Bitbay Exchange Enters Indian Cryptocurrency Markets – Bitcoin News (press release)

Bitbay has announced that it will enter the Indian cryptocurrency markets, with the companys Indian exchange expected to be operational before the end of August. Bitbay is Polands largest exchange by trade volume, and is set to become the first international bitcoin exchange operating within Indias cryptocurrency markets.

Also Read:Panel Recommends Indian Government Take Immediate Steps to Stop Bitcoin Use

Bitbay has announced that it will be launching its exchange platform for the Indian cryptocurrency markets. Bitbay will be the first cryptocurrency exchange to offer altcoin trading providing trading pairs for ethereum litecoin, lisk, monero, ash, and gamecredits.

From August 14 Bitbay will offer demo trading that does not involve using real money, before launching full operations on August 24th. In a recent interview with Money Control, Bitbay India Head, Rohit Dahda has stated we are taking all necessary steps to adhere prescribed rules for Bitbay India. In fact, we are offering demo trading for users before using real currency to bring a level of confidence in common people.

At a launch function for the newexchange, Bitbay CEO, Sylwestor Suszek, stated that Bitbay India has been conceptualized to provide innovative services, support and solution for cryptocurrency users in terms of fast and secure transactions. Our team consists of specialists and Bitcoin enthusiasts who are active in crypto community, attend industry conference events and support charity causes via meaningful fund donations to relevant Indian societies. An official press release states that the prime objective of Bitbay India is to remove all misconceptions related to cryptocurrency, drive more people towards digital currencies, attract potential investors from market and offer all round platform to trade as well as exchange multiple cryptocurrencies at Bitbay.

According to Coinmarketcap, Bitbay hosts the largest BTC/PLN market by volume, with Bitbays 24-hour volume sitting around $8.35 million at the time of this articles composition equating to roughly 0.26% of total global bitcoin trade. We are the number one in Eastern-Central Europe with more than 200,000 users. We are number 10 in the world and are in operations since 2014, Suszek told Moneycontrol.

Despite the nations current climate of regulatory uncertainty regarding Indias cryptocurrency markets, Bitbay plans to expand its presence in India over the coming months, including the introduction of up to 17 different altcoins. Very soon, we will be bringing more features on the platform to cater to requirements of common people on a day-to-day basis. We are following a high-security model and following two-fold authentication models for safe transaction, states Rohit Dahda.

What do you think about Bitbays entry into the Indian cryptocurrency markets? Share your thoughts in the comments section below!

Image courtesy of Shutterstock and Bitbay

Need to calculate your bitcoin holdings? Check ourtoolssection.

Go here to read the rest:
Bitbay Exchange Enters Indian Cryptocurrency Markets - Bitcoin News (press release)

Bitcoin boom: Cryptocurrency marks new record above $4K, boosted by Japan and safe-haven buying – Yahoo Finance

The digital currency bitcoin vaulted to a new record high above $4000 on Saturday, boosted by strong Japanese demand on its way to multiplying its value fourfold this year.

Bitcoin hit an all-time high of$4,225.40 early Sunday before slightly paring those gains to trade near $4,000, according toCoinDesk.

The digital currency has now quadrupled in 2017, and is up about 40 percent in August alone. Bitcoin's market value is now around $64 billion, up about $10 billion in the last week.

Bitcoin trade in Japanese yen accounted for nearly 46 percent of global trade volume, up from about a third a day ago, according to CryptoCompare. US-dollar bitcoin trade accounted for about 25 percent, according to CryptoCompare. Bitcoin trade in Chinese yuan and South Korean won accounted for about 12 percent each.

The surge picked up speed in the last week, mirroring gold's climb amid a global selloff in stocks and bonds . Rising worries about North Korea's nuclear threat have sent investors flocking to perceived safe-havens and alternative assets.

"Bitcoin is benefitting from geopolitical tensions - trading in Japan and Korea has increased significantly over the last few months," Brian Kelly, a CNBC contributor and head of BKCM, which runs an digital asset strategy, said in an email. He also attributed price gains to investors buying back bitcoin after the Aug. 1 split and greater attention from the Russian government.

Analysts have also noted increased investor interest, especially from institutional investors, after bitcoin successfully survived an Aug. 1 split into bitcoin and bitcoin cash.

