New Snowden or Crook? The Man Who Drives Wedge Between EU and Vietnam – Sputnik International

Asia & Pacific

10:58 21.08.2017(updated 11:35 21.08.2017) Get short URL

The high-profile case of Trinh Xuan Thanh, a Vietnamese economic fugitive reportedly abducted by Vietnamese security agents from the streets of Berlin, has driven a wedge between the EU and Hanoi. Sputnik sheds light on the issue of the "Vietnamese Snowden".

On August 2, German media reported that Trinh Xuan Thanh had been returned toVietnam forhis role inthe theft of $150 million duringhis tenure aschairman ofa subsidiary ofthe PetroVietnam energy company.

The incident caused an angry outcry inthe mainstream media and a mixed response inVietnam itself withLuat Khoa (Justice) magazine comparing Trinh Xuan Thanh withfugitive former NSA specialist Edward Snowden who now lives inRussia.

Snowden laid bare the global system ofsurveillance established bythe US and large-scale human rights violations byWashington. He did that ona pro bono basis withoutasking formoney, Kolotov said.

He added that unlikeSnowden, who was driven byidealistic intentions, Trinh Xuan Thanh is a big-time swindler who apparently acted aspart ofan organized group.

The Germans refused toextradite him because they hoped toextract some state secrets fromhim, compromise the corrupt officials and businessmen he worked withand, using the obtained information, toget lucrative contracts bypromising them safe asylum inGermany, Vladimir Kolotov continued.

After Trinh Xuan Thanh disappeared, the Germans blamed it onthe Vietnamese authorities and started blackmailing them. If the Vietnamese government backtracks it would encourage other corrupt officials tosteal and flee abroad, he added.

The Trinh Xuan Thanh case is part ofthe Vietnamese Communist Partys ongoing crackdown oncorruption bysenior officials who put their personal wellbeing beforethe interests ofthe state, thus undermining the peoples trust inCommunity party and the government.

The very same thing happened inthe Soviet Union where corrupt government officials betrayed the countrys interests forpersonal gain.

Had it not been forthe $150 million, good connections and the knowledge ofstate secrets Trinh Xuan Thanh had, the Germans would have sent him back home injiffy, Kolotov concluded.

Meanwhile, Berlin has demanded that Trinh Xuan Thanh be allowed toreturn toGermany and declared the intelligence attach atthe Vietnamese embassy persona-non-grata.

In a commentary forSputnik, Anton Tsvetov, an expert atthe Center forStrategic Studies inMoscow, said that duringthe recent G20 summit inHamburg, the Vietnamese side requested the extradition ofTrinh Xuan Thanh who had applied forpolitical asylum inGermany.

It looks likethe Germans refused [to extradite Trinh Xuan Thanh] and the Vietnamese simply ran outof patience, especially now that their anti-corruption campaign is infull swing, Tsvetov said.

Sputnik/ Maksim Blinov

All this will obviously deal a serious blow toVietnams relations withGermany and the EU, which have previously criticized the Vietnamese authorities fortheir persecution ofindependent bloggers. Hanoi didnt likethat and it looks likeit is ready fora further escalation oftensions withEurope, Anton Tsvetov said.

Trinh Xuan Thanh disappeared afterbeing accused ofcausing 150 million dollars worth offinancial damage tothe company he worked for.

Since then Thanhs capture has been a high priority forthe Vietnamese government, which had been tracking his movements sincehe fled the country in2016.

In December 2016, Communist Party Chief Nguyen Phu Trong said that his capture was ofthe highest priority.

Read the original here:
New Snowden or Crook? The Man Who Drives Wedge Between EU and Vietnam - Sputnik International

The fencing of the 4th estate: Q&A with Paul Farrell – Honi Soit

Journalist Paul Farrell, formerly at the Guardian and now at Buzzfeed, has led key investigations into national security and Australias detention network. He talks to Honi about the state of journalism today, how the government sucks at tech, and what its like to be spied on by the Australian Federal Police.

HS: What does leak-driven journalism like Wikileaks and your Nauru Files investigation offer by way of impact that maybe hasnt been possible in the past?

PF: I think one of the most innovative elements of Wikileaks publication style is their focus on publishing primary source material, and the reason thats so important is because it opens up the journalism to a whole entire community of people, and it makes available a huge amount more that wouldnt ordinarily be accessible in more traditional publication form. It offers a huge amount of insight into the particular power dynamics in play for whatever the subject matter is. But it also forces news organisations to be more honest and more transparent about their own practices as well. And I think that the reason why [these] stories have resonated so much is because they publish all of that material, and they set it out in a level of detail that is just staggering.

HS: Whistleblowers are often key to getting information out for these stories. What do you make of the situation for whistleblowers in Australia?

PF: I think there are some pretty enormous problems with how whistleblowers are treated in Australia, both in terms of cultural attitudes towards them and in terms of the law itself. One of the big problems is that we have incredibly onerous secrecy provisions across all forms of government agencies that restrict what public servants can say. And that restriction took place with no consideration of the public interest in speaking out, and with no consideration of whether there could actually be any harm that flows from a particular disclosure. And in the absence of any kind of guarantee of freedom of expression, that really makes it very difficult. But when governments act in that particular way, it actually can be quite counterintuitive to what their intention is, which is to prevent information from getting out. There is a phenomenon that takes place, where the tighter you try to constrain debate and discourse in the public service or in other areas of government, the more likely it is that you are going to get people that are going to speak out in quite bold and incredible ways. And of course Edward Snowden is a perfect example of that, because people lose faith in those institutions that theyre a part of.

