Edward Snowden: Trump not smart enough to collude with …

Classified document-leaker Edward Snowden isnt a Trump fan, but he also believes its unlikely that the president colluded during the 2016 campaign with Russia because he isnt that sophisticated.

The former National Security Administration contractor, now living in exile in Moscow, told the Intercept that people are asking for too much when they hope that the Mueller investigation is going to come up with kind of a smoking gun and say, Yes! Vladimir Putin, Donald Trump, in the hotel room with the [explictive] tape!

You know thats not how the world works; life is not that simple, Mr. Snowden said in the interview published Friday.

Mr. Trump has called the exile a spy and a total traitor who should be tried for stealing and leaking classified documents on government surveillance in 2013, while Mr. Snowdens supporters have portrayed him as a hero.

In the interview, Mr. Snowden, who faces federal charges in the United States, said he doubted the president was clever enough to have engineered such a scheme.

And to be honest, everyone who has heard Trump speak for three minutes knows hes a wrecking ball, Mr. Snowden said. This does not sound like the kind of person that you would want to engage in some kind of complicated Manchurian Candidate, when, you know, the guy cant even remember what he was going to say at the end of a sentence.

Special counsel Robert Mueller has been investigating since May 2017 whether the Trump campaign colluded with Russian or other foreign governments during the 2016 race.

Mr. Snowden added, But that doesnt mean that he didnt want to cooperate, that doesnt mean that he wouldnt do anything to achieve an advantage, he said. I just think we just need to be realistic about what an investigation can possibly find.

Original post:
Edward Snowden: Trump not smart enough to collude with ...

Julian Assange: UK ‘threat’ to arrest Wikileaks founder – BBC …

Media playback is unsupported on your device

Ecuador has accused the UK of making a "threat" to enter its embassy in London to arrest Wikileaks' Julian Assange.

Mr Assange took refuge at the embassy in June to avoid extradition to Sweden, where he faces questioning over assault and rape claims, which he denies.

Ecuador says a decision on his claim for political asylum will come later.

The UK Foreign Office says it can lift the embassy's diplomatic status to fulfil a "legal obligation" to extradite the 41-year-old.

In an official note to the Ecuadoreans it said it was "surprised" by media reports that "Ecuador is about to take a decision and proposes to grant asylum to Mr Assange".

The BBC's Tim Reid, outside the embassy, said Ecuador had accused the UK of "intimidating" behaviour and that it was "surprised and disappointed" by what had gone on.

In June, the UK's Supreme Court dismissed Mr Assange's bid to reopen his appeal against extradition and gave him a two-week grace period before extradition proceedings could start.

It was during that fortnight, while on bail, that he sought refuge.

The Wikileaks website he founded published a mass of leaked diplomatic cables that embarrassed several governments, particularly the US's, in 2010.

Mr Assange says he fears that if extradited to Sweden, he will then be passed on to the American authorities.

Media playback is unsupported on your device

A number of police officers are outside the Ecuadorean embassy, in Knightsbridge, where some of Mr Assange's supporters have also gathered.

Three protesters have been arrested outside the embassy after minor scuffles.

The BBC's Stuart Hughes says some of the demonstrators have been chanting: "Julian Assange, freedom fighter."

Protests have also been held outside the British embassy in Ecuador's capital.

Images from Quito showed protesters holding signs saying: "We are sovereign, not colonies" and a union jack being stepped on.

At a news conference in Quito on Wednesday, Ecuador's Foreign Minister, Ricardo Patino, said a letter from the UK government had been delivered through a British embassy official.

"Today we received from the United Kingdom an express threat, in writing, that they might storm our embassy in London if we don't hand over Julian Assange," he said.

"Ecuador rejects in the most emphatic terms the explicit threat of the British official communication."

He said such a threat was "improper of a democratic, civilised and rule-abiding country".

He added: "If the measure announced in the British official communication is enacted, it will be interpreted by Ecuador as an unacceptable, unfriendly and hostile act and as an attempt against our sovereignty. It would force us to respond.

"We are not a British colony."

A Foreign Office spokesman said the UK remained "determined" to fulfil its obligation to extradite Mr Assange.

By Arturo WallaceBBC Mundo

It was not a piece of news anyone thought would come from Ecuador - and the style of the announcement came as a great surprise.

