What is Cryptography & Types of Cryptography | Synopsys

With symmetric cryptography, the same key is used for both encryption and decryption. A sender and a recipient must already have a shared key that is known to both. Key distribution is a tricky problemand was the impetus for developing asymmetric cryptography.

With asymmetric crypto, two different keys are used for encryption and decryption. Every user in an asymmetric cryptosystem has both a public key and a private key. The private key is kept secret at all times, but the public key may be freely distributed.

Data encrypted with a public key may only be decrypted with the corresponding private key. So, sending a message to John requires encrypting that message with Johns public key. Only John can decrypt the message, as only John has his private key. Any data encrypted with a private key can only be decrypted with the corresponding public key. Similarly, Jane could digitally sign a message with her private key, and anyone with Janes public key could decrypt the signed message and verify that it was in fact Jane who sent it.

Symmetric is generally very fast and ideal for encrypting large amounts of data (e.g., an entire disk partition or database). Asymmetric is much slower and can only encrypt pieces of data that are smaller than the key size (typically 2048 bits or smaller). Thus, asymmetric crypto is generally used to encrypt symmetric encryption keys which are then used to encrypt much larger blocks of data. For digital signatures, asymmetric crypto is generally used to encrypt the hashes of messages rather than entire messages.

A cryptosystem provides for managing cryptographic keys including generation, exchange, storage, use, revocation, and replacement of the keys.

Originally posted here:
What is Cryptography & Types of Cryptography | Synopsys

AES encryption

AES encryption

Encrypt and decrypt text with AES algorithm

As you see this implementation is using openssl instead of mcrypt and the result of the encryption/decryption is not compatible with each other.The mcrypt function will be deprecated feature in PHP 7.1.x

It is a webtool to encrypt and decrypt text using AES encryption algorithm. You can chose 128, 192 or 256-bit long key size for encryption and decryption. The result of the process is downloadable in a text file.

If you want to encrypt a text put it in the white textarea above, set the key of the encryption then push the Encrypt button.The result of the encryption will appear in base64 encoded to prevent character encoding problems.If you want to decrypt a text be sure it is in base64 encoded and is encrypted with AES algorithm!Put the encrypted text in the white textarea, set the key and push the Decrypt button.

When you want to encrypt a confidential text into a decryptable format, for example when you need to send sensitive data in e-mail.The decryption of the encrypted text it is possible only if you know the right password.

AES (acronym of Advanced Encryption Standard) is a symmetric encryption algorithm.The algorithm was developed by two Belgian cryptographer Joan Daemen and Vincent Rijmen.AES was designed to be efficient in both hardware and software, and supports a block length of 128 bits and key lengths of 128, 192, and 256 bits.

AES encryption is used by U.S. for securing sensitive but unclassified material, so we can say it is enough secure.

Please fill out our survey to help us improving aesencryption.net.

We appreciate your feedback!

View post:
AES encryption

HTTPS – Wikipedia

HTTP Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP) for secure communication over a computer network, and is widely used on the Internet.[1][2] In HTTPS, the communication protocol is encrypted using Transport Layer Security (TLS), or formerly, its predecessor, Secure Sockets Layer (SSL). The protocol is therefore also often referred to as HTTP over TLS,[3] or HTTP over SSL.

The principal motivation for HTTPS is authentication of the accessed website and protection of the privacy and integrity of the exchanged data while in transit. It protects against man-in-the-middle attacks. The bidirectional encryption of communications between a client and server protects against eavesdropping and tampering of the communication.[4] In practice, this provides a reasonable assurance that one is communicating without interference by attackers with the website that one intended to communicate with, as opposed to an impostor.

Historically, HTTPS connections were primarily used for payment transactions on the World Wide Web, e-mail and for sensitive transactions in corporate information systems.[citation needed] Since 2018[update][citation needed], HTTPS is used more often by webusers than the original non-secure HTTP, primarily to protect page authenticity on all types of websites; secure accounts; and keep user communications, identity, and web browsing private.

The Uniform Resource Identifier (URI) scheme HTTPS has identical usage syntax to the HTTP scheme. However, HTTPS signals the browser to use an added encryption layer of SSL/TLS to protect the traffic. SSL/TLS is especially suited for HTTP, since it can provide some protection even if only one side of the communication is authenticated. This is the case with HTTP transactions over the Internet, where typically only the server is authenticated (by the client examining the server's certificate).

HTTPS creates a secure channel over an insecure network. This ensures reasonable protection from eavesdroppers and man-in-the-middle attacks, provided that adequate cipher suites are used and that the server certificate is verified and trusted.

