4D quantum encryption successful in first real-world test – New Atlas – New Atlas

Using quantum encryption to secure messages could make for much less hackable communication networks. The technique has been tested in the lab, but for it to really take off as a practical system it needs to work out in the real world, among other signals and natural air turbulence. Now, researchers from the University of Ottawa have successfully sent a message with high-dimensional quantum encryption between two building rooftops.

Quantum communication, at its most basic level, usually encodes information in a binary system: individual photons are sent between two points, with each representing one bit of information, either a one or a zero. But a technique called high-dimensional quantum encryption can theoretically squeeze twice the data into each photon, in turn allowing exponentially more information to be transmitted. Two bits of information per photon opens up four signal possibilities 00, 01, 10 and 11 giving it the title of 4D quantum encryption.

Not only can this technique fit more information into each particle, it's also more secure against deliberate attempts to intercept the message, as well as environmental factors like air turbulence and electronic interference. To keep out any prying eyes, this information can be encrypted with quantum key distribution, which uses the quantum states of light to encode a message and tell the receiving device how to decrypt it.

But outside of a lab, the real world is a noisy place, full of buildings, turbulent air and electronics. Before 4D quantum encryption can reach its potential, it needs to be tested in the kinds of environments it may eventually be used in. Since there's so much noise on the ground, sending a signal across a distance of 3 km (1.9 miles) horizontally is equivalent to the much greater distance of beaming a message through the relatively-clear air between the ground and a satellite in orbit.

The 3-km horizontal test is the next step, but for this proof of concept, the University of Ottawa researchers set about performing a 300 m (985 ft) test run between two rooftops in a city. They set up the lab equipment on the roof of each building, protected from the worst of the weather in wooden boxes.

The test was successful. Messages secured with 4D quantum encryption were beamed between the two stations, with an error rate of 11 percent well below the threshold to make it a secure connection. Accounting for the error correction and turbulence, the system was able to transfer 1.6 times more data per photon than 2D encryption.

"Our work is the first to send messages in a secure manner using high-dimensional quantum encryption in realistic city conditions, including turbulence," says Ebrahim Karimi, lead researcher on the study. "The secure, free-space communication scheme we demonstrated could potentially link Earth with satellites, securely connect places where it is too expensive to install fiber, or be used for encrypted communication with a moving object, such as an airplane."

The researchers say the next step is to test the system across three points, placed 5.6 km (3.5 mi) apart, using adaptive optics to try to counteract the turbulence. Longer-term, the plan is to add more links and more encryption dimensions to the system.

The research was published in the journal Optica.

Source: The Optical Society

See the rest here:
4D quantum encryption successful in first real-world test - New Atlas - New Atlas

Privacy is your right! Here’s everything about encrypted WhatsApp messages, Apple devices and emails – Economic Times

Now that we can agree that privacy is a right and not a feature, there's no reason for anyone to be snooping on your emails and phone conversations. You probably don't have anything to hide, but your privacy still needs to be respected. If you're in the least bit concerned, read on.

Messaging & Calls

WHATSAPP is encrypted end-to-end this means that no one, not even Whatsapp, has access to what you send. What you probably didn't know is that Whatsapp servers don't store messages at all and even voice/video calls are encrypted with the same uncrackable technology. If Whatsapp is too populous for your taste, you can always use Signal by Open Whisper Systems. They're quite similar because you can use Signal for text, audio, video, sending files, group conversations, voice calls and video calls. In fact, Whatsapp uses the Signal protocol for end-to-end encryption.

APPLE users should know that iMessage and FaceTime are also end-to-end encrypted. Needless to say, this only works within the Apple ecosystem, so you have to be chatting or video calling with someone who has an Apple device.

WICKR normally makes enterprise class communication products but they also have Wickr Me a free, private messenger for personal communications. It is end-to-end encrypted and has default ephemerality (all messages are fleeting, get deleted on being read). It also allows you to send photos, videos and files up to 10MB in size. For larger files and secure chat rooms, you can explore some of the paid plans.