This week, Fidelity launched a feature allowing customers to also view their Coinbase bitcoin holdings. The currency also got a boost from Goldman Sachs, which in a report released this week said it is harder for institutional investors to ignore cryptocurrencies like bitcoin.

That said, bitcoin's future is still uncertain. The digital currency could potentially split again in November, when the second phase of an upgrade proposal called Segregated Witness is implemented.

Chris Burniske, author of the upcoming book, "Cryptoassets: The Innovative Investor's Guide to Bitcoin and Beyond," also noted a sharp pullback in price would not be surprising, given bitcoin's rapid surge.

He noted on Twitter that upticks in the bitcoin price and Google searches have historically led to price corrections.

Bitcoin's offshoot, bitcoin cash, traded little changed near $323, according to CoinMarketCap.

Another digital currency, ethereum, traded nearly 5 percent higher near $315.

More From CNBC

Originally posted here:
Bitcoin boom: Cryptocurrency marks new record above $4K, boosted by Japan and safe-haven buying - Yahoo Finance

What Would Happen if Cryptocurrency Became More Popular Than Cash? – Futurism

In BriefIt's not outlandish to think that our current financial systemwill soon be replaced by cryptocurrency, and the shift will bringabout some big changes to the global economy. The Flippening

For a time, Bitcoin seemed unassailable in its dominance of the cryptocurrency market,being the first digital currency to really take root and establish itself in the mainstream. Since then, a host of worthy competitors have emerged, and theres a real possibility that the balance of power could flip.

Many who have been regularly followingdevelopments in the cryptocurrency market refer to the tipping point where one digital currency supersedes another as the flippening We almost saw this occur in May 2017, when Ethereums market cap approached Bitcoins amid a surge in popularity.

When individuals have significant amounts of money invested in one cryptocurrency over another, its no surprise that tensions run high when they go head to head. However, these squabbles over which coin is best might be distracting us froma more pressing issue.

Some observers would argue that the true flippeningisnt a case of competition between two different forms of cryptocurrency at all. Thesea of change yet to come could have more far reaching consequences, if and when digital currency as a whole becomes more popular than conventional fiat currency.

There would be some major advantages to an all-cryptocurrency future: its value cant be manipulated as easy as fiat currency, and it lends itself to the concept of universal basic income.In fact, several different programs, such as uCoin and Cicada, are already using cryptocurrencyto distribute UBI.

In a future where our transactions with shops and services are likely to be handled by automated systems, cryptocurrency removes many of the intermediaries that would take their own cut. There are many benefits for the individual, but the flippening stands to pose some major challenges for the global economy in its current form.

Should cryptocurrency manage to jump ahead of fiat money in terms of usage, cash wont be able to close the gap. Thats the trick to the flippening once changeover takes place, the losing party loses value and cant do anything about it.

If everyone begins using cryptocurrency, infrastructure would need to bedevelopedwith that in mind. It might not take too long for cash to become incompatible. At this point,it remains to be seen whether established financial institutions could pivot to that new status quo in time.

At the highest level, governments will be hit hard, as they will no longer exercisethe same level of control over the countrys currency. The idea of printing more money has been raised time and time again in response to financial turmoil, but that option disappears once currency has to be mined.

The flip from fiat money to cryptocurrency is a very real prospect, and it could well change the face of how our society spends and saves.

More here:
What Would Happen if Cryptocurrency Became More Popular Than Cash? - Futurism

Field Guide: How Exactly Do You Get Rich Off The Hot New Cryptocurrency? – Gizmodo Australia

Image: Getty

With the meteoric rise in popularity of Ethereum, cryptocurrencies and blockchains are back in the news again. Graphics card prices have soared with the promise that those who have the computers and know-how to do some serious mining can take home huge sums in a Bitcoin-like gold rush to snatch up as much virtual currency as possible. But how easy is it to make your fortune in cryptocurrency? And is it worth your while getting started?

Weve all had tech related regrets. Betamax, backing the Zune against the iPod, letting that precious vinyl collection go. No one likes living with regrets, so dont add what you drive to that list. Stop thinking about it and just book a Mustang test drive already.

