ITEMS TAGGED WITH CRYPTOCURRENCY | HotHardware

If you've been following cryptocurrency news over the past few months, then you know that Bitcoin has been on an incredible winning streak. On August 26th, Bitcoin was at $4,300. Three months later, Bitcoin's price has more than doubled. At this moment, Bitcoin has breached yet another high, sitting at $9,065. At the beginning of the month, Bitcoin crossed the $7,500 threshold and hit $8,000 just over a week ago. Today's milestone shows that Bitcoin's growing momentum could allow it to hit $10,000 by year's end. This latest push means that Bitcoin's market cap is now sitting at $151 billion. BITCOIN...Read more...Every few weeks we talk about Bitcoin hitting another record high, and today is no different. Earlier this month, Bitcoin hit a new high of $7,500, sending its market cap soaring above $120 billion. But things got a bit interesting when the scheduled SegWit2x hard fork, which was set to take place this month, was abruptly canceled last week. A number of community leaders and cryptocurrency miners withdrew their support for SegWit2x, which put the fork in limbo. However, a small group of miners have decided to ahead with the fork anyway, which is now set to take place today. With this uncertainty,...Read more...Bitcoin mining is a very common practice today with the price of the cryptocurrency soaring to over $7,000 earlier this month before settling back down in the $6,000 range. With prices soaring more and more people are getting into mining, there has been a marked effect not only on pricing and availability of video cards, but on electricity consumption as well. Most computer users simply plug in their PC and leave it connected never thinking about how much power that machine is slurping. According to Digiconmist, it would be profitable for Bitcoin miners to consume over 24 terawatt-hours of electricity...Read more...If you recently jumped on the Ethereum bandwagon, you might want to sit down for this news. A security vulnerability has been discovered in the Parity wallet service deployed by Parity Technologies. According to a security alert issued by Parity Technologies today, the vulnerability was found within the standard multi-signature (multi-sig) wallet update that was deployed with the Parity Wallet back on July 20th. A multi-sig setup requires that more than one key be used to both initiate and broadcast ETH transactions. What's astounding is the July 20th update was rushed into place after another...Read more...There is strength in numbers, and that is part of what is driving an increase in cryptocurrency mining malware. The idea is to infect as many mobile devices as possible, and tap into the combined computing power to crunch numbers for profit. Unfortunately, this seems to be a trend (on both mobile and PC)security outfit Trend Micro says it found apps with malicious cryptocurrency mining capabilities on Google Play. This is not the first time these kinds of apps have appeared in Google Play, and it probably will not be the last. What they have in common is that they use dynamic JavaScript loading...Read more...Bitcoin has been on an enviable winning streak this year, and reached a new intraday high earlier today. Bitcoin hit a record high of $6,183.98 at around 10:30 AM EST this morning, which comes just after the cryptocurrency pushed through the $6,000 barrier on Friday. Currently, Bitcoin is trading at around $6,080, giving it a market cap of just over $100 billion. This is a meteoric rise from the start of the year, when Bitcoin was trading at just $968. Not even negative commentary from some in the financial industry has been enough to dull the luster of Bitcoin. JPMorgan Chase CEO Jamie Dimon declared...Read more...An increasing number of websites have turned to embedded cryptocurrency mining to generate revenue in place of (or in addition do) ads. One of the problems with this approach is that websites are not always transparent about this. And in other cases, legitimate websites that have been hacked could be running mining software on visitors' PCs without their knowledge. This has gotten the attention of Google, which is considering ways to prevent mining software from running in its Chrome browser. Websites that take this approach use an online JavaScript-based miner called Coin Hive. What this does...Read more...Something big is happening in the cryptocurrency market. Ethereum, the second largest digital coin behind Bitcoin, is receiving a major change to its codebase on Sunday, and nobody knows what exactly will happen. The update amounts to another hard fork, which for the most part have gone well for Ethereum miners and its investors. But there is always that unknown. "I expect that nothing will happen," Ethereum Foundation developer and designer Alex Van de Sande told CoinDesk. "Nothing happened with previous hard forks, except for one."Image Source: Flickr (BTC Keychain) The exception Alex refers...Read more...It looks like another major hack has been perpetrated against a major company, this time the hack was of pay TV network Showtime's streaming platform, ShowtimeAnytime.com. The platform allows users with a subscription via a cable network to stream shows via a browser from anywhere. People with no TV subscription can also pay for the streaming service alone making it appealing to cord cutters. Word is that last week the ShowtimeAnytime platform was hacked and code created by Coin Hive that runs on JavaScript was inserted into the platform. Interestingly, this is the same Coin Hive code that was...Read more...Abnormally high GPU pricing has been an issue for a long time now, but things really hit a peak when AMD launched its Radeon RX Vega series last month. Immediately, the graphics cards were nearly impossible to find, and those that were in stock were found with seriously inflated prices - sometimes with a nearly $200 premium due to price gouging merchants playing the supply and demand game. Unfortunately, it also appears that consumers looking at picking up an NVIDIAgraphics cardare also now starting to feel the burn of a higher street price. While AMD cards are often sought out first...Read more...What is a blockchain? When considering cryptocurrencies like Bitcoin or Ethereum, it's best to first understand the underlying technology and framework that makes their existence possible. At its core, a blockchain is a what is described as a "shared ledger" technology that is used to record the complete history of transactions that have been made. More importantly, this ledger cannot be altered in any way, making it ideal for historical analysis and peer review. When it comes to everyday transactions -- be they financial, inventory or even account-based, traditionally, each party that is involved...Read more...Bitcoin is living up to its billing as a volatile currency. It was a big deal last month when Bitcoin first flirted with a $2,900 valuation. Just a couple of weeks later, it jumped past the $4,000 mark, setting yet another new high in the process. More recently, Bitcoin has hit a rough patch, causing its value to fall as low as $2,915.15, its lowest level since it surge in early August.Cryptocurrency investors seemingly panicked in the wake of negative news this week. It started with JPMorgan Chase CEO Jamie Dimon calling cryptocurrencies like Bitcoin a fraud. Speaking at the Delivering Alpha conference,...Read more...Update, 9/15/2017: We've updated our Ethereum mining benchmark numbers in this article to include AMD's recently released Radeon RX Vega graphics cards. Head here for that updated data or journey on for the full guide.Cryptocurrencymining is a big buzz topic in technology these days. And why not? Utilizing your computer to digitally mine what seems like free money only begs the question, "where do I sign up?" Your machine will actually be "mining" or processing transactions for a decentralized currency, the hottest variant of which is called Ethereum. Poised to overtake the industry...Read more...Just a day after JPMorgan Chase CEO Jamie Dimon unleashed a fury of attacks on Bitcoin (and cryptocurrencies in general), another salvo is incoming. It was reported last week by Caixin that China was contemplating shutting down cryptocurrency exchange trading, and further confirmation of that order arrived today. The news sent Bitcoin into another tailspin, extending its losses for a fifth straight day, its longest losing streak in over a year. BTC China, the second largest exchange in China, announced that as to today, it will no longer accept new user registrations. It also announced that the...Read more...

Here is the original post:
ITEMS TAGGED WITH CRYPTOCURRENCY | HotHardware

Comodo Disk Encryption Download – softpedia.com

Comodo Disk Encryption is a reliable application that protects your sensitive data by encrypting your drives using complex algorithms.

It provides you with two different methods of securing your information. Either you encrypt any drive partition that contains personal information using combinations of different hashing and encryption algorithms or simply mount the virtual partitions in your hard drive, then save your data.

Since the encryption process can be carried out with two different authentication types, namely Password and USB Stick, the application helps you to add an extra layer of security, thus protecting your critical data from unauthorized users.

When you launch Comodo Disk Encryption for the first time, you will notice that all your drives are automatically recognized (after a restart has been performed). When you click on a random partition, detailed information such as file system, free space, encryption method and total size are displayed in the bottom pane of the program.

The right-click menu enables you to easily encrypt or decrypt the selected partition, edit the available settings, as well as format it by modifying the file system to NTFS, FAT32 or FAT and the allocation unit size.

