What is Mining Cryptocurrency? What you need to know…

Mining cryptocurrency can be a lucrative endeavor with enough computing power

Mining cryptocurrency is in the news a lot lately. People are finding their computers have been compromised by malware and are mining, or in some cases entire botnets are mining. But what does that mean?

This isnt mining in the traditional sense. There are no pick axes or canaries involved. Instead. its more about trying to win a blockchain lottery to earn the reward at the end.

What does that all mean? Lets hash it out.

To begin a discussion of mining cryptocurrency we need to start with what cryptocurrency is. Cryptocurrency is a digital form of currency with a cryptographic underpinning that is used as a secure medium of exchange. There are literally hundreds of different cryptocurrencies with varying real-world values. Many believe its the future of currency.

The most popular cryptocurrency is bitcoin, you may have heard of others like Etherium, too. While cryptocurrencies may differ in terms of the algorithms and encryption they use, they all share one similiarity: blockchain. And thats what we need to talk about next.

Blockchain is a digital ledger of transactions that is impossible to alter. It uses hashing and a concept similar to salting to continuously complete blocks of information that chain to form an immutable ledger.

Hashing is the act of mapping data of any length to a fixed-length output. When cryptography is involved its a one-way function. The most popular hashing algorithm is SHA-256, which outputs at a length of 256 bits. Every hash value is unique. Even the tiniest alteration to the data being hashed caused the entire value to change.

Hashing is considered one-way because of the amount of computing power it would take to reverse-hash it. For a 256-bit output, calculate 2 to the power of 256 (2 X 2 X 2 256 times). Your odds of finding the correct value are 1 in the product of that equation. Those are astronomical odds. It would take a supercomputer thousands of years to compute that.

Now lets fit it all together. With a cryptocurrency blockchain, as transactions occur they are broadcast and added to various private ledgers. Each one of these transactions is digitally signed for the sake of authenticity. On the other end, there are people or groups collecting these transactions and building ledgers. They are also computing to find a value that when hashed along with the ledger, produces a set number of 0s at the beginning of the hash value. Thats the portion thats similar to salting.

So lets say that for our example cryptocurrency, weve set the total to 10 0s. That means the first 10 spots of the 256-character hash value should all be 0s.

When the correct value is found, the block is closed, its broadcast officially and added to everyones blockchain, then the hash of the old block is put atop the new ledger and the process begins again. This is how blocks are created in the chain.

The act of computing the correct value to satisfy the hash function in blockchain is called mining. When it comes to cryptocurrency, a reward is provided to whoever solves for the correct value. That makes it lucrative to compute the correct value, though it takes quite a bit of power to accomplish that.

Oftentimes people pool their computing power together and split the reward if they solve for the correct value. In other cases, hackers have been known to co-opt others computers and use some of their computing power behind the scenes to mine cryptocurrency. There are entire botnets doing nothing but mining.

Really, solving for the correct value is like winning the lotto. There are countless people and botnets attempting to find the value and whoever finds it first gets the reward.

Of course, if you can accumulate enough computing power you could solve for the value enough of the time that you could accrue a substantial amount of cryptocurrency.

When someone says mining cryptocurrency what theyre referring to is the act of trying to compute a specific hash value by producing a set value that, when hashed along with the block ledger, produces a specific result. This requires considerable computing power, but considering the rewards its well worth it.

Heres what we covered in todays discussion:

Read this article:
What is Mining Cryptocurrency? What you need to know...

CryptoCurrency Expo

Crypto Currency ExpoCrypto Currency Expo (CCExpo) consists of the dynamic collaboration of professionals, bankers, investors, educators, miners, thought leaders, and enthusiasts in the cryptocurrency industry worldwide. The main thrust of this global expo is to provide real perspectives, timely insights, and first-hand information on the state of cryptocurrency in today's trends, along with the current business opportunities and innovations in the future. The previous expos were organized by Global Crypto Hub (GCH), which was founded by Mr. ShahinNoble Pilli and Mr. Jagdish Pandya.CCExpo is all about captivating a wide audience regarding the world of blockchains, cryptos, and ICOs, along with the millions of people worldwide.

