WikiLeaks’ Julian Assange could face ‘imminent’ embassy expulsion

There's a degree of additional pressure following the US' indictment of 12 Russian officers over election-related hacking -- the charges offered not-so-subtle hints that investigators believed Russia coordinated the leak of hacked data with WikiLeaks to maximize its impact. However, Assange's legal team also asserted that his health is "deteriorating" after six years of living in the same place, with few chances to experience natural light. He didn't help matters when he lost internet privileges in March for violating Ecuador conditions forbidding political commentary, further cutting him off from the outside world.

Just what happens in an expulsion isn't clear. While Sweden suspended the sexual assault case that prompted Assange to hide in the Ecuadorian embassy, there has been talk of the US prepping espionage charges against him. CNN has confirmed that the UK is in "ongoing" negotiations with Ecuador and the US to make sure Assange isn't in danger if he leaves, but there's no guarantee that he'll exit with those kinds of promises in place. Short of a successful court objection, Assange might might face a prompt US extradition regardless of his condition.

The rest is here:
WikiLeaks' Julian Assange could face 'imminent' embassy expulsion

Have a Cryptocurrency Company? Bermuda, Malta or Gibraltar …

For every one license weve issued, weve probably said no to 10, he said. When youre considering a new sector, to bring in big names is extremely attractive, but theyve got to be good names. So youve got to be willing to say no to even some of the bigger ones.

Online gambling is responsible for around 3,000 jobs on Gibraltar, or about 10 percent of the territorys population. Mr. Isola said he saw a similar possibility in the blockchain, calling it the next significant new flow of business.

Gibraltar is in the final stages before voting on regulations that, similar to Maltas, would let companies issue and trade digital tokens. Already, 35 companies have applied to the government for licenses to operate blockchain businesses.

Liechtenstein, the Alpine nation between Austria and Switzerland, is also among the newer entrants to the race, with the prime minister circulating a Blockchain Act this summer to allow companies to sell tokens.

The activity has spread to other areas, too. Wyoming and Delaware have passed laws aimed at welcoming certain blockchain businesses, though they have been less focused on ones that trade in tokens. In 2014, New York created a so-called BitLicense, which initially drew businesses to the state, but it has since been viewed as a deterrent because of the governments wide-ranging requirements and slow approval process.

In Switzerland, the canton of Zug has also sought out crypto business, labeling itself Crypto Valley. Zugs top economic official who has worked on the effort, Guido Bulgheroni, flew to the cryptocurrency conference in May that Mr. Burt also attended.

At a cocktail party for Crypto Valley, Mr. Bulgheroni said his first job was to make sure that anyone with a crypto project was happy being in the Zug area.

How many other jurisdictions have that? he said.

Continue reading here:
Have a Cryptocurrency Company? Bermuda, Malta or Gibraltar ...

What Is Encryption, and How Does It Work?

Encryption has a long history dating back to when the ancient Greeks and Romans sent secret messages by substituting letters only decipherable with a secret key. Join us for a quick history lesson and learn more about how encryption works.

In todays edition of HTG Explains, well give you a brief history of encryption, how it works, and some examples of different types of encryptionmake sure you also check out the previous edition, where we explained why so many geeks hate Internet Explorer.

Image by xkcd, obviously.

The ancient Greeks used a tool called a Scytale to help encrypt their messages more quickly using a transposition cipherthey would simply wrap the strip of parchment around the cylinder, write out the message, and then when unwound wouldnt make sense.

This encryption method could be fairly easily broken, of course, but its one of the first examples of encryption actually being used in the real world.

Julius Caesar used a somewhat similar method during his time by shifting each letter of the alphabet to the right or left by a number of positionsan encryption technique known as Caesars cipher. For instance, using the example cipher below youd write GEEK as JHHN.

Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZCipher: DEFGHIJKLMNOPQRSTUVWXYZABC

Since only the intended recipient of the message knew the cipher, it would be difficult for the next person to decode the message, which would appear as gibberish, but the person that had the cipher could easily decode and read it.

Other simple encryption ciphers like the Polybius square used a polyalphabetic cipher that listed each letter with the corresponding numeric positions across the top and side to tell where the position of the letter was.

Using a table like the one above you would write the letter G as 23, or GEEK as 23 31 31 43.

Enigma Machine

During World War II, the Germans used the Enigma machine to pass encrypted transmissions back and forth, which took years before the Polish were able to crack the messages, and give the solution to the Allied forces, which was instrumental to their victory.

