Trusted Friends Can Become Crypto Custodians With the Vault12 Platform – Bitcoin News

A firm called Vault12 launched its new passkey security solution for cryptocurrency assets. Vault12 is an application that allows people to enlist their trusted friends and family members to help safeguard their assets. According to the projects creators, the new application leverages the cryptographic algorithm Shamirs Secret Sharing which allows keys to be split in a distributed fashion.

Also Read: French Ministry of Education Publishes Bitcoin Resource Guide for Educators

Vault12 believes theres a dire need to safeguard crypto assets as the onset of blockchain-powered innovation continues to grow exponentially. Since the birth of Bitcoin and a slew of other digital currencies, various applications and devices like hardware wallets have been created to protect cryptos. Vault12s new product allows individuals to take advantage of trusted family members and friends who are willing to help them secure digital currencies. Moreover, guardians are rewarded with ethereum (ETH) to protect the assets as well, giving the trusted network of friends incentive to be a safe keeper. The project officially launched at the San Francisco Blockchain Week and the company is backed by investors like Naval Ravikant, True Ventures, Data Collective, and Winklevoss Capital.

The Vault12 white paper explains when it comes to precious digital assets, there is an unprecedented threat level looming for people in need of a strong security solution. To protect these assets, we need a new cryptographic security platform one that does not leave security centralized in a single place, with a single person, on a single device or in a single organization, the research paper details. In order to bolster the security of digital currencies even more, the firm created a decentralized storage system for digital assets via a hierarchical Shamirs Secret Sharing (SSS) system. The SSS infrastructure is a well known algorithm in cryptography designed by the cryptographer and mathematician Adi Shamir. Essentially the secret (passkey) is shared in the distributed Vault12 system between 3-5 trusted contacts giving each participant its own unique part.

Vault12 allows any owner to set up a vault with friends and family. Custodians can always be recruited from the owners personal network at any time. But high-net-worth individuals who need added security can opt for a professional custodian service (PCS). However, the registration for this service requires far more effort and additional safeguards like verifying the owners identity with a government-issued ID. One of the unresolved challenges for the mass adoption of cryptocurrency and the blockchain economy is the continued challenge and burden associated with securing crypto assets, said Max Skibinksy, cofounder and CEO of Vault12. Skibinksy further added:

Previously, to keep our digital money safe, we had to keep our extremely valuable cryptographic backups on pieces of paper and store them in traditional banks. It was ironic. We built Vault12 to be an innovative, convenient solution that replaced this cumbersome process.

Setting up the Vault12 application is a fairly simple process, but you need to decide on 3-5 trusted individuals to help secure your assets. That part of the process may take longer, but setting up the vault after this decision is made doesnt take too long. The app works for Android and iOS devices and when opened, it immediately asks you if you want to set up a vault and then asks permission to access your phones contacts. The company claims the information is not held on the companys server and you can skip this part and manually add each contact individually as well. After deciding on sharing your contacts with the application, the platform asks you for your name so you can be identified by your guardians helping you protect your vault.

The platform then requires you to choose the number of guardians between 3-5 contacts and the more custodians you use, the more secure the vault will be. Once you save the security level (number of guardians), you cannot change it unless you start a whole new vault. If you opted to manually add contacts, you can send them an invitation or scan their device if they already have Vault12 installed. To add digital assets to the vault you simply upload a picture of the seed phrase or use a file containing the seed. The application will inform you of how many people are guarding the seed held within the Vault12 system.

Overall the Vault12 method is an interesting, novel method of safekeeping digital assets but people may have a hard time with a few requirements such as sharing their name, phone number, and contacts. People also may not trust the upload part where the user is required to upload a file or an image that contains a seed phrase protecting digital assets. However, the projects key elements are open source and Vault12 users can take a look at the ZAX relay network infrastructure and the distribution of how the shards work. In the future, other elements of the platform will be released as open-source libraries, Vault12s website notes.

What do you think about the Vault12 digital currency storage system? Would you use an application like this or are there concepts about the security approach that you dont like? Let us know what you think about this subject in the comments section below.

Disclaimer: Walkthrough editorials are intended for informational purposes only. There are multiple security risks and methods that are ultimately made by the decisions of the user. There are various steps mentioned in reviews and guides and some of them are optional. Neither Bitcoin.com nor the author is responsible for any losses, mistakes, skipped steps or security measures not taken, as the ultimate decision-making process to do any of these things is solely the readers responsibility. This editorial is not a recommendation or endorsement by Bitcoin.com or the author of any products, applications, software, services, or companies mentioned in this article.

Image credits: Shutterstock, Vault12, and Pixabay.

Did you know you can buy and sell BCH privately using our noncustodial, peer-to-peer Local Bitcoin Cash trading platform? The local.Bitcoin.com marketplace has thousands of participants from all around the world trading BCH right now. And if you need a bitcoin wallet to securely store your coins, you can download one from us here.

