Global Email Encryption Market – Size, Trend, Share …

1. Executive summary1.1. Key findings1.2. Market attractiveness and trend analysis1.3. Competitive landscape and recent industry development analysis2. Introduction2.1. Report description2.2. Scope and definitions2.3. Research methodology3. Market landscape3.1. Growth drivers3.1.1. Impact analysis3.2. Restraints and challenges3.2.1. Impact analysis3.3. Porters analysis3.3.1. Bargaining power of buyers3.3.2. Bargaining power of suppliers3.3.3. Threat of substitutes3.3.4. Industry rivalry3.3.5. Threat of new entrants3.4. Global email encryption market shares analysis, 2014-20253.4.1. Global email encryption market shares by deployment, 2014-20253.4.2. Global email encryption market shares by end user, 2014-20253.4.3. Global email encryption market shares by geography, 2014-20254. Global email encryption market by deployment4.1. On-premise4.1.1. Historical market size by region, 2014-20164.1.2. Market forecast by region, 2017-20254.2. Cloud4.2.1. Historical market size by region, 2014-20164.2.2. Market forecast by region, 2017-20255. Global email encryption market by end user5.1. BFSI5.1.1. Historical market size by region, 2014-20165.1.2. Market forecast by region, 2017-20255.2. Healthcare5.2.1. Historical market size by region, 2014-20165.2.2. Market forecast by region, 2017-20255.3. Government5.3.1. Historical market size by region, 2014-20165.3.2. Market forecast by region, 2017-20255.4. Retail5.4.1. Historical market size by region, 2014-20165.4.2. Market forecast by region, 2017-20255.5. IT & telecom5.5.1. Historical market size by region, 2014-20165.5.2. Market forecast by region, 2017-20255.6. Education5.6.1. Historical market size by region, 2014-20165.6.2. Market forecast by region, 2017-20255.7. Manufacturing5.7.1. Historical market size by region, 2014-20165.7.2. Market forecast by region, 2017-20255.8. Others5.8.1. Historical market size by region, 2014-20165.8.2. Market forecast by region, 2017-20256. Global email encryption market by geography6.1. North America6.1.1. U.S.6.1.1.1. Historical market size, 2014-20166.1.1.2. Market forecast, 2017-20256.1.2. Canada6.1.2.1. Historical market size, 2014-20166.1.2.2. Market forecast, 2017-20256.1.3. Mexico6.1.3.1. Historical market size, 2014-20166.1.3.2. Market forecast, 2017-20256.2. Europe6.2.1. UK6.2.1.1. Historical market size, 2014-20166.2.1.2. Market forecast, 2017-20256.2.2. Germany6.2.2.1. Historical market size, 2014-20166.2.2.2. Market forecast, 2017-20256.2.3. France6.2.3.1. Historical market size, 2014-20166.2.3.2. Market forecast, 2017-20256.2.4. Spain6.2.4.1. Historical market size, 2014-20166.2.4.2. Market forecast, 2017-20256.2.5. Italy6.2.5.1. Historical market size, 2014-20166.2.5.2. Market forecast, 2017-20256.2.6. Rest of Europe6.2.6.1. Historical market size, 2014-20166.2.6.2. Market forecast, 2017-20256.3. Asia-Pacific6.3.1. China6.3.1.1. Historical market size, 2014-20166.3.1.2. Market forecast, 2017-20256.3.2. Japan6.3.2.1. Historical market size, 2014-20166.3.2.2. Market forecast, 2017-20256.3.3. India6.3.3.1. Historical market size, 2014-20166.3.3.2. Market forecast, 2017-20256.3.4. Australia6.3.4.1. Historical market size, 2014-20166.3.4.2. Market forecast, 2017-20256.3.5. South Korea6.3.5.1. Historical market size, 2014-20166.3.5.2. Market forecast, 2017-20256.3.6. Rest of Asia-Pacific6.3.6.1. Historical market size, 2014-20166.3.6.2. Market forecast, 2017-20256.4. LAMEA6.4.1. Brazil6.4.1.1. Historical market size, 2014-20166.4.1.2. Market forecast, 2017-20256.4.2. Saudi Arabia6.4.2.1. Historical market size, 2014-20166.4.2.2. Market forecast, 2017-20256.4.3. South Africa6.4.3.1. Historical market size, 2014-20166.4.3.2. Market forecast, 2017-20256.4.4. Rest of LAMEA6.4.4.1. Historical market size, 2014-20166.4.4.2. Market forecast, 2017-20257. Company profiles7.1. HP, Inc.7.1.1. Overview7.1.2. Financials and Business Segments7.1.3. Recent Developments7.2. Symantec7.2.1. Overview7.2.2. Financials and Business Segments7.2.3. Recent Developments7.3. McAfee7.3.1. Overview7.3.2. Financials and business segments7.3.3. Recent developments7.4. Sophos7.4.1. Overview7.4.2. Financials and business segments7.4.3. Recent developments7.5. TrendMicro7.5.1. Overview7.5.2. Financials and business segments7.5.3. Recent developments7.6. Cisco7.6.1. Overview7.6.2. Financials and business segments7.6.3. Recent developments7.7. Proofpoint7.7.1. Overview7.7.2. Financials and business segments7.7.3. Recent developments7.8. Entrust7.8.1. Overview7.8.2. Financials and business segments7.8.3. Recent developments7.9. Zix Corporation7.9.1. Overview7.9.2. Financials and business segments7.9.3. Recent developments7.10. Microsoft Corporation7.10.1. Overview7.10.2. Financials and business segments7.10.3. Recent developments