Ecuador's Foreign Minister Ricardo Patino was visibly angry as he lectured the UK government on its diplomatic obligations for several minutes.

The British "threat" to enter its London embassy to capture Julian Assange, however, might accomplish the unthinkable and briefly unite Ecuador's political forces.

Critics of President Rafael Correa have accused the government of not properly handling Mr Assange's case but have also deemed the UK position unacceptable.

They also fear any violation of Ecuador's sovereignty would strengthen Mr Correa and could turn him into a hero. The question now is whether they will let him fight this battle on his own.

"Throughout this process we have drawn the Ecuadoreans' attention to relevant provisions of our law, whether, for example, the extensive human rights safeguards in our extradition procedures, or to the legal status of diplomatic premises in the UK," the spokesman said.

"We are still committed to reaching a mutually acceptable solution."

The law the UK has informed Ecuador it could use in the case is the Diplomatic and Consular Premises Act 1987.

It allows the UK to revoke the diplomatic status of an embassy on UK soil, which in this case would potentially allow police to enter the building to arrest Mr Assange for breaching the terms of his bail.

The act was introduced after PC Yvonne Fletcher was shot outside the Libyan Embassy in London in 1984.

The Foreign Office note to Ecuador stated: "We very much hope not to get this point [revoking diplomatic status], but if you cannot resolve the issue of Mr Assange's presence on your premises, this route is open to us."

It also said that it must meet its legal obligations to arrest Mr Assange and extradite him to Sweden.

The note went on: "We remain committed to working with you amicably to resolve this matter. But we must be absolutely clear this means that should we receive a request for safe passage for Mr Assange, after granting asylum, this would be refused, in line with our legal obligations."

The Ecuadorean foreign minister told reporters an announcement on Mr Assange's bid for political asylum would be issued on Thursday at 07:00 local time (13:00 BST).

The BBC's Bridget Kendall said she believed it was "quite likely" that Ecuador would grant Mr Assange asylum because it had reacted strongly to the UK and may not want to be perceived to be buckling under pressure.

However, he could still be arrested if he left the embassy, she said.

Our correspondent could not recall a precedent in which the Diplomatic and Consular Premises Act 1987 had been used in this way.

And former government lawyer Carl Gardner told BBC Radio 4's Today programme legal advisers would be "urging the most extreme caution".

In 2010, two female Wikileaks supporters accused Mr Assange, an Australian citizen, of committing sexual offences against them while he was in Stockholm to give a lecture.

Mr Assange claims the sex was consensual and the allegations are politically motivated.

In June, judges at the UK's Supreme Court dismissed his final appeal against extradition to Sweden.

An offer by Ecuador to allow Swedish investigators to interview Mr Assange inside the embassy was rejected.

See the original post:
Julian Assange: UK 'threat' to arrest Wikileaks founder - BBC ...

Chelsea Manning ‘safe’ after tweet that sparked concern …

Chelsea Manning is reportedly out of the harms way following a scare caused by her now-deleted tweets contemplating suicide. (AP)

Chelsea Manning reportedly posted a pair of tweets Sunday night that hinted suicide contemplation that have since been deleted.

Shortly after the tweets, Mannings Twitter handle reported that she is safe and was on the phone with friends.

Thanks everyone for your concern and please give her some space, the tweet read.

Manning, who is currently living in Bethesda in Maryland, announced her run for U.S. Senate earlier this year. She was sentenced to 35-years in prison in 2013 for violating the Espionage Act and leaking sensitive information to WikiLeaks.

One of the alarming messages posted by Chelsea Manning on Twitter.(Twitter)

President Barack Obama commuted her sentence in his last day in office in 2017.

The candidate for the U.S. Senate posted a picture that appeared to show a person looking down to a street from atop a building.

"I'm sorry - I tried - I'm sorry I let you all down," Manning wrote in one of the now-deleted tweets, The Daily News reported. "Im not really cut out for this world - I tried adapting to this world out here but I failed you - I couldn't do this anymore - I can take people I don't know hating me but not my own friends," she added. "I tried and I'm sorry about my failure."

Many on social media quickly jumped on her frightening tweets, asking friends to contact Manning or the authorities to ensure her safety.

The alarming messages came after a debate on social media with Dawn Ennis, a former ABC News assignment editor who criticized Mannings remark that voting wont change anything.