Jamie Redman is a financial tech journalist living in Florida. Redman has been an active member of the cryptocurrency community since 2011. He has a passion for Bitcoin, open source code, and decentralized applications. Redman has written thousands of articles for news.Bitcoin.com about the disruptive protocols emerging today.

Read the rest here:
Trusted Friends Can Become Crypto Custodians With the Vault12 Platform - Bitcoin News

Better Ethereum Privacy: Advent of the Aztec Protocol Is Coming – Blockonomi

AZTEC Protocol, a smart contract-backed privacy solution for Ethereum, has officially kicked off its 30-day Ignition Ceremony, a trusted setup process that will successfully underpin AZTECs privacy features if even one of the efforts 260-plus participants partakes in the ceremony honestly.

Launched on October 25th, the Ignition event now puts AZTEC on course for becoming the inaugural privacy network activated on Ethereum.

As the projects chief executive officer Thomas Pocock explained last month, the randomization ceremony can be generally likened to the shuffling of playing cards:

A good analogy is a group of people shuffling a deck of cards. Each person shuffles the deck (in AZTECs ceremony, thats the process of adding randomness into the transcript), and then hands on the pack to the next participant.

Once the shuffling is finished in a months time, the ensuing randomness will support the zero-knowledge proofs, or zk-SNARKs, that power the projects lone smart contract, the so-called AZTEC Cryptography Engine (ACE). The ceremony is akin to the Powers of Tau event the Zcash privacy coin project completed last year.

Once ACE is live, the system will allow users to make private Ethereum transactions in two distinct ways: one involves the direct creation of Aztec tokens that can be used anonymously, and the other involves wrapping, which will entail using ACE to peg private tokens to other assets like ether (ETH) or ERC20 tokens.

A new kind of privacy solution has appeared in the cryptoverse, and AZTEC team member Zachary Williamson had a hand in bringing it to reality.

Dubbed PLONK, Williamson and other researchers released a paper this fall that illustrated how the new zk-SNARK construction which requires only a single trusted setup could work.

Why is it notable? Precisely because it only needs one updateable setup ceremony in perpetuity instead of requiring a trusted setup for every project that is built atop it, like other systems have in the past.

As Ethereum creator and co-founder Vitalik Buterin explained of PLONKs last month:

[I]nstead of there being one separate trusted setup for every program you want to prove things about, there is one single trusted setup for the whole scheme after which you can use the scheme with any program (up to some maximum size chosen when making the setup).

The innovation could be a game changer in the cryptography ecosystem going forward, and the AZTEC team helped make it a reality.

The rise of AZTEC and PLONKs are just the latest privacy developments to hit the scene in whats already proven to be an action-packed year for Ethereum on the privacy front.

One of the firsts to make waves in 2019 was the Zether project, which like AZTEC also relies on smart contract tech.

We describe Zether as a smart contract that can be executed either individually or by other smart contracts to exchange confidential amounts of a token, denoted by ZTH, the solutions builders explained at the time.

American banking giant JP Morgan followed up Zethers arrival with its own Anonymous Zether project, which was designed to facilitate private enterprise transactions on the banks permissioned Ethereum fork, Quorum.

Other notable Ethereum privacy solutions that have materialized in the past few months include Nightfall created by none other than Big Four accounting firm EY andEthereum 9, a proof of concept that can conceal token transfers.

Theres also been advances when it comes to mixers. Heiswap and Tornado.cash launched this year, and a new crypto primitive in Mixicles that was developed by researchers with the decentralized oracle project Chainlink.

eToro Risk Warning: 75% of retail investor accounts lose money when trading CFDs with this provider. You should consider whether you can afford to take the high risk of losing your money.

Go here to see the original:
Better Ethereum Privacy: Advent of the Aztec Protocol Is Coming - Blockonomi

Email marketing: Harnessing the trust factor – Marketing Land

In recent weeks, weve been exploring the themes laid out in the first-ever Periodic Table of Email Optimization and Deliverability. After Permission, and inextricably tied to it, is the concept of trust.

Gaining permission from a recipient to send them email sets the stage for building trust. This includes both the trust of the recipient and the trust of their ISP, which ultimately controls which emails are delivered, which go into the spam folder and which are blocked entirely.

A number of technical measures, designed to verify the sender of an email, fall under the blanket of Authentication (Au) and represent the basic requirements that mass-senders must fulfill to gain the trust of inbox providers.

Domain Key Identified Mail (Dk), also known as DKIM, refers to mail that uses a public/private cryptography key set to verify the identity of the sender. Sender Policy Framework (Sp), or SPF, is a different authentication standard that specifies which IP addresses are authorized to send mail for a given domain. Domain-based Message Authentication and Conformance (Dc), or DMARC, aims to help brands prevent their domains from being used by other entities for malicious purposes.

