Chinas Xi Jinping App Reportedly Recommends Course on Blockchain, Bitcoin, Ethereum and Crypto – The Daily Hodl

Chinas most popular app, Xuexi Qiangguo, is promoting a course on blockchain technology that contains lessons on Bitcoin, Ethereum and cryptocurrency, reports crypto news source cnLedger.

The app has already spawned a number of monikers since its release on January 1, 2019 by Chinas tech giant Alibaba.

Billed as a fun educational tool, the app is also called Study Xi, Strong Nation, Study the Powerful Nation and the Xi Ping Thought app for espousing the views of President Xi Ping and Chinas Communist Party.

President Xi recently announced his support for the developmentof blockchain technology, which underpins popular cryptocurrencies such as Bitcoin.

China has also passed a cryptography law aimed at facilitating the development of the cryptography business and ensuring the security of cyberspace and information. It will take effect on January 1, 2020.

2/ Chinas most popular app, Xuexi Qiangguo (study for becoming powerful nation) now has a recommended course focusing entirely on blockchain, which contains Bitcoin & Ethereum lessons. The app released by CPC to help ppl learn about its political doctrines like Xi's thoughts. pic.twitter.com/nRdCntNRAA

cnLedger (@cnLedger) October 28, 2019

According to a report by the US governments Open Technology Fund, the app will also start administering a test for journalists to prove their comprehension of Xi Pinjing Thought as well as their loyalty to the Communist Party. In order to renew their credentials, theyll have to pass.

Open Technology Fund also detected a backdoor in the apps code, allowing the collection of detailed daily log reports containing user data and app activity.

The researchers report,

The packages that contain the backdoor code are all in the package namespace containing the values aliyun and alibaba, suggesting that these packages were created and are maintained by Alibaba or Alibaba Cloud.

In addition to supporting blockchain technology and using the new app to push the party doctrine, President Xi has also issued a ban on any anti-blockchain sentiment as the government gears up to launch its own state-backed digital currency. Any online content that calls out blockchain technology as a scam is being systematically scrubbed.

Since launch date, Xuexi Qiangguo has reportedly amassed more than 100 million active users, making it the most downloaded item on Apples App Store in China, outperforming social media apps on popular platforms WeChat and TikTok.

More:
Chinas Xi Jinping App Reportedly Recommends Course on Blockchain, Bitcoin, Ethereum and Crypto - The Daily Hodl

Welcome to the age of quantum computing – TechCentral

Has the era of quantum computing finally dawned? In a field long plagued by hype and hubris, theres reason for some cautious optimism.

A team of scientists at Googles research lab announced last week in the journal Nature that they had built a quantum computer that could perform calculations in about 200 seconds that would take a classical supercomputer some 10000 years to do. An age of quantum supremacy was duly declared.

Rather uncharitably, IBM researchers were quick to point out that the feat was less than advertised. They estimated that by using all of the hard disk space at the worlds most powerful classical computer, the Summit OLCF-4 at Oak Ridge National Laboratory, they could do the same calculation in 2.5 days, not 10000 years. Googles claim to have achieved quantum supremacy that is, to have accomplished a task that traditional computers cant was premature.

This was to miss the bigger picture.

A rudimentary quantum machine has improved on the fastest supercomputer ever built by a factor of 1080 an immense achievement by any measure. Although the specific problem that Googles computer solved wont have much practical significance, simply getting the technology to work was a triumph; comparisons to the Wright brothers early flights arent far off the mark.

So, is the world prepared for what comes next?

Quantum computers, to put it mildly, defy human intuition. They take advantage of the strange ways that matter behaves at the subatomic level to make calculations at extraordinary speed. In theory, they could one day lead to substantial advances in materials science, artificial intelligence, medicine, finance, communications, logistics and more. In all likelihood, no one has thought up the best uses for them yet.

They also pose some risks worth paying attention to. One is that the global race to master quantum computing is heating up, with unpredictable consequences. Last year, US President Donald Trumps administration signed a US$1.1-billion bill to prioritise the technology, which is a decent start. But the US will need to do more to retain its global leadership. Congress should fund basic research at labs and universities, ensure the US welcomes immigrants with relevant skills, invest in cutting-edge infrastructure and use the governments vast leverage as a consumer to support promising quantum technologies.

A more distant worry is that advanced quantum computers could one day threaten the public-key cryptography that protects information across the digital world. Those systems are based on hard maths problems that quantum computers might theoretically be able to crack with ease. Security researchers are well aware of the problem, and at work on creating post-quantum systems and standards. But vigilance and serious investment is nonetheless called for.