Ennis, who came out as transgender in 2013, posted on Twitter, I am looking forward to an update on Chelseas well being in the morning. I truly wish her well. And I expect a new wave of online anger and hate to greet me, too. Be kind to all those who struggle. I myself will work harder to bear that in mind.

Lukas Mikelionis is a reporter for FoxNews.com. Follow him on Twitter@LukasMikelionis.

Go here to read the rest:
Chelsea Manning 'safe' after tweet that sparked concern ...

Edward Snowden: There’s No One Trump Loves More Than …

Its clear Donald Trump is a huge fan of Russian President Vladimir Putin. But whistleblowerEdward Snowdensays Americans shouldnt get their hopes up that special counsel Robert Mueller is going to nail the U.S. president for colluding with the Kremlin.

Theres no one in this world that [Trump] loves more than the Russian president, said Snowden, who exposed eavesdropping by the National Security Agency five years ago and now lives in exile in Russia, a refugee from U.S. treason charges.

I think people are asking for too much when they hope that the Mueller investigation is going to come up with a smoking gun against Trump yes, Vladimir Putin, Donald Trump in the hotel room with the piss tape, Snowden quipped in Fridays episode of the Deconstructed podcast at The Intercept. Thats not how the world works. Life is not that simple.

Snowden, speaking from Moscow, said he also doesnt believe Trump is the kind of crack double operator Putin would rely on.

To be honest, everyone who has heard Trump speak for three minutes knows hes a wrecking ball, he said. This does not sound like the kind of person that you would want to engage in some kind of complicated Manchurian Candidate spy operation, when the guy cant even remember what hes going to say at the end of a sentence.

That doesnt mean that he didnt want to cooperate, Snowden added. That doesnt mean he wouldnt do anything to achieve an advantage.

Snowden encouraged people including would-be leakers in the U.S. government to continue to struggle for change.

I believe that this world can be better. I believe that this world should be better. But its not going to get better unless we make it better, he said. And that requires risk. That requires hard work. That ultimately might require sacrifice.

Things change, he went on. If they can change for the worse, they can change for the better. If more good people are organizing... if were willing to draw lines that we will not allow people to cross without moving us out of the way, the pendulum will swing.

Check out the entire podcast here.

Read more from the original source:
Edward Snowden: There's No One Trump Loves More Than ...

Encryption- Computer & Information Security – Information …

There are instructions at encrypt.stanford.edu that will walk you through the steps necessary to fulfill University security requirements for each of your devices. Before you begin, however, being prepared ahead of time for the following steps may help you streamline the encryption process.

In case something goes wrong during the encryption process, you should back up your computer before running the SWDE installer.

The School of Medicine recommends using CrashPlan: it's asecure, monitored, convenient backup system and it's free for School of Medicine affiliates. Additionally, the SoM can assist you in restoring your information from CrashPlan, in the event of a hard drive crash or lost computer. While it is not currently required, it is strongly recommended.

For instructions and help with installation, visit the School of Medicine'sCrashPlan Guide.

For desktop and laptop computers, Stanford Whole Disk Encryption (SWDE) installer makes certain that your computer has all the necessary requirements, and then guides you through the activation of your computer's native encryption software (FileVault for Mac, and BitLocker for Windows).

(For mobile device encryption instructions, select your operating system:Apple/iOSorAndroid.)

Each time you access your system (on startup, after sleep/hibernation, etc), you use a "key" (password) to unlock your data. IF YOU CANNOT REMEMBER YOUR KEY, YOU WILL NOT BE ABLE TO ACCESS YOUR ENCRYPTED DATA.

In case of a forgotten key, it is likely that someone at ITS will be able to help you recover your data. However, we still recommend the following:

Once you have selected your login password and backup method, you are ready to move on to theencryption process.

View post:
Encryption- Computer & Information Security - Information ...

Enable BitLocker on USB Flash Drives to Protect Data

Encrypting USB flash drives protects the data stored on the volume. Any USB flash drive formatted with FAT, FAT32, or NTFS can be encrypted with BitLocker. The length of time it takes to encrypt a drive depends on the size of the drive, the processing power of the computer, and the level of activity on the computer.