List of Tables

Table 1. Email Encryption Market Share, by Deployment, 2014-2025Table 2. Email Encryption Market Share, by End-User, 2014-2025Table 3. Email Encryption Market Share, by Region, 2014-2025Table 4. Email Encryption Market Value for On-Premise, by Region, 2017-2025, $millionTable 5. Email Encryption Market Value for Cloud, by Region, 2017-2025, $millionTable 6. Email Encryption Market Value for BFSI, by Region, 2017-2025, $millionTable 7. Email Encryption Market Value for Healthcare, by Region, 2017-2025, $millionTable 8. Email Encryption Market Value for Government, by Region, 2017-2025, $millionTable 9. Email Encryption Market Value for Retail, by Region, 2017-2025, $millionTable 10. Email Encryption Market Value for IT & Telecom, by Region, 2017-2025, $millionTable 11. Email Encryption Market Value for Education, by Region, 2017-2025, $millionTable 12. Email Encryption Market Value for Manufacturing, by Region, 2017-2025, $millionTable 13. Email Encryption Market Value for Others, by Region, 2017-2025, $millionTable 14. Email Encryption Market Value for North America, by Country, 2014-2025, $millionTable 15. Email Encryption Market Value for North America, by Deployment, 2014-2025, $millionTable 16. Email Encryption Market Value for North America, by End-User, 2014-2025, $millionTable 17. Email Encryption Market Value for Europe, by Country, 2014-2025, $millionTable 18. Email Encryption Market Value for Europe, by Deployment, 2014-2025, $millionTable 19. Email Encryption Market Value for Europe, by End-User, 2014-2025, $millionTable 20. Email Encryption Market Value for Asia-Pacific, by Country, 2014-2025, $millionTable 21. Email Encryption Market Value for Asia-Pacific, by Deployment, 2014-2025, $millionTable 22. Email Encryption Market Value for Asia-Pacific, by End-User, 2014-2025, $millionTable 23. Email Encryption Market Value for LAMEA, by Country, 2014-2025, $millionTable 24. Email Encryption Market Value for LAMEA, by Deployment, 2014-2025, $millionTable 25. Email Encryption Market Value for LAMEA, by End-User, 2014-2025, $millionTable 26. HP, Inc. - Company SnapshotTable 27. Symantec - Company SnapshotTable 28. McAfee - Company SnapshotTable 29. Sophos - Company SnapshotTable 30. TrendMicro - Company SnapshotTable 31. Cisco - Company SnapshotTable 32. Proofpoint - Company SnapshotTable 33. Entrust - Company SnapshotTable 34. Zix Corporation - Company SnapshotTable 35. Microsoft Corporation - Company Snapshot

List of Figures

Figure 1. Email Encryption: On-Premise Market Value, 2014-2016, $millionFigure 2. Email Encryption: Cloud Market Value, 2014-2016, $millionFigure 3. Email Encryption: BFSI Market Value, 2014-2016, $millionFigure 4. Email Encryption: Healthcare Market Value, 2014-2016, $millionFigure 5. Email Encryption: Government Market Value, 2014-2016, $millionFigure 6. Email Encryption: Retail Market Value, 2014-2016, $millionFigure 7. Email Encryption: IT & Telecom Market Value, 2014-2016, $millionFigure 8. Email Encryption: Education Market Value, 2014-2016, $millionFigure 9. Email Encryption: Manufacturing Market Value, 2014-2016, $millionFigure 10. Email Encryption: Others Market Value, 2014-2016, $millionFigure 11. Email Encryption: U.S. Market Value, 2014-2016, $millionFigure 12. Email Encryption: U.S. Market Value, 2017-2025, $millionFigure 13. Email Encryption: Canada Market Value, 2014-2016, $millionFigure 14. Email Encryption: Canada Market Value, 2017-2025, $millionFigure 15. Email Encryption: Mexico Market Value, 2014-2016, $millionFigure 16. Email Encryption: Mexico Market Value, 2017-2025, $millionFigure 17. Email Encryption: UK Market Value, 2014-2016, $millionFigure 18. Email Encryption: UK Market Value, 2017-2025, $millionFigure 19. Email Encryption: Germany Market Value, 2014-2016, $millionFigure 20. Email Encryption: Germany Market Value, 2017-2025, $millionFigure 21. Email Encryption: France Market Value, 2014-2016, $millionFigure 22. Email Encryption: France Market Value, 2017-2025, $millionFigure 23. Email Encryption: Spain Market Value, 2014-2016, $millionFigure 24. Email Encryption: Spain Market Value, 2017-2025, $millionFigure 25. Email Encryption: Italy Market Value, 2014-2016, $millionFigure 26. Email Encryption: Italy Market Value, 2017-2025, $millionFigure 27. Email Encryption: Rest of Europe Market Value, 2014-2016, $millionFigure 28. Email Encryption: Rest of Europe Market Value, 2017-2025, $millionFigure 29. Email Encryption: China Market Value, 2014-2016, $millionFigure 30. Email Encryption: China Market Value, 2017-2025, $millionFigure 31. Email Encryption: Japan Market Value, 2014-2016, $millionFigure 32. Email Encryption: Japan Market Value, 2017-2025, $millionFigure 33. Email Encryption: India Market Value, 2014-2016, $millionFigure 34. Email Encryption: India Market Value, 2017-2025, $millionFigure 35. Email Encryption: Australia Market Value, 2014-2016, $millionFigure 36. Email Encryption: Australia Market Value, 2017-2025, $millionFigure 37. Email Encryption: South Korea Market Value, 2014-2016, $millionFigure 38. Email Encryption: South Korea Market Value, 2017-2025, $millionFigure 39. Email Encryption: Rest of Asia-Pacific Market Value, 2014-2016, $millionFigure 40. Email Encryption: Rest of Asia-Pacific Market Value, 2017-2025, $millionFigure 41. Email Encryption: Brazil Market Value, 2014-2016, $millionFigure 42. Email Encryption: Brazil Market Value, 2017-2025, $millionFigure 43. Email Encryption: Saudi Arabia Market Value, 2014-2016, $millionFigure 44. Email Encryption: Saudi Arabia Market Value, 2017-2025, $millionFigure 45. Email Encryption: South Africa Market Value, 2014-2016, $millionFigure 46. Email Encryption: South Africa Market Value, 2017-2025, $millionFigure 47. Email Encryption: Rest of LAMEA Market Value, 2014-2016, $millionFigure 48. Email Encryption: Rest of LAMEA Market Value, 2017-2025, $million

