was group supervisor of the Advanced Computer Systems and Technologies Group, which is responsible for providing flight computer hardware to all JPL flight missions. During his tenure at JPL, Kevin had directly worked on, or developed technologies for the Galileo orbiter, Mars Pathfinder lander, Sojourner rover, Cassini orbiter, Mars Global Surveyor orbiter, Mars Phoenix lander, Spirit and Opportunity rovers, and the Curiosity rover projects.

In 2008 Kevin joined SpaceX to lead the development of flight computers for the Falcon 9 & Falcon Heavy rockets and Dragon spacecraft. He led the overall development of the fault-tolerant computing architecture for these vehicles. In addition, Kevin personally designed all computers and networking hardware used on these vehicles. This hardware was proven to be significantly more robust than the avionics typically used in aerospace, yet one to two orders of magnitude less expensive.

Rich Petras has joined as Head of Avionics Software. He has been working in the spacecraft avionics and embedded systems field for 35 years. He has long been an advocate for open source software and commodity hardware for spacecraft applications. His interests include space systems of all kinds, autonomous vehicles and robotics.

Rich Petras started his career working on the Space Shuttle and Space Station programs in Houston at IBM Federal Systems. He developed device drivers for flight hardware and ground systems for various operating systems including DOS, Windows, OS/2 and AIX. It was here that he was first introduced to Linux in 1992.

In 1996 Rich moved to JPLs research rover group where he was the first in the group to use Linux as a development platform for rover software. At JPL Rich worked with the team that developed a common rover software architecture (Claraty) that was the basis for many of the research rovers at JPL culminating in the software used on Spirit, Opportunity and Curiosity. Rich was responsible for testing the autonomous navigation software for the MER rovers. As part of the MER rover operations team he spent several months living on Mars time and was one of 3 people to see the first images come back from Spirit.

In 2008 Rich joined the SpaceX flight software team of about 10 people. He was responsible for developing the microcontroller code for the COTS UHF Communications Unit (CUCU) and Crew Control Panel (CCP) that were used to communicate with the Dragon spacecraft as it approached the ISS. In less than 10 months CUCU went from concept to delivery to the ISS on the Shuttle. Rich also developed the ISS crew laptop software and procedures used to update the CUCU and CCP code onboard the ISS. When SpaceX developed its own fault-tolerant flight computers Rich developed the synchronization software running on a standard Linux kernel to prove that the open-source OS was capable of meeting the real-time requirements needed to control the Dragon and Falcon 9 vehicles.

Excerpt from:
Launcher moves on to develop avionics for its satellite delivery system - 3DPMN

GitLab Acquires Peach Tech and Fuzzit to Expand its DevSecOps Offering – AiThority

TodayGitLab, the single application for the DevOps lifecycle, announced it has acquired Peach Tech, a security software firm specializing in protocol fuzz testing and dynamic application security testing (DAST) API testing, and Fuzzit, a continuous fuzz testing solution providing coverage-guided testing. These acquisitions will add fully-mature testing solutions including protocol fuzzing, API fuzzing, DAST API testing, and coverage-guided fuzz testing. This makes GitLabs DevSecOps offering the first security solution to offer both coverage-guided and behavioral fuzz testing techniques as well as the first true DevSecOps platform to shift fuzz testing left with these new offerings being made available within the GitLab CI/CD environment.

We believe GitLab provides best-in-class tools for the complete DevOps lifecycle on a single platform, said Sid Sijbrandij, CEO of GitLab. Bringing the fuzzing technologies of Peach Tech and Fuzzit into GitLabs security solutions will give our users an even more robust and thorough application security testing experience while enabling them to shift security left. This simultaneously simplifies their workflows and creates collaboration between development, security, and operations teams.

Recommended AI News:The New Version of Sapiens Cloud-Based DigitalSuite Provides an Advanced Set of Digital Capabilities to Carriers

In an era where open source software (OSS) continues to exponentially gain momentum and organizations push towards a zero-trust model, enterprise security concerns grow as potential threats and vulnerabilities extend the available attack surface to a point where even the largest businesses do not have the time nor resources to effectively assess their security posture.Fuzz Testing, sometimes referred to as fuzzing, is the process of providing bad inputs to a program to find bugs, crashes, and faults that could be exploited. Successful automation of application security testing combined with a shift left DevSecOps approach empowers development and security teams to test early and often, as well as collaborate in managing and lowering the organizations overall security risk. The addition of both coverage-guided and behavioral fuzz testing into the DevSecOps toolchain helps organizations find vulnerabilities and weaknesses traditional application security testing and quality assurance (QA) testing techniques often miss as these findings may not be directly tied to a known vulnerability (e.g. CVE IDs).