HS: Last year the AFP admitted they sought your metadata without a warrant. For a lot of people, the metadata laws were swept under the rug and theres a if you have nothing to hide theres nothing to worry about attitude, with people assuming theyd never be the target. But how does it feel to know that you are being so closely monitored?

PF: Its not a good feeling. Its immensely creepy and confronting, and just incredibly weird, to think theres some random AFP officer sitting in an office in Sydney or Brisbane whos been poking around my phone and text records, and possibly my email records and things like that. Theres definitely an effect thats had on my entire personal life, that did take quite a big toll on me thinking about all of that. Its really confronting and definitely does induce a degree of paranoia that is pretty unsettling. So I wouldnt recommend it, but I think its something Ive come to terms with, and you cant let that sort of stuff get to you. And, I guess, fortunately the Federal Police is not very good at those investigations and have not really found anything. So that is certainly one of the good things about it. It has meant that I have to be very careful on the phone or in text, or when I take my phone into meetings, how people communicate with me electronically are all things that I am very conscious of all the time.

HS: What did you make of the lack of debate around the passing of the metadata legislation?

PF: Its really challenging because I do think theres a lack of awareness and interest by the Australian public about issues around freedom of expression, privacy, that you wouldnt see in the United States or some other countries. And I dont know why that is, and I dont know how to make people care more about it. Its difficult to reach people on these kinds of issues, particularly when they are challenging and complex. And I think thats the challenge of doing journalism well in these kinds of spaces, is trying to make relatable, to articulate these issues to young people, old people or whatever, who are struggling to understand why they should care about it. HS: How do you engage young people with these issues?

PF: I think youve really got to show what some of those real life effects of surveillance are, particularly when things go wrong, or those powers are misused. Those fascinating examples from the Snowden disclosures that came up of intelligence officers doing extremely dubious things like looking up ex-girlfriends data and doing all sorts of dodgy things with that material. And I think really hammering the real-life ramifications for your personal lives and things like that are some of the really critical parts of trying to engage people more.

HS: One of your recent stories showed Australians Medicare details were for sale on the dark net. How incompetent is the government when it comes to securing peoples sensitive information?

PF: I think there are definitely some serious problems in different government agencies with how they secure Australians personal information. Weve seen time and time again over the last few years, different sorts of extremely embarrassing data breaches, whether thats the handling of asylum seekers personal data, the handling of the G20 world leaders data, how the census IT issues were navigated, and then of course the Medicare dark web story. It definitely reflects a pattern that is quite concerning, that damages a lot of trust in government with how they handle personal information. In almost all of those instances, there were very preventable measures that could have resolved these issues. For the Medicare dark web one, it would have been as simple as somebody in government actually monitoring commercial dark web sites. It took me about 45 minutes to find that listing, and I didnt set out to look for it. I just stumbled across it, and its like: why is it a journalist from the Guardian who discovers that somebodys flogging Medicare card details on the dark web? So they really need to do a lot of work to get better at that.

Catch Paul on a panel about journalism, resistance, and metadata at the University of Sydney on Tuesday 22 August.

Read the original here:
The fencing of the 4th estate: Q&A with Paul Farrell - Honi Soit

Data Encryption in OneDrive for Business and SharePoint Online

This documentation is archived and is not being maintained.

We are in the process of combining the SharePoint Server 2013 and SharePoint Server 2016 content into a single content set. We appreciate your patience while we reorganize things. See the Applies To tag at the top of each article to find out which version of SharePoint an article applies to.

Applies to: OneDrive for Business, SharePoint Online

Topic Last Modified: 2017-07-31

Summary: Learn how encryption of data security works in OneDrive for Business and SharePoint Online.

Understand the basic elements of encryption for data security in OneDrive for Business and SharePoint Online.

Office 365 is a highly secure environment that offers extensive protection in multiple layers: physical data center security, network security, access security, application security, and data security. This article specifically focuses on the in-transit and at-rest encryption side of data security for OneDrive for Business and SharePoint Online.

For a description of Office 365 security as a whole, see Security in Office 365 White Paper.

Watch how data encryption works in the following video.

In OneDrive for Business and SharePoint Online, there are two scenarios in which data enters and exits the datacenters.

Client communication with the server Communication to OneDrive for Business across the Internet uses SSL/TLS connections. All SSL connections are established using 2048-bit keys.

Data movement between datacenters The primary reason to move data between datacenters is for geo-replication to enable disaster recovery. For instance, SQL Server transaction logs and blob storage deltas travel along this pipe. While this data is already transmitted by using a private network, it is further protected with best-in-class encryption.

Encryption at rest includes two components: BitLocker disk-level encryption and per-file encryption of customer content.

BitLocker is deployed for OneDrive for Business and SharePoint Online across the service. Per-file encryption is also deployed in OneDrive for Business and SharePoint Online in Office 365 multi-tenant and new dedicated environments that are built on multi-tenant technology.