Read the original post:
Global Email Encryption Market - Size, Trend, Share ...

encryption – How to encrypt String in Java – Stack Overflow

This is the first page that shows up via google, and the security vulnerabilities in all the implementations make me cringe so I'm posting this to add information regarding encryption for others as it has been 7 Years from the orignal post. I hold a Masters Degree in Computer Engineering and spent a lot of time studying and learning Cryptography so I'm throwing my 2 cents in to make the internet a safer place.

Also, do note that a lot of implementation might be secure for a given situation, but why use those and potentially accidentally make a mistake? Use the strongest tools you have available unless you have a specific reason not to. Overall I highly advise using a library and staying away from the nitty gritty details if you can. I recommend Jasypt.

I will outline the basics of secure symmetric cryptography below and point out common mistakes I see online.

First thing first you need to pick a symmetric key Block Cipher. A Block Cipher is a tool used to create Pseudo-Randomness. Make sure to NEVER, I repeat NEVER use DES, I would even say NEVER use 3DES. The only Block Cipher that even Snowden's NSA release was able to verify being truly as close to Pseudo-Random as possible is AES 256.

Now let's talk about encryption modes. Never Use ECB this is bad at hiding repeating data as shown by the famous Linux penguin.

When implementing in Java note that if you use the following code, ECB mode is set by default:

... AVOID THIS! Which is seen in a a lot of examples online

If you have no Idea what you are doing I would strictly stick to GCM, and as said before if you really have no idea just use Jasypt. The only other modes that I would even mention are decent as well are CBC and CTR mode, but unlike GCM an attacker could modify the encrypted message in these modes and that is why they are not entirely secure.

So in the typical java implementation this is the setup you want:

GCM is built upon CTR mode and doesn't require padding. but if for whatever reason you choose to use for example CBC Mode do so with PKCS7Padding as follows:

Another very important note, is that when it comes to cryptography a Key and a Password are not the same things. A Key in cryptography needs to have a certain amount of entropy and randomness to be considered secure. This is why you need to make sure to use the Cryptography libraries Key generating algorithm to pick a key.

Along with a Key we also have a thing called an IV. While a key is a secret and you should only share it with people you want to be able to decrypt the message, the IV is public. It's used to make sure that if you encrypt two messages that are the same, the encryption looks different. Now what most people are not aware of is that IV's can not repeat for the same key. The moment you repeat an IV in modes like GCM, CBC, CTR you actually compromise the entire security of the system. This is why you need to make sure first your IV is not static and that you are using the proper Cryptography library to generate a random IV with a really low probability of accidentally creating two of the same.

I have by now hopefully gone through all other posts and edited them to take out vulnerabilities. But to make your life easy with Jasypt here is how you use it!

Gradle

Setup

Encryption

Decryption

For more security use the StrongTextEncryptor util class provided below but it is slower. (you may need to download and install the Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files to use it):

Setup

Encryption

Decryption

Isn't this just so much cleaner? 🙂

Note that when using Jasypt you don't have to worry about the key being truly random as discussed above just use a strong password, their library converts your strong password into a proper crypto key. But remember a weak password is still a weak password

Android Developers

One important point to point out here is know that your android code is reverse engineer able. That means if you store the password in plain text in your code. A hacker can easily retrieve it. Usually for these type of encryption you want to use Asymmetric Cryptography and so on. This is outside the scope of this post so I will avoid diving into it.

An interesting reading from 2013: Points out that 88% of Crypto implementations in android were done improperly and this is really the basis of me coming here and ranting so much.