No doubt, the quantum-computing era will have its share of false starts, dashed hopes and fiendishly difficult problems to overcome. As Google is showing, though, thats how technology advances: bit by bit, into a very strange future. (c) 2019 Bloomberg LP

The rest is here:
Welcome to the age of quantum computing - TechCentral

Week in Review: Baghdadis fall, UK fishermen struggle with Brexit and a look inside Miss Maggies kitchen – FRANCE 24

Issued on: 31/10/2019 - 21:10Modified: 31/10/2019 - 21:38

A look at the rise and fall of the Islamic Stategroups leader Abu Bakr al-Baghdadi, British fishermen are fed up with the Brexit delay, France struggles with its secularist ideals andFRANCE 24 takes a look inside Miss Maggies kitchen.

ARTICLES

Baghdadis rise: From football-obsessed student to self-styled caliph

The man the world came to know as Abu Bakr al-Baghdadi seized on the conflict, chaos and mismanagement in his native Iraq to propel himself from a low-level prisoner in US detention to one of the worlds most dangerous terror chiefs.

Secrecy surrounding Baghdadi raid betrays US distrust of NATO ally Turkey

Islamic State (IS) group chief Abu Bakr al-Baghdadi was found and killed over the weekend in northern Syria just a few miles from the Turkish border in a US raid that evaded the Turkeys Incirlik base, in a sign of the increasing distrust between US and Turkish militaries.

British fishermen battle codfathers, quotas - and Brexit delay

More than three years after Britain voted to leave the EU, the fishermen of Ilfracombe are thoroughly fed up. They were promiseda greater share of fishing quotas, that Britain would take back control of its waters and become an independent coastal state. But theyve seen little of the change they voted for. FRANCE 24 reports.

French move to extend ban on religious symbols sparks fears of 'radical' secularism

Weeks after a far-right politician unleashed controversy by asking a woman accompanying children to remove her veil, the Senate on Tuesday approved an amendment that wouldextend a ban on wearing religious symbols to those supervising school trips. Some say French secularism is becoming too extreme, while others believe it is being used to shroud Islamophobia.

TV SHOWS ONLINE

THE 51 PERCENT

Ethiopia's gender revolution: The road towards equality

Reporting from Ethiopia, we meet Sehin Teferra, co-founder of the feminist group Setaweet, and also speak to the countrys first female President Sahle-Work Zewde, asking them both about the challenges that lie ahead.

ENCORE!

Filmmaker Tim Travers Hawkins gets up close and personal with Chelsea Manning

She's one of the most enigmatic individuals to feature in recent news headlines: Soldier Bradley Manning came to global attention after leaking classified military documents and, in doing so, became a key figure in the WikiLeaks operation. While serving a 35-year sentence for those actions, Manning was contacted by filmmaker Tim Travers Hawkins, who wanted to tell her story. His documentary, "XY Chelsea",deals with Mannings gender transition but also with her shift from prison life to the media spotlight after her sentence was commuted by Barack Obama in 2017.

Film show: Vampire retrospective, 'The Traitor' and 'The Specials'

Film critic Lisa Nesselson tells us about an exhibition at the Cinmathque Franaise that draws the undead out of the shadows to celebrate cinema's most iconic vampires. Classics like "Nosferatu", "The Addiction" and "The Hunger" are also part of the spooky seasonal programming. Next, we check out director Marco Bellochios adaptation of the true story of a key Mafia informant in 1980s Italy. And we learn more about the French heartfelt drama "The Specials", which has drawn crowds here in its home country, with Vincent Cassel and Reda Kateb in the main roles.

FOCUS

Risking their lives: Why taxi rides in Mexico can be dangerous for women

In Mexico, it's not uncommon to hear of women being abducted, raped or even killed after getting into taxis. Every day, there are new victims of drivers and their accomplices in organised crime. So far this year, there have been more than 200 reports of attacks inside taxi cabs in Mexico City alone.

Indonesia's sinking capital Jakarta to be relocated

With 11 million inhabitants, the Indonesian capital Jakarta is one of the most densely populated cities on the planet. It's also one of thosemost threatened by rising sea levels.As a result, authorities recently announced that they will move the capital to a new location over 1,000 kilometres away.

INSIDE THE AMERICAS

Argentina: Alberto Fernandez elected president amid economic crisis

We take a look at leftistAlberto Fernandez's victory in the Argentinian presidential race. In a country facing the worst economic crisis in two decades, voters delivered a stunning rebuke to incumbent conservative Mauricio Macri's austerity measures.