Maintaining that trust also means including the Physical Address (Ph) of the entity sending the email which, according to CAN-SPAM regulation, must appear in the body of the email. A sender can also gain credibility by being placed on an inbox providers Whitelist (Wi), a list of IP addresses and/or domains that are permitted into a particular network, allowing emails to bypass typical checks designed to quarantine emails.

Finally, the Sender Domain (Od) and Sender Reputation (Sr) elements refer to the fact that marketers need to own the domain from which they are sending emails, and that they need to develop and cultivate a good reputation with inbox providers, since that reputation for abiding by responsible practices will affect how the senders emails are placed in the inbox or in the spam folder going forward.

Download the newest Periodic Table nowand ensure your email marketings on the right track.

Go here to read the rest:
Email marketing: Harnessing the trust factor - Marketing Land

Prison conditions for Julian Assange are putting his life ‘at risk’: UN expert – FRANCE 24 English

Issued on: 01/11/2019 - 16:19Modified: 01/11/2019 - 16:34

The treatment of WikiLeaks founder Julian Assange, who is facing the threat of extradition from Britain to the US on espionage charges, is putting his life at risk, an independent UN rights expert said Friday.

Unless the UK urgently changes course and alleviates his inhumane situation, Mr. Assanges continued exposure to arbitrariness and abuse may soon end up costing his life, the UN special rapporteur on torture and other cruel, inhuman or degrading treatment, Nils Melzer, said in a statement.

Melzer, who visited the 48-year-old Australian whistleblower in a London prison on May 9, nearly a month after his arrest at Ecuadors embassy where he had been holed up for seven years, has previously warned he was being subjected to drawn-out psychological torture.

The independent expert, who does not speak on behalf of the United Nations, has not met Assange since, but he told AFP in an email that his growing concern was based on new medically relevant information received from several reliable sources.

This information, he said, indicated that Mr Assanges health has entered a downward spiral of progressively severe anxiety, stress and helplessness typical for persons exposed to prolonged isolation and constant arbitrariness.

Life-threatening

While the precise evolution is difficult to predict with certainty, this pattern of symptoms can quickly develop into a life threatening situation involving cardiovascular breakdown or nervous collapse, he warned.

In Fridays statement, Melzer pointed out that he in May had demanded that London immediately take measures to protect Assanges health and dignity.

However, what we have seen from the UK Government is outright contempt for Mr. Assanges rights and integrity, he said.

Despite the medical urgency of my appeal, and the seriousness of the alleged violations, the UK has not undertaken any measures of investigation, prevention and redress required under international law, he charged.

Assange continues to be detained under oppressive conditions of isolation and surveillance, not justified by his detention status, he said.

His statement pointed out that Assange had completed his prison sentence for violating his British bail terms in 2012 and was now being held exclusively in relation to the pending extradition request from the United States.

Assange is facing the extradition request by the US over charges he violated the US Espionage Act by publishing a huge cache of military and diplomatic files in 2010.

While the US Government prosecutes Mr. Assange for publishing information about serious human rights violations, including torture and murder, the officials responsible for these crimes continue to enjoy impunity, Melzer said.

He also decried that despite the complexity of the proceedings against him led by the worlds most powerful Government, Mr. Assanges access to legal counsel and documents has been severely obstructed.

This, he said, had effectively undermined his most fundamental right to prepare his defence.

In his appeal, Melzer urged London to bar Assanges extradition to the US, and demanded that he be promptly released and allowed to recover his health and rebuild his personal and professional life.

(AFP)

Go here to see the original:
Prison conditions for Julian Assange are putting his life 'at risk': UN expert - FRANCE 24 English

Roger Waters on RT: The US and UK are trying to kill Julian Assange – World Socialist Web Site

By Kevin Reed 2 November 2019

Famed rock music artist Roger Waters gave an extensive and significant interview to the television network Russia Today (RT) on October 25 in which he denounced the continued illegal imprisonment of Julian Assange and reiterated his call for the freedom of the WikiLeaks publisher and founder.

Julian Assange, who founded WikiLeaks in 2006 and published extensive proof of US war crimes in the Middle East and other corruption around the world, is currently being held at Belmarsh prison in London. Although he has broken no laws and not been convicted of any crime, Assange is being held in advance of being handed overin blatant contravention of international lawto the United States to face 18 charges, including violation of the Espionage Act of 1917.

Former British diplomat and human rights activist Craig Murray recently published a blog post called Assange in Court where he described the condition of the journalist during the show trial hearing in Westminster Magistrates Court on October 21. Murray wrote: When asked to give his name and date of birth, he struggled visibly over several seconds to recall both. ... it was a real struggle for him to articulate the words and focus his train of thought.