While BitLocker encrypts all data on a disk, per-file encryption goes even further by including a unique encryption key for each file. Further, every update to every file is encrypted using its own encryption key. Before theyre stored, the keys to the encrypted content are stored in a physically separate location from the content. Every step of this encryption uses Advanced Encryption Standard (AES) with 256-bit keys and is Federal Information Processing Standard (FIPS) 140-2 compliant. The encrypted content is distributed across a number of containers throughout the datacenter, and each container has unique credentials. These credentials are stored in a separate physical location from either the content or the content keys.

For additional information about FIPS 140-2 compliance, see FIPS 140-2 Compliance, and for AES with 256 bit see, Keep Your Data Secure with the New Advanced Encryption Standard.

File-level encryption at rest takes advantage of blob storage to provide for virtually unlimited storage growth and to enable unprecedented protection. All customer content in OneDrive for Business and SharePoint Online will be migrated to blob storage. Heres how that data is secured:

All content is encrypted, potentially with multiple keys, and distributed across the datacenter. Each file to be stored is broken into one or more chunks, depending its size. Then, each chunk is encrypted using its own unique key. Updates are handled similarly: the set of changes, or deltas, submitted by a user is broken into chunks, and each is encrypted with its own key.

All of these chunksfiles, pieces of files, and update deltasare stored as blobs in our blob store. They also are randomly distributed across multiple blob containers.

The map used to re-assemble the file from its components is stored in the Content Database.

Each blob container has its own unique credentials per access type (read, write, enumerate, and delete). Each set of credentials is held in the secure Key Store and is regularly refreshed.

In other words, there are three different types of stores involved in per-file encryption at rest, each with a distinct function:

Content is stored as encrypted blobs in the blob store. The key to each chunk of content is encrypted and stored separately in the content database. The content itself holds no clue as to how it can be decrypted.

The Content Database is a SQL Server database. It holds the map required to locate and reassemble all of the content blobs held in the blob store as well as the keys needed to decrypt those blobs.

Each of these three storage componentsthe blob store, the Content Database, and the Key Storeis physically separate. The information held in any one of the components is unusable on its own. This provides an unprecedented level of security. Without access to all three it is impossible to retrieve the keys to the chunks, decrypt the keys to make them usable, associate the keys with their corresponding chunks, decrypt any chunk, or reconstruct a document from its constituent chunks.

Follow this link:
Data Encryption in OneDrive for Business and SharePoint Online

ESET reveals what to watch out for before you buy encryption – SecurityBrief NZ

Encryption services are becoming a focus for organisations and decision makers as new data protection laws such as the GDPR come in but when faced with a market flooded by various products and little time to make the right choice, it can be difficult to find the one that best fits individual needs, ESET says.

The company has assembled a list of the five questions organisations should ask before buying encryption.

1.Which laptops present the biggest risk; on-site or off-site?

This might seem like a pointless question with an obvious answer; systems are more liable to loss or theft when away from the office, but making this distinction and keeping it in mind is the right place to start and when you have settled on a solution, be sure to test its effectiveness at managing problem scenarios for your remote users.

2.Does the system offer full remote control of off-site endpoint encryption that fits your IT department?

All major Endpoint Encryption products offer the means to manage remote systems, but look carefully at the requirements. Most need either an open incoming connection to a demilitarized zone (DMZ) on your Server, or a VPN connection. All involve a higher level of IT skills and additional costs and may require the user to initiate the connection to function; not much use with a rogue employee or stolen laptop. A well-designed product will give you the remote management necessary without creating additional security problems, requiring specialist knowledge or adding expense to the project.

Why is this important?

Being able to quickly vary security policy, encryption keys, features and operation of endpoint encryption remotely, means that your default policy can be strong and tight. Exceptions can be made only when and where they are needed, and reverted just as easily. If you can't do this you'll be forced to leave 'a key under the doormat' - just in case, tearing holes in your policy before deployment is complete.

3.Does the solution allow you to remotely lock or wipe keys from laptops?

The answer might be crucial if a company computer with full-disk encryption gets stolen while in sleep mode or with operating system booted up, not to mention those systems with the pre-boot password affixed on a label or tucked in the laptop bag. If a remote lock or wipe function is not available, then the system is either unprotected or secured only by the OS password, with the encryption being bypassed in either case.

Similarly, it is important to know whether the solution has been designed to accommodate the typical use-cases that would otherwise unravel a well-designed security policy.

4.Does the solution secure removable media without having to whitelist each item?

With an array of writeable devices that people use for their everyday work, it is almost impossible for the admins to whitelist each and every one of them and decide if they can be read from or written to.

It is much easier to set a file-level policy-- distinguishing between files that need encryption and those that don't-- and keep these protected every time they move from workstation or corporate network to any portable device.

In other words, if you connect your own USB stick, it won't force you to encrypt your private data, however anything coming from the company system will be encrypted without the keys being held on your device. A simple idea, but one which makes any device safe, without the need for whitelisting.

5.Is the solution easy to deploy?

If the setup of the solution takes hours or even days and needs additional tools for its operation, it might cause new headaches for company admins and create new security risks. Aim for an easy-to-deploy solution that doesn't require advanced IT expertise, preserving your finances as well as human resources. If the user-experience mirrors that easy deployment, then IT staff won't be further taxed by user-lockouts, lost data and other frustrations.

Closing remarks: The security was there a long time ago; what will make or break your deployment is flexibility and ease of use.

