Dash Text Is an Excellent Option to Send Cryptocurrency to Relatives – The Cryptocurrency Analytics

Dash is a payments focused cryptocurrency. The marketing feature for this cryptocurrency are the instant transaction confirmation. It provides protection against double spending.

Dash is basically based on Bitcoin. It is compatible with several features of the Bitcoin ecosystem. Individuals and businesses can use Dash. New users who learn about how to buy and spend dash start off with a wallet. There are a few features that sets Dash apart from the Bitcoin Protocol in that it has got various improvements like a two-tier incentivized network the master node network.

Dash Tweeted: Release Process at Dash CoreGroup Dash Core Group is excited to announce changes to how we approach future releases for #Dash Platform. These changes aim to make our releases more predictable, reliable, and transparent.

For those who want to send money to their relatives Dash Text is an excellent option. Even those who do not have a Dash Text wallet need not worry. They need to just accept the invitation and instantly they will be able to receive their Dash.

One of the Dash Enthusiast commented: Hey!. Why dont you take a look at Cuba? DashText can be a great option for participation in crypto for millions of Cubans who still do not have connectivity.

Sydney Ifergan, the crypto expert tweeted: Sending money to family is becoming very important. If DashText makes it work easier like helping Dash coin to dollar, Dash to PHP, MYR, INR or others people should consider trying it.

Dash Core Group have made some changes in the way they will be managing their future releases. These changes will eventually make the releases more predictable, reliable and transparent. These changes are expected to foster greater activity in the Dash developer ecosystem. The agile development environment is expected to keep away from erroneous assumptions during the design and the implementation of the software. Thus avoiding the idea of devoting too much time to unnecessary and undesired features.

Dash Core Group recently tweeted: Release Process at Dash CoreGroup Dash Core Group is excited to announce changes to how we approach future releases for #Dash Platform. These changes aim to make our releases more predictable, reliable, and transparent.

The organizational structure of the Dash Core Group is still in the fluid process of its creation. The change in the release process is a reflection of our growth. This is also representative of numerous internal changes. They believe that these changes will place then in a better position of delivering on the promise of true digital cash.

With distributed ownership a long and coordinated effort will be required to update the nodes to the newest software version. An increase in the frequency of releases is expected with the current changes.

See original here:
Dash Text Is an Excellent Option to Send Cryptocurrency to Relatives - The Cryptocurrency Analytics

[VIDEO] Akoin Cryptocurrency to Power the Mwale Medical and Technology Smart City in Western Kenya – bitcoinke.io

Akoin,the Stellar-based coin by reknowned rapper, Akon, has secured a deal that will see the cryptocurrency become the main currency of Mwale Medical and Technology City (MMTC) in Western Kenya.

This will be the first time Akoin will be used both by the public and on such a large scale.

SEE ALSO:The Akoin Cryptocurrency for Africa to Launch on the Stellar Network, Rapper Akon Reveals

Mwale Medical and Technology City (MMTC) is a USD $2 billion sustainable metropolis centered around a state-of-the-art medical and technology complex located within Butere Sub-county, Kakamega County, of the Republic of Kenya. Construction on the 5,000-acre project began in 2014 and will complete in December of 2020. It is comprised of five districts being built in three phases. Phases 1 & 2 are 100% complete and construction of Phase 3 is currently underway with 40% percent complete.

The massive -5-district project includes:

The entire project and activities are expected to be powered solely by the Akoin cryptocurrency.

In a statement, Akoin said:

We just announced our partnership with Mwale Medical and Technology City (MMTC), the green smart city in Western Kenya. Akoin will process all the transactions occurring within the city!

Akoin will see a minimum of 1 million transactions in the first year at this City and 100 million transactions annually within 5 years.

A similar 2,000-acre smart city project on the outskirts of Dakar, Senegal, is also underway and will be powered by the Akoin cryptocurrency.

Being able to make your own decisions financially is the key. A lot of the things in Africa are not controlled by Africans and I think this will give Africa their whole resources and ideas and be able to utilize the continent to their own benefit. ~ Akon

Follow us onTwitterfor latest posts and updates

Open aPaxful Bitcoin Trading Accounttoday!

Read more:
[VIDEO] Akoin Cryptocurrency to Power the Mwale Medical and Technology Smart City in Western Kenya - bitcoinke.io

Babies now on board in Julian Assange’s mammoth US extradition tussle – The Age

There was one piece of happy news on a doleful Easter day in Britain: Julian Assange had managed to father two children whilst locked up in the Ecuadorian embassy. This proves that love will find a way, even if your self-isolation is being enforced by the British police and the CIA.

It drew attention to the plight of this Australian publisher, who faces charges in America carrying a maximum of 175 years' imprisonment, all for revealing, back in 2010, truthful facts of considerable public interest.

WikiLeaks founder Julian Assange with Gabriel, the first of the two children that he was said to have fathered while in the embassy.Credit:Stella Morris

He now languishes, probably for several years, in Belmarsh, Britains toughest (and mainly for terrorist suspects) prison while he fights the US attempt to extradite him for trial in Maryland. If convicted there, on essentially the same espionage act charges which brought his source, Chelsea Manning, a 35-year sentence, he can expect a somewhat heavier term 50 years, perhaps time enough for him to die in an American Supermax jail. Manning was pardoned by US president Barack Obama, but there is little prospect that Assange would receive clemency from a second-term President Trump.

His defence is, principally, that the extradition proceedings are brought for political purposes, to deter other publishers from revealing what US forces do, even illegally and what US diplomats know (but the media does not) about human rights abuses. This argument will be developed later in the year at Westminster Magistrates Court.