Speaking from New York City on the RT program Going Underground with Afshin Rattansi broadcast from London, Roger Waters condemned Assanges persecution by the UK and US governments. They are clearly trying as hard as they can to kill him, he said. Julian Assange is becoming a warning to other journalists. If you tell the truth, particularly to power, we will get you and that is the message that is being transmitted.

When asked by Rattansi, You think that theyre going to kill him?, Waters responded: They are killing him.

Commenting on the dismissal of Assanges request to extend his extradition hearing for three months, Waters said: Im flabbergasted and horrified in equal measure. The proceedings a couple of days ago in that Magistrates Court were nightmarish. For that to be happening in an English courtroom makes me thoroughly ashamed of being an Englishman.

Waters went on to explain that the extradition treaty between the US and the UK does not apply to any political offenses or complaints: I dont know on what other grounds that they are trying to extradite Assange, but it is clearly a put-up job.

When Afshin Rattansi pointed out that the hearing was not even reported by the UK evening news, Waters discussed his appearance at a rally with John Pilger to demand the freedom of Julian Assange on October 2, outside the Home Office in London. He noted: I sang my song Wish You Were Here and I made a speech and John made a very good speech to the assembled 1,000 or so people. And Julians brother spoke to them as well as and there wasnt a single word in the Western media of a report of that protest. ... Were getting a very, very one-sided narrative here.

Waters then spoke about the reasons behind the persecution of Assange: Hes being railroaded, as I said before, as an example to others, to scare the s**t out of any other potential journalist who might stand up and speak the truth about war crimes and other things that our governments do not want to be reported. They want to keep all that stuff secret.

Assange is one of those essential publishers, and there are precious few of themwhich is why he is so precious to us allwho are prepared to take the risk of actually reporting the reality of our lives, to us, to we the people, which is our right to know. They are applying the heaviest possible penalty they can for him stepping out of line for doing his job as a journalist.

Rattansi turned the interview to the question of Assanges physical condition and explained that when John Pilger was on his program recently, he was visibly shocked about the appearance of Julian Assange not hardly being able to speak. Waters then replied: I wasnt in the courtroom two days ago, but Ive read Craig Murrays account of what happened in the courtroom and Craig Murray was devastated by what he saw...

He is exhibiting all of the symptoms, according to the accounts that Ive read, of somebody who has been subjected to torture in a routine way over many months, and he looks like people who come out blinking from the dungeon after theyve been tortured for many months. So, you can see that he is really frail and he is in real danger of them ending his life before they even get to an extradition hearing.

Moving on to broader historical issues in the persecution of Assange, Waters said: This makes an absolute mockery of the idea that we have the rule of law in the United Kingdom. You know, the Magna Carta might just as well not have happened. Because this just says, no, the lawthe Magistrates Courts and the lawis actually just a tool for whoever it is that rules as all, in this case the United States of America.

Thats why they were in the Magistrates Court pulling Vanessa Baraitsers strings and she was responding like a puppet and doing everything they wanted her to do and everything they wanted her to say, with a bit of prodding from the QC James Lewis who was representing the United States government.

There is no reason to doubt that the governments of the UK and the US would prefer the sudden death in jail of Julian Assange to the prospect of protracted court proceedings. The facts will be presented that he is innocent of the charges against him and that his activities were those of a journalist will be stressed to a world audience.

Everything that the authorities have done to Assangefrom false allegations of sexual misconduct and a campaign of vilification in the media, to his forced near seven-year political asylum inside the Ecuadorian embassy in London, to his extended isolated imprisonment at Belmarshhas been carried out in order to break and destroy him.

As Roger Waters has pointed out, the purpose of the assault on Julian Assange is to intimidate all others who would dare to stand up to and exposewith massive documentary proofthe war crimes and corporate corruption of US and British imperialism.

The working class in every country must urgently take up the fight to stop the extradition of Julian Assange to the United States and win his freedom. This is a central and critical task, as part of the growing struggles of workers and youth throughout the globe against austerity, war and the assault on fundamental democratic rights.

Follow this link:
Roger Waters on RT: The US and UK are trying to kill Julian Assange - World Socialist Web Site

Julian Assange is the "canary in the coalmine" – Scoop.co.nz

Saturday, 2 November 2019, 11:27 amPress Release: Joint Press Release

PRESS RELEASE 01/11/2019:JulianAssange is the "canary in the coalmine"

Without Free speech there is no "press" and without thepress there can be no meaningful democracy. Why is it thatit is left to the Spanish to investigate the violations ofJulian's legal rights - in Britain?!