PERSPECTIVE

The art of eating well: A peek inside Miss Maggies kitchen

What exactly is "l'art de vivre"? Why do some of us photograph our food more as much as we eat it? And have we all become so obsessed by what we eat that we've forgotten how to simply enjoy food? We talk recipes and foodie culture with home-cooking guru Helose Brion, author of "Chez Miss Maggie's Kitchen".

FRANCE IN FOCUS

Counterfeit goods in France: Big business off- and online

Last year, more than 5million counterfeit goodswere seized by the authoritiesin France. Theft of intellectual property isnt just a French problem: After US products, French goods are the most faked products in the world. Amongthe things typically copied areluxury productssuch as perfumeandwatches, football shirts, medication, artworks and much more.As the techniques used to make and sell fake goods become ever more sophisticated, companies need to do more to stay ahead of the counterfeiters.

MIDDLE EAST MATTERS

Female protesters on the front line in Lebanon

Prime Minister Saad Hariri has resigned after nationwide rallies brought the country to a virtual standstill.The protesters want a complete overhaul of an establishmentthat they call corrupt. Our correspondentLeila Molana-Allen reports on how women have taken an active role in the protests.

YOU ARE HERE

Step back in time: Discovering France's regional dances

In France's western Poitou region, dancers dressed in 18th-century costumes twirl in time to the music. Meanwhile, in the southern town of Gmenos, a dance troupe called La Poulido de Gmo keeps the local Provence culture alive through traditional dances. Perhaps surprisingly, the majority of its dancers are young people.

Link:
Week in Review: Baghdadis fall, UK fishermen struggle with Brexit and a look inside Miss Maggies kitchen - FRANCE 24

Max Blumenthal Arrest Exposes Hypocrisy of Western Media and ‘Human Rights’ NGOs – FAIR

by Joe Emersberger

Grayzone (10/28/19) reported that its editor, Max Blumenthal, had been arrested on fabricated charge related to the siege of the Venezuelan embassy in Washington, DC.

Grayzone editor Max Blumenthal, a prominent journalistic critic of US policy toward Venezuela, was arrested by DC police on Friday, October 25, in connection with a protest at the Venezuelan embassy, and held incommunicado. But if you rely on corporate media, or even leading press freedom groups, you havent heard about this troubling encroachment on freedom of the press.

Blumenthal is a bestselling author whose work has appeared in such publications as the New York Times, CJR, The Nation and Salon. DC police arrested him at his home on a five-month-old arrest warrant, charging him with simple assault for his attempt to deliver food to the besieged Venezuelan embassy; he was held for two days, and for the first 36 hours was not allowed to speak with a lawyer. (In an interview with FAIR, Blumenthal noted that keeping arresteesgenerally poor and African-Americanfrom speaking with lawyers or family is par for the course in the DC criminal justice system.) As of this writing, there has been no mention of Blumenthals arrest in outlets like the New York Times, Washington Post and Reuters that constantly publish Venezuela-related content, or by the big press freedom NGOs.

When freelance US journalist Cody Weddle was detained in Venezuela for 12 hours, it made headlines in the New York Times (3/6/19), Washington Post (3/6/19), Miami Herald (3/6/19), USA Today (3/6/19), Guardian (3/6/19), UK Telegraph (3/6/19), NPR (3/10/19), ABC (3/9/19) and Reuters (3/7/19). Thats not exhaustive, but you get the picture.

In Weddles case, the human rights industry also responded immediately. Jose Miguel Vivanco of Human Rights Watch tweeted about Cody Weddles detention, as did Reporters without Borders (RSF). The Committee to Protect Journalists (CPJ) also put out a statement immediately (3/6/19). There has been nothing from them about Blumenthal.

The two-hour detention of Univisions Jorge Ramos in Venezuela was likewise big news. In fact, RSF was outraged that Cody Weddles detention happened barely a week after the Ramos incident.

Nobody should have a problem with Weddles arrest or Ramos detention getting the widespread attention they did. (The content in the reports about Venezuela is a separate issue.) What should anger anybody who isnt consumed with hypocrisy is the point Ben Norton, writing in Grayzone (10/28/19), made about Blumenthals arrest:

If this had happened to a journalist in Venezuela, every Western human rights NGO and news wire would be howling about Maduros authoritarianism. It will be revealing to see how these same elements react to a clear-cut case of political repression in their own backyard.