Read more:
Babies now on board in Julian Assange's mammoth US extradition tussle - The Age

Spanish firm that spied on Julian Assange tried to find out if he fathered a child at Ecuadorian embassy – EL PAS in English

The spying that WikiLeaks founder Julian Assange was subjected to during the seven years that he lived at the Ecuadorian embassy in London extended to his most intimate relations.

The Spanish security firm Undercover Global SL, which had been tasked with protecting the embassy, monitored every visit that Assange received, and even investigated whether he might have fathered a child during this period.

A few days ago, a 37-year-old lawyer named Stella Morris, who is a member of Assanges legal team, told The Mail on Sunday that Assange, 48, is the father of her two children, aged one and two. Morris said they were conceived while the WikiLeaks founder was staying at the embassy to avoid extradition to the United States on charges of leaking thousands of classified intelligence documents.

There was an attempt to take the babys pacifier

David Morales, a former military official who owns the security firm Undercover Global SL, is under investigation by Spains High Court, the Audiencia Nacional, for spying on Assanges meetings with his lawyers and allegedly handing information to the CIA.

Morales suspected that a baby who was repeatedly brought into the embassy by Stephen Hoo, an actor friend of Assanges who paid him regular visits, might really be the cyberactivists own child, and these visits were recorded.

Morales even issued orders to steal the babys diapers to analyze the contents for DNA, although the task was never carried out. Reports were drawn up about Stella Morris and about Stephen Hoo, according to video and documentary material to which EL PAS has had access.

It was an employee of the Spanish security firm who alerted Assanges partner about the plans: They wanted to prove that it was his child in a bid to harm him. There were talks with three Madrid labs to see how the parental connection could be proved. One of them said that DNA cannot be extracted from feces. There was an attempt to take the babys pacifier, said a former employee of Undercover Gobal SL.

A company report dated October 27, 2017 details Hoos visits to the Ecuadorian embassy and sheds light on Morales obsession with getting to the bottom of Assanges best-kept secret during his life as a recluse.

The report noted that Hoo always showed up for his visits in the company of a minor that he tells the security team is his own child. The author of the report also wrote that attempts at seeing identification for the child were fruitless, and that Stella Morris always arrives a few minutes before Stephen Hoo, and departs a few minutes after the latter leaves, although normally she stays for entire days with the host [codename for Assange] and even spends entire nights with him.

After the unnamed employee alerted Morris, the babys visits to the embassy ended.

They wanted to prove that it was his child in a bid to harm him

Stella Morris arrives at the Hotel [the embassy] at 1.49pm and leaves at 4.11pm while Stephen Hoo arrives at 2.06pm and leaves at 3.56pm on November 25, reads the report, which includes two photographs of Hoo walking into the embassys entrance hall and carrying one of Assanges children in a baby carrier.

The report provides details about the actor obtained from the British press, and speculates that Hoo might not really be the babys father. Based on information regarding the possibility that the host [Assange] may have fathered a child during his confinement at the embassy, and given the recent visits by this baby, always in the company of Stella Morris, we posit that, due to the ties of affection between the latter and the host, it cannot be ruled out that the baby could have some kind of relationship between both. The data obtained so far does not allow us to make this assertion, and we continue to work on collecting evidence that might lead to a more accurate result.

Morris, who said she and Assange are planning to get married, made her revelations to The Mail on Sunday after first telling a judge in the hopes that the cyberactivist will be granted bail. Assange has been in Belmarsh Prison ever since he was forcibly evicted from the embassy a year ago. If he were extradited to the US, he would be facing up to 178 years in prison.

Morales was arrested in October and released while the courts investigate him for alleged violations of privacy and client-attorney privilege, besides misappropriation, bribery and money laundering. The criminal investigation was launched a few weeks after EL PAS revealed video, audio and documentary material showing that the Spanish company had spied on Assanges meetings with his lawyers and aides.

English version by Susana Urra.

Given the exceptional circumstances, EL PAS is currently offering all of its digital content free of charge. News related to the coronavirus will continue to be available while the crisis continues.

Dozens of journalists are working non-stop to bring you the most rigorous coverage possible and meet their mission of providing a public service. If you want to support our journalism, you can do so here for 1 for the first month (10 from June). Subscribe to the facts.

See more here:
Spanish firm that spied on Julian Assange tried to find out if he fathered a child at Ecuadorian embassy - EL PAS in English

Intensive CIA spying on Assange targeted his infant child – World Socialist Web Site

By Oscar Grenfell 18 April 2020

Spanish daily ElPasand the Italian newspaper Fatto Quotidiano this week revealed new details of the intensive surveillance and dirty tricks operations targeting WikiLeaks founder Julian Assange while he was a political refugee in Ecuadors London embassy.

Both articles indicated that a particular focus of the spying, which was allegedly orchestrated by the US Central Intelligence Agency, was identifying Assanges immediate family members. It raises the ominous possibility that plans were afoot to harm Assanges relatives, including his infant child.

The reports are the latest exposures of the spying, which was conducted by UC Global, a private Spanish firm contracted by the Ecuadorian authorities to provide security to the embassy building.

The companys director David Morales, a former Spanish military officer, is accused of having met with US authorities in early 2015 and agreed to secretly furnish the CIA with material gathered within the embassy in an operation that escalated over the ensuing three years.

Morales was arrested last year and charged with a raft of offenses, including over the surveillance. Assange has taken out a criminal complaint against the mercenary over the activities, which allegedly breached the legally-enshrined right to attorney-client privilege, along with the privacy of Assange and dozens of others.

Last week, Stella Morris, a 37-year-old lawyer, revealed that she has been in a personal relationship with Assange since 2015 and that the couple have two young children together.