More:
encryption - How to encrypt String in Java - Stack Overflow

Encryption Software Market, Size, Trends and Forecast 2020

Select CountryAfghanistan (+93)Albania (+355)Algeria (+213)American Samoa (+1684)Andorra (+376)Angola (+244)Anguilla (+1264)Antarctica (+0)Antigua and Barbuda (+1268)Argentina (+54)Armenia (+374)Aruba (+297)Australia (+61)Austria (+43)Azerbaijan (+994)Bahamas (+1242)Bahrain (+973)Bangladesh (+880)Barbados (+1246)Belarus (+375)Belgium (+32)Belize (+501)Benin (+229)Bermuda (+1441)Bhutan (+975)Bolivia (+591)Bosnia and Herzegovina (+387)Botswana (+267)Bouvet Island (+0)Brazil (+55)British Indian Ocean Territory (+246)Brunei Darussalam (+673)Bulgaria (+359)Burkina Faso (+226)Burundi (+257)Cambodia (+855)Cameroon (+237)Canada (+1)Cape Verde (+238)Cayman Islands (+1345)Central African Republic (+236)Chad (+235)Chile (+56)China (+86)Christmas Island (+61)Cocos (Keeling) Islands (+672)Colombia (+57)Comoros (+269)Congo (+242)Congo, the Democratic Republic of the (+242)Cook Islands (+682)Costa Rica (+506)Cote D'Ivoire (+225)Croatia (+385)Cuba (+53)Cyprus (+357)Czech Republic (+420)Denmark (+45)Djibouti (+253)Dominica (+1767)Dominican Republic (+1809)Ecuador (+593)Egypt (+20)El Salvador (+503)Equatorial Guinea (+240)Eritrea (+291)Estonia (+372)Ethiopia (+251)Falkland Islands (Malvinas) (+500)Faroe Islands (+298)Fiji (+679)Finland (+358)France (+33)French Guiana (+594)French Polynesia (+689)French Southern Territories (+0)Gabon (+241)Gambia (+220)Georgia (+995)Germany (+49)Ghana (+233)Gibraltar (+350)Greece (+30)Greenland (+299)Grenada (+1473)Guadeloupe (+590)Guam (+1671)Guatemala (+502)Guinea (+224)Guinea-Bissau (+245)Guyana (+592)Haiti (+509)Heard Island and Mcdonald Islands (+0)Holy See (Vatican City State) (+39)Honduras (+504)Hong Kong (+852)Hungary (+36)Iceland (+354)India (+91)Indonesia (+62)Iran, Islamic Republic of (+98)Iraq (+964)Ireland (+353)Israel (+972)Italy (+39)Jamaica (+1876)Japan (+81)Jordan (+962)Kazakhstan (+7)Kenya (+254)Kiribati (+686)Korea, Democratic People's Republic of (+850)Korea, Republic of (+82)Kuwait (+965)Kyrgyzstan (+996)Lao People's Democratic Republic (+856)Latvia (+371)Lebanon (+961)Lesotho (+266)Liberia (+231)Libyan Arab Jamahiriya (+218)Liechtenstein (+423)Lithuania (+370)Luxembourg (+352)Macao (+853)Macedonia, the Former Yugoslav Republic of (+389)Madagascar (+261)Malawi (+265)Malaysia (+60)Maldives (+960)Mali (+223)Malta (+356)Marshall Islands (+692)Martinique (+596)Mauritania (+222)Mauritius (+230)Mayotte (+269)Mexico (+52)Micronesia, Federated States of (+691)Moldova, Republic of (+373)Monaco (+377)Mongolia (+976)Montserrat (+1664)Morocco (+212)Mozambique (+258)Myanmar (+95)Namibia (+264)Nauru (+674)Nepal (+977)Netherlands (+31)Netherlands Antilles (+599)New Caledonia (+687)New Zealand (+64)Nicaragua (+505)Niger (+227)Nigeria (+234)Niue (+683)Norfolk Island (+672)Northern Mariana Islands (+1670)Norway (+47)Oman (+968)Pakistan (+92)Palau (+680)Palestinian Territory, Occupied (+970)Panama (+507)Papua New Guinea (+675)Paraguay (+595)Peru (+51)Philippines (+63)Pitcairn (+0)Poland (+48)Portugal (+351)Puerto Rico (+1787)Qatar (+974)Reunion (+262)Romania (+40)Russian Federation (+70)Rwanda (+250)Saint Helena (+290)Saint Kitts and Nevis (+1869)Saint Lucia (+1758)Saint Pierre and Miquelon (+508)Saint Vincent and the Grenadines (+1784)Samoa (+684)San Marino (+378)Sao Tome and Principe (+239)Saudi Arabia (+966)Senegal (+221)Serbia and Montenegro (+688)Seychelles (+248)Sierra Leone (+232)Singapore (+65)Slovakia (+421)Slovenia (+386)Solomon Islands (+677)Somalia (+252)South Africa (+27)South Georgia and the South Sandwich Islands (+0)Spain (+34)Sri Lanka (+94)Sudan (+249)Suriname (+597)Svalbard and Jan Mayen (+47)Swaziland (+268)Sweden (+46)Switzerland (+41)Syrian Arab Republic (+963)Taiwan, Province of China (+886)Tajikistan (+992)Tanzania, United Republic of (+255)Thailand (+66)Timor-Leste (+670)Togo (+228)Tokelau (+690)Tonga (+676)Trinidad and Tobago (+1868)Tunisia (+216)Turkey (+90)Turkmenistan (+7370)Turks and Caicos Islands (+1649)Tuvalu (+688)Uganda (+256)Ukraine (+380)United Arab Emirates (+971)United Kingdom (+44)United States (+1)United States Minor Outlying Islands (+1)Uruguay (+598)Uzbekistan (+998)Vanuatu (+678)Venezuela (+58)Viet Nam (+84)Virgin Islands, British (+1284)Virgin Islands, U.S. (+1340)Wallis and Futuna (+681)Western Sahara (+212)Yemen (+967)Zambia (+260)Zimbabwe (+263)

Go here to see the original:
Encryption Software Market, Size, Trends and Forecast 2020

Congressman tries to broker White House pardon for Julian …

A U.S. congressman tried to convince the Trump administration to pardon WikiLeaks Julian Assange in exchange for evidence proving Russia did not hack the emails of key Democrats during the 2016 presidential campaign, according to a report.

Rep. Dana Rohrabacher (R-Calif.), who is known for his pro-Russia stance, called White House chief of staff John Kelly on Wednesday in an attempt to broker a deal, the Wall Street Journal reported.

Rohrabacher suggested the White House pardon Assange, who remains confined to the Ecuadorian embassy in London to avoid arrest and extradition by the U.S., if the Swede turned over a computer drive with files showing Russian intelligence was not the source of the hacked emails.

U.S. intelligence agencies determined in January that Russia hacked into the email accounts of the Democratic National Committee among other prominent party figures like Hillary Clintons campaign chairman John Podesta.

The hacked emails, which were published on WikiLeaks, were damaging to Clintons presidential bid and part of a broader effort Russia played in tipping the election to Donald Trump.

But Rohrabacher has spoken out against the U.S. intelligence communitys findings.

After he visited Assange in London in August, Rohrabacher said the WikiLeaks founder emphatically stated that the Russians were not involved in the hacking or disclosure of those emails.

Kelly reportedly told Rohrabacher to contact the intelligence community instead, and did not alert President Trump to the proposal.

Rohrabacher, who is known for backing the legalization of marijuana, cited a conspiracy theory on Thursday that left-wingers orchestrated the violence that erupted at white supremacist rallies in Charlottesville, Va., last month.