Because HTTPS piggybacks HTTP entirely on top of TLS, the entirety of the underlying HTTP protocol can be encrypted. This includes the request URL (which particular web page was requested), query parameters, headers, and cookies (which often contain identity information about the user). However, because host (website) addresses and port numbers are necessarily part of the underlying TCP/IP protocols, HTTPS cannot protect their disclosure. In practice this means that even on a correctly configured web server, eavesdroppers can infer the IP address and port number of the web server (sometimes even the domain name e.g. http://www.example.org, but not the rest of the URL) that one is communicating with, as well as the amount (data transferred) and duration (length of session) of the communication, though not the content of the communication.[4]

Web browsers know how to trust HTTPS websites based on certificate authorities that come pre-installed in their software. Certificate authorities (such as Let's Encrypt, Digicert, Comodo, GoDaddy and GlobalSign) are in this way being trusted by web browser creators to provide valid certificates. Therefore, a user should trust an HTTPS connection to a website if and only if all of the following are true:

HTTPS is especially important over insecure networks (such as public Wi-Fi access points), as anyone on the same local network can packet-sniff and discover sensitive information not protected by HTTPS. Additionally, many free to use and paid WLAN networks engage in packet injection in order to serve their own ads on webpages. However, this can be exploited maliciously in many ways, such as injecting malware onto webpages and stealing users' private information.[5]

HTTPS is also very important for connections over the Tor anonymity network, as malicious Tor nodes can damage or alter the contents passing through them in an insecure fashion and inject malware into the connection. This is one reason why the Electronic Frontier Foundation and the Tor project started the development of HTTPS Everywhere,[4] which is included in the Tor Browser Bundle.[6]

As more information is revealed about global mass surveillance and criminals stealing personal information, the use of HTTPS security on all websites is becoming increasingly important regardless of the type of Internet connection being used.[7][8] While metadata about individual pages that a user visits is not sensitive, when combined, they can reveal a lot about the user and compromise the user's privacy.[9][10][11]

Deploying HTTPS also allows the use of HTTP/2 (or its predecessor, the now-deprecated protocol SPDY), that are new generations of HTTP, designed to reduce page load times, size and latency.

It is recommended to use HTTP Strict Transport Security (HSTS) with HTTPS to protect users from man-in-the-middle attacks, especially SSL stripping.[11][12]

HTTPS should not be confused with the little-used Secure HTTP (S-HTTP) specified in RFC 2660.

As of April2018[update], 33.2% of Alexa top 1,000,000 websites use HTTPS as default,[13] 57.1% of the Internet's 137,971 most popular websites have a secure implementation of HTTPS,[14] and 70% of page loads (measured by Firefox Telemetry) use HTTPS.[15]

Most browsers display a warning if they receive an invalid certificate. Older browsers, when connecting to a site with an invalid certificate, would present the user with a dialog box asking whether they wanted to continue. Newer browsers display a warning across the entire window. Newer browsers also prominently display the site's security information in the address bar. Extended validation certificates turn the address bar green in newer browsers. Most browsers also display a warning to the user when visiting a site that contains a mixture of encrypted and unencrypted content.

Most web browsers alert the user when visiting sites that have invalid security certificates.

The Electronic Frontier Foundation, opining that "In an ideal world, every web request could be defaulted to HTTPS", has provided an add-on called HTTPS Everywhere for Mozilla Firefox that enables HTTPS by default for hundreds of frequently used websites. A beta version of this plugin is also available for Google Chrome and Chromium.[16][17]

The security of HTTPS is that of the underlying TLS, which typically uses long-term public and private keys to generate a short-term session key, which is then used to encrypt the data flow between client and server. X.509 certificates are used to authenticate the server (and sometimes the client as well). As a consequence, certificate authorities and public key certificates are necessary to verify the relation between the certificate and its owner, as well as to generate, sign, and administer the validity of certificates. While this can be more beneficial than verifying the identities via a web of trust, the 2013 mass surveillance disclosures drew attention to certificate authorities as a potential weak point allowing man-in-the-middle attacks.[18][19] An important property in this context is forward secrecy, which ensures that encrypted communications recorded in the past cannot be retrieved and decrypted should long-term secret keys or passwords be compromised in the future. Not all web servers provide forward secrecy.[20][needs update]

A site must be completely hosted over HTTPS, without having part of its contents loaded over HTTPfor example, having scripts loaded insecurelyor the user will be vulnerable to some attacks and surveillance. Also having only a certain page that contains sensitive information (such as a log-in page) of a website loaded over HTTPS, while having the rest of the website loaded over plain HTTP, will expose the user to attacks. On a site that has sensitive information somewhere on it, every time that site is accessed with HTTP instead of HTTPS, the user and the session will get exposed. Similarly, cookies on a site served through HTTPS have to have the secure attribute enabled.[11]

HTTPS URLs begin with "https://" and use port 443 by default, whereas HTTP URLs begin with "http://" and use port 80 by default.

HTTP is not encrypted and is vulnerable to man-in-the-middle and eavesdropping attacks, which can let attackers gain access to website accounts and sensitive information, and modify webpages to inject malware or advertisements. HTTPS is designed to withstand such attacks and is considered secure against them (with the exception of older, deprecated versions of SSL).