All validated, commercial encryption products have been more than strong enough for many years, yet a significant proportion of the recorded data breaches involving lost or stolen laptops and USB drives happened to organizations who had bought and deployed encryption products. Reading the case notes for these incidents reveals being able to fit the solution your environment and working practices and making encryption easy for everyday users as the real challenges.

See original here:
ESET reveals what to watch out for before you buy encryption - SecurityBrief NZ

Facebook won’t change React.js license despite Apache developer pain – The Register

Facebook's decided to stick with its preferred version of the BSD license despite the Apache Foundation sin-binning it for any future projects.

The Foundation barred use of Facebook's BSD-plus-Patents license in July, placing it in the Category X it reserves for disallowed licenses.

Facebook's BSD+Patents license earned that black mark because the Foundation felt it includes a specification of a PATENTS file that passes along risk to downstream consumers of our software imbalanced in favor of the licensor, not the licensee, thereby violating our Apache legal policy of being a universal donor.

Apache's decision became a problem because Facebook's React UI-building JavaScript library has been widely adopted by projects that also code licensed in ways the Foundation approves. Developers are therefore faced with disentangling React if they want to stay on the right side of the T&Cs.

Developers who didn't fancy that work therefore kicked off a GitHub thread calling for Facebook to change React's licence.

But despite describing the situation developers face as painful, Facebook's engineering director Adam Wolff has explained that The Social Network won't be changing anything.

Wolff's asserts that Facebook adores open source and likes to give as good as it gets, but says As our business has become successful, we've become a larger target for meritless patent litigation that sucks up time and money.

Facebook could have walked away from open source, he says, but instead decided to add a clear patent grant when we release software under the 3-clause BSD license, creating what has come to be known as the BSD + Patents license. The patent grant says that if you're going to use the software we've released under it, you lose the patent license from us if you sue us for patent infringement.

Wolff says Facebook believes that if this license were widely adopted, it could actually reduce meritless litigation for all adopters, and we want to work with others to explore this possibility.

As Facebook likes its license and feels it is commercially necessary to keep The Social Network in the world of open source but out of legal strife, Wolff says the company won't change it. Discussions with Apache about a compromise have come up empty.

We recognize that we may lose some React community members because of this decision, Wolff writes. We are sorry for that, but we need to balance our desire to participate in open source with our desire to protect ourselves from costly litigation. We think changing our approach would inhibit our ability to continue releasing meaningful open source software and increase the amount of time and money we have to spend fighting meritless lawsuits.

Sponsored: The Joy and Pain of Buying IT - Have Your Say

Read the original:
Facebook won't change React.js license despite Apache developer pain - The Register

Introduction to Cryptocurrency – Crypto Currency Facts

Cryptocurrency facts takes a simplified look at digital currency like bitcoin to help everyone understand what it is, how it works, and its implications. On this site, we cover everything you need to know about:

As of 2017, cryptocurrency has been used as a decentralized alternative to traditional fiat currencies (which are usually backed by somecentral government)such asthe US dollar (USD).

For theaverage person using cryptocurrency is as easy as:

What is a cryptocurrency address?: A public address is a unique string of charactersused to receive cryptocurrency. Each public address has a matching private address that can be used to prove ownership of thepublic address. WithBitcoin the addressis called a Bitcoin address. Think of it like a unique email address that people can send currency to as opposed to emails.

The first decentralized digital cryptocurrency can be traced back to Bit Gold, which was worked on by Nick Szabo between 1998 and 2005. Bit gold is considered the first precursor to bitcoin. In 2008,Satoshi Nakamoto (an anonymousperson and/or group) released a paper detailing what would become Bitcoin.

Bitcoin became the first decentralized digital coin when it was created in 2008. Itthen went public in2009. As of 2015, Bitcoinis the most commonly known cryptocurrency. Given thepopularity of Bitcoin as well asits history, the term altcoin is sometimes used to describe alternative cryptocurrenciesto bitcoin.

As of January 2015, there wereover 500different types of cryptocurrencies or altcoins for trade in online markets. However,only 10 of them had market capitalizations over $10 million.As of 2017 thetotal market capitalization of all cryptocurrencies reached an all-time high passing $60 billion!

In other words, cryptocurrency isnt just a fad, it is likely a growing market that (despite its pros and cons) is likely here for the long haul.

On this site, we explore every aspect of cryptocurrency. Simply choose a page from the menu,visitour what is cryptocurrency page for a more detailed explanation of cryptocurrency, or jump right in to the how cryptocurrency works section to start learning about transactions, mining, and public ledgers.

Originally posted here:
Introduction to Cryptocurrency - Crypto Currency Facts

Media A-Listers Back eSports Betting Firm As It Dives Into Cryptocurrencies – Deadline

Talk about trendy: An investment group that includes Mark Cuban, Ashton Kutcher, Elisabeth Murdoch, and Shari Redstone is feeling lucky about a business that aims to become a power in betting on eSports with cryptocurrencies.

The A-listers have invested in Unikrn, an eSports betting company. And it says today that beginning September 22 it hopes to persuade consumers to spend $100 million on its own currency, UnikoinGold, which is based on the Ethereum software platform.

The company, founded in 2014, says that its currency will be accessible around the world and allow users to earn prizes, hardware, and exclusive features.

The value of the tokens will be determined by the utility and turnover of the token itself from within the Unikrn platform as well as the value of the token on the free market, the company adds.