The ElPasreport indicates that the older child, Gabriel, born in 2017 while Assange was still in the embassy, was a particular focus of UC Globals surveillance.

The Spanish-daily stated that detailed reports were prepared on Morris visits to and from the embassy. Stephen Hoo, a friend of Assange, often brought Gabriel to the building and was also subjected to surveillance. Hoos relationship status and even his sexual orientation were scrutinised.

ElPas wrote: Moraless suspicion was that a minor who entered the Ecuadorian Embassy in London hanging on a baby carrier carried by actor Stephen Hoo could be the son of the cyber-activist (48 years old) and Morris (37 years old).

UC Global was prepared to go to extraordinary lengths to identify the paternity of the baby. An anonymous ex-employee of the company confirmed that UC Global had considered stealing one of the infants used diapers or a pacifier to test for DNA.

The former employee stated: They wanted to prove that it was his son to try to harm him. One got to speak with three laboratories in Madrid to see how the parental issue could be accredited. One of the labs told us that DNA could not be obtained from the stool. Then they tried to get his pacifier.

It is not clear whether the witness meant that UC Global intended to harm Assange, the baby or both. However given the sordid history of the CIA, nothing can be excluded. Morris stopped bringing Gabriel to the embassy after being alerted by an employee of the operation and has since stated that she feared for his safety.

Writing in Fatto Quotidiano, longtime WikiLeaks collaborator Stefania Maurizi revealed that the targeting of Morris and her young family extended far beyond the walls of the embassy. Maurizi cited an email by Morales to his staff, ordering them to pay special attention to Morris. It noted that the company believed that Morris was not using her original name. The lawyer had, in fact, legally changed her name to avoid the operations of the intelligence agencies.

Morales wrote: If necessary I want a person fully dedicated to this activity, so if you have to hire someone to do it, tell me. All this has to be considered top secret so that the diffusion is limited.

In other words, UC Global was apparently planning to assign a full-time investigator to follow Morris. Morales also stated that the company had identified a relative of her mother in Catalonia, in an indication that the company was seeking to track down Morris family members around the world.

There have been previous indications that UC Global, acting on behalf of the CIA, was not only seeking to monitor every aspect of Assanges life, but also plotting physical attacks against him.

In the most detailed public overview of the embassy spying, Andy Mller-Maguhn, a German computer expert and close collaborator of Assange, explained that the UC Global operation dramatically escalated in 2017.

In December that year, Morales ordered that staff conduct a survey of the building, aimed in part at finding new areas where hidden cameras and microphones could be placed, in a bid to overcome measures Assange had taken to stymie the spying.

Most ominously, Morales also passed on to his staff a request from his American friends for a list of potential physical access points to the embassy. According to Mller-Maguhn, Morales asked his employees about the possibility of leaving the door of the diplomatic mission open, arguing that it was an accidental mistake, to allow the entry and kidnapping of the asylum-seeker.

The timing of these CIA operations is significant. They followed WikiLeaks publication, beginning in March 2017, of Vault 7, a vast trove of CIA documents exposing the global spying and hacking operations of the agency.

Then CIA director and current Secretary of State Mike Pompeo immediately responded by branding WikiLeaks a hostile non-state intelligence agency. At the same time, the US Federal Bureau of Investigation put together a counter-espionage squad to investigate WikiLeaks. Its work would culminate in the issuing of 18 charges against Assange, including 17 under the Espionage Act.

FBI special agent Megan Brown, who played a leading role in the taskforce, filed an affidavit against Assange, laying the basis for at least some of the charges against him, in December 2017.

In other words, at the same time that the CIA and its proxies were violating the privacy of Assanges family and considering illegally kidnapping the WikiLeaks founder, the FBI and the Justice Department were finalising a legal case against him.

Morales appears to have played a central role in both. ElPas previously reported that metadata from Morales emails placed him in Alexandria, Virginia, on March 1 and 2, 2017. This was just weeks after the establishment of the FBI squad. Alexandria is home to the largest concentration of intelligence employees in the US and was, at the time, the site of a secret grand jury impaneled to help concoct charges against Assange.

The close connection between illegal activities targeting Assange and his infant child, and the preparations for a US indictment of the WikiLeaks founder, further underscores the fact that he is the subject of what can only be termed an attempted extraordinary rendition. The charges and the formal extradition process are only a figleaf for a CIA operation aimed at destroying Assange because of his exposure of US government crimes.

As he awaits a show trial for his extradition to the US, scheduled to resume on May 18, Assange faces the imminent danger of being infected by the coronavirus pandemic as it sweeps through Britains prison system.

Earlier this month, Magistrate Vanessa Baraitser rejected an application for Assange to be released from Belmarsh Prison on bail, despite the fact that he has not been convicted of a crime and suffers from a raft of medical issues, rendering him vulnerable to COVID-19.

Maurizi published portions of Morris previously unreleased statement to the bail hearing. Morris stated: I have feared with strong reason for a long time that I will lose Julian to suicide if there is no way in which he can stop his extradition to the USA. I now fear I may lose him for different reasons and sooner to the virus. I know very well that his health is extremely poor and can detail the different aspects of that poor health.

Morris outlined the dire impact that long stretches of effective solitary confinement in Belmarsh had on Assange. When in the Healthcare unit he was taken from a ward into a single cell for many months in a form of isolation save for a very few hours each day I noticed how he, as I described at the time was visibly very diminished like a withering flower.

Baraitser was unmoved, decreeing not only that Assange must remain behind bars, but also that it would be in the public interest for Morris and her young children to be named in the media, denying their right to anonymity.