HTTP operates at the highest layer of the TCP/IP model, the Application layer; as does the TLS security protocol (operating as a lower sublayer of the same layer), which encrypts an HTTP message prior to transmission and decrypts a message upon arrival. Strictly speaking, HTTPS is not a separate protocol, but refers to use of ordinary HTTP over an encrypted SSL/TLS connection.

Everything in the HTTPS message is encrypted, including the headers, and the request/response load. With the exception of the possible CCA cryptographic attack described in the limitations section below, the attacker can only know that a connection is taking place between the two parties and their domain names and IP addresses.

To prepare a web server to accept HTTPS connections, the administrator must create a public key certificate for the web server. This certificate must be signed by a trusted certificate authority for the web browser to accept it without warning. The authority certifies that the certificate holder is the operator of the web server that presents it. Web browsers are generally distributed with a list of signing certificates of major certificate authorities so that they can verify certificates signed by them.

Let's Encrypt, launched in April 2016,[21] provides free and automated SSL/TLS certificates to websites.[22] According to the Electronic Frontier Foundation, "Let's Encrypt" will make switching from HTTP to HTTPS "as easy as issuing one command, or clicking one button."[23]. The majority of web hosts and cloud providers already leverage Let's Encrypt, providing free certificates to their customers.

The system can also be used for client authentication in order to limit access to a web server to authorized users. To do this, the site administrator typically creates a certificate for each user, a certificate that is loaded into their browser. Normally, that contains the name and e-mail address of the authorized user and is automatically checked by the server on each reconnect to verify the user's identity, potentially without even entering a password.

An important property in this context is perfect forward secrecy (PFS). Possessing one of the long-term asymmetric secret keys used to establish an HTTPS session should not make it easier to derive the short-term session key to then decrypt the conversation, even at a later time. DiffieHellman key exchange (DHE) and Elliptic curve DiffieHellman key exchange (ECDHE) are in 2013 the only ones known to have that property. Only 30% of Firefox, Opera, and Chromium Browser sessions use it, and nearly 0% of Apple's Safari and Microsoft Internet Explorer sessions.[20] Among the larger internet providers, only Google supports PFS since 2011[update] (State of September 2013).[citation needed]

A certificate may be revoked before it expires, for example because the secrecy of the private key has been compromised. Newer versions of popular browsers such as Firefox,[24] Opera,[25] and Internet Explorer on Windows Vista[26] implement the Online Certificate Status Protocol (OCSP) to verify that this is not the case. The browser sends the certificate's serial number to the certificate authority or its delegate via OCSP and the authority responds, telling the browser whether the certificate is still valid.[27]

SSL and TLS encryption can be configured in two modes: simple and mutual. In simple mode, authentication is only performed by the server. The mutual version requires the user to install a personal client certificate in the web browser for user authentication.[28] In either case, the level of protection depends on the correctness of the implementation of software and the cryptographic algorithms in use.

SSL/TLS does not prevent the indexing of the site by a web crawler, and in some cases the URI of the encrypted resource can be inferred by knowing only the intercepted request/response size.[29] This allows an attacker to have access to the plaintext (the publicly available static content), and the encrypted text (the encrypted version of the static content), permitting a cryptographic attack.

Because TLS operates at a protocol level below that of HTTP, and has no knowledge of the higher-level protocols, TLS servers can only strictly present one certificate for a particular address and port combination.[30] In the past, this meant that it was not feasible to use name-based virtual hosting with HTTPS. A solution called Server Name Indication (SNI) exists, which sends the hostname to the server before encrypting the connection, although many old browsers do not support this extension. Support for SNI is available since Firefox 2, Opera 8, Safari 2.1, Google Chrome 6, and Internet Explorer 7 on Windows Vista.[31][32][33]

From an architectural point of view:

A sophisticated type of man-in-the-middle attack called SSL stripping was presented at the Blackhat Conference 2009. This type of attack defeats the security provided by HTTPS by changing the https: link into an http: link, taking advantage of the fact that few Internet users actually type "https" into their browser interface: they get to a secure site by clicking on a link, and thus are fooled into thinking that they are using HTTPS when in fact they are using HTTP. The attacker then communicates in clear with the client.[34] This prompted the development of a countermeasure in HTTP called HTTP Strict Transport Security.

HTTPS has been shown vulnerable to a range of traffic analysis attacks. Traffic analysis attacks are a type of side-channel attack that relies on variations in the timing and size of traffic in order to infer properties about the encrypted traffic itself. Traffic analysis is possible because SSL/TLS encryption changes the contents of traffic, but has minimal impact on the size and timing of traffic. In May 2010, a research paper by researchers from Microsoft Research and Indiana University discovered that detailed sensitive user data can be inferred from side channels such as packet sizes. More specifically, the researchers found that an eavesdropper can infer the illnesses/medications/surgeries of the user, his/her family income and investment secrets, despite HTTPS protection in several high-profile, top-of-the-line web applications in healthcare, taxation, investment and web search.[35] Although this work demonstrated vulnerability of HTTPS to traffic analysis, the approach presented by the authors required manual analysis and focused specifically on web applications protected by HTTPS.