Your privacy needs to be respected (Image: Thinkstock)

Email

PROTONMAIL is top of mind for most when it comes to secure email - you can use the web client or even the mobile apps for free. All emails are secured and anonymous (no personal info is needed to create an account). Basic accounts (500MB storage, 150 emails per day) are free and you can upgrade to remove these restrictions.

MAILFENCE is not as popular as ProtonMail but it also offers a free secure email account with up to 200MB total storage, 250MB documents, two-factor authentication and digital signatures. There's no spam, no trackers, no ads and no access for govt surveillance.

TUTANOTA gives you 1GB of space for email with some restrictions (no aliases, no customisation). It automatically encrypts all data including email and contacts. You can access it on any device using a web browser or get the apps for Android and iOS.

Cloud Storage

BOXCRYPTOR can be used to encrypt your files with any of the cloud storage providers like Dropbox, Google or OneDrive. It's free for personal use the catch is that you can only use it with one cloud provider and two devices. There are paid plans available if you need to remove these restrictions.

TRESORIT provides end-to-end encryption of your files. It includes 1,000GB of encrypted storage and you can access them from up to 10 devices all platforms are supported. If you need to send a file to anyone, you can send an encrypted link and access can be revoked anytime. You can try it free for 14 days after which it is US$12.50 a month (or US$10.42 a month, if billed annually).

SPIDEROAK is a cloud storage provider that encrypts data but also protects it in case of accidental loss (backup and sync of data is available for Windows, Mac, iOS and Android). You can create temporary, self-destructing links if you need to share any data from your personal cloud. Plans start at US$5 a month for 100GB storage and there are options for 250GB (US$9/month), 1,000GB (US$12/month) and 5TB (US$25/month).

Go here to read the rest:
Privacy is your right! Here's everything about encrypted WhatsApp messages, Apple devices and emails - Economic Times

The ABCs of ciphertext exploits and other cryptography attacks – TechTarget

The following is an excerpt from the Official (ISC)2 Guide to the CISSP CBK, fourth edition, edited by Adam Gordon,...

Enjoy this article as well as all of our content, including E-Guides, news, tips and more.

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

CISSP-ISSAP, ISSMP, SSCP. This section from Domain 3 offers a comprehensive overview of the various methods attackers use to crack ciphertext and otherwise exploit cryptography systems.

Todays cryptography is far more advanced than the cryptosystems of yesterday. Organizations are able to both encrypt and break ciphers that could not even have been imagined before human civilization had the power of computers. Today's cryptosystems operate in a manner so that anyone with a computer can use cryptography without even understanding cryptographic operations, algorithms and advanced mathematics. However, it is still important to implement a cryptosystem in a secure manner. Any security system or product is subject to compromise or attack. The following explains common attacks against cryptography systems.

The ciphertext-only attack is one of the most difficult because the attacker has so little information to start with. All the attacker starts with is some unintelligible data that he suspects may be an important encrypted message. The attack becomes simpler when the attacker is able to gather several pieces of ciphertext and thereby look for trends or statistical data that would help in the attack. Adequate encryption is defined as encryption that is strong enough to make brute force attacks impractical because there is a higher work factor than the attacker wants to invest into the attack. Moores law states that available computing power doubles every 18 months. Experts suggest this advance may be slowing; however, encryption strength considered adequate today will probably not be sufficient a few years from now due to advances in CPU and CPU technologies and new attack techniques. Security professionals should consider this when defining encryption requirements.

For a known plaintext attack, the attacker has access to both the ciphertext and the plaintext versions of the same message. The goal of this type of attack is to find the link -- the cryptographic key that was used to encrypt the message. Once the key has been found, the attacker would then be able to decrypt all messages that had been encrypted using that key. In some cases, the attacker may not have an exact copy of the message; if the message was known to be an e-commerce transaction, the attacker knows the format of such transactions even though he does not know the actual values in the transaction.

