Cryptocurrency Wallet Jaxx Announces Support for Cofound.it-Approved Tokens – CoinJournal (blog)

Blockchain projects listed on Cofound.it will see their tokens automatically approved for integration into Jaxx, a multi cryptocurrency and digital token wallet. A new partnership formed between the two companies is intended to support and promote the best and most innovative projects in the blockchain space by improving their tokens liquidity.

This will mean the crypto community has immediate access to hold, transmit, and swap some of the worlds best cryptocurrencies natively and securely within their Jaxx wallet, said Jan Isakovic, CEO and co-founder of Cofound.it.

Singapore-based Cofound.it provides a blockchain-powered platform that connects startups with investors and experts for funding and advice. It aims to create a full startup ecosystem, using the power of the blockchain to fuel interactions, Isakovic told Reuters.

We believe that the key advantage of token crowdsales are not funds collected, but the fact that the funds come from engaged supporters. They act as evangelists and early adopters, helping fuel very fast initial growth when compared to traditional startups.

The platform intends to become the place where the best startups in the blockchain industry go to expand their potential and find investment. It would also be a venue where experts with proven track records offer their expertise, and where investors go to find the best projects to support.

Cofound.it distributes its own cryptocurrency called CFI, which holders can use to pay for services on the platform such as early access to listed token crowdsales, and project submission. CFI are also used to pay partners and experts who participate and contribute on the platform.

Besides Cofound.it tokens, others that will launch directly into the Jaxx wallet include Santiment, Maecenas, Musiconomi, Digital Assets Power Play, and X8currency, the companies said.

Anthony Di Iorio, founder and CEO of Jaxx and Decentral, said the partnership with Cofound.it gives a stamp of approval to the currencies and projects hosted and trading within our ecosystem.

We are confident that through our partnership with Cofound.it, Jaxx will help to bring greater stabilization and further growth to the entire blockchain community via our universal command center for universal technologies which is needed to mature the nascent crypto market, he added.

Jaxx is currently undergoing a significant platform expansion with more tokens integrations to come in the near future. Jaxx currently supports Bitcoin, Ethereum, DASH, and Litecoin, among other cryptocurrencies.

The wallet also enables crypto-to-crypto exchange with in-wallet conversion via Shapeshift.

See the original post here:
Cryptocurrency Wallet Jaxx Announces Support for Cofound.it-Approved Tokens - CoinJournal (blog)

Bitbay to launch cryptocurrency trading platform in India – Economic Times

Mumbai: Poland based bitcoin exchange platform Bitbay is all set to open trading in India. The company which allows trading in multiple cryptocurrencies other than bitcoins is planning to expand its technology based workforce in the country as well.

"We will allow six more cryptocurrencies besides bitcoins for trading in India, we wish to associate and work closely with the government to remove all misconceptions around bitcoins and cryptocurrencies of the world," said Chafik Abdellaoui, chief information officer, Bitbay.

The company is planning to start demo operations on August 14 and initiate full fledged trading from August 24. They have a current workforce of 10 people here which they plan to increase to around 50 by end of the year.

At a time when bitcoins are gaining notoreity in this world as a mode of payment for ransomware, Bitbay plans to introduce full KYC norms for traders on its platform along with security applications like two factor authentication to ensure genuine users trade on its platform.

In Europe the platform records 50 million worth transactions on its platform and records around 10,000 to 1 lakh trades per day depending on price fluctuations and allows trading in 17 different cryptocurrencies. The company is also closley working with the Government of Poland to propel wider adoption of cryptocurrency in the country.

See the original post:
Bitbay to launch cryptocurrency trading platform in India - Economic Times

Wikileaks reveals CIA’s ‘Dumbo’ USB stick that mutes microphones … – The Sun


The Sun
Wikileaks reveals CIA's 'Dumbo' USB stick that mutes microphones ...
The Sun
US spies have designed software which switches off microphones and webcams in a room during a physical raid destroying evidence that they ever entered a ...
News in brief: Wikileaks' Dumbo flies; off-script chatbots; Google down-votes duff appsNaked Security
Wikileaks reveals CIA tools used to hijack webcams and microphonesThe INQUIRER
Dark Matter - WikiLeaks - Vault 7: ProjectsWikiLeaks - Vault 7: Projects

all 11 news articles »

Continued here:
Wikileaks reveals CIA's 'Dumbo' USB stick that mutes microphones ... - The Sun

Chelsea Manning Tried To Pick A Fight With Ben ShapiroThings Did Not Turn Out Well – Townhall