By accessing the Encrypt option, you are able to choose one of the available authentication types, then set the properties according to your whims such as hash algorithm and password.

The 'Virtual Drives' tab enables you to view all the mounted drives in your system and create, mount, remove or unmount them, as well as edit the encryption settings effortlessly.

In case you want to decrypt a drive, you will just have to choose the proper option from the context menu and bring back the partition to its original form so that the drive becomes accessible for any user.

Overall, Comodo Disk Encryption keeps all your sensitive data protected from hackers, thieves and online scammers by encrypting your hard disks with ease.

See the rest here:
Comodo Disk Encryption Download - softpedia.com

The Encrypting File System – technet.microsoft.com

By Roberta Bragg

An Overview of the Encrypting File SystemWhat EFS IsBasic How-tosPlanning for and Recovering Encrypted Files: Recovery PolicyHow EFS WorksKey Differences Between EFS on Windows 2000, Windows XP, and Windows Server 2003Misuse and Abuse of EFS and How to Avoid Data Loss or ExposureRemote Storage of Encrypted Files Using SMB File Shares and WebDAVBest Practices for SOHO and Small BusinessesEnterprise How-tosTroubleshootingRadical EFS: Using EFS to Encrypt Databases and Using EFS with Other Microsoft ProductsDisaster RecoveryOverviews and Larger ArticlesSummary

The Encrypting File System (EFS) is a component of the NTFS file system on Windows 2000, Windows XP Professional, and Windows Server 2003. (Windows XP Home doesn't include EFS.) EFS enables transparent encryption and decryption of files by using advanced, standard cryptographic algorithms. Any individual or program that doesn't possess the appropriate cryptographic key cannot read the encrypted data. Encrypted files can be protected even from those who gain physical possession of the computer that the files reside on. Even persons who are authorized to access the computer and its file system cannot view the data. While other defensive strategies should be used, and encryption isn't the correct countermeasure for every threat, encryption is a powerful addition to any defensive strategy. EFS is the built-in file encryption tool for Windows file systems.

However, every defensive weapon, if used incorrectly, carries the potential for harm. EFS must be understood, implemented appropriately, and managed effectively to ensure that your experience, the experience of those to whom you provide support, and the data you wish to protect aren't harmed. This document will

Provide an overview and pointers to resources on EFS.

Point to implementation strategies and best practices.

Name the dangers and counsel mitigation and prevention from harm.

Many online and published resources on EFS exist. The major sources of information are the Microsoft resource kits, product documentation, white papers, and Knowledge Base articles. This paper provides a brief overview of major EFS issues. Wherever possible, it doesn't rework existing documentation; rather, it provides links to the best resources. In short, it maps the list of desired knowledge and instruction to the actual documents where they can be found. In addition, the paper catalogs the key elements of large documents so that you'll be able to find the information you need without having to work your way through hundreds of pages of information each time you have a new question.

The paper discusses the following key EFS knowledge areas:

What EFS is

Basic how-tos, such as how to encrypt and decrypt files, recover encrypted files, archive keys, manage certificates, and back up files, and how to disable EFS

How EFS works and EFS architecture and algorithms

Key differences between EFS on Windows 2000, Windows XP, and Windows Server 2003

Misuse and abuse of EFS and how to avoid data loss or exposure

Remote storage of encrypted files using SMB file shares and WebDAV

Best practices for SOHO and small businesses

Enterprise how-tos: how to implement data recovery strategies with PKI and how to implement key recovery with PKI

Troubleshooting

Radical EFS: using EFS to encrypt databases and using EFS with other Microsoft products

Disaster recovery

Where to download EFS-specific tools

Using EFS requires only a few simple bits of knowledge. However, using EFS without knowledge of best practices and without understanding recovery processes can give you a mistaken sense of security, as your files might not be encrypted when you think they are, or you might enable unauthorized access by having a weak password or having made the password available to others. It might also result in a loss of data, if proper recovery steps aren't taken. Therefore, before using EFS you should read the information links in the section "Misuse and Abuse of EFS and How to Avoid Data Loss or Exposure." The knowledge in this section warns you where lack of proper recovery operations or misunderstanding can cause your data to be unnecessarily exposed. To implement a secure and recoverable EFS policy, you should have a more comprehensive understanding of EFS.

You can use EFS to encrypt files stored in the file system of Windows 2000, Windows XP Professional, and Windows Server 2003 computers. EFS isn't designed to protect data while it's transferred from one system to another. EFS uses symmetric (one key is used to encrypt the files) and asymmetric (two keys are used to protect the encryption key) cryptography. An excellent primer on cryptography is available in the Windows 2000 Resource Kit as is an introduction to Certificate Services. Understanding both of these topics will assist you in understanding EFS.

A solid overview of EFS and a comprehensive collection of information on EFS in Windows 2000 are published in the Distributed Systems Guide of the Windows 2000 Server Resource Kit. This information, most of which resides in Chapter 15 of that guide, is published online at http://www.microsoft.com/technet/prodtechnol/windows2000serv/reskit/default.mspx. (On this site's page, use the TOC to go to the Distributed Systems Guide, Distributed Security, Encrypting File System.)

There are differences between EFS in Windows 2000, Windows XP Professional, and Windows Server 2003. The Windows XP Professional Resource Kit explains the differences between Windows 2000 and Windows XP Professionals implementation of EFS, and the document "Encrypting File System in Windows XP and Windows Server 2003" (http://www.microsoft.com/technet/prodtechnol/winxppro/deploy/cryptfs.mspx) details Windows XP and Windows Server 2003 modifications. The section below, "Key Differences between EFS on Windows 2000, Windows XP, and Windows Server 2003," summarizes these differences.

The following are important basic facts about EFS:

EFS encryption doesn't occur at the application level but rather at the file-system level; therefore, the encryption and decryption process is transparent to the user and to the application. If a folder is marked for encryption, every file created in or moved to the folder will be encrypted. Applications don't have to understand EFS or manage EFS-encrypted files any differently than unencrypted files. If a user attempts to open a file and possesses the key to do so, the file opens without additional effort on the user's part. If the user doesn't possess the key, they receive an "Access denied" error message.

File encryption uses a symmetric key, which is then itself encrypted with the public key of a public key encryption pair. The related private key must be available in order for the file to be decrypted. This key pair is bound to a user identity and made available to the user who has possession of the user ID and password. If the private key is damaged or missing, even the user that encrypted the file cannot decrypt it. If a recovery agent exists, then the file may be recoverable. If key archival has been implemented, then the key may be recovered, and the file decrypted. If not, the file may be lost. EFS is an excellent file encryption systemthere is no "back door."

File encryption keys can be archived (e.g. exported to a floppy disk) and kept in a safe place to ensure recovery should keys become damaged.

EFS keys are protected by the user's password. Any user who can obtain the user ID and password can log on as that user and decrypt that user's files. Therefore, a strong password policy as well as strong user education must be a component of each organization's security practices to ensure the protection of EFS-encrypted files.

EFS-encrypted files don't remain encrypted during transport if saved to or opened from a folder on a remote server. The file is decrypted, traverses the network in plaintext, and, if saved to a folder on the local drive that's marked for encryption, is encrypted locally. EFS-encrypted files can remain encrypted while traversing the network if they're being saved to a Web folder using WebDAV. This method of remote storage isn't available for Windows 2000.

EFS uses FIPS 140-evaluated Microsoft Cryptographic Service Providers (CSPcomponents which contain encryption algorithms for Microsoft products).

EFS functionality is straightforward, and you can find step-by-step instructions in many documents online. Links to specific articles for each possible EFS function, as well as some documents which summarize multiple functionality, follow. If the document is a Knowledge Base article, the Knowledge Base number appears in parentheses after the article title.

Encrypting and Decrypting

The process of encrypting and decrypting files is very straightforward, but its important to decide what to encrypt and to note differences in EFS based on the operating system.

Sharing Encrypted Files

The GUI for sharing encrypted files is available only in Windows XP and Windows Server 2003.