Humble beginningsWith the success of the first three major expos held in Bangkok, Dubai, and Kuala Lumpur, this led to the 4th Crypto Currency Expo held in Mahatma Mandir, Gandhinagar, Gujarat, India on Jan. 24-25, 2018. This fourth expo was a big hit in India, attended by prominent global experts and speakers worldwide. This has validated that blockchains, cryptos, and ICOs have achieved immense popularity in India with the rest of the world.

What to expect in the CCExpoCrypto Currency Expo is filled with panel discussions, presentations by ICO/blockchain companies, insights from experts, one-to- one meetings, networking and special exclusive VIP awards and gala dinners. This provides a huge opportunity for the participants to gather information, acquire knowledge, and network with high net-worth individuals (HNIs). Through the years, it has been recognized as one of the best places to connect, collaborate, and create the future in cryptocurrency ecosystem.

See the article here:
CryptoCurrency Expo

Bring Julian Assange Home – counterpunch.org

The persecution of Julian Assange must end. Or it will end in tragedy.

The Australian government and prime minister Malcolm Turnbull have an historic opportunity to decide which it will be.

They can remain silent, for which history will be unforgiving. Or they can act in the interests of justice and humanity and bring this remarkable Australian citizen home.

Assange does not ask for special treatment. The government has clear diplomatic and moral obligations to protect Australian citizens abroad from gross injustice: in Julians case, from a gross miscarriage of justice and the extreme danger that await him should he walk out of the Ecuadorean embassy in London unprotected.

We know from the Chelsea Manning case what he can expect if a US extradition warrant is successful a United Nations Special Rapporteur called it torture.

I know Julian Assange well; I regard him as a close friend, a person of extraordinary resilience and courage. I have watched a tsunami of lies and smear engulf him, endlessly, vindictively, perfidiously; and I know why they smear him.

In 2008, a plan to destroy both WikiLeaks and Assange was laid out in a top secret document dated 8 March, 2008. The authors were the Cyber Counter-intelligence Assessments Branch of the US Defence Department. They described in detail how important it was to destroy the feeling of trust that is WikiLeaks centre of gravity.

This would be achieved, they wrote, with threats of exposure [and] criminal prosecution and a unrelenting assault on reputation. The aim was to silence and criminalise WikiLeaks and its editor and publisher. It was as if they planned a war on a single human being and on the very principle of freedom of speech.

Their main weapon would be personal smear. Their shock troops would be enlisted in the media those who are meant to keep the record straight and tell us the truth.

The irony is that no one told these journalists what to do. I call them Vichy journalists after the Vichy government that served and enabled the German occupation of wartime France.

Last October, the Australian Broadcasting Corporation journalist Sarah Ferguson interviewed Hillary Clinton, over whom she fawned as the icon for your generation.

This was the same Clinton who threatened to obliterate totally Iran and, who, as US secretary of State in 2011, was one of the instigators of the invasion and destruction of Libya as a modern state, with the loss of 40,000 lives. Like the invasion of Iraq, it was based on lies.

When the Libyan President was murdered publicly and gruesomely with a knife, Clinton was filmed whooping and cheering. Thanks largely to her, Libya became a breeding ground for ISIS and other jihadists.Thanks largely to her, tens of thousands of refugees fled in peril across the Mediterranean, and many drowned.

Leaked emails published by WikiLeaks revealed that Hillary Clintons foundation which she shares with her husband received millions of dollars from Saudi Arabia and Qatar, the main backers of ISIS and terrorism across the Middle East.

As Secretary of State, Clinton approved the biggest arms sale ever worth $80 billion to Saudi Arabia, one of her foundations principal benefactors. Today, Saudi Arabia is using these weapons to crush starving and stricken people in a genocidal assault onYemen.

Sarah Ferguson, a highly paid reporter, raised not a word of this with Hillary Clinton sitting in front of her.

Instead, she invited Clinton to describe the damage Julian Assange did personally to you. In response, Clinton defamed Assange, an Australian citizen, as very clearly a tool of Russian intelligence and a nihilistic opportunist who does the bidding of a dictator.