Blumenthals arrest is another example of the legal harassment of US government critics, including WikiLeaks Julian Assange and whistleblower Chelsea Manningwhose plights have similarly been neglected by Western media and NGOs that claim to support press freedom (FAIR.org, 11/3/18, 4/1/19).

Several months ago, activists invited by the Venezuela government stayed in the Venezuelan embassy in Washington, DC, for over a month until they were finally evicted by police on May 24. The presence of the activists delayed a takeover of the embassy by representatives of the Trump-appointed Venezuelan government-in-exile led by Juan Guaid. The majority of the worlds governments do not recognize Guaid; that was dramatically highlighted on October 17 when Venezuelas was voted onto the UN Human Rights Council despite US lobbying (i.e., bribes and threats).

Nevertheless, Trumps recognition of Guaid in January 2019 was the excuse for intensifying economic sanctions that had already killed thousands of people by the end of 2018. (Incidentally, Jorge Ramos two-hour detention also received more Western media attention than the study showing the already-lethal impact of Trumps sanctionsFAIR.org, 6/14/19).

Democracy Now! (10/30/19) was one of the few US outlets to report on Blumenthals arrest.

With the complicity of DC police, Guaid supporters tried to block food from being delivered to the embassy during the standoff with the activists. At one point, 78-year-old Jesse Jackson Sr. had to scuffle with Guaid supporters to deliver food. The DC police were clearly intent on doing as little as possible, even with an elderly, high-profile visitor trying to make a delivery. Former Green Party candidate Ajamu Baraka (age 66) was forced to act as Jacksons bodyguard, thanks to the aggression of Guaid supporters and the inaction of DC police.

Norton reported:

Court documents indicate the false charge of simple assault stems from Blumenthals participation in a delivery of food and sanitary supplies to peace activists and journalists inside the Venezuelan embassy on May 8, 2019.

Others attempting to deliver food were hit with charges months ago. Activist Ben Rubenstein and Veterans for Peace president Gary Condon (age 72) were beaten by police during the standoff for trying to toss a cucumber to activists inside the embassy. In fact, the warrant against Blumenthal was months old, and apparently initially rejected. Blumenthal explained:

If the government had at least told me I had a warrant I could have voluntarily surrendered and appeared at my own arraignment. Instead, the federal government essentially enlisted the DC police to SWAT me, ensuring that I would be subjected to an early morning raid and then languish in prison for days without even the ability to call an attorney.

The lack of coverage of his arrest is totally consistent with media coverage of the siege of the Venezuelan embassy, Blumenthal told FAIR. The violence, racism, sexism of the Venezuelan oppositionnone of it was reported in the mainstream US press. Aside from alternative outlets like Democracy Now! (10/30/19) and the World Socialist Website (10/30/19), one had to turn to Russian state media to find coverage of Blumenthals arrest. A Sputnik article (10/30/19) about the case cited damaging exposs Grayzone has published about Guaid inner circle, one of which recently led to the resignation of right-wing economist Ricardo Hausmann from Guaids shadow administration.

Heres an idea for media outlets and NGOs concerned about the appeal of Russian public relations efforts: start doing your jobs by holding your own authoritarian politicians and politicized police forces to account.

See the original post:
Max Blumenthal Arrest Exposes Hypocrisy of Western Media and 'Human Rights' NGOs - FAIR

Edward Snowden reveals how your phone keeps tabs on you – The Irish Times

Comedian and podcaster Joe Rogan is for his mix of libertarian and conservative views combined with enthusiasm for subjects like UFOs and Bigfoot. Hes not my cup of tea, but his latest episode an interview with whistle-blower Edward Snowden has an interesting part on smartphone surveillance.

Neither Android nor the iPhone are especially good at protecting your privacy, Snowden says to Rogan. Snowden drives home the message that all phones are transmitting, even when the screen is off and theyre doing nothing. All phones are constantly connected to their nearest tower, he adds.

Its worth being reminded that the IMEI (international mobile station equipment identity) and the IMSI (international mobile subscriber identity) are unique identifiers that can track your phone anywhere in the world and the IMEI is burned into the phone so it exists regardless of sim swapping.

Whenever the phone is turned on theres a record of your presence at that place that is being made and created by companies. It does not need to be kept for ever, and in fact theres no good argument for it to be kept for ever but these companies see that as valuable information.

Thats how bulk collection which is the governments euphemism for mass surveillance works, he says. Just another thing to keep you awake at night.

See original here:
Edward Snowden reveals how your phone keeps tabs on you - The Irish Times

‘Whoa’: Twitter to End Paid Political Advertising on Platform, CEO Says – Common Dreams

Twitter CEO Jack Dorsey on Wednesday announced that the social media site would no longer have paid political advertisements, a move sure to shake up the digital landscape that earned him praise from progressives.