To execute the chosen attacks, the attacker knows the algorithm used for the encrypting, or even better, he may have access to the machine used to do the encryption and is trying to determine the key. This may happen if a workstation used for encrypting messages is left unattended. Now the attacker can run chosen pieces of plaintext through the algorithm and see what the result is. This may assist in a known plaintext attack. An adaptive chosen plaintext attack is where the attacker can modify the chosen input files to see what effect that would have on the resulting ciphertext.

This is similar to the chosen plaintext attack in that the attacker has access to the decryption device or software and is attempting to defeat the cryptographic protection by decrypting chosen pieces of ciphertext to discover the key. An adaptive chosen ciphertext would be the same, except that the attacker can modify the ciphertext prior to putting it through the algorithm. Asymmetric cryptosystems are vulnerable to chosen ciphertext attacks. For example, the RSA algorithm is vulnerable to this type of attack. The attacker would select a section of plaintext, encrypt it with the victims public key, then decrypt the ciphertext to get the plaintext back. Although this does not yield any new information to the attacker, the attacker can exploit properties of RSA by selecting blocks of data, when processed using the victims private key, yields information that can he used in cryptanalysis. The weakness with asymmetric encryption in chosen ciphertext attacks can be mitigated by including a random padding in the plaintext before encrypting the data. Security vendor RSA Security recommends modifying the plaintext by using a process called optimal asymmetric encryption padding (OAEP). RSA encryption with OAEP is defined in PKCS #1 v2.1.

Also called a side-channel attack, this more complex attack is executed by measuring the exact execution times and power required by the crypto device to perform the encryption or decryption. By measuring this, it is possible to determine the value of the key and the algorithm used.

This is a known plaintext attack that uses linear approximations to describe the behavior of the block cipher. Linear cryptanalysis is a known plaintext attack and uses a linear approximation to describe the behavior of the block cipher. Given sufficient pairs of plaintext and corresponding ciphertext, one can obtain bits of information about the key, and increased amounts of data will usually give a higher probability of success. There have been a variety of enhancements and improvements to the basic attack. For example, there is an attack called differential -- linear cryptanalysis, which combines elements of differential cryptanalysis with those of linear cryptanalysis.

Implementation attacks are some of the most common and popular attacks against cryptographic systems due to their ease and reliance on system elements outside of the algorithm. The main types of implementation attacks include:

Side-channel attacks are passive attacks that rely on a physical attribute of the implementation such as power consumption/emanation. These attributes are studied to determine the secret key and the algorithm function. Some examples of popular side channels include timing analysis and electromagnetic differential analysis.

Fault analysis attempts to force the system into an error state to gain erroneous results. By forcing an error, gaining the results and comparing it with known good results, an attacker may learn about the secret key and the algorithm.

Probing attacks attempt to watch the circuitry surrounding the cryptographic module in hopes that the complementary components will disclose information about the key or the algorithm. Additionally, new hardware may be added to the cryptographic module to observe and inject information.

This attack is meant to disrupt and damage processing by the attacker, through the resending of repeated files to the host. If there are no checks such as time-stamping, use of one-time tokens or sequence verification codes in the receiving software, the system might process duplicate files.

Algebraic attacks are a class of techniques that rely for their success on block ciphers exhibiting a high degree of mathematical structure. For instance, it is conceivable that a block cipher might exhibit a group structure. If this were the case, it would then mean that encrypting a plaintext under one key and then encrypting the result under another key would always be equivalent to single encryption under some other single key. If so, then the block cipher would be considerably weaker, and tile use of multiple encryption cycles would offer no additional security over single encryption.