For the uninitiated, mining for currencies like Bitcoin and Ether means devoting a huge amount of computer processing power to doing accounting sums for the platforms behind them, helping to verify the accuracy of the public blockchain ledgers.

You're essentially getting rewarded for keeping the books for these platforms, which we've explained in more detail here, and the rise of cryptocurrencies like Bitcoin and others has led to a flood of amateur enthusiasts jumping into the mining business the idea of having your computer whirring away making you free money sounds almost too good to be true.

Image: Peter Miller/Flickr

And in reality, it almost is you can get rich from cryptocurrencies, but you need to put in plenty of work, and have luck on your side. You're more likely to get a windfall due to market pressures than the quality of your mining rig, which is why it's only worth a shot for the most committed and the most adventurous.

Mining for cryptocoin requires some free software tools and a dedicated rig. Turn the clock back several years and you could get away with a powerful home PC and make a few bucks. These days you can waste a weekend and a month's wages on building a machine with four graphics cards purring away in a row and still not make a profit.

GPUs are now established as the mining processors of choice in most situations graphics cards are even built for and marketed towards miners now basically because they're better at doing lots of laborious, repetitive tasks, whereas CPUs are better suited to switching between many tasks quickly.

Image: Screenshot

The trouble is, the serious players have got whole farms of these computers, and unless you've got a warehouse and some life savings to spare, you're going to be lagging a long way behind. You're up against huge foreign operations running off cheap electricity and hardware bought wholesale.

Even if you do get yourself a rig set up and find a currency with a bit of a profit margin, you're still putting yourself at the whims of the cryptocurrency markets mining can start or stop becoming profitably depending on a currency's current value.

There are several profit calculators on the web that will tell you how much computing power and electricity you need to make a certain amount of cash, so you can see exactly how much (or more likely, how little) you could make. Take Bitcoin, for example, which is now just about impossible to mine profitably for average users at home you'd need thousands of GPUs running before you'd get close to getting more back in Bitcoin than you'd be paying for electricity.

Market fluctuations in cryptocurrencies. Image: Screenshot

You can fork out thousands of dollars on specialised kit, if you want to, but even then you're only going to be raking in a handful of dollars a day with Bitcoin. That of course can go up or down as the currency value fluctuates, and what's profitable one day might not be the next if your chosen cryptocurrency dips in value, or gets some bad media coverage that's where the slice of luck we mentioned earlier comes in.

Other options, like Feathercoin and Ether, have a better profit potential than Bitcoin right now, with the caveats we've already mentioned: If you're serious about your mining then you need to keep a very close eye on the market trends, because the situation can change on a weekly or even daily basis. A single Litecoin, another cryptocurrency, has swung from costing you between $US10 ($13) and $US55 ($72) this year alone.

For instance, a huge $US64m Ether heist carried out last year was severe enough to cause a fork in the Ethereum platform it runs on top of, and a halving in price of Ether itself if you've got a powerful, expensive, cryptocurrency mining operation going on in your basement then that's a serious hit on your profits through factors completely out of your control. Sure, a swing the other way can make you relatively rich, but it's a risk, and the upward trend won't necessarily continue.

Image: The Ethereum Project

Many modern-day miners join a mining pool, combining resources with other users and getting a share of the profits, but the same risks remain. Fork out a few thousand on a mining rig, take the time to study the market trends, go through the process of setting up the programs, join up with a mining pool, and yes you can if the prices stay buoyant and you've picked your cryptocurrency wisely make a few thousand dollars a year. Whether or not it's worth the risk and investment is up to you.

And if your investment isn't already precarious enough, remember the scene is constantly changing: In the near future Ethereum is set to switch from its existing Proof of Work (PoW) system for extending the blockchain to a new Proof of State (PoS) system which is easier to scale and less energy intensive.

Without going too far into the technical details, it essentially makes the mining process more like earning interest on money you've already got: Racks of graphics cards won't be able to generate wealth as they did in the past, which is bad news for miners looking for a profit even if it's good news for your electricity bill. Instead, earning money will rely on staking (investing) rather than mining.

Image: Asus

In other words, if you're already halfway through building your Ethereum mining machine you might want to pick a new cryptocurrency... at least until the ground rules change on that one too. (Remember what we said about the constant state of flux?) And that's really the only way to squeeze any profit out of cryptocurrency mining operations keep moving as fast as the market does, and switch up the currencies you target as conditions change.