Recently released Chelsea Manning, who worked in Army intelligence, tried to pick a fight with the Daily Wires Ben Shapiro and it did not turn out well. In 2010, Manning leaked hundreds of thousands of classified documents about the Iraq and Afghanistan Wars, along with 250,000 cables from the State Department, to Wikileaks. That same year, Manning was sentenced to thirty-five years in prison for leaking classified material. President Barack Obama commuted the sentence after Manning served seven years (via WaPo):

Manning, 29, was an intelligence analyst for the Army at the time of her arrest in 2010. The trove of material she provided to anti-secrecy website WikiLeaks documents known as the Iraq and Afghanistan War Logs included video of a U.S. Apache helicopter opening fire on a group of suspected insurgents in Baghdad. Among the dead were two journalists who worked for the Reuters news agency.

She also leaked documents related to detainees at the military prison at Guantanamo Bay, Cuba, and about 250,000 State Department cables.

Manning tweeted imagine a world without prisons, to which Shapiro responded by saying weve all seen Mad Max. The deathblow was delivered shortly thereafter. Independent Journal Reviews Benny Johnson wrote about the exchange.

Ouch.

Editor's Note: Manning was mistakenly referred to as an Army officer. That wasn't the case. Apologies for the error, folks.

Go here to see the original:
Chelsea Manning Tried To Pick A Fight With Ben ShapiroThings Did Not Turn Out Well - Townhall

Chelsea Manning’s attorney blasts ACLU’s decision to defend Milo Yiannopoulos – Washington Examiner

An ACLU attorney who represented Chelsea Manning is blasting the organization's decision to defend conservative provocateur Milo Yiannopoulous in a lawsuit against Washington D.C.'s public transit agency.

The American Civil Liberties Union on Wednesday announced they were suing the Washington Metro Area Transit Authority over its refusal to display ads promoting Milo Yiannopoulos' book.

"I don't believe in protecting principle for the sake of protecting principle in all cases," Chase Strangio said in a statement.

Strangio argues Yiannopoulos' behavior may not necessarily fall under the legal definition of incitement but his actions do "exacerbate harm" to the black and transgender communities.

"The ACLU has a long history of representing despicable people in the service of protecting valuable First Amendment principles and in some cases I support decisions that have been made and in other cases I do not. Here I do not," Strangio said.

The ACLU's lawsuit argues parts of WMATA's ad policies violate the First Amendment by discriminating against particular ads and advertisers deemed controversial by WMATA officials.

Metro's policies first came into place in 2015 after a set of anti-Muslim advertisements sparked controversy. Current guidelines ban ads "intended to influence members of the public regarding an issue on which there are varying opinions," ads that "support or oppose an industry position or industry goal without any direct commercial benefit to the advertiser," and ads "intended to influence public policy," among others.

"This case highlights the consequences of the government's attempt to suppress all controversial speech on public transit property," Arthur Spitzer, legal director of the ACLU-DC and lead counsel in the case, said in a statement Wednesday. "The First Amendment protects the speech of everyone from discriminatory government censorship, whether you agree with the message or not."

"The ACLU could not more strongly disagree with the values that Milo Yiannopoulos espouses, but we can't allow the government to pick and choose which viewpoints are acceptable," said Lee Rowland, senior staff attorney with the ACLU.

The suit asked the court to declare portions of the WMATA advertising guidelines unconstitutional because they violate free speech rights and are unconstitutionally vague. A motion has also been filed on behalf of Milo Worldwide LLC, seeking immediate financial restitution for the ongoing loss of revenue from book sales caused by what they deem the wrongful removal of advertisements for his book.

See the article here:
Chelsea Manning's attorney blasts ACLU's decision to defend Milo Yiannopoulos - Washington Examiner

Traitor And Genetic Male Bradley Manning To Appear On Cover Of Vogue – The Daily Caller

First Bradley Manning betrayed his country. Then he betrayed his own gender. By all means, lets celebrate his achievements, and enable his delusions about himself and the world he lives in.

Amber Athey reports:

Vogue recently photographed Chelsea Bradley Manning, who has been released from prison after being convicted of espionage and theft

Manning has now been photographed by famed photographer Annie Leibovitz for Vogue, a womens fashion magazine. In the headline for a story about Manning, Vogue says, Manning changed the course of history. Now shes hes focusing on herself himself.

Bask in the glory of it:

To which I can only reply:

Dont let anybody shame you out of telling the truth about this man. Hes not a woman, hes not a patriot, and hes not sane. Pretending otherwise doesnt help anybody, least of all him.