A recovery policy can be an organization's security policy instituted to plan for proper recovery of encrypted files. It's also the policy enforced by Local Security Policy Public Key Policy or Group Policy Public Key Policy. In the latter, the recovery policy specifies how encrypted files may be recovered should the user private key be damaged or lost and the encrypted file unharmed. Recovery certificate(s) are specified in the policy. Recovery can be either data recovery (Windows 2000, Windows XP Professional, and Windows Server 2003) or key recovery (Windows Server 2003 with Certificate Services). Windows 2000 EFS requires the presence of a recovery agent (no recovery agent, no file encryption), but Windows XP and Windows Server 2003 don't. By default, Windows 2000 and Windows Server 2003 have default recovery agents assigned. Windows XP Professional doesn't.

The data recovery process is simple. The user account bound to the recovery agent certificate is used to decrypt the file. The file should then be delivered in a secure manner to the file owner, who may then encrypt the file. Recovery via automatically archived keys is available only with Windows Server 2003 Certificate Services. Additional configuration beyond the installation of Certificate Services is required. In either case, it's most important that a written policy and procedures for recovery are in place. These procedures, if well written and if followed, can ensure that recovery keys and agents are available for use and that recovery is securely carried out. Keep in mind that there are two definitions for "recovery policy." The first definition refers to a written recovery policy and procedures that describe the who, what, where, and when of recovery, as well as what steps should be taken to ensure recovery components are available. The second definition, which is often referred to in the documents below, is the Public Key Policy that's part of the Local Security Policy on stand-alone systems, or Group Policy in a domain. It can specify which certificates are used for recovery, as well as other aspects of Public Key Policies in the domain. You can find more information in the following documents:

Disabling or Preventing Encryption

You may decide that you don't wish users to have the ability to encrypt files. By default, they do. You may decide that specific folders shouldn't contain encrypted files. You may also decide to disable EFS until you can implement a sound EFS policy and train users in proper procedures. There are different ways of disabling EFS depending on the operating system and the desired effect:

System folders cannot be marked for encryption. EFS keys aren't available during the boot process; thus, if system files were encrypted, the system file couldn't boot. To prevent other folders being marked for encryption, you can mark them as system folders. If this isn't possible, then a method to prevent encryption within a folder is defined in "Encrypting File System."

NT 4.0 doesn't have the ability to use EFS. If you need to disable EFS for Windows 2000 computers joined to a Windows NT 4.0 domain, see "Need to Turn Off EFS on a Windows 2000-Based Computer in Windows NT 4.0-Based Domain" (288579). The registry key mentioned can also be used to disable EFS in Window XP Professional and Windows Server 2003.

Disabling EFS for Windows XP Professional can also be done by clearing the checkbox for the property page of the Local Security Policy Public Key Policy. EFS can be disabled in XP and Windows Server 2003 computers joined in a Windows Server 2003 domain by clearing the checkbox for the property pages of the domain or organizational unit (OU) Group Policy Public Key Policy.

"HOW TO: Disable/Enable EFS on a Stand-Alone Windows 2000-Based Computer" (243035) details how to save the recovery agent's certificate and keys when disabling EFS so that you can enable EFS at a future date.

"HOW TO: Disable EFS for All Computers in a Windows 2000-Based Domain" (222022) provides the best instruction set and clearly defines the difference between deleted domain policy (an OU-based policy or Local Security Policy can exist) versus Initialize Empty Policy (no Windows 2000 EFS encryption is possible throughout the domain).

Special Operations

Let enough people look at anything, and you'll find there are questions that are just not answered by existing documentation or options. A number of these issues, third-party considerations, and post introduction issues can be resolved by reviewing the following articles.

Specifications for the use of a third-party Certification Authority (CA) can be found at "Third-Party Certification Authority Support for Encrypting File System" (273856). If you wish to use third-party CA certificates for EFS, you should also investigate certificate revocation processing. Windows 2000 EFS certificates aren't checked for revocation. Windows XP and Windows Server 2003 EFS certificates are checked for revocation in some cases, and third-party certificates may be rejected. Information about certificate revocation handling in EFS can be found in the white paper "Encrypting File System in Windows XP and Windows Server 2003".

When an existing plaintext file is marked for encryption, it's first copied to a temporary file. When the process is complete, the temporary file is marked for deletion, which means portions of the original file may remain on the disk and could potentially be accessible via a disk editor. These bits of data, referred to as data shreds or remanence, may be permanently removed by using a revised version of the cipher.exe tool. The tool is part of Service Pack 3 (SP3) for Windows 2000 and is included in Windows Server 2003. Instructions for using the tool, along with the location of a downloadable version, can be found in "HOW TO: Use Cipher.exe to Overwrite Deleted Data in Windows" (315672) and in "Cipher.exe Security Tool for the Encrypting File System" (298009).

How to make encrypted files display in green in Windows Explorer is explained in "HOW TO: Identify Encrypted Files in Windows XP" (320166).

"How to Enable the Encryption Command on the Shortcut Menu" (241121) provides a registry key to modify for this purpose.

You may wish to protect printer spool files or hard copies of encrypted files while they're printing. Encryption is transparent to the printing process. If you have the right (possess the key) to decrypt the file and a method exists for printing files, the file will print. However, two issues should concern you. First, if the file is sensitive enough to encrypt, how will you protect the printed copy? Second, the spool file resides in the system32SpoolPrinters folder. How can you protect it while its there? You could encrypt that folder, but that would slow printing enormously. The Windows 2000 Resource Kit proposes a separate printer for the printing of these files and how to best secure that printer in the Distributed Systems, Distributed Security, Encrypting Files System, Printing EFS Files section.

To understand EFS, and therefore anticipate problems, envision potential attacks, and troubleshoot and protect EFS-encrypted files, you should understand the architecture of EFS and the basic encryption, decryption, and recovery algorithms. Much of this information is in the Windows 2000 Resource Kit Distributed Systems Guide, the Windows XP Professional Resource Kit, and the white paper, "Encrypting File System in Windows XP and Windows Server 2003." Many of the algorithms are also described in product documentation. The examples that follow are from the Windows XP Professional Resource Kit:

A straightforward discussion of the components of EFS, including the EFS service, EFS driver, and the File System Run Time Library, is found in "Components of EFS," a subsection of Chapter 17, "Encrypting File System" in the Windows XP Professional Resource Kit.

A description of the encryption, decryption, and recovery algorithms EFS uses is in the Resource Kit section "How Files Are Encrypted." This section includes a discussion of the file encryption keys (FEKs) and file Data Recovery Fields and Data Decryption Fields used to hold FEKs encrypted by user and recovery agent public keys.

"Working with Encryption" includes how-to steps that define the effect of decisions made about changing the encryption properties of folders. The table defines what happens for each file (present, added later, or copied to the folder) for the choice "This folder only" or the option "This folder, subfolders and files."

"Remote EFS Operations on File Shares and Web Folders" defines what happens to encrypted files and how to enable remote storage.

EFS was introduced in Windows 2000. However, there are differences when compared with Windows XP Professional EFS and Windows Server 2003 EFS, including the following:

You can authorize additional users to access encrypted files (see the section "Sharing Encrypted Files", above). In Windows 2000, you can implement a programmatic solution for the sharing of encrypted files; however, no interface is available. Windows XP and Windows Server 2003 have this interface.

Offline files can be encrypted. See "HOW TO: Encrypt Offline Files to Secure Data in Windows XP."

Data recovery agents are recommended but optional. XP doesn't automatically include a default recovery agent. XP will take advantage of an existing Windows 2000 domain-level recovery agent if one is present, but the lack of a domain recovery agent wont prevent encryption of files on an XP system. A self-signed recovery agent certificate can be requested by using the cipher /R:filename command, where filename is the name that will be used to create a *.cer file to hold the certificate and a *.pfx file to hold the certificate and private key.

The Triple DES (3DES) encryption algorithm can be used to replace Data Encryption Standard X (DESX), and after XP SP1, Advanced Encryption Standard (AES) becomes the default encryption algorithm for EFS.