These abusesinclude: Surveillance (in aforeign embassy - which is a abuse of civil rights - andinternational law / legal privilege). Theft of evidentiary material (vitalto Julian's legal defence). Procedural"irregularities" (including, but not limitedto...) Solitary confinement -the length of which constitutes "cruel and unusualpunishment... (more than 15 days in solitary confinementis defined as torture United Nations)

Julian Assange is the target of a calculated, andprotracted campaign of injustices designed to torture himmentally and physically intended to render him, and thosethat might be tempted to emulate him, into renouncing hisevidence of war crimes, and to condemn him to a life of"silent" incarceration - and possibly death in solitaryconfinement.

You shall know a tree by it's fruit-and the people who are behind these nefarious, clandestine- and illegal activities are - for want of a better word-evil!

If we as a free people allow our journaliststo be bullied, jailed -and tortured - what do we have tolook forward to in the not too distant future? Will ourepitaph be "First they came for the journalists, and I didnot speak - because I was not a journalist!?

Weimplore the New Zealand media to do everything that they canto bring the light of dayback to this story - as it is amatter of life and death - not only for Julian Assange butfor the free and democratic people of the world.

We are not interested in publicity - for it's ownsake -or for our own - we're simply trying to save a bravean important man from further suffering -and to preventfuture malicious misuses of power.

This Press Releaseis issued by spokespersons for the following groups:

#FreeAssangeNZ (700+) #Candles4Assange (750+) #OperationFreeAssange (1.4k+) #Unity4J(7.7k+)

Scoop Media

Scoop Citizen Membership ScoopPro for Organisations

See the article here:
Julian Assange is the "canary in the coalmine" - Scoop.co.nz

A Former Trump Campaign Aide Said The Campaign Was "Very Happy" About The Release Of Hacked DNC Emails – BuzzFeed News

WASHINGTON President Donald Trumps team was very happy that Wikileaks released emails hacked from the Democratic party during the 2016 race, a former campaign official told investigators from the special counsels office.

Rick Gates, who served as Trumps deputy campaign chair, told Robert Muellers team last year that the release of the hacked emails offered a mode of deflection for the campaign after a sink in polling numbers following Trump's comments about Ted Cruz's father at the end of the Republican National Convention, according to interview summaries obtained by BuzzFeed News.

Cruz, a senator from Texas, refused to endorse Trump at the convention. Afterwards, Trump made a comment linking Cruzs father to President John F. Kennedys killer.

Gates also told investigators that the Republican National Committee had non-public information about the timing of the Wikileaks releases, but did not specify who at the RNC knew this information.

The RNC disputes this, saying it "had no advanced knowledge" of the releases. "Gates has already pled guilty to lying to federal authorities. Why would anyone believe him now?" RNC communications director Michael Ahrens told BuzzFeed News on Saturday.

US intelligence agencies have concluded that Russian intelligence services were behind the hack of the Democratic National Committee and passed the information on to Wikileaks, which the CIA has labelled a non-state hostile intelligence service.

Wikileaks founder Julian Assange announced in June 2016 that the group had an upcoming email leak related to Hillary Clinton, whose use of a private email server while secretary of state was under federal investigation at the time and who had previously deleted thousands of emails she deemed personal. But Gates, who spoke to Muellers team several times after agreeing to cooperate with the investigation, said the Trump campaigns interest in the emails was ratcheting up before Assanges announcement in April and May because it was likely the emails could help Trump's campaign.

Several members of the Trump campaign, including Manafort, Michael Flynn, Jared Kushner, Corey Lewandowski, Jeff Sessions, and Sam Clovis, had expressed interest in finding emails belonging to Hillary Clinton, according to Gates. Gates said Donald Trump Jr. would ask where the emails were in family meetings. As for the now-president, Gates said Trump was interested in the emails but remained composed with a healthy skepticism.

Meanwhile, the Republican National Committee was energized by Assange's announcement, Gates said, adding that he knew the RNC was going to run the Wikileaks issue to ground.

Trump and Kushner were initially skeptical about cooperating with the RNC, but the Wikileaks issue was a turning point, Gates told investigators.

Manafort had instructed Gates to periodically call someone whose name is redacted from the documents to check in on where the information was and when it would be coming, Gates told investigators. He also recalled a conversation with someone before the leak in which that person told him that Wikileaks would be releasing information.

Gates said a messaging strategy was being built in the June/July 2016 timeframe surrounding the upcoming release of information, the interview summary reads. [Redacted] was building this strategy with Manafort also involved.

Trump was generally frustrated Clinton's missing emails had not been found, Gates also told investigators.

At one point it isnt clear exactly when from the redacted documents Trump said get the emails while on his campaign plane, Gates said. Flynn, the former head of the Defense Intelligence Agency, said he could use his intelligence sources to obtain the emails and was adamant the Russians did not carry out the hack.

Gates said Flynn had the most Russia contacts of anyone on the campaign and was in the best position to ask for the emails if they were out there.

Once Wikileaks began releasing the emails, Manafort and another person whose name is redacted were happy from a communications team perspective because it provided an opportunity to deflect from Trumps attacks on Cruz. Trump was advised not to react to the releases and let it play out, Gates told investigators.