Once Peach Tech and Fuzzit technologies are fully-integrated, GitLab Secure customers will no longer need to depend on standalone fuzz testing solutions to meet their application security testing needs. Instead, they will have a fully-integrated security solution, fromAuto DevOps deploymentof security testing to vulnerability management and remediation. Furthermore, these acquisitions will allow GitLab to accelerate its roadmap for interactive application security testing (IAST) by extending Peach Techs DAST API security engine and Fuzzits crash correlation technology.

Recommended AI News:Pareteum Secures $17.5 Million in Financing to Position for Future Growth

Providing GitLab users with the best security testing tools is key to GitLabs DevSecOps core mission, said Michael Eddington, Peach Tech founder and CEO. The integration of Peach Techs technologies expands GitLabs shift security left capabilities making the future of security and DevSecOps a reality today for all GitLab users.

Fully integrating Fuzzit will make GitLab the first security solution that provides continuous coverage-guided fuzz testing natively within the CI/CD pipeline, said Yevgeny Pats, Fuzzit founder and CEO. Fuzzits support for multiple coverage-guided fuzzers combined with its crash analysis and correlation technology will add an important capability to the DevSecOps for GitLab users.

With the Peach Tech and Fuzzit technologies being incorporated into GitLabs DevSecOps platform, GitLab will further accelerate its application security testing roadmap to bring developers a native and seamless experience for discovering, fixing, and remediating security vulnerabilities and weaknesses.

GitLab provides accurate, automated, and continuous assessment of your applications, which enables users to proactively identify vulnerabilities and weaknesses to minimize security risk. GitLabs Secure stage is woven into the DevOps cycle to allow users to adapt security testing and processes, not as an additional step nor tool.

Recommended AI News:Netskope Announces David Fairman as Chief Security Officer for Asia-Pacific Region

Share and Enjoy !

Read more from the original source:
GitLab Acquires Peach Tech and Fuzzit to Expand its DevSecOps Offering - AiThority

What is Tor? Everything you need to know about the anonymity network – The Daily Swig

Peeling back the layers of the onion

The Tor anonymity network receives no small amount of attention from the mainstream press not least for its purported association with cybercrime and darknet drug dealings.

But what is Tor? And how secure is it? The Daily Swigasked several security and privacy experts to answer all of your questions, and many more.

Tor is an internet communication method for enabling online anonymity. The same term is commonly used to refer to both the anonymity network and the open source software that supports it.

The Tor name derives from The Onion Router the name of a pioneering privacy project run by the US Naval Research Lab.

Tor directs internet traffic through a network of thousands of relays, many of which are set up and maintained by volunteers.

Messages are encapsulated in layers of encryption, comparable to the layers of an onion. Inside the Tor network are sites, or hidden services.

Tor facilitates anonymized browsing by allowing traffic to pass onto or through the network through nodes that only know the immediately preceding and following node in a relay.

The source and destination of messages is obscured by encryption.

Tor directs internet traffic through a network of thousands of relays

The easiest way to access the Tor network is through the Tor Browser. The Tor Browser is automatically connected to the Tor network and will place all your requests through it, while ensuring anonymity.

In addition, the browser comes with an added functionality that improves your security and privacy by disabling JavaScript, automatic image, video loading and more.

The Tor Browser bundle is developed by the Tor Project, a non-profit organisation that carries out research as well as maintaining the software used by the Tor anonymity network.

The Tor Browser is currently available for Windows, Linux, and macOS. Theres also a version of Tor Browser for Android but not, as yet, an official version for iOS.

The Tor Browser is just a web browser, and you can still view the surface internet or clear web using the software.

However, the Tor Browser offers an extra level of privacy for normal web use or as a way to bypass government surveillance and censorship.

Some sites on the so-called dark web can only be accessed using Tor.

Vince Warrington, managing director of Protective Intelligence, explained: The dark web primarily those sites that can only be accessed via Tor is still generally the host to the illegal and illicit.

Whilst there are some legitimate sites (for example, the BBC now has a version of the BBC News website) our research indicates that over 95% of sites contain illegal or illicit material, he added.

While most people are only familiar with Tors use for illegal activities such as accessing online markets that sell drugs many other users access the Tor network.

These include:

Tor uses vary from bypassing censorship and avoiding online spying and profiling, to disguising the origin of traffic and hiding sensitive communications.

Tor offers anonymity, but only up to a point.

Those using the technology, and looking to keep their identity secret, also need to apply best practices in operational security (OpSec).