For Windows XP and Windows Server 2003 local accounts, a password reset disk can be used to safely reset a user's password. (Domain passwords cannot be reset using the disk.) If an administrator uses the "reset password" option from the user's account in the Computer Management console users container, EFS files won't be accessible. If users change the password back to the previous password, they can regain access to encrypted files. To create a password reset disk and for instructions about how to use a password reset disk, see product documentation and/or the article "HOW TO: Create and Use a Password Reset Disk for a Computer That Is Not a Domain Member in Windows XP" (305478).

Encrypted files can be stored in Web folders. The Windows XP Professional Resource Kit section "Remote EFS Operations in a Web Folder Environment" explains how.

Windows Server 2003 incorporates the changes introduced in Windows XP Professional and adds the following:

A default domain Public Key recovery policy is created, and a recovery agent certificate is issued to the Administrator account.

Certificate Services include the ability for customization of certificate templates and key archival. With appropriate configuration, archival of user EFS keys can be instituted and recovery of EFS-encrypted files can be accomplished by recovering the user's encryption keys instead of decrypting via a file recovery agent. A walk-through providing a step-by-step configuration of Certificate Services for key archival is available in "Certificate Services Example Implementation: Key Archival and Recovery."

Windows Server 2003 enables users to back up their EFS key(s) directly from the command line and from the details property page by clicking a "Backup Keys" button.

Unauthorized persons may attempt to obtain the information encrypted by EFS. Sensitive data may also be inadvertently exposed. Two possible causes of data loss or exposure are misuse (improper use of EFS) or abuse (attacks mounted against EFS-encrypted files or systems where EFS-encrypted files exist).

Inadvertent Problems Due to Misuse

Several issues can cause problems when using EFS. First, when improperly used, sensitive files may be inadvertently exposed. In many cases this is due to improper or weak security policies and a failure to understand EFS. The problem is made all the worse because users think their data is secure and thus may not follow usual precautionary methods. This can occur in several scenarios:

If, for example, users copy encrypted files to FAT volumes, the files will be decrypted and thus no longer protected. Because the user has the right to decrypt files that they encrypted, the file is decrypted and stored in plaintext on the FAT volume. Windows 2000 gives no warning when this happens, but Windows XP and Windows Server 2003 do provide a warning.

If users provide others with their passwords, these people can log on using these credentials and decrypt the user's encrypted files. (Once a user has successfully logged on, they can decrypt any files the user account has the right to decrypt.)

If the recovery agent's private key isn't archived and removed from the recovery agent profile, any user who knows the recovery agent credentials can log on and transparently decrypt any encrypted files.

By far, the most frequent problem with EFS occurs when EFS encryption keys and/or recovery keys aren't archived. If keys aren't backed up, they cannot be replaced when lost. If keys cannot be used or replaced, data can be lost. If Windows is reinstalled (perhaps as the result of a disk crash) the keys are destroyed. If a user's profile is damaged, then keys are destroyed. In these, or in any other cases in which keys are damaged or lost and backup keys are unavailable, then encrypted files cannot be decrypted. The encryption keys are bound to the user account, and a new iteration of the operating system means new user accounts. A new user profile means new user keys. If keys are archived, or exported, they can be imported to a new account. If a revocation agent for the files exists, then that account can be used to recover the files. However, in many cases in which keys are destroyed, both user and revocation keys are absent and there is no backup, resulting in lost data.

Additionally, many other smaller things may render encrypted files unusable or expose some sensitive data, such as the following:

Finally, keeping data secure takes more than simply encrypting files. A systems-wide approach to security is necessary. You can find several articles that address best practices for systems security on the TechNet Best Practices page at http://www.microsoft.com/technet/archive/security/bestprac/bpent/sec2/secentbb.mspx. The articles include

Attacks and Countermeasures: Additional Protection Mechanisms for Encrypted Files

Any user of encrypted files should recognize potential weaknesses and avenues of attack. Just as its not enough to lock the front door of a house without considering back doors and windows as avenues for a burglar, encrypting files alone isn't enough to ensure confidentiality.

Use defense in depth and use file permissions. The use of EFS doesn't obviate the need to use file permissions to limit access to files. File permissions should be used in addition to EFS. If users have obtained encryption keys, they can import them to their account and decrypt files. However, if the user accounts are denied access to the file, the users will be foiled in their attempts to gain this sensitive information.

Use file permissions to deny delete. Encrypted files can be deleted. If attackers cannot decrypt the file, they may choose to simply delete it. While they don't have the sensitive information, you don't have your file.

Protect user credentials. If an attacker can discover the identity and password of a user who can decrypt a file, the attacker can log on as that user and view the files. Protecting these credentials is paramount. A strong password policy, user training on devising strong passwords, and best practices on protecting these credentials will assist in preventing this type of attack. An excellent best practices approach to password policy can be found in the Windows Server 2003 product documentation. If account passwords are compromised, anyone can log on using the user ID and password. Once user have successfully logged on, they can decrypt any files the user account has the right to decrypt. The best defense is a strong password policy, user education, and the use of sound security practices.

Protect recovery agent credentials. Similarly, if an attacker can log on as a recovery agent, and the recovery agent private key hasn't been removed, the attacker can read the files. Best practices dictate the removal of the recovery agent keys, the restriction of this account's usage to recovery work only, and the careful protection of credentials, among other recovery policies. The sections about recovery and best practices detail these steps.

Seek out and manage areas where plaintext copies of the encrypted files or parts of the encrypted files may exist. If attackers have possession of, or access to, the computer on which encrypted files reside, they may be able to recover sensitive data from these areas, including the following:

Data shreds (remanence) that exist after encrypting a previously unencrypted file (see the "Special Operations" section of this paper for information about using cipher.exe to remove them)

The paging file (see "Increasing Security for Open Encrypted Files," an article in the Windows XP Professional Resource Kit, for instructions and additional information about how to clear the paging file on shutdown)

Hibernation files (see "Increasing Security for Open Encrypted Files" at http://technet.microsoft.com/library/bb457116.aspx)

Temporary files (to determine where applications store temporary files and encrypt these folders as well to resolve this issue

Printer spool files (see the "Special Operations" section)

Provide additional protection by using the System Key. Using Syskey provides additional protection for password values and values protected in the Local Security Authority (LSA) Secrets (such as the master key used to protect user's cryptographic keys). Read the article "Using the System Key" in the Windows 2000 Resource Kit's Encrypting File System chapter. A discussion of the use of Syskey, and possible attacks against a Syskey-protected Windows 2000 computer and countermeasures, can be found in the article "Analysis of Alleged Vulnerability in Windows 2000 Syskey and the Encrypting File System."

If your policy is to require that data is stored on file servers, not on desktop systems, you will need to choose a strategy for doing so. Two possibilities existeither storage in normal shared folders on file servers or the use of web folders. Both methods require configuration, and you should understand their benefits and risks.

If encrypted files are going to be stored on a remote server, the server must be configured to do so, and an alternative method, such as IP Security (IPSec) or Secure Sockets Layer (SSL), should be used to protect the files during transport. Instructions for configuring the server are discussed in "Recovery of Encrypted Files on a Server" (283223) and "HOW TO: Encrypt Files and Folders on a Remote Windows 2000 Server" (320044). However, the latter doesn't mention a critical step, which is that the remote server must be trusted for delegation in Active Directory. Quite a number of articles can be found, in fact, that leave out this step. If the server isn't trusted for delegation in Active Directory, and a user attempts to save the file to the remote server, an "Access Denied" error message will be the result.

If you need to store encrypted files on a remote server in plaintext (local copies are kept encrypted), you can. The server must, however, be configured to make this happen. You should also realize that once the server is so configured, no encrypted files can be stored on it. See the article "HOW TO: Prevent Files from Being Encrypted When Copied to a Server" (302093).

You can store encrypted files in Web folders when using Windows XP or Windows Server 2003. The Windows XP Professional Resource Kit section "Remote EFS Operations in a Web Folder Environment" explains how.