Before you enable BitLocker, you should configure the appropriate Removable Data Drive policies and settings in Group Policy and then wait for Group Policy to be refreshed. If you dont do this and you enable BitLocker, you might need to turn BitLocker off and then turn BitLocker back on because certain state and management flags are set when you turn on BitLocker.

To be sure that you can recover an encrypted volume, you should allow data-recovery agents and store recovery information in Active Directory. If you use a flash drive with earlier versions of Windows, the Allow Access To BitLocker-Protected Removable Data Drives From Earlier Versions Of Windows policy can ensure that you have access to the USB flash drive on other operating systems and computers. Unlocked drives are read-only.

To enable BitLocker encryption on a USB flash drive, do the following: 1. Insert the USB flash drive, click Start, and then click Computer. 2. Right-click the USB flash drive, and then click Turn On BitLocker. BitLocker initializes the drive. 3. On the Choose How You Want To Unlock This Drive page, choose one or more for the following options, and then click Next:

4. On the How Do You Want To Store Your Recovery Key page, click Save The Recovery Key To A File. 5. In the Save BitLocker Recovery Key As dialog box, choose a save location, and then click Save. 6. You can now print the recovery key if you want to. When you have finished, click Next. 7. On the Are You Ready To Encrypt This Drive page, click Start Encrypting. Do not remove the USB flash drive until the encryption process is complete. How long the encryption process takes depends on the size of the drive and other factors.

The encryption process does the following: 1. Adds an Autorun.inf file, the BitLocker To Go reader, and a Read Me.txt file to the USB flash drive. 2. Creates a virtual volume with the full contents of the drive in the remaining drive space. 3. Encrypts the virtual volume to protect it.USB flash drive encryption takes approximately 6 to 10 minutes per gigabyte to complete. The encryption process can be paused and resumed provided that you dont remove the drive.

As a result, when AutoPlay is enabled and you insert the encrypted drive into a USB slot on a computer running Windows 7, Windows 7 runs the BitLocker To Go reader, which in turn displays a dialog box. When you are prompted, enter the password, smart card PIN, or both to unlock the drive. Optionally, select Automatically Unlock On This Computer From Now On to save the password in an encrypted file on the computers system volume. Finally, click Unlock to unlock the volume so that you can use it.

See original here:
Enable BitLocker on USB Flash Drives to Protect Data

Ecuador to remove Julian Assange’s extra security from …

The president of Ecuador, Lenin Moreno, has ordered the withdrawal of additional security assigned to the Ecuadorian embassy in London, where WikiLeaks founder Julian Assange has remained for almost six years.

The move was announced a day after an investigation by the Guardian and Focus Ecuador revealed the country had bankrolled a multimillion-dollar spy operation to protect and support Assange, employing an international security company and undercover agents to monitor his visitors, embassy staff and even the British police.

Over more than five years, Ecuador put at least $5m (3.7m) into a secret intelligence budget that protected him while he had visits from Nigel Farage, members of European nationalist groups and individuals linked to the Kremlin.

Rafael Correa, the then Ecuadorian president who approved of the operation, later defended the security measures as routine and modest.

However, his successor, Moreno, appears to differ in his view. His government said in a statement: The president of the republic, Lenin Moreno, has ordered that any additional security at the Ecuadorian embassy in London be withdrawn immediately.

From now on, it will maintain normal security similar to that of other Ecuadorian embassies.

Moreno has previously described Assanges situation as a stone in his shoe.

Ecuador suspended Assanges communication systems in March after his pointed political comments on Twitter. Assange had tweeted messages challenging Britains accusation that Russia was responsible for the poisoning of a Russian former double agent and his daughter in Salisbury.

Reuters contributed to this report

Original post:
Ecuador to remove Julian Assange's extra security from ...

Chelsea Manning says rise of authoritarianism inspired U …

NORTH BETHESDA, Md. Chelsea Manning is no longer living as a transgender woman in a male military prison, serving the lengthiest sentence ever for revealing U.S. government secrets. Shes free to grow out her hair, travel the world, and spend time with whomever she likes.

But a year since former President Barack Obama commuted Mannings 35-year sentence, Americas most famous convicted leaker isnt taking an extended vacation. Far from it: The Oklahoma native has decided to make an unlikely bid for the U.S. Senate in her adopted state of Maryland.