Hash functions map plaintext into a hash. Because the hash function is a one-way process, one should not be able to determine the plaintext from the hash itself. To determine a given plaintext from its hash, refer to these two ways to do that:

1. Hash each plaintext until matching hash is found; or

2. Hash each plaintext, but store each generated hash in a table that can used as a look up table so hashes do not need to be generated again. A rainbow table is a lookup table of sorted hash outputs. The idea here is that storing precomputed hash values in a rainbow table that one can later refer to saves time and computer resources when attempting to decipher tile plaintext from its hash value.

This attack works closely with several other types of attacks. It is especially useful when attacking a substitution cipher where the statistics of the plaintext language are known. In English, for example, some letters will appear more often than others will, allowing an attacker to assume that those letters may represent an E or S.

Because a hash is a short representation of a message, given enough time and resources, another message would give the same hash value. However, hashing algorithms have been developed with this in mind so that they can resist a simple birthday attack. The point of the birthday attack is that it is easier to find two messages that hash to the same message digest than to match a specific message and its specific message digest. The usual countermeasure is to use a hash algorithm with twice the message digest length as the desired work factor (e.g., use 160-bit SHA-1 to have it resistant to 280 work factor).

This is the most common type of attack and usually the most successful. All cryptography relies to some extent on humans to implement and operate. Unfortunately, this is one of the greatest vulnerabilities and has led to some of the greatest compromises of a nations or organizations secrets or intellectual property. Through coercion, bribery or befriending people in positions of responsibility, spies or competitors are able to gain access to systems without having any technical expertise.

The dictionary attack is used most commonly against password files. It exploits the poor habits of users who choose simple passwords based on natural words. The dictionary attack merely encrypts all of the words in a dictionary and then checks whether the resulting hash matches an encrypted password stored in the SAM file or other password file.

Brute force is trying all possible keys until one is found that decrypts the ciphertext. This is why key length is such an important factor in determining the strength of a cryptosystem. With DES only having a 56-bit key, in time the attackers were able to discover the key and decrypt a DES message. This is also why SHA-256 is considered stronger than MD5; because the output hash is longer and, therefore, more resistant to a brute force attack. Graphical Processor Units (GPU) have revolutionized brute force hacking methods. Where a standard CPU might take 48 hours to crack an eight character mixed password, a modern GPU can crack it in less than 10 minutes. CPUs have a large number of arithmetic/logic units and are designed to perform repetitive tasks continuously. These characteristics make them ideal for performing brute force attack processes. Due to the introduction of CPU-based brute force attacks, many security professionals are evaluating password length, complexity and multifactor considerations.

This attack is one of the most common. A competing firm buys a crypto product from another firm and then tries to reverse engineer the product. Through reverse engineering, it may be able to find weaknesses in the system or gain crucial information about the operations of the algorithm.

This attack was successful against the SSL installed in Netscape several years ago. Because the random number generator was too predictable; it gave the attackers the ability to guess the random numbers so critical in setting up initialization vectors or a nonce. With this information in hand, the attacker is much more likely to run a successful attack.

Most cryptosystems will use temporary files to perform their calculations. If these files are not deleted and overwritten, they may be compromised and lead an attacker to the message in plaintext.

Encryption 101: DES explained

Understand the differences between symmetric and asymmetric encryption

Implement identity management systems for cybersecurity readiness.

Read the original:
The ABCs of ciphertext exploits and other cryptography attacks - TechTarget

qBitcoin: A Way of Making Bitcoin Quantum-Computer Proof? – IEEE Spectrum

A new quantum cryptography-based Bitcoin standard has been proposed that could harden the popular cryptocurrency against the advent of full-fledged quantum computers. Bitcoin as it now exists involves traditional public key cryptography and thus could conceivably be hacked by a future quantum computer strong enough to break it. However, quantum cryptography, which is based not on difficult math problems but the fundamental laws of physics, is expected to be strong enough to withstand even quantum computer-powered attacks.