"Wow," tweeted activist Edward Snowden. "Big move by@jack, and a bigger contrast to@Facebook's increasingly problematic policy positions."

In a series of tweets, Dorsey laid out the reasons for the decision and made clear that the policy would only apply to paid advertisements.

"This isn't about free expression," said Dorsey. "This is about paying for reach."

"They're drawing a clear line between paid reach and earned, organic reach," said NBC journalist Ben Collins.

Under the new rules, as indicated by Dorsey, a campaign presumably could post an advertisement video or photo to its own accountjust not pay to promote it. The final policy will be announced on November 15 and implemented on November 22.

SCROLL TO CONTINUE WITH CONTENT

But our costs are real. Over 90% of the not-for-profit Common Dreams budget comes from reader support. If you're a regular readeror maybe a new oneand you haven't yet pitched in, could you make a contribution today and help keep us going?

No amount is too large or too small. Please select a donation method:

"A political message earns reach when people decide to follow an account or retweet," Dorsey explained. "Paying for reach removes that decision, forcing highly optimized and targeted political messages on people. We believe this decision should not be compromised by money."

Dorsey appeared to take a subtle shot at competitor Facebook, whose CEO Mark Zuckerberg told Rep. Alexandria Ocasio-Cortez in a recent hearing that political advertisements on that platform did not need to be truthful. In response, activists bought an ad that shows members of the Republican Party supporting the congresswoman's Green New Deal; Facebook approved the ad.

"It's not credible for us to say: 'We're working hard to stop people from gaming our systems to spread misleading info, buuut if someone pays us to target and force people to see their political adwell...they can say whatever they want!'" said Dorsey.

Reaction from progressives was hesitantly positive.

"I don't really know their reasons or [if] it is good or bad ultimately," tweeted blogger Atrios, "but at least knock a dent in the ridiculous Facebook 'free speech requires we privilege people who give us money' argument.

See original here:
'Whoa': Twitter to End Paid Political Advertising on Platform, CEO Says - Common Dreams

Primitive Ventures Dovey Wan on Significance of Chinas New Cryptography Law – Ethereum World News

On October 26, the Standing Committee of the 13th National Peoples Congress in China revealed that a new cryptography law will go into effect January 1, 2020, according to local news outlet Xinhuanet.

The announcement comes only a day after Chinese president Xi Jinping called on the citizens of the $12 trillion economy, the second-largest in the world behind only the US, to seize strategic opportunities in blockchain technology.

China is still maintaining its ban on crypto asset trading, even though Bitcoin (BTC) ownership is recognized as personal property thats entitled to protection under the nations laws. The country, which is home to nearly 1.5 billion people, is also developing a sovereign digital currency.

Cryptography, as a key underpinning of distributed ledger technology (DLT), might play a vital role in the nations push to become more competitive in the rapidly evolving, global blockchain industry.

Chinas new cryptography law has been designed to address new regulatory and legal requirements in commercial cryptography use-cases, as theyre playing an important role in supporting and improving Chinas diversified economy, according to the laws recent draft proposal.

The proposal states:

Clear guidelines and regulations are needed to evaluate commercial cryptography technologies used in the major fields related to the national interest as the current loose system is not suitable for the industry anymore.

Chinas national congress said the new law will support research and development (R&D) efforts on commercial cryptography technologies, while creating a comprehensive, standardized regulatory framework for the emerging market.

The Chinese congress prepared a draft proposal for the new law in July 2019, requesting feedback from the general public.

The proposal addresses various issues including how compatible the current industry standards should be with other similar cryptography systems throughout the world, to whether organizations should voluntarily verify commercial crypto-related use-cases with regulators.

Chinas congress says the new law may promote or help the nations educational projects, which include public exhibitions, to spread awareness about cryptography among government agencies, local firms and social groups.

Founding partner at Primitive Ventures Dovey Wan took to Twitter to explain the relevance of Chinas new cryptography law.

Wan noted that the new law is aimed at standardizing the cryptographic application and management of passwords, among other requirements.

After reviewing the draft version, which has been released before the formal version, Wan learned that Chinas central cryptographic agency (CCP) will have unified leadership over the national cryptography work, [which] formulates key guidelines and policies for national cryptography, and coordinates major [activities involving] national security.

She added that Chinas state department encourages and supports the research cryptography, protects the intellectual property rights of related technology according to law, and promotes the progress and innovation of cryptography and public/private key technology.