As soon as one cryptocurrency becomes profitable to mine, as we've seen with Bitcoin and Ethereum, everyone wants a piece of the action and making money gradually gets harder. It's then time to get in early on another currency. In short, if you want to get rich (or at least make a profit), you need to pick and keep picking the right cryptocurrencies, have a serious amount of graphics processing power in hand, hope that your chosen currencies stay secure and keep increasing in value, and put in a lot of time and effort.

It's not impossible, but we can think of easier ways to make a buck. If you're determined to jump in and get involved in cryptocurrency mining, if only for the educational and geek appeal rather than to make any money, your best bet is to immerse yourself in one of the many mining forums out there, which will give you the inside track on the latest news and market trends.

Please log in or register to gain access to this feature.

Following promises of "fire and fury" from US president Donald Trump if it continues its belligerence, North Korea released a statement on Wednesday threatening to launch an "enveloping strike" at the island of Guam, a US territory in the Pacific. Here's why Pyongyang thinks Guam is a worthy target.

Google's always-listening smart home speaker is finally in Australia. But do you need one?

Follow this link:
Field Guide: How Exactly Do You Get Rich Off The Hot New Cryptocurrency? - Gizmodo Australia

The best thing about Chelsea Manning’s shoot in Vogue is the lack … – The Sydney Morning Herald

There is a single thing worth noticing about the photo shoot of Chelsea Manning, this era's second most infamous transgender woman, in the September issue of Vogue. She is not glamorous.

Manning's cropped strawberry blonde hair is windswept and wet, and other than what appears to be a bit of mascara and perhaps some lip balm, there is little evidence of makeup. The styling, by Phyllis Posnick, is all about looking natural and relaxed - or as much as one can while being attended to by a village of fashion editors and assistants.

Play Video Don't Play

Play Video Don't Play

Previous slide Next slide

Convicted intelligence leaker Chelsea Manning gives her first TV interview since leaving prison, thanking Obama for granting her clemency.

Play Video Don't Play

The champion sprinter declared that, definitely and definitively, there was no way he would ever return to sprinting.

Play Video Don't Play

After many years of litigation, Surfrider Foundation wins a court ruling against Vinod Khosla's ability to close access to Martins Beach in California.

Play Video Don't Play

'Unite the Right' march organiser, Jason Kessler, ran for his life after an angry crowd stormed a news conference in Charlottesville, Virginia.

Play Video Don't Play

The death toll is expected to rise as torrential flooding in the country's southern plains submerges about 34,000 homes.

Play Video Don't Play

Extradition papers for brothers Michael Ibrahim and Fadi Ibrahim, accused of being part of an international drug trafficking operation, could begin being processed in Dubai. Vision courtesy: Channel 7's Sunrise

Play Video Don't Play

As US authorities begin to investigate the deadly violence stemming from a white nationalist rally in Virginia, many are attacking the Presidents' comments for being too tame.

Play Video Don't Play

Three people died and several more were injured in a violent rally in the city of Charlottesville, Virginia. Warning: Distressing content.

Convicted intelligence leaker Chelsea Manning gives her first TV interview since leaving prison, thanking Obama for granting her clemency.

The backdrop is a nearly empty, rocky beach - with foamy waves in the distance - on a fairly overcast day. An empty lifeguard's chair sits off to the side. There is nothing particularly sophisticated or chic about the setting or the styling. This is not one of those white-sand beaches dotted with elegant cabanas and oiled-up bar boys standing at the ready.

Instead, this is Everyman's beach - a place for day trips, not summering.

This is Manning's fashion coming out in the pages of a magazine that transforms fashion into popular culture, politics into iconography, controversy into high gloss. However one might view Manning - as a whistleblower or a traitor - the message of this photo is accessibility, normalcy, calm.

This is a far cry from the haughty, hyper-feminine Hollywood unveiling of Caitlyn Jenner on the cover of Vanity Fair in 2015. Jenner's long chestnut hair was done up in flowing waves. Inside, there were more pictures featuring perfect makeup, a glittering gold evening gown, retro ivory lingerie, contoured cleavage and legs stretched long like Marlene Dietrich.