See the rest here:
Congressman tries to broker White House pardon for Julian ...

GOP Congressman Tried to Broker Pardon for Julian Assange …

Republican California congressman Dana Rohrabacher contacted the White House earlier this week with an interesting deal: Pardon Julian Assange in exchange for what he said was evidence proving Russia was not the source of the now infamous hacked DNC emails published by WikiLeaks during the 2016 presidential race,The Wall Street Journal reported Friday.

In a phone call to President Trumps chief of staff John Kelly on Wednesday, Rohrabacher described a possible agreement to pardon Assange or something like that, the Journal reported.In exchange for the deal, according to the report, Assange would provide a computer drive that would exonerate Russia in case.

While Assange has not been formally accused of wrongdoing, the U.S. government is looking into WikiLeaks release of secret government documents in 2010.

Also Read: WikiLeaks Offers Job to Fired 'Anti-Diversity' Google Employee: 'Censorship Is for Losers'

Rohrabacher confirmed that he spoke to Kelly but declined to elaborate.

I cant confirm or deny anything about a private conversation at that level, he told the Journal.

Also Read: Julian Assange Trolls Hillary Clinton With Twitter Trend #BetterNamesForHillarysBook

Rohrabachers offer comes as Special Counsel Robert Mueller and congressional committees are investigating Russias involvementin the 2016 election, as well as the Trump campaigns possible collusion with the Kremlin.

Trump has repeatedly denied the accusations.

Rohrabacher has earned a reputation on Capitol Hill as being decidedly pro-Russia. A May NBC report, saidfellow GOP lawmaker Kevin McCarthy once joked that theres two people I think Putin pays: Rohrabacher and Trump.

Over the years, Republicans particularly Donald Trump supporters have done a 180 (or a full 360) in their remarks about WikiLeaks and its founder, Julian Assange. When he leaked on Hillary Clintons campaign in 2016, some Republicans said he was doing America a great service. But now the Trump administration is poised to attempt to convict Assange and WikiLeaks for their leaking activities. Here are fivetimes Trump and his supporters have flipped on the matter.

In 2010, former Alaska Gov. Sarah Palin said this about Assange: He is an anti-American operative with blood on his hands. His past posting of classified documents revealed the identity of more than 100 Afghan sources to the Taliban. Why was he not pursued with the same urgency we pursue al-Qaeda and Taliban leaders?

In 2016, though, Palin changed her tune. She posted an apology to Assange on Facebook. I apologize for condemning Assange when he published my infamous (and proven noncontroversial, relatively boring) emails years ago, she wrote.

Way back when, Fox News host Sean Hannity said what Assange was doing was waging his war on America and called for his arrest. He also said WikiLeaks stealing and publishing classified documents put lives at risk, as Media Matters reported.

When Assange started leaking emails from the Clinton campaign, though, Hannity became very friendly. He even brought the WikiLeaks founder onto his show for an interview, saying America owes you a debt of gratitude.

Back in 2010, former Speaker of the House Newt Gingrich said Assange was a terrorist. Information warfare is warfare. Julian Assange is engaged in warfare. Information terrorism, which leads to people getting killed is terrorism. And Julian Assange is engaged in terrorism.

Once WikiLeaks turned its attention to Clinton, though, Huckabee was ready to discuss Hillary Clintons criminal enterprise, as he called it, on Hannity. He didnt, however, have anything to say about where the leaks came from or whether the leakers should be brought up on treason charges.

Trump had strong words for Wikileaks in 2010. As CNN reported, in an interview with radio host Brian Kilmeade, Trump said of Wikileaks, I think it's disgraceful, I think there should be like death penalty or something.

During the campaign, though, Trumps support for WikiLeaks was hard to miss. He tweeted over and over again about things WikiLeaks documents about the Clinton campaign, and said at one campaign rally in October, WikiLeaks has provided things that are unbelievable.

While Trump repeatedly tweeted about documents released by WikiLeaks aimed at damaging Clinton, he also tweeted it was the dishonest media that claimed he was in agreement with WikiLeaks.

Republicans were fans of WikiLeaks during the election, but now the U.S. is looking to charge members of the organization

Over the years, Republicans particularly Donald Trump supporters have done a 180 (or a full 360) in their remarks about WikiLeaks and its founder, Julian Assange. When he leaked on Hillary Clintons campaign in 2016, some Republicans said he was doing America a great service. But now the Trump administration is poised to attempt to convict Assange and WikiLeaks for their leaking activities. Here are fivetimes Trump and his supporters have flipped on the matter.

Visit link:
GOP Congressman Tried to Broker Pardon for Julian Assange ...

Bitcoin r/Bitcoin – reddit

Bitcoin is the currency of the Internet: a distributed, worldwide, decentralized digital money. Unlike traditional currencies such as dollars, bitcoins are issued and managed without any central authority whatsoever: there is no government, company, or bank in charge of Bitcoin. As such, it is more resistant to wild inflation and corrupt banks. With Bitcoin, you can be your own bank.

If you are new to Bitcoin, check out We Use Coins and Bitcoin.org. You can also explore the Bitcoin Wiki:

How to buy bitcoins worldwideBuying Reddit Gold with bitcoin

Will I earn money by mining bitcoin?

Security guide for beginners - (WIP)

Sorted roughly by decreasing popularity.

Non-Bitcoin communities

chat.freenode.net #bitcoin

Bitcoin ForumBitcoin Google+ CommunityBitcoin Stack ExchangeBitcoin Magazine

Bitcoin Core is the backbone of the Bitcoin network. Almost all Bitcoin wallets rely on Bitcoin Core in one way or another. If you have a fairly powerful computer that is almost always online, you can help the network by running Bitcoin Core. You can also use Bitcoin Core as a very secure Bitcoin wallet.