Furthermore, no organization or individual may steal other peoples encrypted information, illegally invade other peoples password protection system, or engage in activities that endanger national security, social public interests.

According to Wan,

The key takeaway is: the development of new cryptography, hashing algorithms, [and] even the usage of the tech, will be in the official legal realm. This means you need to follow the CCP standard for all encrypted behaviors, which can be VERY broad, from mining to block propagation.

Read the original post:
Primitive Ventures Dovey Wan on Significance of Chinas New Cryptography Law - Ethereum World News

The top FBI lawyer who tried to force Apple to backdoor its crypto now says working crypto is essential to public safety and national security – Boing…

Jim Baker served as the FBI's general counsel from 2014 until 2017, and he presided over the the FBI's attempt to force Apple to undermine its cryptography under the rubric of investigating the San Bernadino shooters; he has long been a prominent advocate for mass surveillance, but he has had a change of heart: in a long, detailed essay on Lawfare, Baker explains why he believes that governments should not seek to introduce defects into cryptographic systems.

Baker's argument is primarily instrumental: he rejects the idea that you can create cryptography that works perfectly when it's being used to protect good guys, but fails completely when bad guys try to use it. He acknowledges that any effort to ban working cryptography would simply send American criminals to offshore software repositories to get access to working crypto, and that in so doing, it would be much harder for American law enforcement to spy on its adversaries, because the metadata from their encrypted communications would be out of US law enforcement's reach.

Baker is primarily responding to Attorney General William Barr's idiotic call to ban working crypto as a matter of public safety, and he builds on the usual instrumental arguments about the limited utility of crypto bans for law enforcement with a less-often-heard argument about national security and public safety.

Baker discusses how Huawei (and other companies with deep ties to nations that the US considers to be its rivals) will inevitably have some of its gear within the US's communications infrastructure. Baker describes US communications networks becoming "zero trust networks," that can't be trusted to protect their users' privacy -- and he suggests that well-designed cryptographic tools are America's best defense in this zero-trust environment. If you can't stop Huawei from sending your data to the People's Liberation Army, at least you can encrypt that data so the PLA can't make sense of it.

He also discusses the national security interest in having well-secured information systems with up-to-date patches, and criticizes efforts (like the one the FBI made with Apple) to suborn companies to ship out poisoned software updates in order to introduce defects into their software so governments can spy on them. This will poison the well, making American individuals and companies reluctant to apply updates when they arrive, thus preserving security defects that America's nation-state rivals (as well as criminals, terrorists, etc) can exploit.

I've made similar instrumental arguments about the foolishness of attempting to ban working cryptography, but I think it's important to note that there's a much more important equity in the crypto wars: the right to privacy.

As Baker himself notes, cryptography does not create a "law-free zone" where cops can't execute lawful orders. No US law allows government officials to "force manufacturers and service providers to unlock devices and decrypt communicationsthat is, to rewrite software."

This is not an oversight.

The framers of the US Constitution explicitly rejected the idea that people should be forced to arrange their affairs to make life easy for law enforcement.

The existence of conversations that law enforcement can't access after the fact is not a new development: we never passed a law requiring letter-writers to use indelible ink and fireproof paper so that cops could read them later if they needed to. We never passed a law requiring every restaurant to put a hidden mic in every salt cellar so that potential lunchtime plotters could have their whispers played back after a robbery took place. You are allowed to have a murmured conversation with your spouse in bed: no law requires you to shout your communications over a megaphone so that any cops listening by the windows can hear what you're saying.

Yes, it's impossible to keep people safe while taking away their working cryptography.

But even if it wasn't impossible, it would still be wrong. Countries like Russia, China, Iran, Australia and the UK have adopted laws banning working crypto -- these are countries with very different constitutional values, ones that make allowances for forcing people to arrange their affairs to make life easier for their cops.

But both William Barr and Jim Baker are oath-bound to uphold the US Constitution and its values. The relationship of those values to the right to live your life in ways that may inconvenience law enforcement is indisputable.

Baker's willingness to admit the technical incoherence of crypto bans is great, a massive step forward, but American legal officials shouldn't even be debating whether or not it's possible to ban crypto. If Barr managed to produce a working "solution" to the problems that Baker raises, we still shouldn't use it, because Americans have the right to make choices that enhance their own security, privacy and integrity, even if that makes cops work harder.

In other words, even though Snowden opposes crypto bans and Baker opposes crypto bans, they are not talking about the same thing. Snowden is talking about upholding the Constitution; Baker is talking about the regrettable impossibility of having his security cake and eating it too.