Lets face it: modern encryption techniques can be an extremely boring subject, so instead of just explaining them with words, weve put together a comic strip that talks about the history of encryption, inspired by Jeff Mosers stick figure guide to AES. Note: clearly we cannot convey everything about encryptions history in a comic strip.

Back in those days, people do not have a good encryption method to secure their electronic communication.

Lucifer was the name given to several of the earliest civilian block ciphers, developed by Horst Feistel and his colleagues at IBM.

The Data Encryption Standard (DES) is a block cipher (a form of shared secret encryption) that was selected by the National Bureau of Standards as an official Federal Information Processing Standard (FIPS) for the United States in 1976 and which has subsequently enjoyed widespread use internationally.

Concerns about security and the relatively slow operation of DES in software motivated researchers to propose a variety of alternative block cipher designs, which started to appear in the late 1980s and early 1990s: examples include RC5, Blowfish, IDEA, NewDES, SAFER, CAST5 and FEAL

The Rijndael encryption algorithm was adopted by the US Government as standard symmetric-key encryption, or Advanced Encryption Standard (AES). AES was announced by National Institute of Standards and Technology (NIST) as U.S. FIPS PUB 197 (FIPS 197) on November 26, 2001 after a 5-year standardization process in which fifteen competing designs were presented and evaluated before Rijndael was selected as the most suitable encryption algorithm.

Many encryption algorithms exist, and they are all suited to different purposesthe two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing so.

As a good example of the speed difference between different types of encryption, you can use the benchmarking utility built into TrueCrypts volume creation wizardas you can see, AES is by far the fastest type of strong encryption.

There are both slower and faster encryption methods, and they are all suited for different purposes. If youre simply trying to decrypt a tiny piece of data every so often, you can afford to use the strongest possible encryption, or even encrypt it twice with different types of encryption. If you require speed, youd probably want to go with AES.

For more on benchmarking different types of encryption, check out a report from Washington University of St. Louis, where they did a ton of testing on different routines, and explained it all in a very geeky write-up.

All the fancy encryption algorithm that we have talked about earlier are mostly used for two different types of encryption:

To explain this concept, well use the postal service metaphor described in Wikipedia to understand how symmetric key algorithms works.

Alice puts her secret message in a box, and locks the box using a padlock to which she has a key. She then sends the box to Bob through regular mail. When Bob receives the box, he uses an identical copy of Alices key (which he has somehow obtained previously, maybe by a face-to-face meeting) to open the box, and read the message. Bob can then use the same padlock to send his secret reply.

Symmetric-key algorithms can be divided into stream ciphers and block ciphersstream ciphers encrypt the bits of the message one at a time, and block ciphers take a number of bits, often in blocks of 64 bits at a time, and encrypt them as a single unit. Theres a lot of different algorithms you can choose fromthe more popular and well-respected symmetric algorithms include Twofish, Serpent, AES (Rijndael), Blowfish, CAST5, RC4, TDES, and IDEA.

In an asymmetric key system, Bob and Alice have separate padlocks, instead of the single padlock with multiple keys from the symmetric example. Note: this is, of course, a greatly oversimplified example of how it really works, which is much more complicated, but youll get the general idea.

First, Alice asks Bob to send his open padlock to her through regular mail, keeping his key to himself. When Alice receives it she uses it to lock a box containing her message, and sends the locked box to Bob. Bob can then unlock the box with his key and read the message from Alice. To reply, Bob must similarly get Alices open padlock to lock the box before sending it back to her.

The critical advantage in an asymmetric key system is that Bob and Alice never need to send a copy of their keys to each other. This prevents a third party (perhaps, in the example, a corrupt postal worker) from copying a key while it is in transit, allowing said third party to spy on all future messages sent between Alice and Bob. In addition, if Bob were careless and allowed someone else to copy his key, Alices messages to Bob would be compromised, but Alices messages to other people would remain secret, since the other people would be providing different padlocks for Alice to use.

Asymmetric encryption uses different keys for encryption and decryption. The message recipient creates a private key and a public key. The public key is distributed among the message senders and they use the public key to encrypt the message. The recipient uses their private key any encrypted messages that have been encrypted using the recipients public key.

Theres one major benefit to doing encryption this way compare to symmetric encryption. We never need to send anything secret (like our encryption key or password) over an insecure channel. Your public key goes out to the worldits not secret and it doesnt need to be. Your private key can stay snug and cozy on your personal computer, where you generated itit never has to be e-mailed anywhere, or read by attackers.