The fact that most modern websites, including Google, Yahoo!, and Amazon, use HTTPS causes problems for many users trying to access public Wi-Fi hot spots, because a Wi-Fi hot spot login page fails to load if the user tries to open an HTTPS resource.[36][37] Several websites, such as neverssl.com or nonhttps.com, guarantee that they will always remain accessible by HTTP.

Netscape Communications created HTTPS in 1994 for its Netscape Navigator web browser.[38] Originally, HTTPS was used with the SSL protocol. As SSL evolved into Transport Layer Security (TLS), HTTPS was formally specified by RFC 2818 in May 2000.

See the original post:
HTTPS - Wikipedia

Persecution of WikiLeaks editor Julian Assange continues …

By James Cogan 5 July 2018

Today is the 100th consecutive day of the denial, by the Ecuadorian embassy in London, of the democratic right of WikiLeaks editor Julian Assange to communicate with the outside world, or receive visitors, apart from his legal representatives and a brief, unexplained visit by two Australian consular officials.

Julian Assange sought political asylum in the small embassy building on June 19, 2012. For 2,767 daysmore than six yearsthe British government has denied him exposure to direct sunlight and adequate medical care. On July 3, he turned 47-years-old, enduring conditions that the United Nations Working Group on Arbitrary Detention condemned as deprivation of liberty, a violation of his human rights and tantamount to torture.

The reasons why Assange sought asylumand why it was granted, under international law, by Ecuadorhave not changed. He was being given no support by the government of Australia, where he was born and holds citizenship, under conditions where he faced the prospect of extradition to the United States.

In June 2012, Assange lost his last legal appeal against an attempt to extradite him to Sweden to answer questions over manufactured allegations that he may have committed sexual assault offenses. His concern, however, was not the Swedish case. It was the well-grounded fear that Sweden would hand him over to the US to face charges of espionage, in response to WikiLeaks publication of leaked documents that had revealed American war crimes, and intelligence and diplomatic intrigues.

The threat that Assange could face a US show trial on charges that carry massive prison sentences, or even the death penalty, has only become more serious. Former CIA director and now Trumps secretary of state, Mike Pompeo, declared in April 2017after WikiLeaks began publishing explosive exposures of CIA hacking and criminalitythat the US government can no longer allow Assange and his colleagues the latitude to use free speech values against us. The Trump administrations attorney general, Jeff Sessions, declared several days later that Assanges arrest was a priority.

The Swedish prosecutors office ended its investigation and extradition request in May 2017 with no sexual offence charges ever being laid. The British government and police, however, immediately made clear that if Assange left the Ecuadorian embassy he would be detained for breaching his bail conditions.

The danger that faces Assange was spelled out this week by lawyer Geoffrey Robertson. The well-known human rights defender stated: If he leaves the embassy, he will be arrested, held for a short time for a breach of bail, and in that time, the US foreign secretary will order an extradition request that will keep him in prison for years, fighting a US extradition request to prosecute him as a spy.

Since Ecuador cut off his communication on March 28, and leading up to the June 19 sixth anniversary of his involuntary confinement in the embassy, there has been a renewed groundswell of demands that the persecution of Julian Assange be ended. He has not committed any crime. He is the editor of an award-winning media organisation, which has informed the world of numerous cases of government and corporate criminality and abuse of power.

The demands have been raised around the world: Ecuador must restore Assanges communications; the British government must drop its pursuit of a minor bail breach and allow him to leave the United Kingdom if he chooses; and the Australian government must exercise its undeniable diplomatic power and legal discretion to secure the unconditional release of an Australian citizen and journalist facing unjust treatment.

The response of the political establishments of the United States, Britain and Australia, however, has been to continue their vendetta to silence WikiLeaks and prosecute Assange.

Mike Pence, Trumps vice president, visited Ecuador last week. On the eve of the trip, 10 of the most prominent Democratic Party senators demanded that he pressure the government of President Lenn Moreno to renege on Assanges right to asylum and expel him from the embassy.

Based on statements made after the talks, Pence does not seem to have pressed Moreno on the asylum issue. Instead, the Trump administration appears content to use the Ecuadorian government as its agent in a vindictive attempt to break Assange, physically and psychologically, by denying him his fundamental right to access and communicate with the outside world.

For its part, the May government in the United Kingdom is participating in the effort to pressure Assange to leave the embassy with no guarantees against extradition to the US.

In words dripping with deceit, Minister of State for Europe and the Americas Sir Alan Duncan told the British parliament on June 26: We would like to make the assurance that, if he [Assange] were to step out of the embassy, he would be treated humanely and properly and the first priority would be to look after his health, which we think is deteriorating.