Get the latest news and updates emailed straight to your inbox.

Everything about Jenner's photographs, from the cover to the inside pages, declared, loudly and emphatically: I am the visual epitome of a woman, from the top of my perfect blow-out to my stiletto heels.

Manning is not so insistent that her femininity, her womanliness, is consistent with such narrow standards. Perhaps it's because she is younger than Jenner by almost 40 years - a millennial rather than a baby boomer. Perhaps it's because the culture has shifted in the past two years. (And with a single presidential tweet, continues to shift.)

Perhaps it's simply because Manning and Jenner are two very different people, and blessedly, that is reflected in how they are photographed, even though both were shot by Annie Leibovitz.

In Vogue, Manning wears a red Norma Kamali one-piece swimsuit. With its sweetheart neckline and wide straps, it has a retro aesthetic. And had Manning been styled differently, with smoky eye makeup and tousled hair, it would have been the perfect costume for a pin-up. Instead, the suit, with its tummy concealing ruching along the sides, is more reassuring than sexy. As swimwear goes, it's not especially revealing. It's conservative. It's purpose isn't to flaunt the body so much as it is to flatter it.

The accompanying story by Nathan Heller is filled with detailed descriptions of the various ensembles Manning wears as Heller accompanies her to a literary party and engages her in a conversation on the banks of the Hudson River. The list of designer wear is long and impressive: Altuzarra, Marc Jacobs, the Row, Vetements.

Manning notes that she has a lot of fashion news to catch up on, thanks to her detention at Fort Leavenworth military prison. She has been a fast study and is particularly enamored of collections that blur gender lines, that do not aspire to create perfection but that revel in the off-beat,the off-kilter.

When she posted an image of herself on Instagram after leaving prison, her bright red lips stood out against her cropped hair and simple black dress. The picture was controlled but inviting. She looked like she was headed to the office, not declaring her personal freedom. Although sometimes, freedom can simply mean the sweet ability to just be boring.

Manning isn't on the cover of Vogue. Jennifer Lawrence stars in four different versions of the September issue, which celebrates the magazines 125th anniversary. And she gets the full Vogue fantasy gloss, dressed up as everything from a screen siren to (sort of) a 19th-century debutante.

Manning isn't even a head-turner. She doesn't startle you by how pretty she looks. She is so pale against the washed out sky and the sand. The swimsuit pops into focus before she does. Manning is looking directly at the camera and smiling. She doesn't look relaxed. (Perhaps only a professional celebrity could fully exhale in the bullseye of Leibovitz's lens.) But Manning definitely looks pleased.

The Washington Post

Read more:
The best thing about Chelsea Manning's shoot in Vogue is the lack ... - The Sydney Morning Herald

Chelsea Manning Poses in a Red Bathing Suit for Vogue: ‘Guess This Is What Freedom Looks Like’ – PEOPLE.com

Chelsea Manningis feeling free.

The 29-year-old transgender soldier, who spent seven years in prison forleaking700,000 classified documentsto WikiLeaks, shared a photo of herself walking along the beach in a red one-piece bathing suit. The photo comes from feature on Manning in the September issue ofVogue.

Guess this is what freedom looks like, she captioned the image on Instagram.

The shot of Manning, who smiles as she runs her hands through her hair, was taken by veteran photographerAnnie Leibovitz.

RELATED VIDEO:Chelsea Manning Released from Prison After Seven Years for Leaking Government Secrets

The accompanying story forVoguefollows Manning as she nervously prepares to attend anafter-party for the Lambda Literary Awards, an event that honors LGBTQ writers. As soon as she entered, she was greeted by admirers.

Its a completely different scene than where she grew up in Oklahoma.

I knew that I was different, Manning tellsVogue. I gravitated more toward playing house, but the teachers were always pushing me toward playing the more competitive games with the boys.

She recalls, I spent so much time wondering, Whats wrong with me? Why cant I fit in?

Manning, born Bradley Manning, served a portion of her original 35-year sentence for leaking classified documents.Shortly before finishing his second term as president, Barack Obama shortened the sentence for Manning.