The proposal, dubbed qBitcoin, posits transmission of quantum cryptographic keys between a remitter and a receiver of the eponomous named cryptocurrency, qBitcoin. The system would use provably secure protocols such as theBB84quantum key distribution scheme.

To exchange qBitcoin, then, requires that there be a transmission network in place that can send and receive bits of quantum information, qubits. And that is no mean feat, considering it typically involves preserving the polarization states of individual photons across thousands of kilometers. To date, there are five knownquantum key distributionnetworks in the United States, Switzerland, Austria, and Japan. China is working ontheir ownmassive 2000-km link, as well. And a number of satellite-to-satellite and satellite-to-ground quantum key distribution networks are alsobeingdevelopedandprototyped.

Which is to say that qBitcoin or something like it could not be scaled up today. But if the quantum computer singularity is approaching, in which a powerful enough machinecould threaten existing cryptography standards, quantum cryptography would be an essential ingredient of the post-Y2Q age. So existing quantum key distribution networks might at least serve as outposts in a burgeoning global quantum network, like Western Union stations in the early days of the telegraph.

Some things about qBitcoin might appear the same to any Bitcoin user today. Bitcoin is a peer to peer system, and qBitcoin is also peer to peer, says Kazuki Ikeda, qBitcoins creator and PhD student in physics at Osaka University in Japan.Hesays compared to Bitcoin, qBitcoin would offer comparable or perhaps enhanced levels of privacy, anonymity, and security. (That said, his paper that makes this claim is still under peer review.)

However, the lucrative profession ofBitcoin mining, under Ikedas protocol, would be very different than what it is today. Transactions would still need to be verified and secured. Butinstead of todays system of acryptographic puzzles, qBitcoins security would rely on a 2001proposalfor creating aquantum digital signature.Such a signature would rely on the laws of quantum physics to secure the qBitcoin ledger from tampering or hacking.

Ikeda's proposal is certainly not the first to suggest a quantum-cryptographic improvement onclassical-cryptography-based digital currencies. Other proposals in2010,2016,and evenearlier this yearhave also offered up variations on the theme. All work to mitigate against the danger large-scale quantum computers would represent to Bitcoin.

Of course, not every solution to the quantum singularity is as promising as every other. A person going by the handle amluto criticized Ikedas qBitcoin proposal onaprominent message boardlast week. (amluto claimed to be author of one of aprevious quantum currency proposalsfrom 2010presumably the 2010 proposals co-author Andrew Lutomirski, althoughIEEE Spectrumwas unable to confirm this supposition at press time.)

This is nonsense It's like saying that you can transmit a file by mailing a USB stick, which absolutely guarantees that you, the sender, no longer have the original file. That's wrongall that mailing a USB stick guarantees is that you don't have the USB stick any more, not that you didn't keep a copy of the contents. Similarly, quantum teleportation eats the input state but says nothing about any other copies of the input state that may exist.

Ikeda says he disagrees with the analogy. The point, he says, is that there are no other copies of the input state as it's called abovein other words of the quantum keys that secure qBitcoin. So, Ikeda says, qBitcoin is safe just like Bitcoin is safe today.

But one day, thanks to quantum computers, Bitcoin, will no longer be safe. Someone will needto save it. And, no matter who devises the winning protocol, the thing that threatens Bitcoinmay in fact also be the thing that comes to its rescue: The cagey qubit.

IEEE Spectrums general technology blog, featuring news, analysis, and opinions about engineering, consumer electronics, and technology and society, from the editorial staff and freelance contributors.

Sign up for the Tech Alert newsletter and receive ground-breaking technology and science news from IEEE Spectrum every Thursday.