Assanges health has been deteriorating over the past six years because the May government has refused to allow him to even temporarily leave the embassy building to visit a hospital or a dentist. Duncans real attitude to the WikiLeaks editor was made clear on March 27, when he labelled him a miserable little worm, who should give himself up to British justice.

The Labour Party opposition headed by Jeremy Corbyn has made no attempt to expose the utter fraud of Duncans statement, let alone demand that Assange be given a guarantee against US extradition and the right to leave the UK unhindered.

The Australian government of Prime Minister Malcolm Turnbull has likewise not shifted from its cowardly collaboration with the US.

Assanges father John Shipton wrote to Turnbull last month, appealing to him for assistance in extricating his son from the Ecuadorian embassy, with the necessary protections.

Turnbull has responded with a deafening silence. Moreover, the establishment media has raised not a single question of the government over Assanges condition, or even asked that it explain why it sent two officials to visit him on June 7, for the first time since he sought asylum.

The Australian Labor Party, which denounced Assange as a criminal when it was in government, has predictably also said nothing. More significantly, the Greens leadership, along with independent Andrew Wilkie, who once claimed to defend WikiLeaks and Assange, have also remained mute over the issue.

Only one member of parliament has mentioned Assange: Green senator Andrew Bartlett, who is retiring in a matter of weeks. On June 28, during debate on sweeping anti-democratic, foreign interference laws, Bartlett noted in the Senate that government member Andrew Hastie had raised Assange and WikiLeaks as examples of the kinds of individuals and organisations that the new legal powers would be required to suppress.

Bartlett used one of his last opportunities to speak in parliament, to provide at least some voice to the sentiments of millions of ordinary people in Australia.

Im not giving him [Assange] a character reference, Bartlett insisted, but I am certainly saying he has a right as an Australian citizen to receive proper support against what has clearly been an international conspiracy by governments to try and silence him. He has been kept in isolation for years. He has been basically silenced already because of the threat he poses to the statenot to the community, not to the public. These laws are attempts to criminalise and attack people like Julian Assange.

In a later contribution, Bartlett directly asked: Given that Mr Hastie specifically referred to Julian Assange, is there actually an explicit focus on the activities of him and his organisation? A government minister replied: The answer is no.

The honest answer to that question would have been yes.

Successive Labor and Coalition governments have collaborated in the persecution of Assange and WikiLeaks because of their support for the full alignment of Australian imperialism with its alliance partner, the US, in its escalating geo-strategic and military confrontation with China. The Australian ruling elite is just as hostile to an independent and critical media as its American counterpart.

There is little question that the new Australian foreign interference laws are intended to be used against media organisations that publish leaked information, which exposes US and Australian war plans against China. They can also potentially be used to criminalise anti-war political opposition and activity. Most ominously, the laws are being hailed internationally as a model for legislation in other countries.

Assange and WikiLeaks are a sharp example of the broader campaign to censor and silence oppositional voices. The fight to defend him is inseparable from the struggle to alert and mobilise the international working class against the ongoing attacks on fundamental democratic rights and against the danger of dictatorship and war.

SEP (Australia) to hold meetings on new foreign interference laws: A move towards dictatorship and war [3 July 2018]

Full WSWS Coverage on the defence of Julian Assange

Google is blocking the World Socialist Web Site from search results.

To fight this blacklisting:

Read more:
Persecution of WikiLeaks editor Julian Assange continues ...