If your Web applications need to require authentication to access EFS files stored in a Web folder, the code for using a Web folder to store EFS files and require authentication to access them is detailed in "HOW TO: Use Encrypting File System (EFS) with Internet Information Services" (243756).

Once you know the facts about EFS and have decided how you are going to use it, you should use these documents as a checklist to determine that you have designed the best solution.

By default, EFS certificates are self-signed; that is, they don't need to obtain certificates from a CA. When a user first encrypts a file, EFS looks for the existence of an EFS certificate. If one isn't found, it looks for the existence of a Microsoft Enterprise CA in the domain. If a CA is found, a certificate is requested from the CA; if it isn't, a self-signed certificate is created and used. However, more granular control of EFS, including EFS certificates and EFS recovery, can be established if a CA is present. You can use Windows 2000 or Windows Server 2003 Certificate Services. The following articles explain how.

Troubleshooting EFS is easier if you understand how EFS works. There are also well known causes for many of the common problems that arise. Here are a few common problems and their solutions:

You changed your user ID and password and can no longer decrypt your files. There are two possible approaches to this problem, depending on what you did. First, if the user account was simply renamed and the password reset, the problem may be that you're using XP and this response is expected. When an administrator resets an XP user's account password, the account's association with the EFS certificate and keys is removed. Changing the password to the previous password can reestablish your ability to decrypt your files. For more information, see "User Cannot Gain Access to EFS Encrypted Files After Password Change or When Using a Roaming Profile" (331333), which explains how XP Professional encrypted files cannot be decrypted, even by the original account, if an administrator has changed the password. Second, if you truly have a completely different account (your account was damaged or accidentally deleted), then you must either import your keys (if you've exported them) or ask an administrator to use recovery agent keys (if implemented) to recover the files. Restoring keys is detailed in "HOW TO: Restore an Encrypting File System Private Key for Encrypted Data Recovery in Windows 2000" (242296). How to use a recovery agent to recover files is covered in "Five-Minute Security AdvisorRecovering Encrypted Data Using EFS."

Read the original here:
The Encrypting File System - technet.microsoft.com

10 Things You Should Know About Julian Assange | Alternet

Julian Assange, founder of Wikileaks, is more loved, and more hated, than ever. And just who is doing the loving and the hating is more complicated than ever.

In his rise from libertarian hacker to global publisher, Assange pioneered a new kind of power,the power to disrupt the secrecy of the national security state. With the help of Chelsea Manning, the silver-haired Australian published the "Collateral Murder" video, which showed the world the reality of the war in Iraq, and the State Department cables, which showed the realities of American diplomacy. So a lot of people admired him.

Last weeks disclosure that Assange collaboratedwith Donald Trump Jr. during the 2016 presidential campaign has generated another blizzard of headlinesand a lot of confusionabout the world-famous transparency advocate.

Heres what you need to know about Assange.

1. Hes sitting on a pile of Bitcoin.

The Daily Beast reports that Wikileaks has received a total of 4,025 BTC through its public wallet addressroughly $29 million by current exchange rates.

2. Assange was Twitter buddies with Donald Trump Jr. during the 2016 presidential campaign.

Wikileaks contacted Trump Jr. for the first time in September 2016 and continued reaching out in Twitter messages until at least July 2017, theAtlantic reportedlast week.

After receiving a private message from @Wikileaks, an account presumably controlled by Assange, Trump Jr. then emailed other senior officials from the Trump campaign such as Steve Bannon and Kellyanne Conway, as well as President Trumps son-in-law Jared Kushner to notify them Wikileaks had reached out.

On Oct. 12, 2016, the Wikileaks account again messaged Trump Jr.

Hey Donald, great to see you and your dad talking about our publications." (At a rally on October 10, Donald Trump hadproclaimed, I love Wikileaks!)

Nine days later, the voice of Wikileaks made an offer.

Hey Don. We have an unusual idea, Wikileaks wrote. Leak us one or more of your fathers tax returns.

TheNew York Timeshad alreadypublisheda fragment of Trumps tax returns on October 1.

If we publish them it will dramatically improve the perception of our impartiality, Assanges account continued. That means that the vast amount of stuff that we are publishing on Clinton will have much higher impact, because it wont be perceived as coming from a pro-Trump pro-Russia source.

Trump did not give his tax returns to Assange.

3. Jared Kushners newspaper loved him.

TheNew YorkObserver, a weekly newspaper owned by the presidents son-in-law, published a long-running series of laudatory articlesabout Assange in 2015 and 2016, replete with exclusive details.

Duly appreciative, Wikileakstweetedsome of theObservers coverage, including stories expressing doubt about the farfetched idea that the Russians might have meddled in the 2016 U.S. presidential election.

4. Sarah Palin is an Assange fan.

President Trump is not the only Wikileaks lover on the right.

Earlier this year, Sarah Palin, the one-time conservative darling marginalized by her dopey sound bites, herpunch-drunk familyand her bald-faced lies, fell hard for Assange. In a heartfelt Facebook post, Palin praised Assange's anti-Clinton stance at Wikileaks and apologized for once criticizing him.

5. The investigation of Assange for alleged sexual misconduct has been discontinued.

Assange has not been charged with rape, as has often been reported. Two women in Sweden alleged that Assange had molested and coercedthem in sexual encounters.

One charge was dropped because the statute of limitations ran out. Last May, Swedish authorities discontinued their investigation of the other charge, citing the difficulty in obtaining Assanges testimony while he is holed up in the Ecuadorian Embassy in London.

6. Once admired on the left, Assange has alienated many former allies.

For a long time, the Intercept and Glenn Greenwald took the lead in defending Assange from his critics. No more. In a recent piece, Robert Mackey wrote "We Knew Julian Assange Hated Clinton. We Didnt Know He Was Secretly Advising Trump."

In the piece, investigative reporter Barrett Brown blasted Assange. Heexplainedhe had defended Wikileaks for releasing emails hacked from the Democratic National Committee, because it was an appropriate thing for a transparency org to do.

But in the messages with Trump Jr., he noted, Assange was complaining about slander of being pro-Trump IN THE ACTUAL COURSE OF COLLABORATING WITH TRUMP.

This latest revelation about the 2016 election has disappointed some people, wroteTruthDig, which is an understatement. Time will tell if Assange and Wikileaks can regain the publics trust and be regarded as impartial publishers."

7.Assange helped promote the bogus Seth Rich conspiracy theory.

In August 2016, Assange suggested during a television interviewthat his source for the DNC email might have been DNC staffer Seth Rich, who was murdered in Washington 12 days before Wikileaks began publishing.

We have to understand how high the stakes are in the United States, and that our sources face serious risks, he said.

Assange offered a cash reward for information leading to a conviction in the murdera gesture that sent alt-right sleuths, convinced that Clinton had masterminded the killing, into a foolish frenzy. There was nothing to the story, except that it caused a lot of unnecessary pain for Rich's grieving family.

Even Fox News retracted its conspiratorial allegations about Seth Rich. Assange did not.

8. Assange promised to turn himself in if Chelsea Manning was freedthen reneged.

But when President Obama commuted the remainder of Manning's sentence, Assange back-pedaled.He said he had only promised to surrender if Manning was pardoned immediately and several months had passed. Obama, he added, was just trying to "make life hard for him."

9. Filmmaker Laura Poitras made two versions of 'Risk,' her documentary about Assange. The first version was admiring, the second disenchanted.

What specifically bred Poitras distrust of Assange? asked Slate. The sex charges; the Russia connection; his blooming paranoia; the sense, gleaned from several in Assanges entourage (we see it on the faces of his lawyers and advisers, as they try to debrief him on his legal and PR troubles) that hes a narcissistic asshole. All of the above?

10. Kate McKinnon plays him on Saturday Night Live.

In her latest skit, the comedian spoofs Assange as a boy playing spy games he barely understands. The chain-smoking Assange meets with Donald Trump Jr. (Mikey Day) and brother Eric Trump (Alex Moffat) in a darkened parking lot underneath the Ecuadorian Embassy. He wants to be a mastermind, but the Trumps are not impressed.