The Beijing-Shanghai project will form the backbone of the nations quantum communications network 26Oct2016

What is a blockchain and why is it the future of the web? 8Jul2015

New 53-kilometer record for quantum cryptography through the air could enable a 24/7 space-based quantum Internet 24Jul

While the fictional geniuses in HBOs Silicon Valley aim to reinvent the Internet, Mozilla and the NSF hope prize money will attract real-world innovations 23Aug

Organizations, organisms, and communication networks all have similar growth dynamics 18Aug

Annual Las Vegas gathering of white-hat hackers breaks into e-voting and registration systems, sometimes in just a few hours 3Aug

It looks a lot different than its decentralized predecessors. Can it last? 30Jun

This weeks Ukrainian malware attack cribbed from last months WannaCry ransomware outbreakbut foreshadows worse to come 30Jun

Mouser and Grant Imahara team up with the creative minds at WIRED Brand Lab to take a look at the modern city

Qudits can have 10 or more quantum states simultaneously compared to just two for qubits 28Jun

Record distance for quantum entanglement set at more than 1,200 km 15Jun

The human neocortex learns and recognizes new songs with amazing efficiency. See how it works 10Jun

Researchers publish taxonomy of trolls, sybils, and other online troublemakers 9Jun

The Pied Piper of the TV show's fictional quest to reinvent the Internet trails the progress of MaidSafe and the University of Michigan 9Jun

Enel talks a blockchain energy market while advocating incremental change in the sector 24May

The networking trick made famous by Bitcoin could make car-to-cloud communication easier and more secure 24May

But would a digital cybertreaty of the future bind Redmond to operate Windows XP as a public utility? 16May

Owlet provides new parents with much-needed sleep knowing that their infants heart rate and oxygen levels are constantly and effectively monitored.

The fictional entrepreneur of "Silicon Valley" sets out his plan to reinvent the Internet, and decentralized Web pioneer Brewster Kahle says it sounds very familiar 8May

Sovrin joins Hyperledger Indy to build a permissioned open ledger for identity management 2May

Read the original post:
qBitcoin: A Way of Making Bitcoin Quantum-Computer Proof? - IEEE Spectrum

Genome cryptography is the new way to secure your DNA data – Gears Of Biz

DNA security and privacy is a looming problem that scientists and researchers are only just starting to grapple with. A team at Stanford has now developed a technique that can cloak irrelevant genomic information, allowing scientists to access key disease-related mutations without revealing an individuals broader genome sequence.

In a world where everything from dating profiles to medical diagnoses are drawing on DNA data, were currently just forced to hope that each company with access to our DNA is acting responsibly with out genetic fingerprints. But for many, hope is not enough, and nor should it be. With genomic information becoming increasingly of value, a demand has arisen for a way to secure that data while still being able to enjoy the benefits of DNA analysis.

Often people who have diseases, or those who know that a particular genetic disease runs in their family, are the most reluctant to share their genomic information because they know it could potentially be used against them in some way, says Gill Bejerano, associate professor of developmental biology, of pediatrics and of computer science. They are missing out on helping themselves and others by allowing researchers and clinicians to learn from their DNA sequences.

To address such concerns, the Stanford team developed a technique based on a classic cryptographic protocol, known as garbled circuit or Yaos protocol. The individual encrypts their own genome using an algorithm on their smartphone or computer, which translates specific gene variants into a linear set of values that are securely uploaded into the cloud. On the other end of the transaction, the researcher (or any second-party) accesses only the data that is pertinent to their investigation.

In this way, no person or computer, other than the individuals themselves, has access to the complete set of genetic information, says Bejerano.

The team demonstrated the process by executing several practical demonstrations, including identifying specific gene mutations in patients with rare diseases and comparing a babys DNA with his parents to target the likely cause of a genetic disease. In all tested instances, at least 97 percent of each subjects unique DNA information was completely hidden from the researchers.

As well as protecting a persons privacy when having their DNA processed for medical reasons, this technique could theoretically be applied to more commercial contexts, such as ancestry genome studies or even the rising field of nutrigenomics.

There is a general conception that we can only find meaningful differences by surveying the entire genome, says Bejerano. But these meaningful differences make up only a very tiny proportion of our DNA. There are now amazing tools in computer science and cryptography that allow researchers to pinpoint only these differences while keeping the remainder of the genome completely private.