Manning, 30, filed to run in January and has been registered to vote in Maryland since August. She lives in North Bethesda, not far from where she stayed with an aunt while awaiting trial. Her aim is to unseat Sen. Ben Cardin, a 74-year-old Maryland Democrat who is seeking his third Senate term and previously served 10 terms in the U.S. House.

Manning, who also has become an internationally recognized transgender activist, said shes motivated by a desire to fight what she sees as a shadowy surveillance state and a rising tide of nightmarish repression.

The rise of authoritarianism is encroaching in every aspect of life, whether its government or corporate or technological, Manning told The Associated Press during an interview at her home in an upscale apartment tower. On the walls of her barely furnished living room hang Obamas commutation order, and photos of U.S. anarchist Emma Goldman and British playwright Oscar Wilde.

Mannings longshot campaign for the June 26 primary would appear to be one of the more unorthodox U.S. Senate bids in recent memory, and the candidate is operating well outside the partys playbook. She says she doesnt, in fact, even consider herself a Democrat, but is motivated by a desire to shake up establishment Democrats who are caving in to President Donald Trumps administration. She vows she wont run as an independent if her primary bid fails.

Shes certainly got an eye-catching platform: Close prisons and free inmates; eliminate national borders; restructure the criminal justice system; provide universal health care and basic income. The top of her agenda? Abolish the U.S. Immigration and Customs Enforcement, a federal agency created in 2003 that Manning asserts is preparing for an ethnic cleansing.

Manning ticks off life experiences she believes would make her an effective senator: a stint being homeless in Chicago, her wartime experiences as a U.S. Army intelligence analyst in Iraq even her seven years in prison. She asserts shes got a bigger vision than establishment politicians.

But political analysts suspect the convicted felon is not running to win.

Manning is running as a protest candidate, which has a long lineage in American history, to shine light on American empire, said Daniel Schlozman, a political science professor at Johns Hopkins University. Thats a very different goal, with a very different campaign, than if she wanted to beat Ben Cardin.

Mannings insurgent candidacy thus far has been a decidedly stripped-down affair, with few appearances and a campaign website that just went up. In recent days, she approached an anti-fracking rally in Baltimore almost furtively, keeping to herself for much of the demonstration. But when it was her turn to address the small group, her celebrity status was evident. People who never met her called her by her first name and eagerly took photos.

Manning has acknowledged leaking more than 700,000 military and State Department documents to anti-secrecy site WikiLeaks in 2010. She said her motivation was a desire to spark debate about U.S. foreign policy, and she has been portrayed as both a hero and a traitor.

Known as Bradley Manning at the time of her arrest, she came out as transgender after her 2013 court-martial. She was barred from growing her hair long in prison, and was approved for hormone therapy only after litigation. She spent long stints in solitary confinement, and twice tried to kill herself.

The Pentagon, which has repeatedly declined to discuss Mannings treatment in military prison, is also staying mum about her political ambitions. Democratic Party officials say they have no comment, citing a policy not to weigh in on primaries. Republican operatives are quiet.

In Maryland, a blue state thats home to tens of thousands of federal employees and defense contractors, it appears Mannings main supporters are independents or anti-politics, making them unlikely to coalesce politically. She recently reported contributions of $72,000 on this years first quarterly finance statement, compared with Cardins $336,000.

The candidate has barely made an effort at tapping sources of grassroots enthusiasm outside of activism circles. And its easy to find progressive Democrats who feel her candidacy is just a vehicle to boost her profile.

It feels to me almost like its part of a book tour that this is her moment after being released from prison, said Dana Beyer, a transgender woman who leads the Gender Rights Maryland nonprofit and is a Democratic candidate for state senate. I dont think this is a serious effort.

Manning is indeed working on a book about her dramatic life. For now, she says she supports herself with income from speaking engagements. Shes spoken at various U.S. colleges and is due to take the stage at a Montreal conference later this month.

Last week, she appeared at a tech conference in Germanys capital of Berlin, arriving to cheers from the audience of several thousand people. She told attendees shes still struggling to adjust to life after prison and hasnt gotten used to her celebrity status yet.

Theres been a kind of cult of personality that is really intimidating and that is overwhelming for me, she said in Berlin.