She offered no evidence nor was asked for any to back her grave allegations.

At no time was Assange offered the right of reply to this shocking interview, which Australias publicly-funded state broadcaster had a duty to give him.

As if that wasnt enough, Fergusons executive producer, Sally Neighour, followed the interview with a vicious re-tweet: Assange is Putins bitch. We all know it!

There are many other examples of Vichy journalism. TheGuardian, reputedly once a great liberal newspaper, conducted a vendetta against Julian Assange. Like a spurned lover, theGuardianaimed its personal, petty, inhuman and craven attacks at a man whose work it once published and profited from.

The former editor of theGuardian,Alan Rusbridger, called the WikiLeaks disclosures, which his newspaper published in 2010, one of the greatest journalistic scoops of the last 30 years. Awards were lavished and celebrated as if Julian Assange did not exist.

WikiLeaks revelations became part of theGuardiansmarketing plan to raise the papers cover price. They made money, often big money, while WikiLeaks and Assange struggled to survive.

With not a penny going to WikiLeaks, a hypedGuardianbook led to a lucrative Hollywood movie deal. The books authors, Luke Harding and David Leigh, gratuitously abused Assange as a damaged personality and callous.

They also revealed the secret password Julian had given theGuardianin confidence and which was designed to protect a digital file containing the US embassy cables.

With Assange now trapped in the Ecuadorean embassy, Harding, who had enriched himself on the backs of both Julian Assange and Edward Snowden, stood among the police outside the embassy and gloated on his blog that Scotland Yard may get the last laugh.

The question iswhy.

Julian Assange has committed no crime. He has never been charged with a crime. The Swedish episode was bogus and farcical and he has been vindicated.

Katrin Axelsson and Lisa Longstaff of Women Against Rape summed it up when they wrote, The allegations against [Assange] are a smokescreen behind which a number of governments are trying to clamp down on WikiLeaks for having audaciously revealed to the public their secret planning of wars and occupations with their attendant rape, murder and destruction The authorities care so little about violence against women that they manipulate rape allegations at will.

This truth was lost or buried in a media witch-hunt that disgracefully associated Assange with rape and misogyny. The witch-hunt included voices who described themselves as on the left and as feminist. They willfully ignored the evidence of extreme danger should Assange be extradited to the United States.

According to a document released by Edward Snowden, Assange is on a Manhunt target list. One leaked official memo says: Assange is going to make a nice bride in prison. Screw the terrorist. Hell be eating cat food forever.

In Alexandra, Virginia the suburban home of Americas war-making elite a secret grand jury, a throwback to the middle ages has spent seven years trying to concoct a crime for which Assange can be prosecuted.

This is not easy; the US Constitution protects publishers, journalists and whistleblowers. Assanges crime is to have broken a silence.

No investigative journalism in my lifetime can equal the importance of what WikiLeaks has done in calling rapacious power to account. It is as if a one-way moral screen has been pushed back to expose the imperialism of liberal democracies: the commitment to endless warfare and the division and degradation of unworthy lives: from Grenfell Tower to Gaza.

WhenHarold Pinter accepted the Nobel Prize for Literature in 2005, he referred to a vast tapestry of lies up on which we feed. He asked why the systematic brutality, the widespread atrocities, the ruthless suppression of independent thought of the Soviet Union were well known in the West while Americas imperial crimes never happened even while [they] were happening, they never happened..

In its revelations of fraudulent wars (Afghanistan, Iraq) and the bald-faced lies of governments (the Chagos Islands), WikiLeaks has allowed us to glimpse how the imperial game is played in the 21st century.Thatis why Assange is in mortal danger.

Seven years ago, in Sydney, I arranged to meet a prominent Liberal Member of the Federal Parliament, Malcolm Turnbull.

I wanted to ask him to deliver a letter from Gareth Peirce, Assanges lawyer, to the government. We talked about his famous victory in the 1980s when, as a young barrister, he had fought the British Governments attempts to suppress free speech and prevent the publication of the bookSpycatcher in its way, a WikiLeaks of the time, for it revealed the crimes of state power.