In a phone call after the release, Gates gathered that [...] there would be additional leaks coming. Gates thought this because shortly after boarding the plane Trump stated that more leaks were coming.

Manafort, who was getting pressure regarding [redacted] information, appears to have continued to instruct Gates to obtain status updates on upcoming information.

Among the hacked emails were many belonging to Clinton campaign chair John Podesta. Gates told investigators that there was a strategy to defend Manafort by attacking Podesta, with the idea being that Podesta had baggage as well.

Gates cooperated with investigators after pleading guilty to charges brought by the special counsel's team, while Manafort is serving a seven-year sentence behind bars.

Continue reading here:
A Former Trump Campaign Aide Said The Campaign Was "Very Happy" About The Release Of Hacked DNC Emails - BuzzFeed News

The Lynching of the Charismatic Geek – Antiwar.com

Once upon a time, there was a very bright little boy in Australia who grew up as stranger to conventional society. His mother went from husband to husband, from theater to cult, always on the eccentric margins, while the boys natural father was left behind. As an adolescent he found his own world in cyberspace, which offered a field for his insatiable curiosity. As he learned about that great world out there and its secrets, he developed his very own rigorous ethic: his vocation was to search for true facts and share them with the public. Living outside the usual social codes, his moral compass was uninhibited by the usual niceties. Truth was truth, deception was wrong, lies on the part of the powerful should be exposed.

The original sin of Julian Assange was the same as that of Galileo Galilei. Galileo sinned by revealing to the people things the elite already knew or at least surmised, but wished to keep secret from the masses, in order not to shake the peoples faith in the official truth. Assange did the same thing with the formation of WikiLeaks The official version of reality was challenged. All lies should be exposed. By far the most sensitive targets of his wide-ranging reality revelations were the lies, the hypocrisy, the inhuman brutality of the United States in its wars of global hegemony. To Assange, these things were simply wrong.

At first, WikiLeaks attracted a great deal of popular attention and even acclaim. Julian Assange became famous. He was a geek, but he didnt look like a geek. Tall, handsome, striking with his nearly white hair, Julian was something strange: a charismatic geek.

He arrived in Sweden with near superstar status. Swedish women contrived to get him into their beds. They bragged about having sex with Julian: he was a trophy lover. But the charismatic geek didnt know the social codes of the peculiar Swedish forms of virtuous promiscuity. This lacuna was exploited by his enemies in extravagantly unpredictable ways.

Julian Assange tried to straighten out what seemed to be a serious misunderstanding before leaving Sweden. But the Swedish side failed to make matters clear and he left for London.

In London, he was quickly taken up by the radical chic branch of the British upper class, the champagne and caviar humanitarians. The nave charismatic geek who didnt know the social codes no doubt thought he was among friends. He didnt belong to any political or social movement in the UK, he depended on the beautiful people who for a time found him an interesting outsider, one of their latest causes.

Julian Assange may have been socially nave, but he very acutely perceived what the imperial powers were working up against him. The totally unjustifiable demand for extradition to Sweden for questioning unjustifiable because they had declined to question him while he was there and then declined to question him in the UK appeared to Julian to be an obvious device to enable Sweden to extradite him to the United States, given the total obedience of post-Olof Palme Sweden to the wishes of Washington. Others didnt see this so clearly, except for the excellent President of Ecuador at the time, Rafael Correa. Correa offered Assange asylum in the tiny Ecuadorian embassy in London. Assange, unconventional, negligent of the codes, but with a clear view of the danger stalking him, jumped the bail set up for him and moved into the embassy.

This was the beginning of his alienation from the caviar humanitarians. At first the smart set defended him. Such glamorous personalities as Jemima Khan and Amal Amamuddin (not yet Clooney) initially defended him and then lost interest. He was not of their world. He did not know how to compromise, he was a geek after all, less and less charismatic as he faded in the shadows of the embassy of Ecuador. Its all very well to denounce lies and tell the truth, but one mustnt overdo it. Its delightful to have a cause when you have a solid social and financial background to fall back on, and when you know how to play the game so as to be in and out at the same time. Julian had none of those social graces. He was honest, intent, stubborn. He was incapable of hypocrisy, even in his own interest. He would not abjure, as Galileo did.

Such stubborn honesty on the part of someone who has nothing no family, no fortune, no social status, no political party, nothing but his stubborn devotion to truth is unbearable in a society based on lies. The media who profited from his scoops became the most zealous in denouncing him. No wonder: his honesty was a living reproach to the scribblers who had sold out all down the line, who get ahead by adding new touches to the mendacious "common narrative" required by the masters of their careers.

Lies were spread. Someone so honest must have hidden vices. He must be as bad as we are, or worse. The mob gathers. This man who knows the truth but not the social codes is an insult to us all, a freak, a monster, who must be destroyed.