Charity Wright, a cyber threat intelligence advisor at IntSights and former NSA Chinese espionage expert, explained: Tor is a browser that can anonymize your network connection and your IP address that you are logging on from.

However, once you venture into illicit spaces, it is important to use pseudonyms and to hide your real name and never reveal your true location, nationality, or identifying pieces of information.

Any small clue can be used for people to find out who you are. Even more, federal agencies and law enforcement will use every detail about an online persona to find a wanted suspect, she added.

Tor is easily accessible via the Tor Browser

Tor is aimed at providing anonymous communication, but there have been numerous examples of people whose identities have been unmasked despite using Tor.

For example, The FBI recently closed a criminal case against the owner of Freedom Hosting, a dark web service that ran on the Tor network.

In addition, several research projects have shown varying levels of successful attacks that either attempted to eavesdrop on Tor-encrypted traffic or identify users.

Read more of the latest privacy news from The Daily Swig

Protective Intelligences Warrington commented: Its a myth to think that using Tor (even with a VPN) gives you total anonymity. With the tools we are using nowadays we can slowly strip back the layers of anonymity to find out who is behind the computer.

By using specialist software combined with open source intelligence basically searching the surface, deep, and dark web for small snippets of information we can build up a picture of a Tor user who is involved in illegal activity.

The era where Tor was a thorn in the side of law enforcement seems to be coming to an end.

Warrington explained: In the UK, the police and intelligence agencies have access to these tools, and the only limitation on identifying users of the dark web is resources. Theres simply not enough police dedicated to these kinds of investigations.

Tor has its limitations. Maintaining online anonymity is much more far reaching an exercise than simply using Tor.

Israel Barak, chief information security officer at Cybereason, told The Daily Swig: Tor, at its core, only gives you network level anonymity. It won't help you with applications on your computer that retain your identity and provide your identity to the internet service providers.

As an example, when an individual connects to Gmail, the computer or device you are using saves your identity, so you don't have to log on in the future.

Tor will not protect your anonymity from this, he warned.

INSIGHT How to become a CISO Your guide to climbing to the top of the enterprise security ladder

While the Tor network is designed to keep browsing habits away from service providers or webpage trackers, the most privacy-conscious users can go even further.

Boris Cipot, senior security engineer at Synopsys, added: To achieve the highest level of anonymity, one would need to get rid of any installation of OS or software with tracking, thus allowing the user to enter the Tor network with a clean slate.

This can be achieved with the use of Tails or Qubes OS, which run from a USB stick. They run fully in memory, so it is safe to use on existing hardware, but once activated, there is no trace of you.

The Tails operating system can be combined with Tor to help improve users anonymity online

Using Tor to browse the web involves accepting trade-offs.

The Tor Browser gives a user considerable anonymity advantages over other web browsers, such as Edge, Firefox, and Chrome.

While standard browsers can leak data that goes a long way to identifying the user even in private mode Tor was designed with anonymity in mind.

RELATED Firefox and Chrome yet to fix privacy issue that leaks user searches to ISPs

Tor does, however, saddle the user some significant limitations when browsing the internet.

For starters, browsing with Tor can be very slow, and so many people are unlikely to want to swap out their current browser.

Sluggish traffic speeds arise because data packets take a circuitous route through Tor, bouncing between various volunteers computers to reach their destinations.

Network latency is always going to be a problem in this scenario even if youre fortunate enough to avoid bottlenecks.

Tor also makes websites look like they were built 20 years ago, as much of the presentation and customization content of websites is stripped away by Tor, since these technologies can be used to identify the computer thats being used.

Opinions among experts are split over whether or not Tor has done much to directly affect browser development, but at a minimum the technology has done a great deal to raise awareness about privacy.

Chad Anderson, senior security researcher at DomainTools, commented: I dont know how much we can attribute back to modern browser improvements due to Tor, but I think privacy issues have certainly become more focused.

The browser shift to DNS-over-HTTPS, commonly called DoH, is a boost for user privacy and where DNS didnt work over Tor before, and in fact was an attack vector for de-anonymizing users, DoH fixes that, he added.

RECOMMENDED A guide to DNS-over-HTTPS how a new web protocol aims to protect your privacy online

Anderson continued: It used to be you could listen to traffic on a Tor exit node but now that SSL is near ubiquitous thanks to free certificates [from the likes of Lets Encrypt] thats less of an issue.

Arthur Edelstein, senior product manager for Firefox Privacy and Security, gave The Daily Swig a list of projects involving collaborations between Mozilla and Tor:

Current examples of Tors development projects include proof-of-concept work on human-memorable names, a collaboration with SecureDrop, the open source whistleblowing system based on Tor, among other examples.