The prime minister of Australia was then Julia Gillard, a Labor Party politician who had declared WikiLeaks illegal and wanted to cancel Assanges passport until she was told she could not do this: that Assange had committed no crime: that WikiLeaks was a publisher, whose work was protected under Article 19 of the Universal Declaration of Human Rights, to which Australia was one of the original signatories.

In abandoning Assange, an Australian citizen, and colluding in his persecution, Prime Minister Gillards outrageous behaviour forced the issue of his recognition, under international law, as a political refugee whose life was at risk. Ecuador invoked the 1951 Convention and granted Assange refuge in its embassy in London.

Gillard has recently been appearing in a gig with Hillary Clinton; they are billed as pioneering feminists.

If there is anything to remember Gillard by, it a warmongering, sycophantic, embarrassing speech she made to the US Congress soon after she demanded the illegal cancellation of Julians passport.

Malcolm Turnbull is now the Prime Minister of Australia. Julian Assanges father has written to Turnbull. It is a moving letter, in which he has appealed to the prime minister to bring his son home. He refers to the real possibility of a tragedy.

I have watched Assanges health deteriorate in his years of confinement without sunlight. He has had a relentless cough, but is not even allowed safe passage to and from a hospital for an X-ray .

Malcolm Turnbull can remain silent. Or he can seize this opportunity and use his governments diplomatic influence to defend the life of an Australian citizen, whose courageous public service is recognised by countless people across the world. He can bring Julian Assange home.

This is an abridged version of an address by John Pilger to a rally in Sydney, Australia, to mark Julian Assanges six years confinement in the Ecuadorean embassy in London.

Link:
Bring Julian Assange Home - counterpunch.org

Download Sophos Free Encryption 2.40.1.11 – softpedia.com

IMPORTANT NOTICE

Sophos Free Encryption is an intuitive application that you can use to protect your sensitive data from unauthorized viewing. It can be handled by all types of users.

The interface of the program is based on a standard window with an intuitive layout, where you can add files into the secured environment using either the file browser, folder view or "drag and drop" method. You can add as many items as you want.

In order to encrypt data, you have to specify a target for the archive with the Sophos Free Encryption format (UTI), and assign a password to it. Alternatively, you can apply a key file as a dependency.

A few options are available for the encryption process. Therefore, you can create self-extracting executable files, securely delete the original items after encryption, compress data and save passwords in a history list.

Furthermore, you can use the default email client to send the encrypted archives via email after the process is done, as well as change the default file path to the passwords history list.

Sophos Free Encryption carries out a task rapidly and without errors, while using a low-to-moderate quantity of CPU and system memory, thus it does not affect the computer's overall performance. We haven't come across any difficulties in our tests, since the tool did not hang or crash.

Although it has not been updated for a pretty long time, Sophos Free Encryption offers users a simple alternative to secure their files, by turning them into encrypted archives.

File Encryption File Encrypter Encrypt Folder Encryption Encrypt Encrypter Decrypt

Read more here:
Download Sophos Free Encryption 2.40.1.11 - softpedia.com

StoreName Enumeration (System.Security.Cryptography …

This documentation is archived and is not being maintained.

.NET Framework (current version)

The .NET API Reference documentation has a new home. Visit the .NET API Browser on docs.microsoft.com to see the new experience.

Specifies the name of the X.509 certificate store to open.

System (in System.dll)

The X.509 certificate store for other users.

The X.509 certificate store for third-party certificate authorities (CAs).

The X.509 certificate store for intermediate certificate authorities (CAs).

The X.509 certificate store for revoked certificates.

The X.509 certificate store for personal certificates.

The X.509 certificate store for trusted root certificate authorities (CAs).

The X.509 certificate store for directly trusted people and resources.

The X.509 certificate store for directly trusted publishers.

This enumeration specifies the X.509 store name, which also includes the type of certificates included. For example, My includes personal certificates, whereas Disallowed includes only revoked certificates.

The following code example opens an X.509 certificate store, adds and deletes certificates, and then closes the store. It assumes you have three certificates to add to and remove from a local store.

.NET Framework Available since 2.0

See more here:
StoreName Enumeration (System.Security.Cryptography ...