The lynch mob is enormous. The media, politicians, even the judicial authorities. There are no loud shouts for blood but silent cruelty as the Anglo-American ruling Establishment shamelessly contrives to halt the last breath of the outsider who dared expose them for what they are.

Diana Johnstone is the author of Fools Crusade: Yugoslavia, NATO, and Western Delusions. Her new book is Queen of Chaos: the Misadventures of Hillary Clinton. The memoirs of Diana Johnstones father Paul H. Johnstone, From MAD to Madness, was published by Clarity Press, with her commentary. She can be reached at diana.johnstone@wanadoo.fr.

Go here to read the rest:
The Lynching of the Charismatic Geek - Antiwar.com

Democrats make a huge mistake if they just focus impeachment on the Ukraine scandal – NationofChange

The impeachment theater on display today in the House, bracketed by Speaker Nancy Pelosis maudlin reading of Article I of the Constitution, and by House Minority Leader Kevin McCarthys ludicrous evocation of the Stalin purge trials to characterize the full House vote to establish impeachment rules and procedures, is increasingly looking like the first act of an almost certain impeachment of President Trump.

Unfortunately, if Democrats impeaching Trump on just the effort to extort an investigation of the Bidens by Ukraines government their goal, theyll get their impeachment vote, but it will end up like the Clinton impeachment as a farcical trial in the Senate, perhaps even strengthening President Trump in next years presidential election contest.

The Democrats, that is to say, are following the Republicans disastrous impeachment model, set in 1998-99 when they sought to oust President Clinton over a blow-job in the Oval Office, and ended up making him one of the most popular presidents in the history of the job.

Democrats should be looking instead to the Nixon impeachment, which obtained the desired result removing a criminal president from office without even having to go to a full vote of the House following passage of articles of impeachment by the House Judiciary Committee.

When one looks back at that impeachment effort, it almost seems incredible that Nixon was forced out of office. This was a president, remember, who in 1972 was re-elected to a second term by a landslide 60.7 percent of the popular vote to just 37.5 percent for his Democratic opponent Sen. George McGovern. Nixon won the electoral votes of 49 states, with only Massachusetts going for McGovern.

Congressional investigation into Nixons crimes began with the establishment of the so-called Watergate Committee, headed by Senator Sam Ervin. That committees public hearings into that scandal started on May 17, 1973, just six months after Nixons electoral triumph.

At the time, while Democrats had solid majorities in both houses of Congress, Nixon was still hugely popular, even as the early details of the Watergate break-in and of the cover-up of that tip-of-the-iceberg corruption in the Nixon White House and re-election campaign were starting to come out. At the time of his inauguration, Nixons popularity was at a peak of 67% in a Gallup poll.

By the time the Watergate Committee started its hearings, four months into his second term, Nixons popularity had slumped to the mid-40s, about equal to his disapproval rating. As those hearings continued, his support continued to sink. By October 30, 1973, just short of a year after Nixon won re-election, when the House Judiciary Committee beganinvestigating possible impeachable crimes by the president, his support had slumped to 27 percent. (Contrary to assertions by todays CongressionalRepublicans, who claim that an impeachment must start with a full vote by the House,it wasnt until February 6, 1974, more than three months after its investigations began, that the Judiciary Committee went to the full House for a vote designating it as an Impeachment Committee.)

More importantly, though, even after the empowered Judiciary Committee began its work, and began issuing subpoenas for documents, tapes and testimony, it wasnt until late July that it finally voted out three articles of impeachment. Those articles were for obstruction of justice, abuse of power, and contempt of Congress, but they each included a number of examples of the presidents impeachable (though perhaps not all criminal) behavior. Along the way, the committee also investigated and considered other impeachable offenses, drawing up but rejecting two other articles of impeachment.

This is important. When talk of impeaching Nixon first began, Republicans were all up in arms defending the president, and even many Democrats were nervous and unconvinced. They had, after all, been trounced in the last election, and Nixon had won re-election decisively. But the hearings, with their dramatic testimony from Nixon White House and campaign staff, both in the Watergate and in the impeachment committees, provided a steady stream of disturbing information and criminality on the part of the president and his acolytes and appointees. It was a process that led to a steady decline in his popular (and Congressional) support until by the time those three impeachment articles were voted for by the Judiciary Committee, his approval ratings were down in the mid-20 percent range. Not surprisingly, those articles won the backing of even some Republicans on the committee.

There was no further action on Nixons impeachment because Republican leaders did some head-counting and went to the president with word that he would be impeached by the full House on those articles, with significant Republican support, and that he would lose a trial in the Senate, after which he would likely be indicted and likely convicted and sentenced to jail for his crimes.