Style sheet credits

The CSS used by this subreddit is the Erdune Theme modified by /u/Annihilia and /u/konkedas. Logo design by /u/Annihilia. Check out his other work here.

Ad campaign:

We previously collected donations to fund Bitcoin advertising efforts, but we no longer accept donations. The funds already donated will be spent on some sort of advertising, as intended. As of now, 10.35799117 BTC was spent out of 22.51357574. If you have ideas for the remaining BTC, see here for more info.

Read more from the original source:

Bitcoin r/Bitcoin - reddit

Harvard Disinvites Chelsea Manning, and the Feeling Is …

When asked by a member of Ms. Mannings team why Mr. Spicer and Mr. Lewandowski were being endorsed, Mr. Elmendorf said that they had something to bring to the table, the source said.

The call lasted about 10 minutes; Ms. Mannings team left the conversation stunned and insulted.

The sudden turnabout by the school came after a day of intense backlash over the universitys announcement that Ms. Manning had been included. Mr. Elmendorf said that while the university encouraged a diversity of opinions and did not shy away from controversy, naming Ms. Manning a fellow was a mistake for which he accepted responsibility.

I see more clearly now that many people view a visiting fellow title as an honorific, so we should weigh that consideration when offering invitations, he wrote in a letter posted on the Harvard Kennedy School website early Friday morning, shortly after the phone call with Ms. Manning. I apologize to her and to the many concerned people from whom I have heard today for not recognizing upfront the full implications of our original invitation.

In his statement, Mr. Elmendorf said the university had extended the fellowship to Ms. Manning because she fit the schools tradition of asking influential people to address students.

After news that the invitation had been revoked became public, Ms. Manning tweeted that she was honored to be disinvited and that the institution was chilling marginalized voices under C.I.A. pressure.

In another tweet, she contrasted herself with Mr. Spicer and Mr. Lewandowski.

Chase Strangio, a lawyer for Ms. Manning, wrote in a statement that the decision to withdraw the invitation in the middle of the night without coherent explanation is disgraceful even for Harvard. He also accused the school of being beholden to the C.I.A.

The decision by the Kennedy School followed forceful denunciations by a former top official at the C.I.A. and the current director at the agency.

Michael J. Morell, a deputy director at the intelligence agency under President Barack Obama, resigned as a fellow on Thursday, calling the invitation to Ms. Manning wholly inappropriate. He said it honors a convicted felon and leaker of classified information.

It is my right, indeed my duty, to argue that the schools decision is wholly inappropriate and to protest it by resigning from the Kennedy School, Mr. Morell wrote to Mr. Elmendorf. The letter was obtained and reported on by CBS News, where Mr. Morell is a national security contributor.

Mr. Morell did not respond to an email Thursday night, and the Kennedy School did not respond to a request for comment.

Later on Thursday, the director of the C.I.A., Mike Pompeo, withdrew from a Harvard forum he was scheduled to participate in that night, citing Ms. Mannings fellowship as the reason.

Ms. Manning betrayed her country, Mr. Pompeo, who graduated from Harvard Law School, wrote in a letter to a Kennedy School official, adding that he commended Mr. Morells decision to resign.

He said that his withdrawal has everything to do with her identity as a traitor to the United States of America and my loyalty to the officers of the C.I.A.

Ms. Manning was convicted in 2010 for giving WikiLeaks hundreds of thousands of classified diplomatic cables and military reports from the wars in Afghanistan and Iraq. Mr. Obama commuted her sentence in January as one of his final acts as president, and she was released in May.

Since 2013, Mr. Morell had served as a nonresident senior fellow at the Belfer Center for Science and International Affairs, which is also part of the Kennedy School. In his letter, Mr. Morell said he worried that Ms. Mannings actions would encourage others to leak classified information as well.

I have an obligation to my conscience, he wrote.

See the original post:
Harvard Disinvites Chelsea Manning, and the Feeling Is ...

Is There a Cryptocurrency Bubble? Just Ask Doge.

Today, Mr. Palmer, 30, is one of the loudest voices warning that a similar fate might soon befall the entire cryptocurrency industry.

Whats happening to crypto now is what happened to Dogecoin, Mr. Palmer told me in a recent interview. Im worried that this time, its on a much grander scale.

Already, there are signs of trouble on the horizon. This week, after Chinese authorities announced a crackdown on virtual currencies, the value of Bitcoin briefly tumbled 30 percent before partially recovering. The value of Dogecoin fell more than 50 percent last week. Its market value by midday Friday was about $100 million.

But there remains no bigger mania among tech investors than cryptocurrency, which some see as an eventual replacement for traditional, government-issued money. Even with the recent declines, the price of Bitcoin has more than tripled this year; another cryptocurrency, Ethereum, has gained more than 2,300 percent. The success of these currencies has minted a new class of crypto-millionaires and spawned hundreds of other digital currencies, called altcoins. In addition, it has given rise to an entire category of start-ups that take advantage of cryptocurrencys public ledger system, known as the blockchain.

Many cryptocurrency start-ups have raised money through an initial coin offering, or I.C.O., a type of fund-raising campaign in which investors buy into a new venture using Bitcoin or another cryptocurrency and receive virtual tokens instead of stock or voting rights in the company. These tokens grant investors access to a product or service that will be built with the money raised in the I.C.O., such as cloud data storage or access to a new social network.

(If youre having trouble picturing it: Imagine that a friend is building a casino and asks you to invest. In exchange, you get chips that can be used at the casinos tables once its finished. Now imagine that the value of the chips isnt fixed, and will instead fluctuate depending on the popularity of the casino, the number of other gamblers and the regulatory environment for casinos. Oh, and instead of a friend, imagine its a stranger on the internet who might be using a fake name, who might not actually know how to build a casino, and whom you probably cant sue for fraud if he steals your money and uses it to buy a Porsche instead. Thats an I.C.O.)