The author also recommends:

Julian Assanges partner Stella Morris speaks out: His life is on the brink[13 April 2020]

' ]; var html = htmlArray.join(''); $('body').prepend(html); $('#popupfundappeal > .wrapper > .text > .button').click(function() { _paq.push(['trackGoal', 22]); }); $('#popupfundappeal > .wrapper > .text > .link').click(function() { $('#popupfundappeal').remove(); _paq.push(['trackGoal', 23]); return false; }); var expireDate = new Date(); var minutes = 180; expireDate.setTime(expireDate.getTime() + (minutes * 60 * 1000)); $.cookie('popupfundappeal', 'seen', { expires: expireDate, path: '/', domain: 'wsws.org', secure: false }); setTimeout(function() { $('#popupfundappeal').addClass('active'); }, 2000); } } /* if (!$.cookie('popupfundappeal')) { var expireDate = new Date();var minutes = 180;expireDate.setTime(expireDate.getTime() + (minutes * 60 * 1000));$.cookie('popupfundappeal', 'unseen', {expires: expireDate,path: '/',domain: 'wsws.org',secure: false}); } */ }function appendInlineChart() {if (window.location.href.indexOf('/en/articles/2019/04/20/chic-a20.html') != -1) {var htmlArray = ['

'];var html = htmlArray.join('');$('#content > p').slice(-5,-4).before(html);}if (window.location.href.indexOf('/en/articles/2018/12/20/kil1-d20.html') != -1) {var htmlArray = ['

'];var html = htmlArray.join('');$('#content > p').slice(-5,-4).before(html);}if (window.location.href.indexOf('/en/articles/2018/12/21/kil2-d21.html') != -1) {var htmlArray = ['

'];var html = htmlArray.join('');$('#content > p').slice(1,2).before(html);htmlArray = ['

'];html = htmlArray.join('');$('#content > p').slice(9,10).before(html);htmlArray = ['

'];html = htmlArray.join('');$('#content > p').slice(9,10).before(html);}if (window.location.href.indexOf('/en/articles/2018/12/22/kil3-d22.html') != -1) {var htmlArray = ['

'];var html = htmlArray.join('');$('#content > p').slice(1,2).after(html);htmlArray = ['

'];html = htmlArray.join('');$('#content > p').slice(2,3).after(html);}}function appendInlineHeritageAd() {var htmlArray = ['

'];var html = htmlArray.join('');$('#content > p').slice(-25,-24).before(html);}function appendInlineNewsletterAd() {var htmlArray = ['

'];var html = htmlArray.join(''); var pos = $('#content > p').length / 2;$('#content > p').slice(-(pos+1),-(pos)).before(html);}function appendInlineSepjoinAd() {var htmlArray = ['

'];var html = htmlArray.join(''); var pos = $('#content > p').length / 2;$('#content > p').slice(-pos,-(pos-1)).before(html);}function appendCookieBar() { if ($.cookie('cookies') != 'accepted_20181101') {var htmlArray = [ '

'];var html = htmlArray.join('');$('body').append(html);$('#cookies > p > .button-accept').click(function() {var expireDate = new Date(); var days = 365; expireDate.setTime(expireDate.getTime() + (days * 1440 * 60 * 1000)); $.cookie('cookies', 'accepted_20181101', { expires: expireDate, path: '/', domain: 'wsws.org', secure: false });$('#cookies').remove();return false; });}} function callSidebarFunctions() { //appendTopAppeal(); //appendInlineAppeal(); //appendInlineAppeal2(); //appendBottomAppeal(); //appendBottomAppeal2(); if (window.location.href.indexOf('demo=topbar') != -1) { appendFundAppeal2015(); } if (window.location.href.indexOf('demo=bottombar') != -1) { appendFundAppeal2016(); } // appendCookieBar(); if (window.location.href.indexOf('demo=mayday') != -1) { popupMaydayAd(); } if (window.location.href.indexOf('demo=popup') != -1) { popupFundAppeal(); } //popupEventAd(); appendInlineChart(); if (window.location.href.indexOf('/en/articles/2017/06/23/pref-j23.html') != -1) { appendInlineHeritageAd(); } if (window.location.href.indexOf('/en/articles/2017/06/29/pers-j29.html') != -1) { appendInlineSepjoinAd(); } if (window.location.href.indexOf('/en/articles/2017/09/09/irma-s09.html') != -1) { appendInlineNewsletterAd(); } if (window.location.href.indexOf('/en/articles/2019/02/19/lett-f19.html') != -1) { $('#content').children('h5').remove(); }};

View original post here:
Intensive CIA spying on Assange targeted his infant child - World Socialist Web Site

Netflix Party Got Hacked With Threats and Mysterious Pro-WikiLeaks Videos – VICE UK

This week, like usual, we, VICE UK, hosted a Netflix Party for the fifth edition of our weekly Corona Film Club series. For those who havent been involved, we screen a film every Wednesday, chat along with the readers and post the responses in a follow-up blog the next day. Anyway: this time we were hacked.

Halfway through our viewing of Shrek the Third, the film disappeared and was replaced by a looping one and a half minute Dailymotion video that implored viewers to write to their local MP to appeal against the UK-US extradition of WikiLeaks founder Julian Assange. Shrek never returned. The video which began with 2010 Wikileaks footage showing a US air crew shooting down Iraqi civilians and ended with a 2019 news clip of Assange being dragged out of the Ecuadorian embassy played again and again. There's a screenshot above.