You look like Draco Malfoy, says Eric Trump.

Im not some dumb blonde you can take advantage of," says Assange.

Go here to see the original:
10 Things You Should Know About Julian Assange | Alternet

Security, privacy, and cryptography Microsoft Research

Differentially Private Network-Trace-Analysis Tools Research and analysis related to computer networks is often hampered by the tension between the need for accurate network packet traces to study, and the concern that these traces may contain sensitive information. Starting from recent work on differential privacy, we have produced a toolkit and a collection of standard network trace analyses using these

FourQLib FourQLib is an efficient and portable math library that provides functions for computing essential elliptic curve operations on a new, high-performance curve called FourQ.

FS2PV: A Cryptographic-Protocol Verifier for F# FS2PV is a verification tool that compiles cryptographic-protocol implementations in a first-order subset of F# to a formal pi-calculus model. This pi-calculus model then can be analyzed using ProVerif to prove the desired security properties or to find security flaws.

LatticeCrypto LatticeCrypto is a high-performance and portable software library that implements lattice-based cryptographic algorithms.

MSR ECCLib MSR ECCLib is an efficient cryptographic library that provides functions for computing essential elliptic curve operations on a new set of high-security curves.

MSR JavaScript Cryptography Library The Microsoft Research JavaScript Cryptography Library has been developed for use with cloud services in an HTML5 compliant and forward-looking manner.

SIDH Library SIDH is a fast and portable software library that implements a new suite of algorithms for Supersingular Isogeny Diffie-Hellman (SIDH) key exchange.

Simple Encrypted Arithmetic Library (SEAL) SEAL is an easy-to-use homomorphic encryption library, developed by researchers in the Cryptography Research group at Microsoft Research. SEAL is written in C++11, and contains .NET wrappers for the public API. It has no external dependencies.

TulaFale: A Security Tool for Web Services TulaFale is a new specification language for writing machine-checkable descriptions of SOAP-based security protocols and their properties.

See the original post:
Security, privacy, and cryptography Microsoft Research

Exclusive: Chelsea Manning Tells Off Harvard and the CIA

Chelsea Manning never ended up lecturing at Harvard University after loud objections from the Central Intelligence Agency. But late Monday afternoon, the day she was supposed to begin her fellowship, Manning did talk about surveillance, tech, and social repression down the streetat the similarly prestigious Massachusetts Institute of Technology.

For someone who enlisted in the Army at a young age and spent most of her adult life in prison, seeing the prevalence of domestic surveillance and the militarization of policing is like Im walking out into the most boring dystopian novel I can imagine, she told The Daily Beast shortly after her talk. It feels like American cities, certain parts of them, are occupied by an American force, the police department.

Having traveled across the East and West Coasts since her release, one of the 21st centurys signature whistleblowers is trying to reconnect with her country and spread an activist message about political engagement. She ran up against an obstacle last month: the current and former intelligence officials who pressed Harvard to reject her fellowship.

Yet the result was an MIT conversation with the ACLUs Kade Crockford that encouraged the software engineers of tomorrow to think through the applications of their innovations that might aid a more expansive surveillance apparatusitself a statement of defiance to those whod rather respectable institutions shun her.

Whats important here is that the Central Intelligence Agency and associated people in the intelligence community, they think they can stifle dissent, all forms of dissent, all across America and use academic institutions as a battleground, Manning said.

Seeing all those militarized cops on American streets is like Im walking out into the most boring dystopian novel I can imagine.

Chelsea Manning

Last month, Harvards Kennedy School of Government withdrew a fellowship offer it had extended to Manning. Michael Morell, the former acting CIA director, set off a backlash by resigning his own Harvard fellowship over outrage that leaks by Ms. Manning put the lives of U.S. soldiers at risk. Mike Pompeo, the current CIA director, followed up by calling Manning an American traitor. (Never mind the fact that Pompeo promoted WikiLeaks, the outlet that published Mannings leaks, during the 2016 campaign.)

Manning said she couldnt be bothered by the spymasters words. Im not going to be afraid and Im not going to be intimidated, she added.

Her MIT talk, delivered to about 130 students and other attendees, was the result of a post-Harvard invitation extended by Joi Ito of the MIT Media Lab after Manning reached out through a mutual friend, MIT confirmed. In it, Manning said, she touched on living in the panopticon of prison as a microcosm for tech-fueled advancements in repression, when it comes to facial recognition, surveillance, using databases and techniques to monitor and surveil people, as well as how she depended on other inmates for support while imprisoned.

Then she issued a warning to the engineers MIT will matriculate: While we might be making a piece of software that does one thing, for medicine or marketing or advertising, it can be used in a military context or to suppress dissent. These technological solutions are kind of universal in that sense that they can be misused.

Aiding the Enemy?

The MIT talk was the latest skirmish in a battle over Mannings legacyone that shows no sign of stopping.

One of the things we wanted to make sure was that it was about the substance of the conversation, we didnt want this to be just about snubbing Harvard, Ito explained in introducing one of the first public talks given by a figure who has been defined for seven years mostly by hostile, powerful officials.

Get The Beast In Your Inbox!

Start and finish your day with the top stories from The Daily Beast.

A speedy, smart summary of all the news you need to know (and nothing you don't).

Subscribe

Thank You!

You are now subscribed to the Daily Digest and Cheat Sheet. We will not share your email with anyone for any reason.

Contrary to Pompeos invective, a military judge in 2013 specifically acquitted Manning, then known as Bradley, of knowingly aiding the enemy. She was convicted of multiple counts of leaking classified information and received a 35-year sentence. After serving seven years, to include pre-trial detention, President Barack Obama commuted her sentence in January. She walked free from Fort Leavenworth in May after confinement so severeit included a yearlong stint in solitarythat a U.N. special rapporteur on torture called it a violation of her right to physical and psychological integrity as well as of [her] presumption of innocence.

Mannings deployment to Iraq and exposure to the material she leaked disillusioned her to the U.S. war effort. She said at her sentencing: It was never my intention to hurt anyone. I only wanted to help people. When I chose to disclose classified information, I did so out of a love for my country and a sense of duty to others.

It was both a surprise and no surprise to see an institution [like] Harvard quake in their boots when Chelseas name is mentioned.

Eugene Jarecki

Pompeo and Morell made points frequently invoked by Mannings detractors, and not often carefully. In the wake of her disclosures publication by WikiLeaks in 2010, the then-chairman of the Joint Chiefs of Staff charged that the group might already have on their hands the blood of some young soldier or that of an Afghan family.

Yet an actual taxonomy of any harm resulting from Mannings leaks, something that might allow for a balanced assessment of what she did and the punishment she subsequently endured, is not a matter of public knowledge seven years after Mannings saga began. Detractors in the intelligence agencies say doing so would put more sources and methods at risk, compounding the damage; Manning supporters consider that too convenient, permitting overblown accusations against her to remain in perpetual circulation.

Mannings defense counsel in her military trial was not permitted to read a classified document assessing the impact of her leaks of thousands of tactical military reports and diplomatic cables.

But BuzzFeeds Jason Leopold obtained the document earlier this year after transparency litigation and wrote that the multi-agency task force found her leaks largely insignificant and did not cause any real harm to U.S. interests. The 2011-era document found the leaks had potential to serious[ly] damage intelligence sources, informants, and the Afghan population and would have their greatest likely effect on cooperative Afghans, Iraqis, and other foreign interlocutors.

Academics and human-rights groups have said that contacts with the U.S., revealed in the diplomatic cables, complicated their jobs and potentially placed them in danger in authoritarian countries. But there remains little certainty over whether those leaks actually led to someone suffering harm.

Evidence the leaks contained about greater civilian deaths and injuries than the Pentagon had disclosed, something Mannings defenders cite to demonstrate her leaks importance, could damage support for current operations in the region, the task force found, focusing more on the leaks than on the deaths they revealed.

That matched contemporaneous reporting, which found the Obama administrations claims about the damage Manning caused exaggerated. A congressional official briefed on the leaks impact in 2011 told Reuters they were embarrassing but not damaging.