The Defense Innovation Board discussed the fact that even if the United States and its allies keep Huawei equipment out of their domestic networks for a sustained period of timewhich increasingly will be difficult to dothey will eventually encounter it somewhere in the world. Therefore, they will need to figure out how to operate in a zero-trust interconnected world, especially after the widespread deployment of 5G networks globally, much of which (at least abroad) will include Huawei equipment. They need to think about the reality of operating in a degraded communications security environment and never trust the internet, applying the zero-trust network concept on a global scale.

This strikes me as eminently sensible. The widespread deployment of Huawei and other Chinese equipment in the backbone of the internet increasingly provides China with the technical capability (whether utilized or not) to copy, corrupt or disrupt substantial portions of data traffic transmitted on Huawei equipment. In a crisis, China could direct Huawei and other companies to degrade key network elements of its adversaries and/or render them inoperable. Huawei denies that it would cooperate with the Chinese government in such activities, and some observers question the logic of Huawei ever doing so. But from a national security perspective it is prudent to focus on the capabilities of an adversary, not just stated intent. Living in a Huawei world means there are substantial risks to the confidentiality, integrity and availability of data that is essential to our effective functioning as a society.

As mentioned above, China is not the only cyber threat actor. But China and Huawei exemplify the nature and scope of the pervasive cybersecurity risks that the United States and its allies face from many adversaries.

Rethinking Encryption [Jim Baker/Lawfare]

(via Schneier)

(Image: U.S. Air Force photo by J.M. Eddins Jr)

The EFFs Panopticlick tool (previously) is now a general purpose testing suite for browser privacy, checking Do Not Track, the effectiveness of ad- and tracker-blocking, and providing details on your browsers fingerprint. [via Hacker News]

Japan's Henn na Hotel chain, owned by the HIS Group, uses "bed-facing Tapia robots" in its rooms; these robots turn out to be incredibly insecure: you can update them by pairing with them using a NFC sensor at the backs of their heads. The robots do not check the new code for cryptographic signatures, meaning []

In the wake of Berkeley joining the growing list of cities that ban the use of facial recognition by governments, RIT philosophy prof Evan Selinger and Northeastern law/comp sci prof Woodrow Hartzog make the case in the New York Times for a nationwide ban on facial recognition technology.

Want an online presence that matters? As the graveyard of fallen start-ups can attest to, having a fancy website and a sleek logo isnt worth much unless people actually start engaging with them. Even on the fast changing web, there are ironclad strategies for marketing that can adapt to any platform. The best way to []

Big things are happening in tech with AI and deep learning. Thats not exactly a news flash when you look at how often companies use algorithms to manage everything from online advertising to the songs, videos, posts, and other digital content platforms recommend for their users. Getting into the field requires a pretty broad range []

In the early days of the web, everyone wanted a .com domain for their site. As a results, all the good ones got snapped up. But .com no longer has the cachet it once did. In fact, many new business and individuals are opting for other top-level domain extensions. One of the most memorable is []

Read the original:
The top FBI lawyer who tried to force Apple to backdoor its crypto now says working crypto is essential to public safety and national security - Boing...

China has Passed Cryptography Law That will take Effect on Jan… – TokenHell

A local news outlet CCT reports that the National People Congress of China has passed a crypto Law.

The cryptography law is passed on 26th Oct during the 14th meeting of the Standing Committee by the Chinese National Peoples Congress. According to the report, the crypto law will be in effect on Jan 2020.

According to the report of the local news outlet, this new Chinese crypto law will aim at standardizing the application of cryptography and management of passwords.

Apart from this, it will also help to promote the development of the password industry. The cryptography law will improve and boost the different levels of password management such as scientific, standardized, and legalized level.

This news was also shared on twitter by Dovey Wan who is the founding partner of Primitive Crypto.

Dovey Wan says that this is the initial step by the Chinese government towards its national Central Bank Digital Currency (CBDC).

She then explained that the main focus of the crypto law is on the development of cryptography. While commenting on the crypto law, she further stated:

The key take away is the developing of new cryptography, hashing algo, even the usage of the tech, will be in the official legal realm. This means you need to follow the CCP standard for all encrypted behaviors, which can be VERY broad, from mining to block propagation.

The president of China Xi Jinping has recently made an announcement in which he says that the main focus of China is on becoming the global leader in the field of Blockchain technology. President Xi says that we aim to accelerate the blockchain technology in our country.