Just recently it was demonstrated that synthetic DNA could be created containing malware that allows a malicious party to gain control of the computer that sequences it. As we learn more and more about what our genetic fingerprint means, the value of that fingerprint will only increase. In the future, the DNA marketplace will be big business and security protocols such as this new Stanford technique are going to be important.

The teams research was published in the journal Science.

Source: Stanford Medicine

Read the rest here:
Genome cryptography is the new way to secure your DNA data - Gears Of Biz

Assange blasts ‘absurd’ bid to class WikiLeaks a hostile intelligence service – RT

Published time: 24 Aug, 2017 15:02

WikiLeaks founder Julian Assange slammed efforts to officially class his whistleblowing organization as a non-state hostile intelligence service branding it an attempt to put the Pompeo Doctrine into law.

The Senate Intelligence Committee is proposing a provision in its annual intelligence authorisation bill to declare WikiLeaks as such.

It is the sense of Congress that WikiLeaks and the senior leadership of WikiLeaks resemble a non-state hostile intelligence service often abetted by state actors and should be treated as such a service by the United States, the bill states.

Published Friday, the bill was passed by the committee late last month on a 14-1 vote. Democrat Ron Wyden of Oregon voted against the measure citing the legal, constitutional and policy implications that the WikiLeaks provision may entail.

Assange tweeted a statement describing it as absurd to brand media organizations in such a way.

It is equivalent to suggesting that the CIA is a media organization. Publishers publish what they obtain, Assange said. Intelligence agencies do not.

It is an interesting thought experiment to consider where other media outlets lay on this spectrum. It is clear that if the 'Pompeo doctrine' applies to WikiLeaks then it applies equally if not more so to other serious outlets," he added.

US intelligence agencies have accused Russia of hacking emails from the Democratic National Committee and Hillary Clinton campaign chairman John Podesta and relaying the data to WikiLeaks for publication.

In April, CIA Director Mike Pompeo branded WikiLeaks a "hostile non-state intelligence agency" which should not be afforded the protections of the First Amendment under the constitution.

In March, WikiLeaks began publishing a series of leaks codenamed Vault 7, allegedly from the CIA, revealing the agencys arsenal of hacking tools.

READ MORE: CIAs secret spy tool helps agency steal data from NSA & FBI, WikiLeaks reveals

Go here to read the rest:
Assange blasts 'absurd' bid to class WikiLeaks a hostile intelligence service - RT

Russian Deputy PM Says He Supports a State-Backed Cryptocurrency – CoinDesk

A senior Russian official has thrown his support behind a state-backed cryptocurrency.

In an interview with Russian broadcaster RBC, First Deputy Prime Minister Igor Shuvalov said that he is in favor of a "crypto-ruble" provided that certain measures are put in place on the security front.

"This theme will develop," he said in translated statements. "But it should develop in such a way that the national economy cannot be put under attack, but rather make it stronger."

Shuvalov isn't the first Russian official to opine on the subject of a blockchain-based ruble. Indeed, the deputy chief of the Bank of Russia remarked in February that the implementation of a national cryptocurrency was "only a question of time." Skorobogatova stated that, after extendeddiscussions withinthe centralbank they were finally ready to move forward with initiative.

The Russian government is exploring blockchain on multiple fronts, including work by health officials to test possible methods that utilizethe tech for exchanging patient information. And earlier this summer, President Vladimir Putin briefly met with ethereum creator Vitalik Buterin.

During the RBC interview, Shuvalov confirmed that the government is considering investing in cryptocurrency mining resources, a disclosure that comes after word emerged that an advisor to Russian President Vladimir Putin is putting together a bitcoin mine of his own.

The idea that Russia would potentially fund construction of cryptocurrency mining facilities is in itself notable, given that at one point, lawmakers in the countryonce debated harsh measures including prison terms to deter the creation and spread of so-called "money surrogates".