Betting on e-Sports is only legal in a few countries including the U.K., Ireland, and Australia.

Unikrn CEORahul Sood says that the company is in the middle of testing our eSports skill betting platform that will allow [U.S.] customers to use UnikoinGold for betting.Much of this has been in development for the last two years, we will start launching new applications 90 days after our token sale is complete.

Buyers should beware: Rules and structures governing eSports competitions are still evolving.

And cryptocurrency markets are even more turbulent although Bitcoins are making news this week with valuations hitting new highs after appreciating 750% over the last year.

The SEC recently found that coin offerings are covered by securities laws, although its not clear whod be covered since valuations are determined by a decentralized market. The IRS is looking into how tax laws apply to cryptocurrencies. And there are lingering concerns that criminals use the computer-based currencies to launder money, sell illegal drugs, or commit fraud.

Sood says the decentralized market for UnikoinGold tokens would give users more autonomy and opportunity to participate on our platform, with flexibility to trade in a more open marketplace. Our improved eSports betting system is creating a new world of opportunity for cryptocurrency wagering that is legal, safe and fun. Competitive gaming thrives on innovation, risk and reward, and we believe that UnikoinGold is the breakthrough that the eSports world has been waiting for.

See more here:
Media A-Listers Back eSports Betting Firm As It Dives Into Cryptocurrencies - Deadline

Meet Charlie Lee, Inventor Of Litecoin Cryptocurrency – International Business Times

If future generations buy their coffee with cryptocurrency, they will have globetrotting programmer Charlie Lee to thank for it.

Lee was born in the Ivory Coast, West Africa, immigrated to the United States at 13 and now lives in the Bay Area. He read a Wired article about the Silk Road black market back in 2011, when Lee was still a Google software engineer who dabbled in gold trading on the side. Intrigued, heimmediately reached out to Bitcoin Core developer Mike Hearn and bought a bitcoin from Hearn. Soon Lee was mining bitcoin and buying computer equipment off the darknet.

That was when bitcoin was $30, Lee told International Business Times. I fell in love with bitcoin, seeing it as really good money, better than gold. It wasnt long until Lee started playing around with the idea of his own blockchain cryptocurrency, inspired by bitcoin. His code copied bitcoins features and mechanisms in almost every way. The biggest difference was to make the tokens work faster than bitcoin and be more cost-effective.

I really didnt expect it to become what it is today, he said. Just for fun... I wanted to create silver to bitcoins gold. Lee left Google and worked at the worlds most popular bitcoin exchange, Coinbase, before dedicating himself completely to his brainchild litecoin in the summer of 2015.

Silver is cheaper and lighter, so the idea is people will use it more as a currency, were as gold would not be used for daily spending, Lee said. Over the years, you see how bitcoin transactions are costing more in fees, and litecoin transactions are still relatively cheap. In fact, thats kind of the whole idea behind the comparison.

Because bitcoin operates on a decentralized network run by contributors around the world, transactions are slow and users pay a portion of their tokens to use the networks computing power. The price goes up when demand rises, just like it does with Ethereums gas system. Litecoin transactions cost a pittance compared to its bulkier predecessors.

Today, most people use litecoin for trading and currency exchanges. Most users still cant pay for services with it or use it for business transactions like Ripples XRP. Even so, some websites like Yours.org are switching from bitcoin to litecoin payments because its easier. If you have a site ready for bitcoin, its just like one or two code changes and you can start running it on litecoin, Lee said. Overstock.com recently started accepting litecoin, and where that megastore site goes other retailers often follow.

There are now reportedly 50 cryptocurrency ATMs around the world that use litecoin, which reached a peak price of $56 in July. Bitcoin, being the most secure and most decentralized, will handle the most expensive transactions, he said. Litecoin will be used for more everyday transactions, like buying food and coffee.

Lee just hired two full-time employees, meaning the whole litecoin operation is run bythree people, including Lee himself. Most unpaid contributors are hobbyists participating through open source communities. Were not really based anywhere, were all working remotely. Communicating online. The developers are all over the world, Lee said. The whole purpose of the [Litecoin] foundation is so we can raise money to hire more developers.

Given how limited their resources are, the litecoin team has already accomplished some incredible feats. Litecoin is now one of the worlds top 10 cryptocurrencies, with a market cap well over $2 billion. The technology behind it is much more cutting edge and flexible than bitcoin itself, thanks toscaling solutions called SegWit and Lightning.

Bitcoin is like a highway, where developers argue over how to add extra lanes as traffic piles up. Meanwhile, nimble little litecoin is much closer to adding new metaphorical roads and ramps altogether, so people can hop on and off the highway whenever they need to.

The vision is that you can easily convert between the two [bitcoin and litecoin], via Lightning networks. So you can store most of your money in bitcoin and, if you ever need to spend it, you can easily convert to litecoin and spend it, Lee said. Bitcoins fees will still be high. So if you are spending five dollars, and the fee is five dollars, it wont be worth it.

Lee isnt trying to dethrone bitcoin. He just thinks it is better suited to high value transactions. The thing about a decentralized network is, it is by nature inefficient. Every node in the network needs to process every transaction and hold a copy of every transaction, he said. We need to split up the work between various different currencies.