It was very bizarre. But this isnt the only time Netflix Party has been targeted with the same video. UK indie band Glass Animals encountered a similar video when they hosted a Netflix Party on 5th April. I don't know exactly what happened, but we were watching Spirited Away for our weekly cinema club, got five minutes in, then the whole website glitched and went to a Dailymotion site just playing some of Julian Assange's WikiLeaks videos. On repeat, Glass Animals singer Dave Bayley told us.

Twitter user @chachisays also seems to have come across the same video at their Netflix Party on March 21. They tweeted: 15 minutes in and I got redirected to an ad telling me to contact my MP to stop extradition on Julian Assange

The Wikileaks video we encountered in VICEs viewing party of US troops shooting Iraqi civilians was released in full-length form on 5th April, 2010 exactly ten years before Glass Animals hosted their viewing party. VICE has reached out to Wikileaks for comment.

Like video apps Houseparty and Zoom, Netflix Party has been touted by publications like the New York Times and the Guardian as a communication lifeline for those in lockdown during the pandemic. But the widespread adoption of new platforms rarely goes as planned: random users can pop up uninvited on Zoom chats a practice known as Zoombombing and the same goes for Houseparty.

VICE has seen several reports from Netflix Party users who say their private viewing sessions were interrupted by strangers who proceeded to send threatening messages using the apps chat function. Asli Ali, 18, was watching You Get Me a 2017 thriller film starring Bella Thorne as an emotionally disturbed stalker when toward the end of the film an unknown user who hadnt joined the party previously began typing.

Netflix Party usually alerts everyone when someone new joins the group, but this time it didn't. The user sent a message to the group that said the next victim. They then alluded to the film's plot and referred to themselves as Bella Thornes character.

Everyone else was in the party already, so they couldn't have been pranking us, says Asli, who explains their Netflix Party link was private and hadnt been shared with anyone beyond those already in the virtual room, and that "the next victim" message just popped up. It doesn't add up and it left me and my friends on a call for hours trying to figure out who it was.

Georgia Weidman, a cybersecurity expert and author of A Hands-on Introduction to Hacking, told VICE that were seeing more of these hacks because the numbers of users on these platforms have increased exponentially. There were always attackers attacking online meetings, mobile devices, etc. but now thats where the most users and the most sensitive data can be found.

Combine the amount of growth these apps are getting and the state of the economy and how much security budgets are being slashed right now, and I find it impressive that Zoom has been able to respond as well as they have to the security issues that have been raised. It seems its now Netflix Partys turn to beef up their security and privacy program.

When VICE reached out to Netflix Party, they said they were taking steps to repair the situation. A spokesperson told us that they have identified the issue and have posted a fix in the most recent update (V.1.7.9) to Netflix Party: It may take a few days for Google to review the extension, but the new version should automatically update and roll out in a few days.

@ryanbassil & @IamHelenThomas

See original here:
Netflix Party Got Hacked With Threats and Mysterious Pro-WikiLeaks Videos - VICE UK

Celebrity inmates who are citing coronavirus to try to get released – New York Post

From gun-toting rappers to sleazy politicians, criminals all over the world are using the coronavirus pandemic as way to weasel out of prison time.

Celebrity jailbirds from New York City to England including Ponzi schemer Bernie Madoff, disgraced comic Bill Cosby and accused document-leaking spy Julian Assange are demanding to be sprung due to the deadly bug.

Here are their crimes, their excuses for release and what judges have to say about it.

Rap sheet: President Trumps disgraced former lawyer and fixer pleaded guilty to tax evasion and campaign finance violations in 2018. He was sentenced to three years behind bars and is serving time at Otisville Federal prison upstate.Why I should be free:Cohen argues that he should be released because the federal prison system is demonstrably incapable of safeguarding and treating B.O.P. inmates who are obliged to live in close quarters and are at an enhanced risk of catching the virus.Result:His request was first rejected but a judge later ruled that he will be allowed to finish his sentence in home confinement.

Rap sheet: The 53-year-old I Believe I Can Fly singer is accused of sexual exploitation of a minor and child pornography and is awaiting trial at the Metropolitan Correctional Center in Chicago.Why I should be free: Kelly argues that the fact he recently underwent surgery for a hernia along with his age put him at risk of contracting the virus. He also says some of his fellow inmates have been quarantined with with flu-like symptoms.Result: Rejected.

Rap sheet: The big mouthed 49-year-old lawyer, known for representing porn actress Stormy Daniels in her lawsuits against President Trump, tried to extort millions of dollars from the athletic wear company Nike. He was awaiting sentencing at the Metropolitan Correctional Center in Manhattan.Why I should be free: Avenatti says hes at high risk of contracting coronavirus because he had a recent bout with pneumonia, and his cellmate was removed due to flu-like symptoms.Result: Approved. A judge allowed him to be temporarily freed in order to ride out the pandemic at a friends house in Los Angeles.

E. Jason Wambsgans/Chicago Tribune via AP, Pool, File

Steven Hirsch

Damaso Garcia, a two-time All-Star and former Yankees second baseman,...

Rap sheet: Madoff ran the largest Ponzi scheme in history, scamming 4,800 clients out of $64.8 billion. He was sentenced to 150 years behind bars and is doing the time at the Federal Correctional Complex in Butner, N.C.Why I should be free: The disgraced 81-year-old Ponzi king says he has terminal kidney disease, which puts him at risk of contracting the virus, and the federal prison system has consistently shown an inability to respond to major crises.Result: Pending.

Rap sheet: The Brooklyn-born hip-hop star pleaded guilty to gang-related racketeering, assault, firearms offenses and drug trafficking. He was sentenced to two years behind bars and was serving time at a private prison in Queens.Why I should be free: The 23-year-old rainbow-haired rapper says his asthma puts him at risk of death if he contracts the virus behind bars.Result: Approved. A Manhattan federal court judge ordered him released immediately into home confinement, citing extraordinary and compelling medical reasons.