Apollo All-in-One Cryptocurrency

About Apollo

Utilizing a community of world-class developers, managers, marketers and researchers, the Apollo community, backed by the Apollo Foundation, has set out to accomplish the goal of making Apollo the most technologically advanced, feature-rich currency on the market. The Apollo Foundation understands the demands of a top tier cryptocurrency and they believe they can create a coin that will integrate everything necessary to replace the current currency options. Having started from NXT, a proven cryptocurrency, the Apollo Foundation will continue development with the goal of being first all-in-one cryptocurrency, innovating and incorporating every ability that could be beneficial in a digital currency, all in a single decentralized platform. The first major update, Olympus Protocol, puts mass adoption-proof privacy at Apollo's core. This is because the Apollo Foundation knows the ability for a user to buy, sell, trade and send in absolute secrecy is vital in an industry that could be moments away from intense regulation. The Apollo team is here because they believe the only person or entity that should be in control of your funds is you.

FEATURES

Olympus Protocol

Olympus protocol will integrate functions allowing for the simple choice of whether to send publicly on the blockchain or privately using the blockchain. As part of this protocol we will be integrating an IP masking feature that will hide the users IP address.

We are also working to secure a technology that would keep nodes from being blocked by entities. Olympus Protocol will help make Apollo the safest, most feature-rich privacy coin in existence.

Decentralized Exchange

The decentralized exchange is an important feature in the Apollo platform as it allows for the fast and private purchasing, selling and trading of all assets, tokens and currencies created within Apollo. We are in the process of also adding Bitcoin, Ethereum and many other well-known cryptocurrencies to this exchange. This will allow users the ability to buy and sell Apollo privately from any nation on Earth.

Next-Generation Blockchain

Having utilized NXT technology as our base, we are developing Hermes to be it's replacement. Hermes will allow the Apollo blockchain to grow faster and healthier the larger the Apollo user base grows, rather than slower as with most cryptocurrencies on the market. Where as our current speed may be 20 to 30 seconds on average (transaction times will differ) Hermes will allow for transaction speeds of 2-3 seconds. Our goal in integrating Hermes is to become the safest, fastest and most private cryptocurrency on the market.

Alias System

The alias system in Apollo can be used to create unique aliases that act as a representation for a specific set of text. This will encrypt the chosen text into the alias. This text could be your account number, a website, email address, etc. A specific alias can be claimed only once (like a domain name), therefore it can be sold privately or publicly and transferred to any other account. The most obvious use for an alias is in sending funds to an account number that is tied to that alias. Instead of typing out the entire account number you would simply write out the alias.

Multi-Sig/Phased Transactions

Voting System

Apollo supports multi-signature accounts allowing more than one user to control an account. It also supports phased transactions which are transactions set up to occur after a certain condition is met. This could be after another transaction is sent or received, after a passage of time or after a certain block number is hit.

The Apollo voting system allows users to create public or private polls for many purposes. Polls can be used to direct and manage funds from an account, elect officials or simply to gauge public opinion. This opens up near endless possibilities for collecting absolute, verified responses from designated sources.

Possible use cases: Contracts, Voting, Signatures, Account Management, Arbitration, etc.

Encrypted Messaging

Encrypted messaging on the Apollo blockchain will allow any user to send and receive , untraceable messages and data files from one account to another. Utilizing the Olympus protocol, the users IP address and the transaction carrying the message will be invisible.

Possible use cases: Untraceable Communication, Untraceable File Transfer, etc.

Monetary System

The monetary system within Apollo allows users to instantly create currencies that can be traded privately on Apollos decentralized exchange as well as freely on external exchanges. These currencies can be easily backed by Apollo giving them an instant, tangible value.

Possible use Cases: Finance, Charity, Voter IDs, Escrows, Coupons, Currencies, etc.

Decentralized Marketplace

The Apollo decentralized marketplace will allow users to buy, sell and trade physical and digital goods using the Apollo currency. Users can list goods to be sold locally or even worldwide. Trading will be decentralized and untraceable allowing the free trade of any item. Future updates will include a review and reputation system aiding sellers in building a positive reputation based on experiences.