All of this wouldnt be possible without the work of people like Elizabeth Stark, the CEO of Lightning Labs. Shes working to implement her blockchain solution for multiple currencies including both bitcoin and litecoin. Despite her no-nonsense approach, revamping a headless infrastructure is inherently tricky. While Lee jokes on Twitter about how the bitcoin community debates updates, Stark is already working with blockchain companies like Bitfury to test network capacities.

Its still hard to say when either currency will graduate from testing to full implementation with the Lightning Network, although litecoin has laid more groundwork so far. Litecoin has Segregated Witness [SegWit] activated, Stark told IBT. Itll be working on litecoin when we feel the software has reached a point where we feel comfortable with people using amounts of real currency. Which we will be soon.

What if, in order to send an email, you first had to download every email that anyone ever sent? That would take forever, right? Stark and Lee want to make it possible for blockchain networks to retain some of bitcoins security features without all of its bulk.

Lightning is like an added layer on top of everything, which changes the way the blockchain network itself works while simultaneously making it easier to build on that network. It enables instant clearing, Stark said. So you can instantly withdraw or deposit or send it to your friend or build apps.

She told IBT litecoin is better positioned to adapt to technological advancements than many other virtual tokens. Its implementing a lot of things that folks in bitcoin have wanted to do, but it takes them longer to get the community on board in a kind of consensus, Stark said. While litecoin can be iterative, put all these cool new technologies onto it without changing the direction in which its heading.

One of the coolest features the Lightning Network offers is the ability to transfer value between blockchain networks without needing an exchange or a trusted central party. Imagine handing a dollar to a cashier to buy coffee in Italy. As your hand moves, the bill magically shifts and becomes a euro. Its not a perfect metaphor, but it illustrates what cross-network compatibility can do. That is a new technology we havent seen yet, Stark said. In the future, Lee also wants to add more privacy features to litecoin.

Many experts believe cryptocurrency will continue to spread until it reaches widespread, global adoption for daily transactions. If that dream comes true within the next decade, litecoin will have paved the way.

Original post:
Meet Charlie Lee, Inventor Of Litecoin Cryptocurrency - International Business Times

2017 EFF Pioneer Award winners: Chelsea Manning, Mike Masnick and Annie Game – Boing Boing

The Electronic Frontier Foundation has announced the winners of the 2017 Pioneer Awards, "which recognize leaders who are extending freedom and innovation on the electronic frontier." They are whistleblower Chelsea Manning, Techdirt editor Mike Masnick and free expression defender Annie Game.

Congrats to all three! As a former winner myself, I count the Pioneer Award as one of the greatest honors ever bestowed on me, and I can't imagine three more deserving honorees.

There will be an awards ceremony on Sept 14 at Delancey Streets Town Hall Room in San Francisco, with a keynote from Full Frontal correspondent Ashley Nicole Black, $65 for EFF members and $75 for non-members.

Chelsea E. Manning is a network security expert, whistleblower, and former U.S. Army intelligence analyst whose disclosure of classified Iraq war documents exposed human rights abuses and corruption the government kept hidden from the public. While serving in Iraq, Chelsea worked to release hundreds of thousands of classified war and State Department files on the Internet, including a video depicting the shooting deaths of Iraqi civilians and two Reuters reporters by U.S. troops. Chelseas conscience-driven leaks exposed critical information about U.S. involvement in Iraq and Afghanistan and made it available online to journalists and citizens around the world, greatly contributing to public knowledge, understanding, and discussion of the governments actions. While serving seven years of an unprecedented 35-year sentence for leaking the documents, she became a prominent and vocal advocate for government transparency and transgender rights, both on Twitter and through her op-ed columns for The Guardian and The New York Times. She currently lives in the Washington, D.C. area, where she writes about technology, artificial intelligence, and human rights.

Mike Masnick is the founder and editor of the popular and respected Techdirt blog and an outspoken activist for digital rights, the First Amendment, and a free and open Internet. For 20 years Mike has explored the intersection of technology, policy, civil liberties, and economics, making Techdirt a must-read for its insightful and unvarnished analysis. He was a powerful voice in the fight against SOPA, and coined the term The Streisand Effect. Today Mike is in a fight for Techdirts survivalhe and the weblog are targets of a $15 million libel lawsuit for publishing articles disputing claims of a man who says he invented email. The case pits Mike and Techdirt against the self-proclaimed email inventor and his lawyer, who, bankrolled by Peter Thiel, brought down Gawker. Mike has vowed to stand up for a free and independent press and fight this attempt to silenceor drive out of businesshis blog for publishing First Amendment-protected opinions.

Annie Game is Executive Director of IFEX, a global network of over 115 journalism and civil liberties organizations that defends and promotes freedom of expression as a fundamental human right. IFEX exposes threats to online free expression, focuses on bringing to justice those who harm or kill journalists, and advocates for the rights of media workers, women and LGBT journalists, citizen journalists, and activists. For over 10 years Annie has led IFEXs efforts to free imprisoned journalists, defend online activists targeted by repressive regimes, provide tools for organizing successful campaigns advocating for free expression, and expose legislation aimed at quelling free speech. Under Annies leadership, IFEX has begun pairing more traditional free expression organizations with their more digitized counterparts with a focus on building organizational security capacities. Annie has been activist throughout her career in the NGO sector and is also a published writer and broadcaster of satire and humor.