Rap sheet: The 82-year-old former comic great drugged and sexually assaulted Temple University employee Andrea Constand at his home in 2004. He was sentenced to three to 10 years in prison, and is behind bars at the State Correctional Institution Phoenix prison in Skippack Township, Penn.Why I should be free: Cosby, once considered Americas TV dad, says at least one prison officer has tested positive for COVID-19 at the Pennsylvania jail where hes incarcerated. His spokesman says he is elderly and blind and has close contact with prison workers who take him to his medical appointments.Result: Pending.

What he did: The notorious Pharma Bro jacked up the price of the AIDS drug Daraprim nearly 5,000 percent in 2015. He was convicted of fraud and is serving a seven-year prison sentence at the Metropolitan Detention Center in Brooklyn for scamming investors in hedge funds he ran.Why I should be free: Shkreli, 37, always known as an online troll, claims he wants to help research a treatment for the coronavirus, saying that authorities should let him out for three months so he can do laboratory work under strict supervision.Result: Pending.

AP Photo/Matt Slocum, File

Damaso Garcia, a two-time All-Star and former Yankees second baseman,...

What he did: The disgraced New York state senator used his powerful position to get his son Adam cash and jobs. He was convicted, sentenced to five years behind bars and is doing time at the Federal Correctional Institution in Danbury, Conn.Why I should be free: He asked to finish his sentence in home confinement because the virus has spread through federal prisons.Result: Released. The 72-year-old former Albany powerbroker was allowed to go into home custody Wednesday after testing positive for the coronavirus.

What he did:The WikiLeaks founder is awaiting trial at the Belmarsh prison in London for allegedly violating espionage laws when he published a series of leaks given to him by US Army intelligence analyst Chelsea Manning.Why I should be free: Assange, 48, applied for bail, saying the virus caused him to fear for his life at the Belmarsh prison in London.Result: Pending.

Rap sheet: The Gambino mob soldier conspired to whack a government witness at a Staten Island strip club in 1998. He pleaded guilty, was sentenced to 20 years and is serving time at the Federal Correctional Institution in Danbury, Conn.Why I should be free: He says hes sick as dog and suffering from COVID-19. He seeks immediate release into home confinement.Result: Pending.

Rap sheet: The ex-FIFA soccer honcho accepted tens of millions of dollars in bribes and kickbacks in exchange for TV marketing rights and was convicted of racketeering conspiracy, money laundering and other charges. He was convicted, sentenced to nine years and doing time at the Federal Correctional Institution in Miami.Why I should be free: Napout, 61, says he filed a request for compassionate release because of the coronavirus pandemic.Result: Denied. A judge rejected him, saying the court does not find that defendants particular circumstances, as they relate to the COVID-19 pandemic, justify his release. He added that Napout is a flight risk.

Photo by JUSTIN TALLIS/AFP via Getty Images

REUTEREUTERS/Brendan McDermidRS

REUTERS

Damaso Garcia, a two-time All-Star and former Yankees second baseman,...

Rap sheet: Mexicos former top cop is awaiting trial at the Metropolitan Detention Center in Brooklyn for allegedly taking millions of dollars in bribes stuffed inside suitcases from Joaquin El Chapo Guzmans notorious Sinaloa cartel.Why I should be free: The 51-year-old says he faces a high risk of contracting COVID-19 if he stays behind bars in Brooklyn, where inmates have tested positive for the coronavirus.Result: Denied. A judge says hes a flight risk.

Rap sheet: The Born to Kill gang kingpin was responsible for murdering a states witness, committing robberies engaging in an extortion scheme in Chinatown. He was convicted, sentenced to life and is being held at a federal medical facility in Massachusetts.Why I should be free: Thai says his ailing health puts him in danger of serious illness if he contracts COVID-19. If released, he plans to hole up with his sister and brother-in-law in Texas.Result: Pending

Read the original:
Celebrity inmates who are citing coronavirus to try to get released - New York Post

Signal: Well be eaten alive by EARN IT Acts anti-encryption wolves – Naked Security

Recent weeks have been rough, with droves of people turning to virtual communication for sensitive conversations theyd like to keep private medical visits, seeing friends faces and hearing their voices, or solace for those whove lost loved ones.

Understandably, the end-to-end (E2E) encrypted messaging app Signal has been signing up new users at unprecedented rates and flipping the switch on servers faster than we ever anticipated, Signals Joshua Lund said last week.

and you can say goodbye to any of that staying stateside if the EARN IT Act passes.

Signal claims that legal and liability concerns would make it impossible to operate in the US. That doesnt mean it would shut up shop entirely, but it could mean that the non-profit would need to move operations now based in the US.

Called the Eliminating Abusive and Rampant Neglect of Interactive Technologies Act (EARN IT Act), the bill was introduced last month. If it passes, EARN IT would require tech companies to meet safety requirements for children online before obtaining immunity from lawsuits. You can read the discussion draft here.

To kill that immunity, the bill would undercut Section 230 of the Communications Decency Act (CDA) from certain apps and companies so that they could be held responsible for user-uploaded content. Section 230, considered the most important law protecting free speech online, states that websites arent liable for user-submitted content.

The proposed legislations details havent been ironed out yet, but at this early point, the bills intent to water down Section 230 turns that protection into a hypocritical bargaining chip, Lund wrote on Signals blog.

At a high level, what the bill proposes is a system where companies have to earn Section 230 protection by following a set of designed-by-committee best practices that are extraordinarily unlikely to allow end-to-end encryption. Anyone who doesnt comply with these recommendations will lose their Section 230 protection.