An Historic Embarrassment for American Academia

In a confusing statement following the CIA pressure, Harvards Douglas Elmendorf called extending the fellowship to Manning a mistake. Elmendorf said the initial invitation to her was defensible but neglected the impact of the perceived honor that it implies to some people, which opened up Harvard to criticism for hypocrisy in honoring, among others, Sean Spicer, who repeatedly lied from the White House podium as President Trumps press secretary. As a consolation, Elmendorf offered Manning a one-day opportunity to spend a day at the Kennedy School and speak in the Forum. That isnt going to happen.

The filmmaker Eugene Jarecki told The Daily Beast that Harvards decision was an historic embarrassment for American academia.

Jarecki interviewed Manning at a public event on Nantucket shortly after Harvards about-face and pronounced himself impressed with her willingness to engage with hard questions.

Shes a remarkable human being who really is a walking concentration of several-hot button issues in American life, Jarecki said. It was both a surprise and no surprise, in a way, to see an institution such as Harvard quake in their boots when Chelseas name is mentioned.

Despite the CIA pressure and Harvards acquiescence to it, Manning indicated to The Daily Beast that political activism will be a feature of her unfolding life as a free woman.

In prison, she learned we are our own political agents, depending on one anothera message that seems to inform where shes going next.

Im trying to live my life, but I realize I cant go back to the life I was living before. I need to be with the people I care about, and we need to be with each other. Its not about meIm very concerned about the direction all of us are going in, she said.

I think its important people understand they have power. Nobody can give them power and give them rights, we need to assert that.

Out in the tech world, Manning said she got the sense engineers are expecting someone to tell them what to do with their innovations, rather than figuring out their social utility through dialogue with their neighbors.

The reality is people need to... have these conversations in our communities right now. We cant wait for someone to come up with a final product, idea, [or] solution, she said. Theres no roadmap to the future. We have to chart our own course.

Original post:
Exclusive: Chelsea Manning Tells Off Harvard and the CIA

Harvard Withdraws Fellowship Invitation To Chelsea Manning …

Chelsea Manning was interviewed on the ABC News program Nightline shortly after her release from prison. Manning, a 29-year-old transgender woman, formerly known as Bradley Manning, was convicted of leaking classified information. Heidi Gutman/ABC via Getty Images hide caption

Chelsea Manning was interviewed on the ABC News program Nightline shortly after her release from prison. Manning, a 29-year-old transgender woman, formerly known as Bradley Manning, was convicted of leaking classified information.

The Institute of Politics at Harvard Kennedy School announced Wednesday that Chelsea Manning would be one of its visiting fellows, but less than two days later, the school's dean withdrew the invitation.

Manning, a 29-year-old transgender woman, formerly known as Bradley Manning, was convicted of leaking classified information.

Manning was released from a military prison in Fort Leavenworth, Kan., in May after serving seven years of a 35-year sentence, which was commuted by former President Barack Obama. Before leaving office in January, Obama said he felt justice had been served.

Early Thursday, Michael Morell, former deputy director and acting director of the CIA, resigned his senior fellowship post at Harvard over the school's decision to include Manning as a visiting fellow.

Morell said he could not be part of an organization that "honors a convicted felon and leaker of classified information."

A short time later, CIA Director Mike Pompeo canceled an appearance at the school, where he was scheduled to discuss such topics as Russian involvement in the presidential election and the nuclear standoff with North Korea.

CIA Director Mike Pompeo canceled an appearance at Harvard on Thursday after Chelsea Manning was named a visiting fellow at the school. Jacquelyn Martin/AP hide caption

CIA Director Mike Pompeo canceled an appearance at Harvard on Thursday after Chelsea Manning was named a visiting fellow at the school.

The Associated Press reports:

"Minutes after the event was to begin, Douglas Elmendorf, dean of the John F. Kennedy School of Government, took the stage and told the audience Pompeo was not there and would not speak.

"We will try to reschedule it as soon as we can, but the CIA director, is obviously, in charge of his schedule," Elmendorf said. "We are not in charge of his schedule and he gets to decide when and where he speaks, of course."

"Several hours later, the CIA released a letter that Pompeo wrote to a Harvard official.

"Pompeo , who has a law degree from Harvard, said he didn't make the decision lightly. He wrote that he would betray the trust of CIA employees if he appeared."

In a statement released late Thursday, Elmendorf said the school did not intend to honor Manning in any way or to endorse any of her words or deeds.

"We are withdrawing the invitation to her to serve as a Visiting Fellow and the perceived honor that it implies to some people while maintaining the invitation for her to spend a day at the Kennedy School and speak in the Forum.

"I apologize to her and to the many concerned people from whom I have heard today for not recognizing upfront the full implications of our original invitation."

Harvard also announced this week that it had invited former White House press secretary Sean Spicer, former Trump campaign manager Corey Lewandowski and MSNBC hosts Joe Scarborough and Mika Brzezinski to be visiting fellows.

Read the original:
Harvard Withdraws Fellowship Invitation To Chelsea Manning ...

Everything you need to know about Bitcoin mining

Price...Global Vol....Diff.... How Bitcoin Mining Works

Where do bitcoins come from? With paper money, a government decides when to print and distribute money. Bitcoin doesn't have a central government.

With Bitcoin, miners use special software to solve math problems and are issued a certain number of bitcoins in exchange. This provides a smart way to issue the currency and also creates an incentive for more people to mine.

Bitcoin miners help keep the Bitcoin network secure by approving transactions. Mining is an important and integral part of Bitcoin that ensures fairness while keeping the Bitcoin network stable, safe and secure.

Currently, based on (1) price per hash and (2) electrical efficiency the best Bitcoin miner options are:

Bitcoin mining is the process of adding transaction records to Bitcoin's public ledger of past transactions or blockchain. This ledger of past transactions is called the block chain as it is a chain of blocks. The block chain serves to confirm transactions to the rest of the network as having taken place.

Bitcoin nodes use the block chain to distinguish legitimate Bitcoin transactions from attempts to re-spend coins that have already been spent elsewhere.

Bitcoin mining is intentionally designed to be resource-intensive and difficult so that the number of blocks found each day by miners remains steady. Individual blocks must contain a proof of work to be considered valid. This proof of work is verified by other Bitcoin nodes each time they receive a block. Bitcoin uses the hashcash proof-of-work function.

The primary purpose of mining is to allow Bitcoin nodes to reach a secure, tamper-resistant consensus. Mining is also the mechanism used to introduce Bitcoins into the system: Miners are paid any transaction fees as well as a "subsidy" of newly created coins.

This both serves the purpose of disseminating new coins in a decentralized manner as well as motivating people to provide security for the system.

Bitcoin mining is so called because it resembles the mining of other commodities: it requires exertion and it slowly makes new currency available at a rate that resembles the rate at which commodities like gold are mined from the ground.

A proof of work is a piece of data which was difficult (costly, time-consuming) to produce so as to satisfy certain requirements. It must be trivial to check whether data satisfies said requirements.

Producing a proof of work can be a random process with low probability, so that a lot of trial and error is required on average before a valid proof of work is generated. Bitcoin uses the Hashcash proof of work.

Bitcoin mining a block is difficult because the SHA-256 hash of a block's header must be lower than or equal to the target in order for the block to be accepted by the network.

This problem can be simplified for explanation purposes: The hash of a block must start with a certain number of zeros. The probability of calculating a hash that starts with many zeros is very low, therefore many attempts must be made. In order to generate a new hash each round, a nonce is incremented. See Proof of work for more information.

The Bitcoin mining network difficulty is the measure of how difficult it is to find a new block compared to the easiest it can ever be. It is recalculated every 2016 blocks to a value such that the previous 2016 blocks would have been generated in exactly two weeks had everyone been mining at this difficulty. This will yield, on average, one block every ten minutes.

As more miners join, the rate of block creation will go up. As the rate of block generation goes up, the difficulty rises to compensate which will push the rate of block creation back down. Any blocks released by malicious miners that do not meet the required difficulty target will simply be rejected by everyone on the network and thus will be worthless.