Despite the obvious risks of these ventures, investor appetite has been ravenous. A group of Bay Area programmers this year used an I.C.O. to raise $35 million for their project, an anonymous web browser called Brave, in less than 30 seconds. There have been 140 coin offerings in 2017 that have raised a total of $2.1 billion from investors, according to Coinschedule, a website that tracks the activity.

I.C.O. fever has even infected celebrities. This month, the actress Paris Hilton tweeted that she was looking forward to participating in the initial coin offering of LydianCoin, a cryptocurrency project associated with the digital advertising company Gravity4. The boxing star Floyd Mayweather and the rapper the Game have also endorsed coin offerings.

Unlike traditional stock offerings, which are carefully supervised and planned months or years in advance, I.C.O.s are largely unregulated in the United States, although that could soon change. The Securities and Exchange Commission warned investors this year about the growing number of coin offerings, saying that fraudsters often try to use the lure of new and emerging technologies to convince potential victims to invest their money in scams.

Mr. Palmer predicts that while some I.C.O.s may finance the creation of new and exciting enterprises, many will go up in smoke. He sees echoes of the first dot-com boom, when investors poured money into new and risky ventures only to get burned when the market came to its senses.

People are treating cryptocurrency now like penny stocks, he said. Its become a securities market.

Other high-profile skeptics have sounded the alarm about a potential crash in the crypto market, including Jamie Dimon, the chief executive of JPMorgan Chase, who last week called Bitcoin a fraud, and compared the current digital money craze to the 17th-century Dutch tulip bubble. And even true cryptocurrency believers have started to worry that I.C.O. mania wont end well.

Its a ticking time bomb, Charles Hoskinson, one of the developers of the cryptocurrency Ethereum, told Bloomberg in July.

When Mr. Palmers interest in digital money began, just four years ago, cryptocurrency was the sole province of math geeks and early adopters.

It was fun, nobody took it seriously, he recalled. People threw it around like change because it wasnt worth anything.

Unlike Bitcoin, whose early adopters often used it to buy drugs, weapons, or other illicit goods on the dark web, Dogecoin attracted a crowd of earnest do-gooders at first. They even set up a philanthropic arm, called the Dogecoin Foundation, and used it to raise thousands of dollars for projects, including sponsoring service dogs for autistic children and drilling water wells in Kenya. (Their generosity extended to quirkier projects; when Dogecoin fans heard that Jamaicas two-man bobsled team had qualified for the Winter Olympics in Sochi but lacked the money to get to Russia, they pitched in $30,000 to fund the trip.)

As the price of Bitcoin climbed, investors got interested in other cryptocurrencies. With no explanation, the price of Dogecoin doubled, then tripled. Two months after it was introduced, Mr. Palmers joke was worth $50 million, and some early Dogecoin adopters, who called themselves shibes, were sitting on lucrative stockpiles.

The success of Dogecoin attracted unsavory characters. One scammer raised $750,000 from Dogecoin supporters for a cryptocurrency start-up that never materialized. A hacker broke into Dogewallet, a website where users stored their coins, and stole thousands of dollars worth of the currency. Soon, the Dogecoin Reddit forum was full of angry scam victims and get-rich-quick schemers, and the once tight-knit Dogecoin community started to disintegrate.

We tried to do everything right, said Ben Doernberg, a former board member of the Dogecoin Foundation. But when you have a situation where people stand to put in a dollar and take out a thousand dollars, people lose their minds.

Mr. Palmer, a laid-back Australian who works as a product manager in the Bay Area and describes himself as socialist leaning, was disturbed by the commercialization of his joke currency. He had never collected Dogecoin for himself, and had resisted efforts to cash in on the currencys success, even turning down a $500,000 investment offer from an Australian venture capital firm.

In 2015, he announced he was leaving Dogecoin behind, telling an interviewer that the cryptocurrency market increasingly feels like a bunch of white libertarian bros sitting around hoping to get rich and coming up with half-baked, buzzword-filled business ideas.

He recently began making a series of YouTube videos that explain tech topics to beginners, including how digital currencies work. His goal? To rekindle peoples excitement in the core blockchain technology, while tamping down some of the excessive hype.

My mission in all of this is to help people better understand things, rather than just thinking about profit, he said.

It may be too late for that. Regulators in the United States have begun to scrutinize I.C.O.s, and Chinas central bank went as far as issuing a temporary ban on new coin offerings. But more dollars are still pouring into cryptocurrency ventures every day, as giddy investors ignore the warning signs and look to multiply their money.

Mr. Palmer worries that the coming reckoning in the cryptocurrency market and it is coming, he says confidently will deter people from using the technology for more legitimate projects.

The bigger this bubble goes, the bigger negative connotation its going to have, he said. Its going to be like the dot-com bust, but on a much more epic scale.

Read the original:
Is There a Cryptocurrency Bubble? Just Ask Doge.

Chelsea Manning: I’m not a traitor – The Washington Post

Chelsea Manning appeared on stage in the final interview of the four-day Nantucket Project conference on the island of Nantucket, Mass., on Sept. 17. (AP)

The question has doggedChelsea Manning ever since she walked out of prison four months ago nearlythree decadesshortof a35-year sentence, courtesyof a commutation from President Barack Obama in the last days of his administration.

Is she a traitor? Had the Army privatebetrayed her country in 2010 when she passed hundreds of thousands of classifieddocuments to WikiLeaks? Or had Manning, as many believe, demonstrated loyalty to the American publicby exposingits government institutions?

At least once,the question was put toManning herself.An ABC reporterasked itin June, in one of Mannings rare interviewssince walking free, butdidnt get a clear answer.

Often, an answer was supplied by another, such as President Trump, who called Manninga traitorin all-capital letters.

Manningwas asked the question again Sunday, this timepoint-blank on astage on the island of Nantucket, Mass.

And this time, sheansweredwith finality.