Maybe some of the tech behemoths could swing the potentially huge financial risk that would come with slews of lawsuits as they suddenly become responsible for whatever random things their users say, but not Signal, Lund said.

It would not be possible for a small nonprofit like Signal to continue to operate within the United States. Tech companies and organizations may be forced to relocate, and new startups may choose to begin in other countries instead.

Its bizarre that a government thats reliant on secure, private messaging would even contemplate gutting E2E encryption, Lund said. In February, the European Commission endorsed the messaging app, telling staff to switch to Signal for encrypted messaging. Lund listed other military and government endorsements, calling the proposed legislation troubling and confusing:

For a political body that devotes a lot of attention to national security, the implicit threat of revoking Section 230 protection from organizations that implement end-to-end encryption is both troubling and confusing. Signal is recommended* by the United States military. It is routinely used by senators and their staff. American allies in the EU Commission are Signal users too. End-to-end encryption is fundamental to the safety, security, and privacy of conversations worldwide.

*The US Military also recommends Wickr for encrypted messaging: both it and Signal feature auto-delete functions that erase messages after a set period of time.

The bills backers claim that theyre not targeting encryption. Rather, as with other attempts to legally enforce encryption backdoors, theyre claiming that their real goal is to get companies to accept responsibility for the enabling of online child sexual abuse.

But as has been explained by Riana Pfefferkorn, Associate Director of Surveillance and Cybersecurity at The Center for Internet and Society at Stanford Law, the bill doesnt have any tools to actually stop online child abuse. Furthermore, if it passes, it would actually make it much harder to prosecute pedophiles, she says.

As it now stands, online providers proactively, and voluntarily, scan for child abuse images by comparing their hash values to known abusive content.

Apple does it with iCloud content, Facebook has used hashing to stop millions of nude childrens images, and Google released a free artificial intelligence tool to help stamp out abusive material, among other voluntary efforts by major online platforms.

The key word is voluntarily, Pfefferkorn says. Those platforms are all private companies, as opposed to government agencies, which are required by Fourth Amendment protections against unreasonable search to get warrants before they rifle through our digital content, including email, chat discussions and cloud storage.

The reason that private companies like Facebook can, and do, do exactly that is that they are not the government, theyre private actors, so the Fourth Amendment doesnt apply to them.

Turning the private companies that provide those communications into agents of the state would, ironically, result in courts suppression of evidence of the child sexual exploitation crimes targeted by the bill, she said.

Pfefferkorn has also pointed out that the bill would give unprecedented power to Attorney General William Barr, a vocal critic of end-to-end encryption, who would become the arbiter of any recommendations from the best practices commission that the EARN IT bill would create.

The best practices approach came after pushback over the bills predicted effects on privacy and free speech. The best practices would be subject to approval or veto by Barr, who has issued a public call for backdoors; the Secretary of Homeland Security (ditto); and the Chair of the Federal Trade Commission (FTC).

Basically, those wolves are going to eat smaller encryption providers alive, Lund said:

It is as though the Big Bad Wolf, after years of unsuccessfully trying to blow the brick house down, has instead introduced a legal framework that allows him to hold the three little pigs criminally responsible for being delicious and destroy the house anyway. When he is asked about this behavior, the Big Bad Wolf can credibly claim that nothing in the bill mentions huffing or puffing or the application of forceful breath to a brick-based domicile at all, but the end goal is still pretty clear to any outside observer.

Last month, Sen. Ron Wyden, who introduced the CDAs Section 230, said that the disastrous legislation is a Trojan horse that will give President Trump and Attorney General Barr the power to control online speech and require government access to every aspect of Americans lives.

The EARN IT Act is only the latest of many attempts to inject an encryption backdoor that the US government and law enforcement agencies have been trying to inflict for years.

Digital rights advocates say that the proposed act could harm free speech and data security, and Sophos concurs. For years, weve said #nobackdoors, agreeing with the Information Technology Industry Council that Weakening security with the aim of advancing security simply does not make sense.

The EARN IT Act is still working its way through Congress, not having seen a vote in either the House nor Senate.

Theres still time to stop it, Lund said. To reach out to elected officials, you can look up contact information on The Electronic Frontier Foundations Action Center.

See the rest here:
Signal: Well be eaten alive by EARN IT Acts anti-encryption wolves - Naked Security

Protecting consumers personal data becomes top reason for encryption, global study involving nCipher Security finds – Cambridge Independent

Protecting consumers personal information has become the primary reason for deploying encryption technology, according to a study involving Cambridge-based nCipher Security.

It also found employee mistakes were the biggest threat to keeping sensitive data safe - outweighing concerns over hacking.

Some 6,457 individuals across multiple industry sectors in 17 countries were surveyed for the 15th annual Global Encryption Trends Study by the Ponemon Institute in collaboration with nCipher, an Entrust Datacard company focused on hardware security modules.

For the first time, protecting consumer data topped the reasons given for using encryption, with 54 per cent citing it as their top priority, while compliance (47 per cent) - traditionally a key driver - was fourth. It has been falling down the list since 2017, indicating that encryption is transitioning from a requirement to a proactive choice to safeguard critical information.

Dr Larry Ponemon, chairman and founder of Ponemon Institute, said: Consumers expect brands to keep their data safe from breaches and have their best interests at heart. The survey found that IT leaders are taking this seriously, with protection of consumer data cited as the top driver of encryption growth for the first time.

Encryption use is at an all-time high with 48 per cent of respondents this year saying their organization has an overall encryption plan applied consistently across the entire enterprise, and a further 39 per cent having a limited plan or strategy applied to certain application and data types.