Whistleblower Chelsea Manning, Techdirt Founder Mike Masnick, and Free Expression Defender Annie Game Named Electronic Frontier Foundation Pioneer Award Winners [EFF]

The whole magic community mourns the passing of Eugene Burger, at age 78. One of the most influential magicians of the 20th century, as well as an exceptional human being, he will be sorely missed by a vast network of loving friends, students and fans all the world over. The impact of Eugenes contribution to []

Back in 2011, The New York Review of Books inducted Daniel Pinkwaters classic Lizard Music into its canon with a handsome little hardcover edition; today they follow that up with a stylish, jazzy paperback, priced to move at $10.

My Walkaway book-tour is basically over, but Im taking a little victory lap tonight at my local library, the Buena Vista Branch of the Burbank Public Library. Hope to see you there!

The Pry.Me Bottle Opener holds tens of thousands of times its own weight, and you can pick one up now from the Boing Boing Store.This remarkable keychain is considerably smaller than any of your keys, but dont let that fool you: it can easily open any bottle, and could even tow a trailer full of []

Guaranteeing your privacy online goes way beyond checking the Do Not Track option in your browsers settings. To ensure that your internet activity is totally hidden from Internet Service Providers, advertisers, and other prying eyes, take a look at Windscribes VPN protection. It usually costs $7.50 per month, but you can get a 3-year subscription []

This project management bundle will help you get organized and learn how to lead a team to success. You can pay what you want for these five courses when you pick them up from the Boing Boing Store.To help you become an invaluable asset for your company, this bundle includes a curated collection of professional []

Read the rest here:
2017 EFF Pioneer Award winners: Chelsea Manning, Mike Masnick and Annie Game - Boing Boing

‘It’s very much a 1984 world’: Oliver Stone on making the film Snowden – Bendigo Advertiser

4 Sep 2016, 12:15 a.m.

Director Oliver Stone found the stakes were high in making a movie about US whistleblower Edward Snowden.

The core of the film centres around a tense six days inside a Hong Kong hotel room. Photo: Jurgen Olczyk

Few filmmakers have been as controversial as Oliver Stone. Photo: Chris Pizzello/Invision/AP

Joseph Gordon-Levitt plays Edward Snowden and Shailene Woodley his girlfriend Lindsay Mills. Photo: Gray Pictures

"Ed may go down in history as one of those guys who actually made a difference to his time," says director Oliver Stone. Photo: Jurgen Olczyk

The film Snowden centres on a tense six days inside a Hong Kong hotel room with Edward Snowden, played by Joseph Gordon-Levitt (pictured). Photo: Jurgen Olczyk

Oliver Stone has made a career of mapping out pivotal moments in American culture to bring us politicallycharged films such asPlatoon, Born on the Fourth of July, Nixon, The People vs. Larry Flynt and JFK. But when the 70-year-old Oscar-winning director became interested in making a movie about Edward Snowden the man responsible for what has been described as the most far-reaching security breach in USintelligence history he realised the stakes were much higher.

"Ed may go down in history as one of those guys who actually made a difference to his time," Stone says solemnly, as we sit in a hotel in San Diego, California, overlooking costumed fans at an annual Comic Con event. As he glances out the window, he can't help wondering if his movie will garner attention here from this community of geeks and outsiders.

"This is a huge issue, what this film raises," he declares in his booming voice, "and this is the beginning of a new generation that won't even know what they are losing. Ironically, a lot of them are here today, in the streets of San Diego, and I think many of them still take things for granted about their privacy."

The film begins in 2013, when Edward Snowden, played by Joseph Gordon-Levitt, has quietly left his job as a contractor at the US National Security Agency and flown to Hong Kong to meet with two journalists from The Guardian newspaper and an award-winning filmmaker. The virtuoso programmer was a self-declared patriot and former soldier who had become angry and disillusioned after discovering a mountain of data assembled by tracking all kinds of digital communications from ordinary citizens.

During the meeting in Hong Kong, he handed over a vast tranche of top-secret files that revealed US government cyber-surveillance programs of epic proportions, instantly making him one of America's most wanted men and anicon of popular culture at the same time.

Oliver Stone, no stranger to controversy, initially flew to Russia to meet with Snowden's lawyer, Anatoly Kucherena, about making a fiction movie loosely inspired by Snowden's own story. But once he was introduced to the youthful-looking reluctant hero trapped outside the US after his passport was revoked and granted temporary asylum in Russia his focus shifted.

"It was only after we had met three times, each time over a different trip, that we mutually decided to go ahead with the realistic version of his life story," Stone says.

"There was all this controversy, with some people saying he should be hanged and others wanting to give him a Nobel Prize, so we were looking for a story that reflected the reality of his present situation and decided the core of the 10-year journey in the film could be found in the tense six days inside that Hong Kong hotel room where they were all waiting to get the material out and had no idea who could come bursting into the room at any moment to arrest them all."

After a screening of the film at Comic Con, attended by Stone and his actors, a bespectacled Snowden made a surprise appearance via satellite and confessed he was still conflicted about the decision to collaborate on a movie. "I don't think anybody looks forward to having a movie made about themselves, particularly someone who is a privacy advocate," the 33-year-old exile said.

Despite those hesitations, Snowden agreed to make a compelling cameo appearance in the film. He said: "It made me nervous but I think there's a kind of magic to it and I think it works."