I appreciate the wonderful support that I have received from so many people across the world over these past years, Manning said in an exclusivestatement to ABC News at the time. As I rebuild my life, I remind myself not to relive the past. The past will always affect me and I will keep that in mind while remembering that how it played out is only my starting point, not my final destination.

Manning confirmed that she identified as a woman just one day after her 2013 sentencing. She began her gender transition while in prison, although she had made appearances as a woman since as early as 2010.

See the original post:
Chelsea Manning Poses in a Red Bathing Suit for Vogue: 'Guess This Is What Freedom Looks Like' - PEOPLE.com

Pulitzer-Winner James Risen Joins The Intercept And First Look Media – HuffPost

Two-time Pulitzer Prize-winning journalist James Risen, who spent seven years fighting off government efforts to force him to reveal a confidential source, will continue to advocate for the First Amendment as director of the First Look Press Freedom Defense Fund, HuffPost has learned.

Risen will also join The Intercept, the First Look Media news organization launched in 2014 by journalists Glenn Greenwald, Jeremy Scahill and Laura Poitras and backed by billionaire eBay founder and philanthropist Pierre Omidyar.

At the Intercept, Risen will serve as senior national security correspondent, writing a column based on his own reporting, and help steer the sites investigative work.

I am incredibly excited by this amazing and unique opportunity to combine my journalism with efforts to defend press freedom, Risen said in a statement. I am honored to help lead the fund as both America and the world face unprecedented threats to freedom of the press, while also writing and reporting and helping [Intercept editor-in-chief] Betsy Reed and her incredible team continue to turn The Intercept into one of the most important investigative reporting outlets in the nation.

Risen, 62, was among the most prominent journalists to leave the New York Times last month in the papers latest round of buyouts. Times executive editor Dean Baquet described Risen at the time as one of the giants of national security and investigative reporting.

In nearly two decades at the Times, Risen delved deeply into national security, intelligence, and surveillance matters. He was part of a Pulitzer Prize-winning team delving into the aftermath of the Sept. 11, 2001, terrorist attacks and won a second Pulitzer with colleague Eric Lichtblau for their2005 investigation into the National Security Agencys secret domestic spying program.

Risen also battled attempts by both the George W. Bush and Barack Obama administrations to compel him to reveal a confidential source for a botched CIA plot described in his 2006 book, State of War: The Secret History of the CIA and the Bush Administration. Risen, whose legal fight finally ended in 2015, has expressed concern that the Obama administration laid the groundwork for the targeting of journalists under President Donald Trump.

There is no journalist better equipped to cover the national security scandals and abuses of the Trump era than Jim Risen, Reed said in a statement.

Were honored and thrilled to have the countrys leading national security journalist bring his vast experience and vision to our team at this critical time, she added.

The Intercept was co-founded by journalists at the forefront of reporting on the disclosures from former NSA contractor Edward Snowden, and the site has quickly distinguished itself for aggressive coverage of national security issues.

But the site alsocame under firein Junefollowing accusations that its reporters failed to protect contractor Reality Leigh Winner, the alleged source of top secret NSA documentrevealing Russian hacking efforts ahead of the 2016 presidential election.

Following an internal review,Reed said that at several points in the editorial process, our practices fell short of the standards to which we hold ourselves for minimizing the risks of source exposure when handling anonymously provided materials.

The company announced last month thatFirst Looks Press Freedom Defense Fund would help provide support for Winners legal defense, a role it intends to play for journalists and whistleblowers in future cases.

First Look Media president Michael Bloom cited Risens first-hand experience in a statement on the companys newly created defense fund role.

Jim is not only a respected journalist who was prepared to sacrifice his own freedom to protect a source, he said, but a very real example of how the press can challenge those in power who misuse laws to fulfill a political agenda.

The Morning Email

Wake up to the day's most important news.

Here is the original post:
Pulitzer-Winner James Risen Joins The Intercept And First Look Media - HuffPost

End-to-end encryption isn’t enough security for ‘real people’ – San Francisco Chronicle

(The Conversation is an independent and nonprofit source of news, analysis and commentary from academic experts.)

Megan Squire, Elon University

(THE CONVERSATION) Government officials continue to seek technology companies help fighting terrorism and crime. But the most commonly proposed solution would severely limit regular peoples ability to communicate securely online. And it ignores the fact that governments have other ways to keep an electronic eye on targets of investigations.