Are you an American traitor? asked the moderator, in the final interviewof the four-day Nantucket Project conference(the boldest and most thought-provoking ideas of our time).

No, Im not, Manningsaid. And I believe I did the best I could in my circumstances to make an ethical decision.

And when she said ethical, she hammeredher fist inher lap.

[Chelsea Manning on leaking information: I have a responsibility to the public]

Manning tried to kill herself twice during her seven years in a cell in Fort Leavenworth. She was reportedly forced to sleep naked.

Not everyone was sympathetic.

As an Army intelligence analyst in 2010, then named Bradley Manning, she perpetratedwhat The Washington Post once described as one of the most notorious leaks of classified documents in U.S. history.

A quarter-million State Department cables. Classified documents about military prisoners atGuantanamo Bay, Cuba. Recordingsof U.S. soldiers firing from a helicopter atsuspected insurgents in Baghdad(I think they just drove over a body. Ha ha!), leaving two journalists dead and revolting much of the American public.

Chelsea Manning has served a tough prison sentence, President Obama said seven years after her arrest as he wiped out the remainder of her sentence. She took responsibility for her crime.

She had, in a sense. But in Manningsfirst interview after going free, she told ABC News she felt a responsibility to the public.

Youre getting all this information, and its just death, destruction, mayhem, she said in June.And eventually, you just stop. I stopped seeing just statistics and information, and I started seeing people.

So many people call you a traitor. Many call you a hero, said the interviewer. Whois Chelsea Manning?

Im just me, she said. And for a while, that answer stood.

Vogue scored another interview in September a long piece that focused less on Mannings morality than on her fashion decisions (she came out as a transgender woman while in prison).

[Harvard dean rescinds Chelsea Mannings visiting fellow invitation, calling it a mistake]

And Harvard University has invited her to make a speech therein the future, although the schools relationship with the privatewas clouded this month when itrescinded a fellowship offer to Manning, bowing to pressure from upset staff and graduates.

CIA Director Mike Pompeo, for instance, canceled his own speech at the school,calling Manning an American traitor.

Pompeos comments mightbe why the Nantucket Project moderator, Eugene Jarecki, used exactly that term in on Sunday, when he and some of about 600 people in the audience questioned Manning, according to the Associated Press.

No,Manning said.She was not an American traitor.

Nor did she mind being snubbed by Harvard: I view that just as much of an honored distinction as the fellowship itself.

With a microphonetucked into her shirtcollar, sometimes sitting and sometimes rising to face the audience, Manning painted a dark picture of the country where she walks free.

Im walking out of prison, and I see literally a dystopiannovel unfolding before my eyes, she said. Thats how I feel when I walk in American streets today.

Butat one point,she also hinted at her version of brighterfuture.

There are things we as people can always do, Manningsaid. Whenever society and the institutionsare failing, we can always take our own individualactions against the institutionsof power.

More reading:

The Chelsea Manning fiasco says a lot about Harvard

Chelsea Manning, who gave trove of U.S. secrets to WikiLeaks, leaves prison

Chelsea Manning releases first photo of herself since leaving prison

Chelsea Manning doesnt look glamorous in Vogue. And thats great.

See original here:
Chelsea Manning: I'm not a traitor - The Washington Post

Edward Snowden, NSA leaker, says U.S. should show evidence of …

Russia likely interfered in last years U.S presidential election, according to former intelligence contractor Edward Snowden, but the American public deserves to see evidence of its involvement, he said in an interview published Wednesday.

Everybody is currently pointing at the Russians, Mr. Snowden, 33, told Germanys Der Spiegel. They probably did hack the systems of Hillary Clintons Democratic Party, but we should have proof of that.

The U.S. Office of the Director of National Intelligence has concluded that Russia interfered in last years election race by using state-sponsored hackers and propagandists to target Mrs. Clintons campaign in an effort to hurt her odds of winning the White House.

Officials have blamed Kremlin-tied cybercriminals with security breaches suffered by the likes of the Democratic National Committee and Mrs. Clintons former campaign manager, John Podesta, among others.

But Mr. Snowden, a computer expert who previously worked for the National Security Agency and CIA, said the U.S. government isnt being forthcoming with respect to supporting its claims, especially when compared to another recent security breach attributed to state actors.

In the case of the hacking attack on Sony, the FBI presented evidence that North Korea was behind it. In this case they didnt, although I am convinced that they do have evidence. The question is why? Mr. Snowdenasked.

I think the NSA almost certainly saw who the intruders were. Why wouldnt they? But I am also convinced that they saw a lot of other attackers on there, too, Mr. Snowden added.

As many as six or seven separate actors may have infiltrated the DNC, Mr. Snowden suggested, calling it a big target with apparently lax security.

I think the reality here was the narrative shaping about the Russians, added Mr. Snowden, who received political asylum from Moscow in 2013 and currently lives in the region as a lawful permanent resident.

Russian President Vladimir Putin apparently agrees with Mr. Snowdens last point on account of previously labeling allegations of election hacking hysteria whipped up by Washington.

Does anyone seriously think Russia can somehow influence the choice of the U.S. people? Is the U.S. some kind of banana republic? Mr. Putin said last year. The United States is a great power. Please correct me if Im wrong.

Mr. Snowden admittedly leaked a trove of classified intelligence in 2013 concerning the NSA and its international surveillance operations. He was subsequently charged with violations of the U.S. Espionage Act and theft by the Justice Department, but has evaded prosecutions by residing in Russia ever since.

Russia was the only country willing to grant Mr. Snowden asylum, he told Der Spiegel.

I have been quite critical of the Russian government on Twitter and in my statements, and that probably doesnt win me any friends. They havent bothered me in the period until now, but who knows what that will look like in the future, he said.

Go here to see the original:
Edward Snowden, NSA leaker, says U.S. should show evidence of ...