In the announcement he says:

We must take the blockchain as an important breakthrough for independent innovation of core technologies. [We must] clarify the main direction, increase investment, focus on a number of key core technologies, and accelerate the development of blockchain technology and industrial innovation.

China is rapidly adopting the blockchain technology and is developing day by day in this field. The Chinese government aims to leave the United States behind in the field of blockchain technology.

See the rest here:
China has Passed Cryptography Law That will take Effect on Jan... - TokenHell

Global encryption software market is expected to grow with a CAGR of 16.38% over the forecast period from 2019-2025 – PRNewswire

The report on the global encryption software market provides qualitative and quantitative analysis for the period from 2017 to 2025.

Read the full report: https://www.reportlinker.com/p05806461/?utm_source=PRN

NEW YORK, Oct. 29, 2019 /PRNewswire/ -- The report predicts the global encryption software market to grow with a CAGR of 16.38% over the forecast period from 2019-2025. The study on encryption software market covers the analysis of the leading geographies such as North America, Europe, Asia-Pacific, and RoW for the period of 2017 to 2025.

The report on encryption software market is a comprehensive study and presentation of drivers, restraints, opportunities, demand factors, market size, forecasts, and trends in the global encryption software market over the period of 2017 to 2025. Moreover, the report is a collective presentation of primary and secondary research findings.

Porter's five forces model in the report provides insights into the competitive rivalry, supplier and buyer positions in the market and opportunities for the new entrants in the global encryption software market over the period of 2017 to 2025. Further, IGR- Growth Matrix gave in the report brings an insight into the investment areas that existing or new market players can consider.

Report Findings1) Drivers Growing number of cyber-attack cases across the world Increasing adoption of the cloud-based technologies2) Restraints Availability of pirated encryption software3) Opportunities Increasing awareness and demand for integrated data protection solutions

Research Methodology

A) Primary ResearchOur primary research involves extensive interviews and analysis of the opinions provided by the primary respondents. The primary research starts with identifying and approaching the primary respondents, the primary respondents are approached include1. Key Opinion Leaders associated with Infinium Global Research2. Internal and External subject matter experts3. Professionals and participants from the industry

Our primary research respondents typically include1. Executives working with leading companies in the market under review2. Product/brand/marketing managers3. CXO level executives4. Regional/zonal/ country managers5. Vice President level executives.

B) Secondary ResearchSecondary research involves extensive exploring through the secondary sources of information available in both the public domain and paid sources. At Infinium Global Research, each research study is based on over 500 hours of secondary research accompanied by primary research. The information obtained through the secondary sources is validated through the crosscheck on various data sources.

The secondary sources of the data typically include1. Company reports and publications2. Government/institutional publications3. Trade and associations journals4. Databases such as WTO, OECD, World Bank, and among others.5. Websites and publications by research agencies

Segment CoveredThe global encryption software market is segmented on the basis of deployment, application, and end user.

The Global Encryption Software Market by Deployment On-premise Cloud

The Global Encryption Software Market by Application Database Encryption Disk Encryption Cloud Encryption Communication Encryption File/Folder Encryption

The Global Encryption Software Market by End User IT and Telecommunication BFSI Healthcare Aerospace and Defence Other End Users

Company Profiles Microsoft Corporation Symantec Corporation International Business Machines Corporation McAfee, LLC Thales e-Security, Inc. (Thales Group) Sophos Group plc Trend Micro Incorporated Check Point Software Technologies Ltd. ESET, spol. S r. o. Proofpoint, Inc. Other Companies

What does this report deliver?1. Comprehensive analysis of the global as well as regional markets of the encryption software market.2. Complete coverage of all the segments in the encryption software market to analyze the trends, developments in the global market and forecast of market size up to 2025.3. Comprehensive analysis of the companies operating in the global encryption software market. The company profile includes analysis of product portfolio, revenue, SWOT analysis and latest developments of the company.4. IGR- Growth Matrix presents an analysis of the product segments and geographies that market players should focus to invest, consolidate, expand and/or diversify.

Read the full report: https://www.reportlinker.com/p05806461/?utm_source=PRN

About Reportlinker ReportLinker is an award-winning market research solution. Reportlinker finds and organizes the latest industry data so you get all the market research you need - instantly, in one place.

__________________________ Contact Clare: clare@reportlinker.com US: (339)-368-6001 Intl: +1 339-368-6001

SOURCE Reportlinker

http://www.reportlinker.com

Here is the original post:
Global encryption software market is expected to grow with a CAGR of 16.38% over the forecast period from 2019-2025 - PRNewswire