For many years, the SSL (Secure Sockets Layer) protocol has been securing web transactions using encryption between your web browser and a web server, protecting you from anybody that might be snooping on the network in the middle.

SSL itself is conceptually quite simple. It begins when the browser requests a secure page (usually https://)

The web server sends its public key with its certificate.The browser checks that the certificate was issued by a trusted party (usually a trusted root CA), that the certificate is still valid and that the certificate is related to the site contacted.The browser then uses the public key, to encrypt a random symmetric encryption key and sends it to the server with the encrypted URL required as well as other encrypted http data.The web server decrypts the symmetric encryption key using its private key and uses the browsers symmetric key to decrypt its URL and http data.The web server sends back the requested html document and http data encrypted with the browsers symmetric key. The browser decrypts the http data and html document using the symmetric key and displays the information.

And now you can securely buy that eBay item you really didnt need.

If you made it this far, were at the end of our long journey to understanding encryption and a little bit of how it worksstarting from the early days of encryption with the Greeks and Romans, the rise of Lucifer, and finally how SSL uses asymmetric and symmetric encryption to help you buy that fluffy pink bunny on eBay.

Were big fans of encryption here at How-To Geek, and weve covered a lot of different ways to do things like:

Of course encryption is far too complicated a topic to really explain everything. Did we miss something important? Feel free to lay some knowledge on your fellow readers in the comments.

View original post here:
What Is Encryption, and How Does It Work?

Julian Assange faces imminent expulsion from Ecuadorean Embassy

JULIAN Assanges time in the Ecuadorean Embassy in London may be up.

The Times of London reports sources as saying Assange may be forced out in hours, days or weeks.

A source with detailed knowledge of the case said yesterday: I expect (Assange) to lose his asylum status imminently. This means he will be expelled from the embassy. When this will happen is impossible to say.

His lawyer Jennifer Robinson reportedly told The Times, that she was concerned for Assanges health.

We are preparing to defend him in the British courts and will fight extradition to the US, she said. We dont have any indication of time frame.

This is a very serious situation, one that we are very concerned about. Its a matter for Ecuador, the UK, the US and Australia.

Assange, 47, has been holed up in the embassy since 2012 after losing an appeal against extradition to Sweden for questions about rape and sexual assault allegations. Sweden eventually dropped the case but UK authorities still have an arrest warrant out on him for breaching a bail agreement with them.

Ecuadorean President Lenin Moreno has made no secret of the fact that he wants Assange out, saying this week I have never agreed with what Mr. Assange does.

The only thing we want is a guarantee that his life will not be in danger. We have spoken to, and of course, we are dealing with this with Mr. Assanges legal team and with the British government.

CNN said this week that US prosecutors may have a sealed indictment and could seek extradition to America to answer questions on Russias hacking of the 2016 US election.

The recent indictments issued by US Special Counsel Robert Mueller imply that Assange and WikiLeaks were a conduit for Russian intelligence in distributing hacked Democratic Party emails in 2016, the media outlet said. Whether a sealed indictment awaits Assange in relation to the Russian hacking investigation is unknown. But according to US officials, charges have been drawn up relating to previous WikiLeaks disclosures of classified US documents.

Follow this link:
Julian Assange faces imminent expulsion from Ecuadorean Embassy

Mastercard Secures a Potentially Game-Changing Cryptocurrency …

In 2017, virtual currencies simply couldn't be stopped. At the beginning of the year, the combined value of all digital currencies was a mere $17.7 billion. But by year's end, the aggregate market cap of cryptocurrencies had soared to $613 billion -- a gain of better than 3,300%. In other words, it was arguably the greatest year in history for a single asset class.

But, as many of you are probably aware by now, the wheels fell off the wagon just one week into 2018. After hitting an all-time market cap high of $835 billion, cryptocurrencies have plunged by as much as 72%, to $232 billion, in recent weeks.

Why the complete 180 on cryptocurrencies, you ask? Much of the blame probably lies with the emergence and waiting game associated with blockchain technology.

Image source: Getty Images.

Blockchain is, hands down, the biggest reason for the ascent of cryptocurrency valuations. Blockchain is the digital, distributed, and decentralized ledger that underlies virtual currencies and is responsible for the ability to move funds without a third-party provider (i.e., banks). It also allows for the transparent and immutable logging of data.

Or, in plainer English, blockchain has game-changing currency and non-currency applications.