At her Maryland apartment, Manning told the AP she occasionally wakes up panicked that shes back in the cage in Kuwait where she was first jailed, or incarcerated at the Marine base at Quantico, Virginia, where a U.N. official concluded shed been subjected to cruel, inhuman and degrading treatment. She works hard to overcome anxiety, centering herself with yoga, breathing exercises, and reading.

Ive been out for almost a year now and its becoming increasingly clear to me just how deep the wounds are, she said in her Spartan living room.

Asked how she would define success, Manning responded with passionate intensity: Success for me is survival.

FOLLOW NBC OUT ON TWITTER, FACEBOOK AND INSTAGRAM

View original post here:
Chelsea Manning says rise of authoritarianism inspired U ...

5 Common Encryption Algorithms and the Unbreakables of the …

Mchten Sie diesen Beitrag in Deutsch zu lesen? Lesen Sie die Deutsch-Version hier.

While security is an afterthought for many PC users, its a major priority for businesses of any size. It has to be when the Ponemon Institute tells us that security breaches are costing companies millions every year.

Even if you dont have millions to lose, protecting what you do have should be a high priority.

There are several forms of security technology available, but encryption is one that everyday computer users should know about.

Encryption is an interesting piece of technology that works by scrambling data so it is unreadable by unintended parties. Lets take a look at how it works with the email-friendly software PGP (or GPG for you open source people).

Say I want to send you a private message, so I encrypt it using either one of these programs. Heres the message:

wUwDPglyJu9LOnkBAf4vxSpQgQZltcz7LWwEquhdm5kSQIkQlZtfxtSTsmawq6gVH8SimlC3W6TDOhhL2FdgvdIC7sDv7G1Z7pCNzFLp0lgB9ACm8r5RZOBiN5ske9cBVjlVfgmQ9VpFzSwzLLODhCU7/2THg2iDrW3NGQZfz3SSWviwCe7GmNIvp5jEkGPCGcla4Fgdp/xuyewPk6NDlBewftLtHJVf=PAb3

Once encrypted, the message literally becomes a jumbled mess of random characters. But, equipped with the secret passcode I text you, you can decrypt it and find the original message.

Come on over for hot dogs and soda!

Whether its in transit like our hot dog party email or resting on your hard drive, encryption works to keep prying eyes out of your business even if they happen to somehow gain access to your network or system.If you want to learn more about how encryption helps protect business data,you can read our article on how encryption aids cloud security.

The technology comes in many forms, with key size and strength generally being the biggest differences in one variety from the next.

Triple DES was designed to replace the original Data Encryption Standard (DES) algorithm, which hackers eventually learned to defeat with relative ease. At one time, Triple DES was the recommended standard and the most widely used symmetric algorithm in the industry.

Triple DES uses three individual keys with 56 bits each. The total key length adds up to 168 bits, but experts would argue that 112-bits in key strength is more like it.

Despite slowly being phased out, Triple DES still manages to make a dependable hardware encryption solution for financial services and other industries.

RSA is a public-key encryption algorithm and the standard for encrypting data sent over the internet. It also happens to be one of the methods used in our PGP and GPG programs.

Unlike Triple DES, RSA is considered an asymmetric algorithm due to its use of a pair of keys. Youve got your public key, which is what we use to encrypt our message, and a private key to decrypt it. The result of RSA encryption is a huge batch of mumbo jumbo that takes attackers quite a bit of time and processing power to break.

Blowfish is yet another algorithm designed to replace DES. This symmetric cipher splits messages into blocks of 64 bits and encrypts them individually.

Blowfish is known for both its tremendous speed and overall effectiveness as many claim that it has never been defeated. Meanwhile, vendors have taken full advantage of its free availability in the public domain.

Blowfish can be found in software categories ranging from e-commerce platforms for securing payments to password management tools, where it used to protect passwords. Its definitely one of the more flexible encryption methods available.

Computer security expert Bruce Schneier is the mastermind behind Blowfish and its successor Twofish. Keys used in this algorithm may be up to 256 bits in length and as a symmetric technique, only one key is needed.

Twofish is regarded as one of the fastest of its kind, and ideal for use in both hardware and software environments. Like Blowfish, Twofish is freely available to anyone who wants to use it. As a result, youll find it bundled in encryption programs such as PhotoEncrypt, GPG, and the popular open source software TrueCrypt.