In June, government intelligence officials from the Five Eyes Alliance nations held a meeting in Ottawa, Canada, to talk about how to convince tech companies to thwart the encryption of terrorist messaging. In July, Australian Prime Minister Malcolm Turnbull called on technology companies to voluntarily ban all systems that totally encrypt messages in transit from sender to recipient, an approach known as end-to-end encryption. British Home Secretary Amber Rudd made global headlines with her July 31 newspaper opinion piece arguing that real people dont need end-to-end encryption.

These claims completely ignore the one billion real people who already use secure messaging apps like Signal and WhatsApp. And it leaves no room for people who may decide they want that security in the future. Yet some technology companies look like they might be considering removing end-to-end encryption and others installed backdoors for government access years ago. Its been two decades since the Clipper chip was in the news, but now a revival of the government-business-consumer crypto-wars of the 1990s threatens.

One thing is very clear to computer scientists like me: We real people should work on improving security where we are most vulnerable on our own devices.

For the moment at least, we do have good, easy-to-use solutions for secure communication between computers, including end-to-end encryption of our messages. End-to-end encryption means that a message is encrypted by the sender, and decrypted by the recipient, and no third party is able to decrypt the message.

End-to-end is important, but security experts have warned for years that the most vulnerable place for your data is not during transit from place to place, but rather when its stored or displayed at one end or the other on a screen, on a disk, in memory or on some device in the cloud.

As the WikiLeaks release of CIA hacking tools highlighted, if someone can gain control of a device, they can read the messages without needing to decrypt them. And compromising endpoints both smartphones and personal computers is getting easier all the time.

Why are we most vulnerable at the endpoint? Because we dont like to be inconvenienced, and because adding more protection makes our devices harder to use, the same way putting multiple locks on a door makes it harder to get in, for both the homeowner and the burglar. Inventing new ways to protect our digital endpoints without reducing their usefulness is very challenging, but some new technologies just over the horizon might help.

Suppose a criminal organization or bad government, EvilRegime, wants to spy on you and everyone you communicate with. To protect yourself, youve installed an end-to-end encryption tool, such as Signal, for messaging. This makes eavesdropping even with a courts permission that much more difficult for EvilRegime.

But what if EvilRegime tricks you into installing spyware on your device? For example, they could swap out a legitimate upgrade of your favorite game, ClashBirds, with a compromised version. Or, EvilRegime could use a malware network investigative technique as a backdoor into your machine. With control of your endpoint, EvilRegime can read your messages as you type them, even before they are encrypted.

To guard against either type of EvilRegimes trickery, we need to improve our endpoint security game in a few key ways, making sure that:

- EvilRegime isnt masquerading as the company that makes ClashBirds when we install our software.

- No one has tampered with our ClashBirds app before or after installation.

- The app doesnt have any backdoors or security holes that could be exploited by EvilRegime after we install it.

In addition, it would be ideal if users could control their apps security themselves, rather than having to rely on app store security provided by yet another vulnerable corporation.

Computer security experts are excited about the idea that blockchain technology might be able to help us secure our own endpoints. Blockchain, the technology that underpins Bitcoin and other cryptocurrencies, creates a verifiable, unchangeable public record of information.

What this means for endpoint security is that computer scientists might be able to create blockchain-based tools to help us verify the origin of our apps. We could also use blockchains to confirm our data havent been tampered with, and to ensure our privacy. And as long as the source code for these programs is also free for us to inspect as Signal is today the security community will be able to verify that there are no secret backdoors.

As with any new technology, there is an enormous amount of hype and misinformation around blockchain and what it can do. It will take time to sift through all these ideas and develop secure tools that are easy to use. In the meantime, we all need to continue to use end-to-end encryption apps whenever possible. We should also stay vigilant about password hygiene and about what apps we install on our machines. Finally, we must demand that real people always have access to the best security mechanisms available, so we can decide for ourselves how and when to resist surveillance.

This article was originally published on The Conversation. Read the original article here: http://theconversation.com/end-to-end-encryption-isnt-enough-security-for-real-people-82054.