Gordon-Levitt recently won acclaim portraying real-life French high-wire artist Philippe Petit in the drama The Walk, but the 35-year-old actor known for films such as Inception and The Dark Knight Rises says this challenge was nothing like his previous roles.

"I've never been on the phone with a producer before a film to say, 'Can you guarantee me I'm going to be 100 per cent safe?' " Gordon-Levitt says. "But I went to Russia and it turned out I was quite safe and I got to spend about four hours with Ed and his girlfriend Lindsay Mills [who recently relocated to Russia to be with Snowden] and really get a sense of who he was besides all of his politics, so that was important to me."

Stone says Snowden's girlfriend, a yoga and pole-dancing instructor, was the key to understanding the mystery man at the centre of the controversy in human terms, and he was excited when he received a letter from Shailene Woodley offering herself for the role. Already a star with her own franchise (Divergent), Woodley is also fiercely political, having spent a large part of the year on the campaign trail with presidential candidate Bernie Sanders, and has an earnest doe-eyed look about her when asked about her motivation.

"It wasn't just wanting a job, although I did ask him for an audition," the 24-year-old says, "but I wrote to thank him for having the courage to make a film like this because as a young woman knowing about privacy issues outside the fact my privacy is already limited by the Hollywood side I felt like growing up we always heard about 'big brother' watching and when Ed released what he released, it verified and validated all of those suspicions and fears and sent a chill up my spine."

Few filmmakers have been as controversial as Stone, whose mantra seems to be "to hell with the consequences". Even at Comic Con, he couldn't help ruffle feathers by publicly describing the app sensation Pokemon Go as "totalitarian" and suggesting "they are data mining every single person in this room for information, so it's a whole new level of invasion".

Stone grew up in a deeply conservative familyin New York with a father who served as a colonel on General Dwight D. Eisenhower's staff in Paris, post-World War II. After attending Yale University with classmates such as George W. Bush and John Kerry, the current US Secretary of State, he dropped out to teach English in Saigon, Vietnam, and later enlisted in the army. After two tours of duty in Vietnam, Stone returned home in 1968 with two Purple Heartmedals, a Bronze Star for Valor and a transformed outlook on the world as an anti-establishment rebel full of an almost radicalised hatred of the establishment that still bubbles to the surface when he's talking politics.

"It's very much a 1984 world," Stone says, in a nod to George Orwell's tyrannical tale. "We are all being told how to think and being manipulated and while I think it's important the Democratic party gets to appoint the next Supreme Court justice, on the other hand you have Mrs Clinton, who is one of the greatest warmongers of our generation, and that makes me very concerned about her attitude and aggression towards foreign countries."

In the hands of an expert filmmaker like Stone, the story of Edward Snowden has depth and emotion. Not surprisingly, the director has a unique relationship with many of his movie alter-egos after his own experiences in life.

"My growth of consciousness has sometimes cost me dearly but this is my journey and it's important stuff," he says. "The stories I told about the Vietnam War or JFK or Nixon, those were revelations to me at the time and this is what I am going through now with the Snowden revelations.

"In the end, I can really only go by my own sense of the truth. If it's the truth, I want to put it in my movies."

Snowden is out in cinemas on September 22.

Edward Snowden isn't the first person whose conscience madehim risk everything. Here are some other memorable films about whistleblowers.

On the waterfront (1954) The classic film about a worker (Marlon Brando) who agrees to risk everything to give evidence about union corruption on the docks of Hoboken, New Jersey, after he unwittingly helps facilitate a union-authorised murder.

All the President's Men (1976) Robert Redford and Dustin Hoffman star as Washington Post reporters Bob Woodward and Carl Bernstein, who expose corruption in the Richard Nixon administration after receiving tips from a man who identifieshimself only as Deep Throat.

Silkwood (1983) The film, based on a true story, stars Meryl Streep as Karen Silkwood, an employee at a plutonium plant and a union activist. After being contaminated by radiation, she exposesthe plant's cover-up before dying under mysterious circumstances.

The Insider (1999) Russell Crowe plays a former research biologist for a cigarette company who agrees to do a 60 Minutes interview to reveal that tobacco companies were not only aware that cigarettes were addictive and harmful, but worked to increase their addictiveness.

Erin Brockovich (2000) Julia Roberts won an Oscar portraying the working-class single mother who, as a law clerk, stumbled upon evidence that a big gas and electric company was knowingly poisoning people through contaminated water and helped to organise a major class-action lawsuit against them.

The Most Dangerous Man In America: Daniel Ellsberg and the Pentagon Papers (2009) A documentary about Daniel Ellsberg, a US military analyst working for the RAND Corporation in 1971 when he accessed and leaked thousands of top-secret documents that became known as the Pentagon Papers, infuriating the Nixon administration.

We Steal Secrets: The Story of WikiLeaks/The Fifth Estate (2013) The documentary looks at the rise to prominence of WikiLeaks founder Julian Assange and his war on secrecy while the movie, The Fifth Estate, is a fictional version of the story starring Benedict Cumberbatch as the famed hacker now living in exile.

The story 'It's very much a 1984 world': Oliver Stone on making the film Snowden first appeared on The Sydney Morning Herald.

Go here to see the original:
'It's very much a 1984 world': Oliver Stone on making the film Snowden - Bendigo Advertiser