WikiLeaks | Organization | Common Dreams

Newswire articleTuesday, March 07, 2017 Vault 7: CIA Hacking Tools RevealedToday, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency. The first full part of the series, "Year Zero", comprises 8,761 documents and...Read more Newswire articleFriday, November 25, 2016The Yemen FilesToday, Friday 25th November, WikiLeaks releases The Yemen Files. The Yemen Files are a collection of over 500 documents from the United States embassy in Sana'a, Yemen. Comprising of over 200 emails and 300 PDFs, the collection details official documents and correspondence pertaining to the Office...Read more Newswire articleFriday, October 09, 2015TPP Treaty: Intellectual Property Rights Chapter - 5 October 2015Today, 9 October, 2015 WikiLeaks releases the final negotiated text for the TPP (Trans-Pacific Partnership) Intellectual Property Rights Chapter. The TPP encompasses 12 nations representing more than 40 per cent of global GDP. Despite a final agreement, the text is still being withheld from the...Read more Newswire articleFriday, July 31, 2015Target TokyoToday, Friday 31 July 2015, 9am CEST, WikiLeaks publishes "Target Tokyo", 35 Top Secret NSA targets in Japan including the Japanese cabinet and Japanese companies such as Mitsubishi, together with intercepts relating to US-Japan relations, trade negotiations and sensitive climate change strategy...Read more Newswire articleWednesday, July 08, 2015All The Chancellor's MenToday, Wednesday 8 July at 1800 CEST, WikiLeaks publishes three NSA intercepts of German Chancellor Angela Merkel, together with a list of 56 National Security Agency (NSA) target selectors for the Chancellor and the Chancellery. It lists not only confidential numbers for the Chancellor, but also...Read more Newswire articleTuesday, June 02, 2015WikiLeaks Issues Call for $100,000 Bounty on Monster Trade TreatyToday, WikiLeaks has launched a campaign to crowd-source a $100,000 reward for America's Most Wanted Secret: the Trans-Pacific Partnership Agreement (TPP). Over the last two years, WikiLeaks has published three chapters of this super-secret global deal, despite unprecedented efforts by negotiating...Read more Newswire articleThursday, December 18, 2014CIA Report Warned Assassination Programme Might Backfire WikiLeaks today, Thursday 18th December, publishes a review by the Central Intelligence Agency (CIA) of its "High Value Target" (HVT) assassination programme. The report weighs the pros and cons of killing "insurgent" leaders in assassination plots. After the report was prepared, US drone strike...Read more Newswire articleThursday, June 19, 2014Wikileaks Publish Secret Trade in Services Agreement (TISA) - Financial Services AnnexToday, WikiLeaks released the secret draft text for the Trade in Services Agreement (TISA) Financial Services Annex, which covers 50 countries and 68.2%1 of world trade in services. The US and the EU are the main proponents of the agreement, and the authors of most joint changes, which also covers cross-border data flow. In a significant anti-transparency manoeuvre by the parties, the draft has been classified to keep it secret not just during the negotiations but for five years after the TISA enters into force.Read more Newswire articleTuesday, June 17, 201459 International Organizations Call Upon UN to Remedy Human Rights Violations in Pre-Charge Detention of Wikileaks Publisher Julian AssangeBefore the United Nations this Sunday, 26 international human rights, fair trial, and jurist organizations, and 33 Latin American civil society organisations, condemned Swedens violation of the fundamental human rights of WikiLeaks editor-in-chief Julian Assange, who has experienced protracted pre-charge detention stemming from a Swedish investigation which has yet to charge him. Mr. Assanges pre-charge detention has spanned nearly four years as US Federal Grand Jury prepares a criminal case against WikiLeaks and its officers.Read more Newswire articleFriday, May 23, 2014WikiLeaks Statement on the Mass Recording of Afghan Telephone Calls by the NSAThe National Security Agency has been recording and storing nearly all the domestic (and international) phone calls from two or more target countries as of 2013. Both the Washington Post and The Intercept (based in the US and published by eBay chairman Pierre Omidyar) have censored the name of one of the victim states, which the latter publication refers to as country "X".Read more

See the original post:
WikiLeaks | Organization | Common Dreams

Download KaKa File Encryption 1.3 – softpedia.com

KaKa File Encryption is a tiny and portable piece of kit that password-protects files on your computer, in order to prevent unauthorized users from accessing them. It can be effortlessly handled, even by users with little or no experience in this kind of apps.

As installation is not a prerequisite, you can just drop the executable file anywhere on the hard drive and run it directly.

Alternatively, you can store KaKa File Encryption on a removable device (like a USB flash drive) and run it on any computer. Therefore, you can keep the utility with you whenever you're on the go.

What's more important is that the Windows Registry section does not receive entry updates and files are not left behind on the hard drive after program removal.

The interface of the program is formed from a small, regular window with a simple-to-use layout. The "what you see is what you get" concept clearly applies to the app, since there are no other options available, aside from the ones visible in the main frame.

Loading files into the working environment is done with the help of the file browser or "drag and drop" function. It is possible to encrypt multiple items in a single session with the same password. The main application window reveals the name, path and status for each file. Basically, all you have to do is write a password, confirm it and click a button to initialize the encryption operation.

KaKa File Encryption locks the original files without creating new ones. In order to decrypt them, you must have the program stored somewhere on the hard drive or flash drive. Once you decrypt a file, the restriction is automatically removed by the tool, so you have to redo the entire task.

The application barely uses CPU and system memory, hence it shouldn't affect the computer's overall performance. It has a good response time, applies the protection status rapidly and is pretty stable. We haven't come across any issues in our tests. To conclude, KaKa File Encryption comes packed with the necessary and suffice elements for protecting files against unauthorized use.

File encryption Encrypt file Secure file Encrypt Encryption Encrypting Protect

More here:
Download KaKa File Encryption 1.3 - softpedia.com

Cryptocurrency, Bitcoin, Ethereum, Ripple … – RTTNews

Cryptocurrency Tutorial

SCAMCOIN is a fake cryptocurrency that is meant to help only those who created it and in turn, hurt those who hold it. Such coins are promoted on crypto forums usually through shilling as well as through pump-and-dumps.