Tor Project representative Al Smith told The Daily Swig: Currently, we only partnered with Freedom of the Press Foundation (FPF), but we want to continue expanding the proof-of-concept with other media and public health organizations in the future.

The Tor Project was recently obliged to lay off a third of its core staff in response to the coronavirus pandemic. The Daily Swig asked how the non-profit has sought to minimize the effect of this on development pipelines.

A representative of the Tor Project responded: Because we are now a smaller organization, we are creating more projects where different teams (e.g., Browser, Network, UX, Community, Anti-Censorship) come together and work on the same issue, instead of working in isolated groups on disparate pieces of work.

This is the approach we took to improve onion services for the Tor Browser 9.5 release, they added.

Despite the many and varied caveats about Tor the security experts we spoke to raised, none made any suggestion that the technology was unsafe.

In a typical response, Charles Ragland, a security engineer at threat intel agency Digital Shadows, explained: Generally speaking, as long as security updates are in place, and users are following privacy and anonymity best practices, yes, Tor is safe to use.

INTERVIEW Shodan founder John Matherly on IoT security, dual-purpose hacking tools, and information overload

Read more here:
What is Tor? Everything you need to know about the anonymity network - The Daily Swig

What is Pizzagate? The fake news scandal involving Hilary Clinton and Wikileaks explained – and why its trending amid Epstein inquiry – Edinburgh News

Comet Ping Pong pizzeria in Washington, DC (Photo: Alex Wong/Getty Images)

After Truth: Disinformation and the Cost of Fake News aired earlier this month, and surveys the effects of disinformation campaigns on social media and the impacts of well known conspiracy theories.

One of those theories is that of Pizzagate, and the film follows the growth of the story on forums like Reddit and 4chan, how it was fomented by the alt-right and Alex Jones, and then translated into a real-life dangerous situation.

Heres everything you need to know:

Pizzagate was a widely discredited news story which linked Hilary Clintons presidential campaign with a fictional human trafficking ring.

Its so-called because the alleged headquarters of the operation was the Comet Ping Pong pizzeria in Washington, D.C, which according to the conspiracy was also a meeting ground for Satanic ritual abuse.

It all began in March 2016, when the personal email account of John Podesta, Clinton's campaign manager, was hacked.

WikiLeaks published the emails later that year; conspiracy theorists claimed the emails contained coded messages that alluded to human trafficking and a child sex ring.

The emails contained multiple references to pizza and pizza restaurants, but there is no evidence that they are code or refer to anything else.

Had the claims been true, it would have implicated a number of high-ranking Democratic Party officials.

How was the story debunked?

The story has been widely debunked by a number of fact checking a news organisations from across the political spectrum even Fox News has said the story is completely false.

Theorists claimed that similarities between Comet Ping Pongs logo contained symbols linked to Satanism and paedophilia; the New York Times noted these similarities could be found in the logos of completely unrelated companies, if you looked hard enough.

Claims of a secret underground network beneath Comet Ping Pong were disproven by the fact the establishment has no basement, and evidence that John Podesta played a part in the kidnapping of Madeleine McCann were simply sketches of a suspect taken from the descriptions of two eyewitnesses.

No alleged victims have come forward and no physical evidence has been found.

Despite the theory having zero evidence to support it, that didnt stop those who opposed Hilary Clinton believing the story wholesale.

That included gunman Edgar Maddison Welch, who travelled down from South Carolina to confront the owners of Comet Ping Pong.

He entered the pizza restaurant in Washington D.C. packed with families on a Sunday afternoon and fired an automatic rifle.

Thankfully, no one was injured in the disturbance; Mr Welch told police he had driven from South Carolina to investigate the restaurant after reading online reports.

Why is Comet Ping Pong back in the news?

Though its been four years since the height of the Pizzagate story, the owners still have to deal with death threats and abuse.

As employees continue to search for a new rhythm [during the coronavirus pandemic], say the Washington Post, they still field calls from Pizzagate obsessors.

A few weeks ago, someone jammed the phone line for an entire day, frustrating customers who struggled to place orders. [Comet] has received almost 70 Pizzagate messages in recent weeks.

There also seems to be a renewed interest in the false story in the wake of news that US prosecutors want a face-to-face interview with Prince Andrew over the Jeffrey Epstein scandal.

The story has been trending on Twitter again, despite remaining completely untrue, with theorists linking Epsteins private jet the Lolita Express and his private Epstein Island with the restaurant.

There is no evidence to suggest any of it is true.