On the currency front, blockchain looks to improve the speed and cost with which currency moves from one party to another. With traditional banking networks, it can take up to five business days to validate and settle a payment. But with blockchain, payments could be processed within a matter of seconds or minutes. Plus, with no bank to pilfer third-party fees for using their network, the belief is that transaction fees on crypto networks would save either businesses or consumers money.

As for non-currency transactions, the ability of blockchain to log and secure real-time data could come in handy. In particular, blockchain is being examined as a means to aid companies in monitoring their supply chains.

Along those same lines, blockchain could allow businesses to more quickly locate supply chain inefficiencies, as well as expedite the shipping process through the use of smart contracts. A smart contract is essentially a customizable protocol that could play a role in eliminating paper from supply chains. For instance, an approved smart contract could handle the reorder of a product once inventory reaches a certain level.

Throughout 2017, only the imagination of investors constrained what blockchain appeared capable of.

Image source: Getty Images.

However, 2018 has become the "prove it" year for cryptocurrencies.

One of the biggest issues with blockchain technology is what I refer to as the "proof-of-concept conundrum." In demos and small-scale testing, blockchain has had little trouble doing exactly what's expected of it. However, no enterprises have been willing to take the training wheels off of this technology and expose it to the real world. The reason? It's an unproven technology that hasn't yet shown its ability to scale. Yet, the only way blockchain can demonstrate this scale is if enterprises give it the opportunity. This Catch-22 creates a major headache for blockchain developers, and puts its near and intermediate future into limbo.

Cyberattacks have been another cause for concern. An analysis from Carbon Black found that $1.1 billion worth of digital currency had been stolen by hackers through the first five months and change since the year began. Nearly half of these stolen funds were Monero tokens, known as XMR. Monero, being a privacy coin, purposefully obfuscates the sender and receiver of funds, making a transaction anonymous. In this instance, it also makes it veritably impossible to retrieve hacked tokens.

Inconsistency has also plagued crypto networks. For instance, even though bitcoin is the world's most valuable virtual currency, the average transaction can take in excess of an hour to validate and completely settle. If we're talking about a cross-border transaction, then a one hour wait time could be a major improvement over current banking networks. But for domestic transactions that are settled considerably faster on traditional networks, blockchain inconsistency has put cryptocurrencies at a clear disadvantage.

Image source: Getty Images.

But one financial industry juggernaut may have a solution that bridges the gap between fiat currencies -- i.e., money that governments have declared as legal tender -- and cryptocurrencies, which are mostly unregulated.

On July 17, the U.S. Patent and Trademark Office awarded a patent to Mastercard (NYSE:MA) that would provide "for linkage of blockchain-based assets to fiat currency accounts."

As noted in the background section of the patent, blockchain currencies have "seen increased usage over traditional fiat currencies by consumers who value anonymity and security." However, the limitations of blockchain are also noted, with traditional payment networks having processing times measured in nanoseconds, whereas blockchain transactions can take a significant amount of time to verify. This inconsistency could persuade businesses and consumers to shy away from blockchain currencies.

The solution offered by Mastercard is a hybrid system that'll incorporate blockchain currencies, but allow them to be transacted on traditional payment channels. Why stick with traditional payment channels and not use blockchain? For starters, it's all about speed. Mastercard believes that using traditional channels would allow transactions involving cryptocurrency to be processed considerably faster than with blockchain.

More importantly, Mastercard has copious amounts of data on fraud and risk that it's evaluated on existing networks that would come in handy. As noted in the patent filing, "payment networks may be able to evaluate the likelihood of fraud and assess risk for blockchain transactions using existing fraud and risk algorithms and information that is available to payment networks, such as historical fiat and blockchain transaction data, credit bureau data, demographic information, etc., that is unavailable for use in blockchain networks."

To be clear, Mastercard hasn't unveiled any products as of yet that accomplish the objectives outlined by this patent. However, it does appear to be in the driver's seat to bridge the gap between fiat currencies and cryptocurrencies, should the latter continue to gain mainstream acceptance. That makes Mastercard a major player worth eyeing as the cryptocurrency space matures.

The rest is here:
Mastercard Secures a Potentially Game-Changing Cryptocurrency ...

Wikileaks’ Julian Assange will be removed from Ecuadorean …

WikiLeaks founder Julian Assange is seen on the balcony of the Ecuadorian Embassy in London. Thomson Reuters

LONDON Julian Assange will be kicked out of the Ecuadorean Embassy in London where he has lived in diplomatic isolation since 2012 "imminently," a source has told The Times of London. CNN reports that Downing Street is in "ongoing" discussions with Ecuador and the United States over his fate.