Still, movement on this front is in the earliest stages, accordingto Shuvalov.

"But while this is a discussion, there are no concrete projects yet. In order to develop such centers, it is necessary to prepare appropriate legislation and its regulation," he told the broadcaster.

Image Credit:ID1974/Shutterstock.com

The leader in blockchain news, CoinDesk is an independent media outlet that strives for the highest journalistic standards and abides by a strict set of editorial policies. Have breaking news or a story tip to send to our journalists? Contact us at [emailprotected].

Read more here:
Russian Deputy PM Says He Supports a State-Backed Cryptocurrency - CoinDesk

How to Learn About Cryptocurrency In The Bitcoin Era – Daily Beast

Today the world of cryptocurrency digital cash that primarily takes on the form of data, usually used for online transactions for goods and services is in the news, specifically because of the prominence of Bitcoin. Demand is high and the valuation for Bitcoin and other forms of cryptocurrency is skyrocketing. The Beginner's Guide to Cryptocurrency Investing provides the basics on how to research cryptocurrencies, to estimate the true value of the market and to invest wisely. And in little time you may be able to start earning a digital fortune. Cryptocurrencies are so appealing to users because they are decentralized and available to anyone. Plus they use advanced encryption techniques to help ensure security and the anonymity of users. Best of all, today you can get the Beginner's Guide to Cryptocurrency Investing for $15.

Please note that if you buy something featured in one of our posts we may collect a share of sales.

See more here:
How to Learn About Cryptocurrency In The Bitcoin Era - Daily Beast

Bernanke to Give Keynote Speech at October Cryptocurrency Event – Bloomberg

Ben Bernanke, former chairman of the Federal Reserve, will be the keynote speaker at a blockchain and banking conference in October hosted by Ripple, the startup behind the fourth largest digital currency.

The three-day event, called Swell, starts Oct. 16 in Toronto, Ripple said in a statement on its website. Bernanke, who has criticized cryptocurrencies in the past, will be interviewed by Gene Sperling, the former national economic adviser under Presidents Bill Clinton and Barack Obama.

Bernanke wrote that virtual currencies could have long-term promise in a 2013 letter to Congress. However, in a 2015 interview with Quartz, he said bitcoin has some serious problems, including its anonymity and lack of stability. Bernanke was not immediately available to comment.

Since the former Fed chairmans remarks, the largest cryptocurrency has skyrocketed in value, fueling excitement among enthusiasts but skepticism among critics worried that the digital coin is in a bubble.

Related: Ripple Is Seeing More Volume in Fiat Currencies, Less in Bitcoin

See original here:
Bernanke to Give Keynote Speech at October Cryptocurrency Event - Bloomberg

WikiLeaks releases CIA tool to steal info intel allies already supposed to share – The Hill

WikiLeaks on Thursday released an apparent CIA tool designed to make sure that the United Statesintelligence partners actually share biometric data they had agreed to share.

"OTS/I2C [Office of Technical Service/Identity Intelligence Center] has an established effort to provide liaison services with a system that collects biometric information. ExpressLane v3.1.1, and supporting tools, was developedto support OTS/I2C in their efforts to verify that this data is also being shared with the Agency," reads the user manual to the tool, titled ExpressLane.

ExpressLane is designed to run on systems provided by the CIA to its partners for the program. It could either be installed in advance or handled via a software update. It is capable of disabling those systems if the partners do not meet the terms of their agreement.

The cache of ExpressLane documents, which the CIA have not authenticated, is dated 2009.

WikiLeaks first began its so-called "Vault 7" series of leaks of CIA hacking tools in March.

ExpressLane marks Vault 7's twentieth installment.

This story was updated at 12:36 p.m.

See more here:
WikiLeaks releases CIA tool to steal info intel allies already supposed to share - The Hill