See original here:
What is Pizzagate? The fake news scandal involving Hilary Clinton and Wikileaks explained - and why its trending amid Epstein inquiry - Edinburgh News

How to Claim Political Asylum in the UK – Lexology

Few things are more terrifying than facing persecution from your countrys government. Here in Britain, although we may complain about our governments performance, thankfully no one fears physical or economic retribution for expressing views contrary to those in power at the time. British nationals do not have to seek political asylum in other countries.

But for millions around the world, freedom of speech, association, religion, and politics is a far-off dream. However, even modern countries can take actions that can trigger a person to seek political asylum.

One of the most famous cases is that of Australian-born Julian Assange, founder of Wikileaks. In 2012, Ecuador granted the editor asylum in its London embassy, two months after he sought refuge there to avoid extradition to Sweden to answer sexual assault charges. Mr. Assange argued that his human rights would be violated of he entered Sweden, as the allegations were false and designed ultimately to get him extradited to the United States.

He was quoted in the BBC in 2012:

"It was not Britain or my home country, Australia, that stood up to protect me from persecution, but a courageous, independent Latin American nation.

"While today is a historic victory, our struggles have just begun. The unprecedented US investigation against Wikileaks must be stopped.

"While today much of the focus will be on the decision of the Ecuadorean government, it is just as important that we remember Bradley Manning has been detained without trial for over 800 days.

Bradley Manning (now Chelsea Manning) is a former US soldier accused of leaking government material to Wikileaks.

The right to political asylum in international law

The right to seek political asylum is an ancient one. It was recognised by those who inhabited the classical Greek and Roman world, and by medieval people who would seek sanctuary in a church. Many famous people in history sought asylum in other nations, from Kings (Edward IV, Charles II), to philosophers (Descartes, Voltaire, and Hobbes).

The United Nations Universal Declaration of Human Rights of 1948, supported by the 1951 Convention Relating to the Status of Refugees and the 1967 Protocol Relating to the Status of Refugees declares

"Everyone has the right to seek and to enjoy in other countries asylum from persecution".

Understanding the difference between an asylum seeker and refugee

The term asylum seeker and refugee are often used interchangeably; however, legally, they are distinct. If you have reached a country and have applied for political asylum there, you are an asylum seeker. If your application is granted, you become a refugee.

How to seek asylum in the UK

You must make an asylum claim from within the UK. You cannot claim asylum from another country. Therefore, as soon as you reach Britain, whether that be by plane, train, or ship, you need to go to the UK Border Agency in Croydon (in south London) and claim asylum. Failure to do so may result in you not being able to access accommodation and benefits whilst your claim is being considered. You should also immediately contact an immigration solicitor who is experienced in asylum claims to help you with your application.

Asylum can be claimed under the following international treaties:

The UK is also a signatory to the European Union Asylum Qualification Directive. This Directive is designed to provide consistency across the European Union (EU) regarding who qualifies for humanitarian protection and the level of public funds an asylum seeker is entitled to. When the UK leaves the EU on 31 December 2020, this Directive is set to become retained law. However, Britain will not be obliged to take on any developments to this and other EU Directives relating to asylum seekers.

When you apply for asylum, you will be assigned a caseworker who will investigate your asylum claim and make all the decisions relating to it. You will be asked to attend a Screening Interview, where UK Border Agency officials will check if you have made any previous asylum claims and provide you with a reference number.

After the Screening Interview, you may be taken to either the Harmondsworth Immigration Removal Centre or Yarls Wood Immigration Removal Centre and held in detention until a decision on your application is made. You will not normally be detained if:

You will need to attend an Asylum Interview with your caseworker. This is where you have the chance to tell your story about why you fled your home country, your journey to the UK, and why you need political asylum. You can bring your legal representative to this interview.

Applications are decided within six months; however, this can take longer if there are complications. Having legal representation from the outset can help shorten the length of time it takes to get a decision.

If you are refused asylum, you can appeal.

See also How to apply for Asylum and become a Refugee in the UK

Final words

Claiming asylum is not easy, and Britains Conservative government has been notoriously tough on allowing asylum claims to succeed. It is therefore crucial that you get the best legal advice from the outset. Having an experienced immigration lawyer on your side dramatically increases your chances of a successful political asylum application.

As An Asylum Seeker What Are My Options For Getting Married To My British Spouse? Home Office Under Fire For Covid-19 Immigration Detention And Bail Decisions Long Immigration detention periods violate ECHR Article 5 - JN v United Kingdom UK Immigration Detention Crisis COVID-19

Continue reading here:
How to Claim Political Asylum in the UK - Lexology