Both Ecuador and Britain want to ensure Assange remains unharmed. But their suspicion is that US prosecutors have a sealed indictment against him and will extradite him to America, where he faces prison if convicted of charges related to the publication of US documents that were subject to national security secrecy protections. CNN said :

"The recent indictments issued by US Special Counsel Robert Mueller imply that Assange and WikiLeaks were a conduit for Russian intelligence in distributing hacked Democratic Party emails in 2016."

"Whether a sealed indictment awaits Assange in relation to the Russian hacking investigation is unknown. But according to US officials, charges have been drawn up relating to previous WikiLeaks disclosures of classified US documents."

The Times said Assange could be evicted from the Embassy at any moment. A member of Assange's support team said that he might leave in "hours, days or weeks."

Assange took refuge in the Embassy after he was sought by prosecutors in Sweden in an investigation of rape and sexual assault. The Swedes dropped the case. But British authorities maintained an arrest order for him based on a breach of his bail agreement with UK police. Ecuador granted him asylum inside the Embassy, shielding him from extradition to the US or Sweden, and from arrest in the UK.

Six years indoors have taken their toll. Assange's health is said to be failing, lending some urgency to the search for a solution.

Read this article:
Wikileaks' Julian Assange will be removed from Ecuadorean ...

Julian Assange’s team ‘making plans for imminent expulsion …

Julian Assange's six-year self-imposed imprisonmentinside theEcuadorean embassy in London appears to be drawing to a close, with the countries in talks and the Wikileaks founder reportedly pondering his next move.

Lenin Moreno,Ecuador's president,has confirmed a July 15 report in London's Sunday Times that Ecuador and Britain were in talks to try to end Mr Assange's stay at the embassy where he has been holed up since successfully seeking asylum in 2012.

Mr Moreno said on Friday any eviction of Mr Assangefrom the embassy had to be carried out correctly and through dialogue, but he displayed no sympathy forthe Wikileaks founder'spolitical agenda as a leaker of confidential documents.

"I have never been in favour of MrAssange's activity," Mr Moreno said at an event in Madrid.

"I have never agreed with the interventions in people's private emails in order to obtain information, however valuable it may be, to bring out certain undesirable acts of governments or people, not in that way.

"There are correct and legal ways to do it."

Go here to see the original:
Julian Assange's team 'making plans for imminent expulsion ...

Cryptography: The Science of Making and Breaking Codes

There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But its tough to make a code truly unbreakable.

Hosted by: Michael Aranda----------Dooblydoo thanks go to the following Patreon supporters -- we couldn't make SciShow without them! Shout out to Justin Ove, John Szymakowski, Fatima Iqbal, Justin Lentz, David Campos, and Chris Peters.----------Like SciShow? Want to help support us, and also get things to put on your walls, cover your torso and hold your liquids? Check out our awesome products over at DFTBA Records: http://dftba.com/scishow

Or help support us by becoming our patron on Patreon:https://www.patreon.com/scishow----------Looking for SciShow elsewhere on the internet?Facebook: http://www.facebook.com/scishowTwitter: http://www.twitter.com/scishowTumblr: http://scishow.tumblr.comInstagram: http://instagram.com/thescishow

Sources:http://www.vectorsite.net/ttcode_04.h...http://www.simonsingh.net/The_Black_C...http://book.itep.ru/depository/crypto...http://www.cs.trincoll.edu/~crypto/hi...http://www.sans.org/reading-room/whit...http://ftp.stmarys-ca.edu/jsauerbe/m1...http://www.turing.org.uk/scrapbook/ww...http://enigma.louisedade.co.uk/howitw...http://www.codesandciphers.org.uk/eni...http://www.pbs.org/wgbh/nova/military...http://www.cs.miami.edu/~burt/learnin...

View post:
Cryptography: The Science of Making and Breaking Codes

Things you need to know Bitcoin.com

No Central Command

Bitcoin isnt owned by anyone. Think of it like email. Anyone can use it, but there isnt a single company that is in charge of it. Bitcoin transactions are irreversible. This means that no one, including banks, or governments can block you from sending or receiving bitcoins with anyone else, anywhere in the world. With this freedom comes the great responsibility of not having any central authority to complain to if something goes wrong. Just like physical cash, dont let strangers hold your bitcoins for you, and dont send them to untrustworthy people on the internet.