Continued here:
End-to-end encryption isn't enough security for 'real people' - San Francisco Chronicle

Will IBM India’s impenetrable encryption tech stop Anonymous hacker? – Born2Invest

IBM India claims the IBM Z (z14) is so secured that it is hacker-proof.

The days of Anonymous hacker could be numbered as IBM India releases an encryption technology which claims to be hacker-proof. Is this really the solution to stop all the hacking and stealing of online data?

Recently, the news of leaked Game of Thrones unaired episodes made the headlines. A group hackers have demanded ransom in form of Bitcoins from HBO in exchange for not leaking more episodes, per Business Insider. Included in the sensitive information the hackers got allegedly hold of are emails of executives, scripts and unaired episodes. The group revealed they get as much as $15 million a year for blackmailing.

However, a team of tech specialists in India is planning to put a stop to this blackmailing scheme. According to The Hindu, the IBM Z (z14) can encrypt customer data from banks, customers, and healthcare industry. It can process 12 billion encrypted transactions per day.

IBM Indias accomplishment will save a lot of companies money in the future. (Source)

One of the reasons why hacking has been successful in the past is because data have not been encrypted. Since 2013, only four percent of the estimated nine billion hacked data were encrypted. IBM executive Gururaj S. Rao naturally takes pride in their accomplishment. Other than IBM, no other vendor has been able to do it, he added.

SEE ALSO Atari announces the release of a new console called the Ataribox

Once the z14 mainframe detected intrusion or an attack, it will launch a defensive stance and shut itself down automatically, as reported by India Times. While this feat is a big step in the right direction, it did not surprise the tech community.

In an interview published by The Hindu Business Line, IBM India Private Limited Chairman Vanitha Narayanan claims, In India, we have created a pool of innovations that can be applied both globally and in the domestic market.

The rogue community of online hackers is becoming more brazen as their tech know-how becomes at-par or even ahead of the technologies of some big companies. The only way to stop them is to get ahead. And as always, prevention is better than cure. It is better for data to be encrypted than to be stolen.

Go here to read the rest:
Will IBM India's impenetrable encryption tech stop Anonymous hacker? - Born2Invest

Despite end to end encryption, apps like WhatsApp, Messenger are still vulnerable to hacking: Study – Firstpost

Do you know that despite the end-to-end encryption provided by popular messaging platforms like Facebook Messenger, WhatsApp, and Viber, your sensitive information is vulnerable to hacking?

A research report has highlighted the importance of what is called an 'authentication ceremony' to help mitigate the risk.

Researchers from Brigham Young University (BYU) at Utah in the US found that most users of popular messaging apps like Facebook Messenger, WhatsApp, and Viber are leaving themselves exposed to fraud or hacking because they are unaware of important security options like an 'authentication ceremony'.

The 'authentication ceremony' is a security practice to ensure the members involved in a communication are authentic. It is done by identifying the message recipient before sending out any sensitive or confidential information.

But because most users are unaware of the 'ceremony' and its importance, "it is possible that a malicious third party or man-in-the-middle attacker can eavesdrop on their conversations", said Elham Vaziripour, Computer Science student at BYU who led the study.

The researchers conducted a two-phase experiment in which they prompted participants to share a credit card number with another participant. Participants were warned about potential threats and encouraged to make sure their messages were confidential.

Only 14 percent of users in the first phase managed to successfully authenticate their recipient. Others opted for ad-hoc security measures like asking their partners for details about a shared experience.

In the second phase, after researchers emphasised the importance of 'authentication ceremonies', 79 percent of users were able to successfully authenticate the other party. However, the participants averaged 11 minutes to authenticate their partners.

"Once we told people about the authentication ceremonies, most people could do it. But it was not simple, people were frustrated and it took them too long," noted Daniel Zappala, Professor, Computer Science, BYU.

Most people don't invest the time and effort to understand and use these security measures because they don't experience significant security problems. But there's always a risk in online communications.

The researchers are now working to develop a mechanism that makes the 'authentication ceremony' quick and automatic.

"If we can perform the authentication ceremony behind the scenes for users automatically or effortlessly, we can address these problems without necessitating user education," said Vaziripour.

More here:
Despite end to end encryption, apps like WhatsApp, Messenger are still vulnerable to hacking: Study - Firstpost