CBDC is short for Central Bank Digital Currency, which is the proposed new digital version of a fiat money that is issued by the central bank of a country. The discussion on the topic is nascent and the various facets involved are under careful consideration. Central banks already use digital money in the form of traditional reserves, but CBDC is different from that.

Cryptocurrency exchanges are a crucial player in the cryptosphere as they are key to supporting prices of different cryptocurrencies, disseminating information, and facilitating transactions in digital currencies through their platforms. They are often in news for both right and wrong reasons. Some have grown beyond trading and diversified into payment processors and crypto lending platforms.

Bitcoin, once dismissed as something reserved for geeks and the cryptography enthusiasts, is back in the limelight, as the price of the cryptocurrency appreciated in recent weeks.

Visit link:
Cryptocurrency, Bitcoin, Ethereum, Ripple ... - RTTNews

Cryptocurrency TechCrunch

The blockchain revolution is coming, but you might not see it. Thats the view ofBrian Behlendorf, executivedirector of the Linux Foundations Hyperledger Project. Speaking at the TC S

In what amounted to one of the most far-reaching and interesting conversations at TC Sessions in Zug, Ethereum masterminds Vitalik Buterin, Justin Drake, and Karl Floersch spoke openly and oft

The Securities and Exchange Commission, the federal agency responsible for protecting investors and maintaining fair and orderly functioning of our securities markets, has 11 regional offices, includi

Cryptocurrency exchange Coinbase is the go-to place for buying and exchanging cryptocurrencies as long as youre fine sticking to Bitcoin, Litecoin, Ethereum and Bitcoin Cash. But Coinba

Ethereum creator Vitalik Buterin talked about a wide range of topics during an interview with Jon Evans at TechCrunch Sessions: Blockchain. He was surprisingly balanced and stated multiple times that

Few debates can get as heated in blockchain circles as the simple question: which chain(s)? Will a single public blockchain such as Ethereum become the one chain to rule us all, or will multiple chain

Highly-prized domain name Crypto.com has been sold! Registered in 1993 by Matt Blaze, a professor of computer and informationscience at theUniversity of Pennsylvania who sits on the board of direc

There is perhaps no firm that has done as much to promote the adoption of Ethereum as the dominant cryptocurrency platform for actual product development as Consensys. Founded by Ethereum Foundation c

The evidence is increasingly clear: 2018 is the year of the Chinese venture deal. With half of the year now complete, China is driving ahead of Silicon Valley and the rest of the United States on vent

Our TC Sessions: Blockchain event takes place in Zug, Switzerland, this coming Friday (July 6), but we are also excited to host the TechCrunch Ethereum Meetup the very next day. We are putting on the

A group of researchers at ETH Zurich have created an Ethereum smart contract scanner that will check your smart contracts for bugs, exploits or potential problems. The researchers, Dr. Petar Tsankov,

Two sites that are actively cataloging failed crypto projects, Coinopsy and DeadCoins, have found that over a 1,000 projects have failed so far in 2018. The projects range from true abandonware to out

Out on the plains of East Texas, not far from Dallas, a company called TMGcore is mining crypto. The company, funded to the tune of $70 million, will be mining multiple cryptocurrencies and is using s

Hot on the heels of Coinbase expanding its crypto fund to U.S.-based investors, the companys own CEO has unveiled a fund of his own but this time it is focused on philanthropy. GiveCryp

Messaging app firm Line has confirmed it will launch a cryptocurrency exchange called BitBox next month. The company said back in January that it planned to enter the crypto space with an exchange, bu

Silicon Valley powerhouse Andreessen Horowitz (a16z) has some big, and bigger, news today. First, it closed a dedicated crypto fund late last week from a subset of its limited partners, whove p

Just weeks after Korean crypto exchange Coinrail lost $40 million through an alleged hack, another in the crypto-mad country Bithumb has claimed hackers made off with over $30 million

Three-month-old Elph wants to make it easier for you to find and use blockchain-based apps. How? Through a portal thats promising to enable users to click through to see how their crypto holdin

BitWall, a Bitcoin-focused startup promising to help online publishers make money, has been acquired. Its new owner is Watch Out, the company behind an app that sends alerts about things like product

Fresh from revealing plans to add Ethereum Classic to its exchange, crypto giant Coinbase today announced that itscryptocurrency index fund first revealed in March is open to investo

Read more here:
Cryptocurrency TechCrunch

Edward Snowden Fast Facts – CNN

Mother: Elizabeth Snowden, federal court administrator

Other Facts:Dropped out of high school.

The Guardian reported that in 2009, Snowden got the first of several jobs with private contractors that worked with the National Security Agency (NSA).

Timeline:May 7, 2004 - Enlists in the Army Reserve as a Special Forces candidate.

September 28, 2004 - Is discharged from the Army Reserve without completing any training.

2013 - Works for Booz Allen Hamilton for less than three months, assigned to a team in Hawaii. Snowden is terminated on June 10, 2013.