Cloud Storage

The Apollo data cloud allows any user to upload data to the blockchain for storage, retrieval and publishing of information. This gives a user the ability to upload a file to the blockchain, therefore receiving an irrefutable timestamp for that data. This timestamp could be helpful in establishing an absolute date for legal documents such as contracts and intellectual ownership.

Possible use cases: Voting, Permits, Evidence, Court Records, Transparency, Death/Birth Certificates, Contracts, Wills, Trusts, Escrows, Maps, GPS Data, Signatures, Medical Records, Arbitration, Delivery Records, Certifications, etc.

Advanced Account Control

Accounts can be created in a way that allows group control. Utilizing the Apollo voting system a group can be granted the ability (via initial ownership or ownership of a specified token or asset) to vote on the transactions that are spent on the account.

Possible use cases: Private Investment Fund, Private Insurance Fund, Charity Fund, Decentralized Autonomous Organizations (DAO)

Asset System

Using the Apollo asset system, a user can issue, buy, sell and trade asset tokens intended to represent anything from public and private equity to real world commodities. Unlike other markets and cryptocurrencies, users will be able to trade these assets with 100% privacy.

Possible use cases: Assets, Commodities, Derivatives, etc.

Coin Shuffling

Plugins

Coin shuffling is an additional privacy feature allowing your Apollo, as well as other assets or currencies held in the account, to be simply and randomly shuffled between user accounts. This allows an account holder to anonymize their funds and transactions nearly instantly.

The Apollo system allows for integration of 3rd party software into the core wallet. This will allow unimaginable growth via community developed features.

Authentication System

The Apollo authentication system allows a user to authenticate an account using the blockchain. This could be used to prove that a user is genuinely in control of a specific account.

Read the rest here:
Apollo All-in-One Cryptocurrency

ATB Coin – The fastest and most secure payment system

General at all

Business

Developments

Marketing

Client

ATBCoin alpha is ready for an ICO

Crowdsale process

Daily trade value hits $1000000

Becoming a popular global cryptocurrency

Official law office opening in USA (ask our support for an address)

Payment gateway for our partners

Additional offices in other countries on demand

Building own investment portfolio

ATB Coin public test launch

ATB Coin White Paper

ATBCoin first block mined & mining launch

Protocol updates

Press-conference at the biggest world-class financial center in New York city

ATB/USD is listed at USA, Canada, Europe & Asia exchanges

Exchanges start to trade with ATB Coin pairs

PR & marketing campaign

Exploding our targets on market and its geography

Charity events

Eliminate any kind of transaction fees using ATB Coin

iOS & Android apps release

More exchanges lists ATB pairs

Lightning Network

Block confirmation lasts 2,5 min

More:
ATB Coin - The fastest and most secure payment system

Device encryption settings not available (Windows 10 home …

Hi all, I recently upgraded from Windows 8.1 to Windows 10 Home, and read about device encryption. Apparently this was already available in Windows 8.1 but now that I discovered it, I would like to enable it. So I switched to logging in with a Microsoft account, and hoped that the setting would become available.

When I search for "device encryption" in the Start menu, it finds two options:

- Device Encryption (Control panel)

- Change device encryption settings (Settings)

But if I click them, I get: Search results:

- No results for device encryption

Does this mean something about my system is not compatible with, or configured correctly for device encryption? If I'm not mistaking, my system, a Mac Mini, is the 2013 model, and reading about it, it seems to have TPM. I am using BootCamp (using Mac OS X only as fallback and for playing).

Am I looking for this setting in the wrong places?

To show precisely what I am seeing, below are the screenshots:

Original post:
Device encryption settings not available (Windows 10 home ...

Office 365 Message Encryption FAQ – Office Support

Have a question about how the new message protection capabilities in Office 365 work? Check for an answer here. Also, take a look at Frequently asked questions about data protection in Azure Information Protection for answers to questions about the data protection service, Azure Rights Management, in Azure Information Protection.

OME combines email encryption and rights management capabilities. Rights management capabilities are powered by Azure Information Protection.

You can use the new capabilities for OME under the following conditions:

If you have never set up OME or IRM for Exchange Online in Office 365.