The Advanced Encryption Standard (AES) is the algorithm trusted as the standard by the U.S. Government and numerous organizations.

Although it is extremely efficient in 128-bit form, AES also uses keys of 192 and 256 bits for heavy duty encryption purposes.

AES is largely considered impervious to all attacks, with the exception of brute force, which attempts to decipher messages using all possible combinations in the 128, 192, or 256-bit cipher. Still, security experts believe that AES will eventually be hailed the de facto standard for encrypting data in the private sector.

Cyber attacks are constantly evolving, so security specialists must stay busy in the lab concocting new schemes to keep them at bay. Expert observers are hopeful that a new method called Honey Encryption will deter hackers by serving up fake data for every incorrect guess of the key code. This unique approach not only slows attackers down, but potentially buries the correct key in a haystack of false hopes. Then there are emerging methods like quantum key distribution, which shares keys embedded in photons over fiber optic, that might have viability now and many years into the future as well.

Whether its protecting your email communications or stored data, some type of encryption should be included in your lineup of security tools. Successful attacks on victims like Target show that its not 100 percent bulletproof, but without it, youre offering up convenient access to your data. Find some tools that give you a piece of mind and stick with em!

Follow this link:
5 Common Encryption Algorithms and the Unbreakables of the ...

Cryptocurrency Communities Just Cant Get Along

If theres one thing that rival cryptocurrency factions can agree on, its their mutual dislike of one other. Everything else is up for debate, and not calm, reasonable debate, but the sort of fevered in-fighting that makes the crypto community resemble an unruly rabble. This internecine squabbling has arguably done more to hinder cryptocurrency adoption than any external threat.

Also read:Washington Utility Increases Security Amid Crypto Mining Moratorium

Ripple supporters squabbling with Dogecoin diehards; Bitcoin Core and Cash maximalists constantly sniping; Vergelets lashing out against everyone; IOTA being IOTA. Its easy to forget, amidst all the hullabaloo and name-calling, that were all on the same side. Crypto communities have more that unites them than divides them, and yet you wouldnt think so at times.

Humans have been falling out with fellow humans ever since the Garden of Eden (replace the serpent with Segwit and the forbidden fruit with Lightning to complete the analogy). Religious factions (or forks) have been attacking one another for centuries over slight ideological differences, and on crypto Twitter its much the same.

Last week, Jackson Palmer expressed his frustration at constant attacks from Ripple supporters over XRP data on his Arewedecentralizedyet site. Such attacks are by no means isolated, and Ripple is certainly not the only community to face such charges. Crypto would be boring if everyone always got on, and differences of opinion were settled by courteous fedora tipping. One of the reasons why altcoin communities bicker is because their members are so passionate about crypto, but this zealotry risks alienating newcomers.

In Divided We Fail: The Irrational Insanity of Crypto Tribalism Kent Barton writes: Were all part of the same technological revolution. Yet here we are, wasting precious time and energy attacking ourselvestribal thinking will do nothing to make the world a better and freer place. Its only beneficiaries are the centralized entities we seek to disintermediate. Thats not to say that detractors cant call Ripple a centralized security or Tron shitcoin vaporware if they want to: the beauty of crypto is that nobody can tell you what do do.

You get to control your keys, your crypto, and the conversations you have with your fellow coiners. You can be insightful, funny, a jerk or a combination of all three. But if youre constantly bashing other cryptocurrencies, or attacking anyone who criticizes your own, maybe its time to step away from the keyboard for a moment and remind yourself of why you got into cryptocurrency in the first place. Its not crypto vs crypto: its crypto vs the rest of the world. Win the battle for mass adoption and therell be plenty of time afterwards for squabbling over scalability.

Do you think crypto communities are too divisive, and does in-fighting deter onlookers?Let us know in the comments section below.

Images courtesy of Shutterstock, and Twitter.

This is an Op-ed article. The opinions expressed in this article are the authors own. Bitcoin.com does not endorse nor support views, opinions or conclusions drawn in this post. Bitcoin.com is not responsible for or liable for any content, accuracy or quality within the Op-ed article. Readers should do their own due diligence before taking any actions related to the content. Bitcoin.com is not responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any information in this Op-ed article.

See more here:
Cryptocurrency Communities Just Cant Get Along