May 20, 2013 - Snowden leaves for Hong Kong.

June 9, 2013 - Booz Allen Hamilton releases a statement confirming that Snowden has been an employee of their firm for almost three months.

June 17, 2013 - During a live online chat, the person identified as Snowden by Britain's Guardian newspaper insists that US authorities have access to phone calls, e-mails and other communications far beyond constitutional bounds.

June 21, 2013 - Federal prosecutors unseal a complaint filed in US District Court in Virginia on June 14, 2013, charging Snowden with espionage and theft of government property.

June 22, 2013 - A senior US administration official says the United States has contacted authorities in Hong Kong to seek the extradition of Snowden.

June 23, 2013 - A source tells CNN that the US government has revoked Snowden's passport.

July 24, 2013 - Russian news media reports that Russia has approved documents that would allow Snowden to enter the rest of the country while his temporary asylum request is considered.

August 1, 2013 - Kucherena tells CNN that Snowden's application for political asylum for a year has been approved and he has left the Moscow airport.

October 31, 2013 - Snowden's attorney Kucherena tells CNN that his client has been hired by an unnamed Russian website.

November 3, 2013 - A letter, purportedly written by Snowden, is published in the German magazine Der Spiegel. The letter, titled "A Manifesto for the Truth" says, "mass surveillance is a global problem and needs a global solution."

August 7, 2014 - Snowden's attorney announces that Snowden has been granted an extension to stay in Russia for three more years.

July 28, 2015 - The White House rejects a petition to pardon Snowden and maintains its position that Snowden should return to the United States. The petition contains over 167,000 signatures supporting Snowden.

Excerpt from:
Edward Snowden Fast Facts - CNN

WikiLeaks Fast Facts – CNN

Facts:WikiLeaks is an organization that facilitates the anonymous leaking of secret information through its website. It was founded in 2006 by Julian Assange, activist, computer programmer and hacker. Chelsea Manning, a former Army intelligence analyst who provided WikiLeaks with classified documents, was convicted of violating the Espionage Act in 2013 and sentenced to 35 years in prison. Her sentence was later commuted by President Barack Obama. Timeline:December 2007 - WikiLeaks posts the US Army manual for soldiers dealing with prisoners at Camp Delta, Guantanamo Bay.

March 2008 - WikiLeaks posts internal documents from the Church of Scientology.

November 2008 - WikiLeaks posts a list of names and addresses of people it claims belong to the far-right British National Party.

April 5, 2010 - A classified military video is posted by WikiLeaks. It shows a US Apache helicopter firing on and killing two journalists and a number of Iraqi civilians in 2007. The military claimed that the helicopter crew believed the targets were armed insurgents, not civilians.

July 6, 2010 - The military announces it has charged Manning with violating army regulations by transferring classified information to a personal computer and adding unauthorized software to a classified computer system and of violating federal laws of governing the handling of classified information.

November 28, 2010 - WikiLeaks begins publishing approximately 250,000 leaked State Department cables dating back to 1966. The site says the documents will be released "in stages over the next few months."

November 28, 2010 - The WikiLeaks website suffers an attack designed to make it unavailable to users. A Twitter user called Jester claims responsibility for the attack.

December 1, 2010 - Amazon removes WikiLeaks from its servers.

April 24, 2011 - Nearly 800 classified US military documents obtained by WikiLeaks reveal details about the alleged terrorist activities of al Qaeda operatives captured and housed in Guantanamo Bay.

September 2, 2011 - WikiLeaks releases its archive of more than 250,000 unredacted US diplomatic cables.

October 24, 2011 - WikiLeaks announces that it is temporarily halting publication to "aggressively fundraise." Assange states that a financial blockade by Bank of America, VISA, MasterCard, PayPal and Western Union has cut off 95% of WikiLeaks' revenue.

December 16, 2011 - Manning's Article 32 hearing, the military equivalent of a grand jury hearing that will determine whether enough evidence exists to merit a court-martial, begins.

February 23, 2012 - Manning is formally charged with aiding the enemy, wrongfully causing intelligence to be published on the Internet, transmitting national defense information and theft of public property or records.

July 5, 2012 - WikiLeaks begins publishing more than 2.4 million emails from Syrian politicians, government ministries and companies dating back to 2006.

July 30, 2013 - Manning is acquitted of aiding the enemy, but found guilty on 20 other counts, including violations of the Espionage Act.

August 22, 2013 - Through a statement read on NBC's Today show, Manning announces he wants to live life as a woman and wants to be known by his new name, Chelsea Manning.

April 23, 2014 - A Kansas judge grants Manning's request for a formal name change from Bradley to Chelsea.

January 12, 2017 - WikiLeaks tweets that Assange will agree to be extradited to the US if Obama grants clemency to Manning.

Go here to read the rest:
WikiLeaks Fast Facts - CNN