Some 54 per cent cited employee mistakes as the biggest threat to keeping sensitive data safe, with hackers (29 per cent), malicious insiders (20 per cent), lawful data requests (12 per cent) and government eavesdropping (11 per cent) well behind in the list.

The growth in digital initiatives, cloud use, mobility, IoT devices and the advent of 5G networks means that data discovery was cited by 67 per cent as the biggest challenge in planning and executing a data encryption strategy. The number of employees working remotely during the pandemic, and keeping extra copies on personal devices or in cloud storage, means this concern is only likely to increase.

John Grimm, vice president of strategy at nCipher, which has a base in Station Square, said:As the world goes digital, the impact of the global pandemic highlights how security and identity have become critical for organisations and individuals both at work and at home,

Organisations are under relentless pressure to deliver high security and seamless access protecting their customer data, business critical information and applications while ensuring business continuity. nCipher empowers customers by providing a high assurance security foundation that ensures the integrity and trustworthiness of their data, applications and intellectual property.

Other findings in the full report, which can be downloaded online, include:

Read more

nCipher acquisition completed by Entrust Datacard

nCipher Security looks forward to 'great synergies' with Entrust Datacard as Thales Group agrees to divest

Read more:
Protecting consumers personal data becomes top reason for encryption, global study involving nCipher Security finds - Cambridge Independent

Analysis of COVID-19-Encryption Management Solutions Market 2019-2023 | Rising Demand For Digitalization to Boost Growth | Technavio – Yahoo Finance

Technavio has been monitoring the encryption management solutions market and it is poised to grow by USD 3.21 bn during 2019-2023, progressing at a CAGR of almost 14% during the forecast period. The report offers an up-to-date analysis regarding the current market scenario, latest trends and drivers, and the overall market environment.

This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20200417005010/en/

Technavio has announced the latest market research report titled Global Encryption Management Solutions Market 2019-2023 (Graphic: Business Wire)

Technavio suggests three forecast scenarios (optimistic, probable, and pessimistic) considering the impact of COVID-19. Please Request Latest Free Sample Report on COVID-19 Impact

The market is concentrated, and the degree of concentration will accelerate during the forecast period. Cisco Systems Inc., IBM Corp., McAfee LLC, Oracle Corp., Sophos Ltd., and Symantec Corp, are some of the major market participants. To make the most of the opportunities, market vendors should focus more on the growth prospects in the fast-growing segments, while maintaining their positions in the slow-growing segments.

Rising demand for digitalization has been instrumental in driving the growth of the market.

Encryption Management Solutions Market 2019-2023 : Segmentation

Encryption management solutions market is segmented as below:

To learn more about the global trends impacting the future of market research, download a free sample: https://www.technavio.com/talk-to-us?report=IRTNTR31232

Encryption Management Solutions Market 2019-2023 : Scope

Technavio presents a detailed picture of the market by the way of study, synthesis, and summation of data from multiple sources. Our encryption management solutions market report covers the following areas:

This study identifies honey encryption as one of the prime reasons driving the encryption management solutions market growth during the next few years.

Encryption Management Solutions Market 2019-2023 : Vendor Analysis

We provide a detailed analysis of around 25 vendors operating in the encryption management solutions market, including some of the vendors such as Cisco Systems Inc., IBM Corp., McAfee LLC, Oracle Corp., Sophos Ltd., and Symantec Corp. Backed with competitive intelligence and benchmarking, our research reports on the encryption management solutions market are designed to provide entry support, customer profile and M&As as well as go-to-market strategy support.

Register for a free trial today and gain instant access to 17,000+ market research reports.

Technavio's SUBSCRIPTION platform

Encryption Management Solutions Market 2019-2023 : Key Highlights

Table Of Contents :

PART 01: EXECUTIVE SUMMARY

PART 02: SCOPE OF THE REPORT

PART 03: MARKET LANDSCAPE

PART 04: MARKET SIZING

PART 05: FIVE FORCES ANALYSIS

PART 06: MARKET SEGMENTATION BY APPLICATION

PART 07: CUSTOMER LANDSCAPE

PART 08: MARKET SEGMENTATION BY DEPLOYMENT

PART 09: GEOGRAPHIC LANDSCAPE

PART 10: DECISION FRAMEWORK

PART 11: DRIVERS AND CHALLENGES

PART 12: MARKET TRENDS

PART 13: VENDOR LANDSCAPE

PART 14: VENDOR ANALYSIS

PART 15: APPENDIX

PART 16: EXPLORE TECHNAVIO

About Us

Technavio is a leading global technology research and advisory company. Their research and analysis focus on emerging market trends and provides actionable insights to help businesses identify market opportunities and develop effective strategies to optimize their market positions. With over 500 specialized analysts, Technavios report library consists of more than 17,000 reports and counting, covering 800 technologies, spanning across 50 countries. Their client base consists of enterprises of all sizes, including more than 100 Fortune 500 companies. This growing client base relies on Technavios comprehensive coverage, extensive research, and actionable market insights to identify opportunities in existing and potential markets and assess their competitive positions within changing market scenarios.

View source version on businesswire.com: https://www.businesswire.com/news/home/20200417005010/en/

Contacts

Technavio ResearchJesse MaidaMedia & Marketing ExecutiveUS: +1 844 364 1100UK: +44 203 893 3200Email: media@technavio.com Website: http://www.technavio.com/

See more here:
Analysis of COVID-19-Encryption Management Solutions Market 2019-2023 | Rising Demand For Digitalization to Boost Growth | Technavio - Yahoo Finance