It was an agonizing political process, though also gripping not just for those who wanted Nixon gone, but even for his backers, or former backers among the electorate.

It is precisely this process which Democrats need to copy in pursuing the eminently impeachment-deserving President Donald Trump.

It would be a historic mistake of epic proportions to go after this congenitally criminal and morally appalling president for just one issue one which many Americans who have backed him will readily excuse him for. Indeed Trumps withholding of Congressionally approved military aid to extort a foreign criminal investigation of a potential political opponent pales in comparison Nixons interference with the Vietnam peace talks or Reagans successful effort as a candidate to get Iran to delay release of the US embassy hostages until after the 1980 election, neither of which led to any impeachment hearings.

Thats not to say that Trump is not a uniquely dangerous threat to Constitutional government.

What the now fully empowered House Judiciary Committee needs to do, though, is to significantly expand its hearings to examineall the myriad impeachable crimeswhich this president is known or strongly suspected of having committed. That would include everything from lying to the American public, cheating on his taxes, obstructing justice on myriad occasions, suborning perjury from witnesses, paying bribes, profiting personally from his powers of office, violating election laws, and perhaps rape and assault as well.

The American people need all these impeachable deeds and misbehavior laid bare in all their gory detail over the next six-12 months. Trumps support, currently languishing around 40 percent, will sink as time goes on, as the shameful behavior gets continuous exposure. As the evidence of his crimes mounts, the risk of his ending up in the clink, at least after he leaves office, will grows. Meanwhile, the likelihood of his winning re-election and escaping that fate will fades. The odds will then grow that he will choose the same option that Nixon chose: resignation with a pardon.

I obviously would like to see Trump removed from the White House, either by impeachment and conviction in the Senate, or by resignation. But I also believe, as I did in the case of both George W. Bush and Barack Obama, that even if he survives impeachment, it is crucial for US democracy that impeachable crimes be called out for what they are, even if the perpetrator cannot be convicted by the Senate. (It is my contention, for example, that Obama committed serious impeachable crimes such as refusing to prosecute known the war criminals Bush and VP Dick Cheney, as well as violating the First and Fourth Amendments with his expanded use of NSA spying on Americans, as well as his illegal war on Libya. For these actions or nonactions, he should have been impeached by the House.)

So far, it looks like the House, under the leadership of Speaker Nancy Pelosi, who single-handedly stymied efforts to impeach G.W. Bush (as well as crushing the sales of my 2006 bookThe Case for Impeachment!) by declaring in May 2006 that impeachment is off the table, is keeping a lid on any widening of the impeachment case against Trump.

If she persists in this wrong-headed strategy, Pelosi must take the blame for the disaster that will likely ensue, of a triumphal Trump declaring that he had been cleared by the Senate, and campaigning through next summer and fall against a Democratic Party he will accuse of being obsessed with overturning the results of the last election.

FALL FUNDRAISER

If you liked this article, please donate $5 to keep NationofChange online through November.

Read more:
Democrats make a huge mistake if they just focus impeachment on the Ukraine scandal - NationofChange

[Webinars] CI/CD optimization and automated testing, open source audit reports – Security Boulevard

Learn how our CloudBees partnership helps users optimize CI/CD and automate AppSec Testing, and steps to take after you get an open source audit report.

As many organizations have learned, sometimes the hard way, DevOps transformation is as much about creating a process and adopting a mindset as it is about acquiring the right tools. But organizations creating a DevOps process shouldnt neglect to implement security into their pipelines. Synopsys and CloudBees aim to deliver the best of both worlds to customers adopting DevOps: CI/CD optimization and application security testing automation.

Join experts from Synopsys and CloudBees as we discuss:

What:Implementing DevSecOps With Synopsys and CloudBees

When: Tuesday, Nov. 12 @ 12 p.m. Eastern / 9 a.m. Pacific

Who: Meera Rao, senior principal consultant, Synopsys; Chris Saleski, sr. technical alliance marketing manager, CloudBees

Register now

Companies use of open source software has surpassed the occasional and solidified itself as mainstream. Effectively identifying and managing the compliance and security risks associated with open source software can be a difficult task. Whether youre acquiring another company, preparing for acquisition, or simply wanting to manage your use of open source, the universal first step is to figure out the composition of your code, often via an audit. But what do you do once you have the audit report?

Join us for this live webinar to learn best practices before and after an open source audit. Well cover how to:

What:Youve Got Your Open Source Audit ReportNow What?

When: Thursday, Nov. 14 @ 12 p.m. Eastern / 9 a.m. Pacific

Who: Tony Decicco, shareholder, GTC Law Group & Affiliates; Leon Schwartz, associate, GTC Law Group & Affiliates; Phil Odence, GM of Black Duck Audits, Synopsys

Register now

Read the original here:
[Webinars] CI/CD optimization and automated testing, open source audit reports - Security Boulevard