When a block is discovered, the discoverer may award themselves a certain number of bitcoins, which is agreed-upon by everyone in the network. Currently this bounty is 25 bitcoins; this value will halve every 210,000 blocks. See Controlled Currency Supply.

Additionally, the miner is awarded the fees paid by users sending transactions. The fee is an incentive for the miner to include the transaction in their block. In the future, as the number of new bitcoins miners are allowed to create in each block dwindles, the fees will make up a much more important percentage of mining income.

See the original post here:

Everything you need to know about Bitcoin mining

Warning Signs About Another Giant Bitcoin Exchange

In the latest blow, on Tuesday, an alternative virtual currency that is owned and operated by the same people as Bitfinex, known as Tether, announced that it had been hacked and lost around $30 million worth of digital tokens.

None of that has been enough to stop customers from pumping billions of dollars worth of virtual currency trades through Bitfinex in recent weeks on some days, the exchange claimed to be doing more trades, by dollar value, than some stock exchanges in the United States.

Even many people who believe in virtual currencies worry that the mixture of loose controls and booming trading at the worlds largest exchange is likely to cause trouble for all the investors piling into virtual currencies, even those who dont go near Bitfinex.

Im worried about the systemic risk that this centralized company poses, and Im worried that if they go down, they will take down the space with them, said Emin Gn Sirer, an associate professor of computer science at Cornell University, who has a track record of successfully predicting problems in the growing virtual currency industry.

The chief executive of Bitfinex and Tether, Jan Ludovicus van der Velde, said in an email on Tuesday that the financial position of the company has never been stronger.

Concerns over virtual currency exchanges are nothing new. The first and largest Bitcoin exchange, Mt. Gox, collapsed in 2014 after losing $500 million of customer money to hackers.

This year, law enforcement took down another large Bitcoin exchange, BTC-E, which was accused of being a way station for many of the Bitcoin flowing through online black markets and ransomware attacks.

Regulators in the United States and a few other countries have tried to tame the business, and the largest exchanges in the United States and Japan are now under official oversight.

Those regulated exchanges, though, are dwarfed by unregulated ones like Bitfinex and several that have popped up in South Korea, where regulators have been slow to act.

The liquid nature of the Bitcoin markets, flowing around national borders and laws, is a product of the virtual currencys unusual structure. Bitcoin is stored and moved through a decentralized network of computers that are not under the control of any single company or government.

This structure means that the virtual currency continues to be an easy target for people who want to manipulate its price or use it to launder money.

Unregulated, unregistered exchanges are a very big concern for the industry and the community broadly, said Kathryn Haun, a former federal prosecutor who is on the board of the American virtual currency company Coinbase.

The most frequent face of Bitfinex is its chief strategy officer, Phil Potter. Mr. Potter worked for Morgan Stanley in New York in the 1990s but lost his job after bragging at length in The New York Times about his $3,500 Rolex, his opulent lifestyle and his aggressive tactics for making money.

Mr. Potter, 45, runs Bitfinex alongside Mr. Van der Velde, a Dutch-speaking man living in Hong Kong, and Giancarlo Devasini, an Italian man who lives on the French Riviera, according to company filings in Hong Kong.

The company lost 1,500 Bitcoin, worth around $400,000, to a hacker in 2015. But the most damaging incident happened in August 2016 when a thief got almost 120,000 Bitcoin, worth around $75 million at the time.

The company spread out the losses to all customers even those who were not holding Bitcoin at the time of the hacking by forcing customers to take a 36 percent haircut or loss on any money at the exchange.

The lack of detail that Bitfinex provided about the hacking drove away some large customers like Arthur Hayes, the founder of Bitmex, a Hong Kong-based virtual currency exchange.

There are so many questions about them, Mr. Hayes said. All of this could be easily rectified by just showing all the figures.

Mr. van der Velde said the company had been as public and transparent as possible about the security incident in August 2016 given the ongoing criminal investigations.

Banks have also been put off by Bitfinexs operations. Wells Fargo said this year that it would no longer move money from Bitfinex accounts. Shortly after, Bitfinex said its main banks in Taiwan were shutting it off. Since then, it has moved between a series of banks in other countries, without telling customers where the exchanges money is stored.

But nothing has drawn more criticism than the operation of Tether, a virtual currency that is supposed to be tied or tethered to the value of a dollar.

Customers can buy Tether coins on Bitfinex and then transfer them to other virtual currency exchanges, providing a way to move dollars between countries without going through banks. Tether has also become a very popular way to buy Bitcoin. In recent weeks, a few hundred millions dollars worth of Tether has changed hands on a daily basis across several exchanges, according to data on CoinMarketCap.com.

Tether and Bitfinex have insisted that the two operations are separate. But leaked documents known as the Paradise Papers, which were made public this month, show that Appleby, an offshore law firm, helped Mr. Potter and Mr. Devasini, the Bitfinex operators, set up Tether in the British Virgin Islands in late 2014.

One persistent online critic, going by the screen name Bitfinexed, has written several very detailed essays on Medium arguing that Bitfinex appears to be creating Tether coins out of thin air and then using them to buy Bitcoin and push the price up.

Tether and Bitfinex have countered this criticism in statements on the companies websites and promised that every Tether is backed up by a dollar sitting in a bank account. In September, the companies provided an accounting document intended to prove that Tether is financed with real money.

Lewis Cohen, a lawyer at the law firm Hogan Lovells who advises many virtual currency projects, said the document, because of the careful way it was phrased, did not prove that the Tether coins are backed by dollars.

Even if they are, he said, Tether and Bitfinex appear to be violating laws in the United States and Europe that govern investments like Tether, which has qualities very similar to a money market mutual fund.

There are a long list of reasons that you dont want to deal with them, Mr. Cohen said of Tether.

On Tuesday, Tether announced that an external attacker had taken $30 million worth of Tether from the companys online wallets. The company said it was working to recover the coins.

See more here:

Warning Signs About Another Giant Bitcoin Exchange

Julian Assange Tries to Save Net Neutrality With Rambling …

Julian Assangewhose organization Wikileaks sad, thirsty Twitter DMs to Donald Trump Jr. recently leaked, revealing he sought to coordinate with Donald Trumps presidential campaignappears to have had a moment of buyers regret on Tuesday evening.

Upon hearing the Republican-controlled FCC had finally scheduled a vote to scrap Barack Obama-era net neutrality rules, potentially enriching massive digital conglomerates at the expense of the open web, some brief glimmer of the old Assange seemed to spark back to life. But not really very brightly, as he was only able to express his opposition to the White House-backed change in the form of convoluted pretzel logic posited as a Machiavellian 4-dimensional chess move.

Dear @realDonaldTrump, Assange wrote. Net neutrality of some form is important. Your opponents control most internet companies. Without neutrality they can make your tweets load slowly, CNN load fast and infest everyones phones with their ads. Careful.

As Assange has continued to hole up in the Ecuadorian embassy in London for years while attempting to avoid extradition, Wikileaks has largely fallen apart and his originally stated mission of radical transparency has increasingly given way to bizarre pro-Trump ramblings, suspiciously biased editorial decisions, and Twitter braggadocio.

To Assanges credit, while appealing to the presidents manically paranoid psychology is not actually how public policy decisions should be made, that is one of the few approaches capable of grabbing his attention. Anti-trust advocates may have won a similar victory recently when Trumps Department of Justice sued to block a (very bad for the public interest) merger between AT&T and Time Warner, possibly because Trump hates Time Warner subsidiary CNN with an unholy passion.

Alas, Assange is still probably barking up the wrong tree. Pais agency is ostensibly independent, and Pai is very committed to repealing the neutrality rules, so even the unlikely event of a last-minute pivot from the White House might not be enough to blunt his momentum. Its yet even less likely that Republicans in Congress, who are broadly anti-net neutrality, would be willing to override the FCC to bring back an Obama-era directive.

See original here:
Julian Assange Tries to Save Net Neutrality With Rambling ...