There are several different types of Bitcoin wallets, but the most important distinction is in relation to who is in control of the private keys required to spend the bitcoins. Some Bitcoin wallets actually act more like banks because they are holding the users private keys on behalf. If you choose to use one of these services, be aware that you are completely at their mercy regarding the security of your bitcoins. Most wallets, however, allow the user to be in charge of their own private keys. This means that no one in the entire world can access your account without your permission. It also means that no one can help you if you forget your password or otherwise lose access to your private keys. If you decide you want to own a lot of Bitcoin it would be a good idea to divide them among several different wallets. As the saying goes, dont put all your eggs in one basket.

Like everything, Bitcoins price is determined by the laws of supply and demand. Because the supply is limited to 21 million bitcoins, as more people use Bitcoin the increased demand, combined with the fixed supply, will force the price to go up. Because the number of people using Bitcoin in the world is still relatively small, the price of Bitcoin in terms of traditional currency can fluctuate significantly on a daily basis, but will continue to increase as more people start to use it. For example, in early 2011 one Bitcoin was worth less than one USD, but in 2015 one Bitcoin is worth hundreds of USD. In the future, if Bitcoin becomes truly popular, each single Bitcoin will have to be worth at least hundreds of thousands of dollars in order to accommodate this additional demand.

There are several ways to buy Bitcoin, but trusted exchanges are a great way to acquire Bitcoin. Because there are inefficiencies in the traditional banking system, exchanges will sometimes have slightly different prices. If the difference is too great, traders will buy low on one an exchange and sell high on another and close the gap. If an exchange constantly has substantially different prices than others, it is a sign of trouble and that exchange should be avoided. As with everything else, do your research and find an exchange you can trust. Its also a good idea not to use an exchange as a wallet. Move your Bitcoin to your personal wallet so that you have control over your funds at all times. You can view our list of Bitcoin exchanges here.

Because all Bitcoin transactions are stored on a public ledger known as the blockchain, people might be able to link your identity to a transaction over time. Some companies offer various tools such as Bitcoin mixers to help achieve greater privacy, but it takes a huge amount of effort to use Bitcoin anonymously. You may want to follow your countrys tax regulations regarding Bitcoin in order to avoid trouble with the law, but you have the power not to should you choose to take that risk. To improve privacy, most newer Bitcoin wallets will use a new Bitcoin address each time someone sends bitcoins to you.

Bitcoin transactions are seen by the entire network within a few seconds and are usually recorded into Bitcoin's world wide ledger called the blockchain, in the next block. While its possible that a transaction wont be confirmed in the next block, in the vast majority of circumstances it is fine to accept a transaction as soon as it has been seen by the network. Unlike traditional payment systems, Bitcoin transactions are lightning fast and can be sent globally. Bitcoin is still relatively new, but with each passing day the technology becomes more reliable. It is more and more unlikely that a major bug will emerge in the system as time goes by, and people can trust the technology more with the passing of time. Each month people transact hundreds of millions of dollars worth of Bitcoin.

See the rest here:

Things you need to know Bitcoin.com

WikiLeaks – aws.amazon.com

There have been reports that a government inquiry prompted us not to serve WikiLeaks any longer. That is inaccurate.

There have also been reports that it was prompted by massive DDOS attacks. That too is inaccurate. There were indeed large-scale DDOS attacks, but they were successfully defended against.

Amazon Web Services (AWS) rents computer infrastructure on a self-service basis. AWS does not pre-screen its customers, but it does have terms of service that must be followed. WikiLeaks was not following them. There were several parts they were violating. For example, our terms of service state that you represent and warrant that you own or otherwise control all of the rights to the content that use of the content you supply does not violate this policy and will not cause injury to any person or entity. Its clear that WikiLeaks doesnt own or otherwise control all the rights to this classified content. Further, it is not credible that the extraordinary volume of 250,000 classified documents that WikiLeaks is publishing could have been carefully redacted in such a way as to ensure that they werent putting innocent people in jeopardy. Human rights organizations have in fact written to WikiLeaks asking them to exercise caution and not release the names or identities of human rights defenders who might be persecuted by their governments.

Weve been running AWS for over four years and have hundreds of thousands of customers storing all kinds of data on AWS. Some of this data is controversial, and thats perfectly fine. But, when companies or people go about securing and storing large quantities of data that isnt rightfully theirs, and publishing this data without ensuring it wont injure others, its a violation of our terms of service, and folks need to go operate elsewhere.

We look forward to continuing to serve our AWS customers and are excited about several new things we have coming your way in the next few months.

Amazon Web Services

The rest is here:
WikiLeaks - aws.amazon.com