If you have set up OME and IRM, you can use these steps if you are using the Azure Rights Management service from Azure Information Protection.

If you are using Exchange Online with Active Directory Rights Management service (AD RMS), you can't enable these new capabilities right away. Instead, you need to migrate AD RMS to Azure Information Protection first. When you've finished the migration, you can successfully set up OME.

If you choose to continue to use on-premises AD RMS with Exchange Online instead of migrating to Azure Information Protection, you will not be able to use these new capabilities.

To use the new OME capabilities, you need one of the following plans:

Office365 Message Encryption is offered as part of Office 365 E3 and E5, Microsoft E3 and E5, Office 365 A1, A3, and A5, and Office 365 G3 and G5. Customers do not need additional licenses to receive the new protection capabilities powered by Azure Information Protection.

You can also add Azure Information Protection Plan1tothe followingplans to receive the new Office 365 Message Encryption capabilities: Exchange Online Plan 1, Exchange Online Plan 2, Office 365 F1,Office 365 Business Essentials, Office 365 Business Premium, or Office 365 Enterprise E1.

Each user benefiting from Office 365 Message Encryption needs to be licensed to be covered by thefeature.

For the full list see the Exchange Online service descriptions for Office 365 Message Encryption.

Yes! Microsoft recommends that you complete the steps to set up BYOK before you set up OME.

For more information about BYOK, see Planning and implementing your Azure Information Protection tenant key.

No. OME and the option to provide and control your own encryption keys, called BYOK, from Azure Information Protection were not designed to respond to law enforcement subpoenas. OME, with BYOK for Azure Information Protection, was designed for compliance-focused customers. Microsoft takes third-party requests for customer data very seriously. As a cloud service provider, we always advocate for the privacy of customer data. In the event we get a subpoena, we always attempt to redirect the third party to the customer to obtain the information. (Please read Brad Smiths blog: Protecting customer data from government snooping). We periodically publish detailed information of the request we receive. For more information regarding third-party data requests, see Responding to government and law enforcement requests to access customer data on the Microsoft Trust Center. Also, see Disclosure of Customer Data in the Online Services Terms (OST).

The new capabilities for Office 365 Message Encryption are an evolution of the existing IRM and legacy OME solutions. The following table provides more details.

Capability

Previous versions of OME

IRM

New OME capabilities

Sending an encrypted email

Only through Exchange mail flow rules

End-user initiated from Outlook for PC, Outlook for Mac, or Outlook on the web; or through Exchange mail flow rules

End-user initiated from Outlook for PC, Outlook for Mac, or Outlook on the web; or through mail flow rules

Rights management

-

Do Not Forward option and custom templates

Do Not Forward option, encrypt-only option, default and custom templates

Supported recipient type

External recipients only

Internal recipients only

Internal and external recipients

Experience for recipient

External recipients received an HTML message which they downloaded and opened in browser or downloaded mobile app.

Internal recipients only received encrypted email in Outlook for PC, Outlook for mac, and Outlook on the web.

Internal and external recipients receive email in Outlook for PC, Outlook for Mac, Outlook on the web, Outlook for Android, and Outlook for iOS, or through a web portal regardless of whether or not they are in the same Office 365 organization or any Office 365 organization. The OME portal requires no separate download.

Bring Your Own Key support

Not available

Not available

BYOK supported

See Set up new Office 365 Message Encryption capabilities.

You can still use the previous version of OME, it will not be deprecated at this time. However, we highly encourage organizations to use the new and improved OME solution. Customers that have not already deployed OME cannot set up a new deployment of the previous version of OME.

No. If you are using Exchange Online with Active Directory Rights Management service (AD RMS), you can't enable these new capabilities right away. Instead,you need to migrate AD RMS to Azure Information Protection first.

Today, the sender needs to be in Exchange Online. We plan to support other topologies in the coming months.

You can create protected messages from Outlook 2016, and Outlook 2013 for PC and Mac, and from Outlook on the web.

You can read and respond from Outlook for PC and Mac (2013 and 2016), Outlook on the web, and Outlook mobile (Android and iOS) if you are an Office 365 user. You can also use the iOS native mail client if your organization allows it. If you are a non-Office 365 user, you can read and reply to encrypted messages on the web through your web browser.

You can attach any file type to a protected mail, however protection policies are applied only on the file formats mentioned here.

If a file format is supported, such as a Word, Excel, or PowerPoint file, the file is always protected, even after the attachment has been downloaded by the recipient. For example, if an attachment is protected by Do Not Forward, and the original recipient downloads and forwards the attachment to a new recipient, the new recipient will not be able to open the protected file.

If you attach a PDF file to a protected message, the message itself will be protected, but no additional protection will be applied to the PDF file after the recipient has received it. This means that the recipient can Save As, Forward, Copy, and Print the PDF file.

Not yet. OneDrive for Business attachments are not supported and end-users can't encrypt a mail that contains a cloud OneDrive for Business attachment.

Yes. Use mail flow rules in Exchange Online to automatically encrypt a message based on certain conditions. For example, you can create policies that are based on recipient ID, recipient domain, or on the content in the body or subject of the message. See Define mail flow rules to encrypt email messages in Office 365.

Currently you can only set up mail flow rules in Exchange Online. Encryption is currently not supported in DLP through the Security & Compliance Center.

Yes! For information on customizing email messages and the OME portal, see Add your organization's brand to your encrypted messages. See Add your organization's brand to your encrypted messages.

Not at this time but coming soon.

Yes. All encrypted email messages are discoverable by Office 365 compliance features.

Read more:
Office 365 Message Encryption FAQ - Office Support

Julian Assange, WikiLeaks publisher, receives rare embassy …

Julian Assange met with diplomats from his native Australia on Thursday as the WikiLeaks publisher approaches his sixth year in self-exile at the Ecuadorian Embassy in London.

Mr. Assange was visited at the embassy by two officials from Australias High Commission, the nations diplomatic mission in the U.K., marking what is believed to be the first time Australian officials have met with the WikiLeaks chief since he sought asylum there in June 2012, the U.K.s Press Association first reported Thursday.

Jennifer Robinson, a member of Mr. Assanges legal team, confirmed the meeting to The Washington Times.

Julian Assange is in a very serious situation, Ms. Robinson said in a statement. He remains in the embassy because of the risk of extradition to the U.S. That risk is undeniable after numerous statements by Trump administration officials including the director of the CIA and the U.S. attorney-general.

Given the delicate diplomatic situation we cannot comment further at this time, she said.

The Australian High Commission referred The Washington Times to the nations Department of Foreign Affairs and Trade when reached for comment.

The Department of Foreign Affairs and Trade is providing consular assistance to Mr. Assange through the Australian High Commission in London, a department spokesperson told The Times. Owing to our privacy obligations we will not provide further comment.

Mr. Assange, 46, was born in Townsville, Queensland in 1971, and he wound up abroad during the course of his work with WikiLeaks, the antisecrecy group he helped launch in 2006.

He became the subject of a rape investigation following a trip to Stockholm in 2010, and he subsequently sought asylum from Ecuador in lieu of surrendering to Swedish authorities, citing the likelihood hed be extradited to the U.S. and punished for releasing classified diplomatic and military documents through the WikiLeaks website.

Ecuador granted asylum to Mr. Assange in 2012, and Swedish prosecutors dropped their rape probe in 2017. British police have said they will arrest him if he exits the embassy, however, relegating him to its confines rather than risking apprehension and possible extradition.

The Department of Justice began investigating Mr. Assange during the Obama administration after WikiLeaks began publishing classified State and Defense Department documents. Federal prosecutors have failed so far to unseal any charges against Mr. Assange, but members of President Trumps administration including Mike Pompeo, the former CIA director-turned-secretary of state, and Jeff Sessions, Mr. Trumps attorney general, have advocated prosecuting the WikiLeaks publisher.

Ecuador has since granted citizenship to Mr. Assange, Foreign Minister Maria Fernanda Espinosa revealed in January, calling the status one more ring of protection.

Go here to read the rest:
Julian Assange, WikiLeaks publisher, receives rare embassy ...