And saying so isnt hate. Its reality. Trying to coerce people into telling a lie is wrong, even if you think youre sparing somebodys feelings.

Plus, that color is all wrong for him. Good lord, Leibovitz, youre supposed to be a professional.

Read more from the original source:
Traitor And Genetic Male Bradley Manning To Appear On Cover Of Vogue - The Daily Caller

Transgenderism Doesn’t Excuse Treason – National Review

If Bradley Manning had stayed Bradley Manning, would he still be in prison? If Bradley Manning had stayed Bradley Manning, would he be basking in celebrity, enjoying fawning photo shoots? Given the magnitude of his crimes, I dare say that hed be in prison today if he still identified as a man. Then hed be nothing but what he actually is, a garden-variety traitor a faithless soldier who should count himself fortunate not to face capital punishment.

Its worth remembering what he did. He disclosed, in a gigantic document dump, more than a million pages of classified information, including information about American military operations, American diplomacy, and American allies. The Obama administration was forced to rush to safety foreign friends whom Manning had outed as helping Americans. He broke faith with every relevant provision of the Armys warrior ethos he abandoned his mission, he actively aided the enemy, and he acted with stunning disregard for the lives of his comrades. He did so because, acting on his own authority, he decided he wanted to stimulate worldwide discussion, debate, and reforms.

To be clear, this wasnt whistleblowing. He didnt identify a specific wrong and expose it responsibly while taking care to minimize the harm of disclosure. He just disclosed documents without regard for their contents. He didnt know if anyone would die because of his actions. He didnt know to what extent vital missions or programs would be compromised. He just did what he wanted to do. There was no honor in his action. None.

And now look at him. Hes the subject of a fawning Vogue profile and photo shoot:

In fact, hes an LGBT celebrity now, swarmed at public events and even featured at New Yorks Pride March, where he waved from a drop-top Nissan alongside Gavin Grimm. When Trump issued a series of tweets declaring a ban on transgender soldiers in the military, media outlets flocked to cover Mannings response. But one wonders, do the transgender soldiers actually serving look at Chelsea Manning as a poster child for trans service?

But no matter. For many leftists, Manning offers the irresistible combination radical criminal acts combined with revolutionary identity. Its Radical Chic all over again, this time through the lens of latest civil-rights fashion, transgender rights

The radical quarters of the Left have a long history of excusing and celebrating even the most vile of criminals so long as they have the right revolutionary politics. Disturbingly, that celebration leaks even into organizations that are billed as meanstream. Recall, it was just last month the Womens March tweeted its appreciation for convicted cop-killer and FBI most-wanted terrorist Assata Shakur:

Earlier this summer, New Yorks Puerto Rican Day Parade sought to honor convicted terrorist Oscar Lopez Rivera as a National Freedom Hero. Under pressure, he decided to forgo that honor, but he was featured in a float anyway and parts of the crowd gave him a heros welcome.

These kinds of celebrations are not just morally abhorrent; theyre deeply polarizing. They represent the idea that the rule of law even when the subject is murder or treason is contingent upon the politics and racial or gender identity of the lawbreaker. Americans on opposing sides of the ideological divide are given a signal that when it comes to advancing the radical cause, not even human life or national security can stand in the way. There are no lines that cant be crossed.

This is what radical identity politics does. It twists and distorts normal moral analysis. It declares that the ends justify the means, and then goes even farther to say, By any means necessary. This is an unacceptable ethic not just for a constitutional republic but for any form of civil society. Allegedly mainstream media outlets, politicians, or organizations that honor or respect the likes of Manning, Rivera, or Shakur cover themselves in shame.

READ MORE: NR Editorial: The Injustice of Communting Mannings Sentence Chelsea Manning Is Not a Whistleblower Chelsea Manning and the Problem with Pronouns

David French is a senior writer for National Review, a senior fellow at the National Review Institute, and an attorney.

Go here to see the original:
Transgenderism Doesn't Excuse Treason - National Review

Avoid getting lost in encryption with these easy steps – We Live Security (blog)

Encryption can be the answer to many data security issues faced by small and medium businesses.Not onlycan it protect sensitive information from unauthorized use and minimize the risks arising from data breaches, implementing this technology can also represent another step towards compliance with legislation, especially with respect to the General data protection regulation (GDPR).

But in cybersecurity, there isno silver bullet meaning that no single product or service can handle all the potential threats out there. This applies to encryption also, as even this technology despite its many advantages still has limitations that you need to take into consideration. So before opting for a specific product, be sure you know the one that best fits your needs.

According to a recent study on data breaches carried out by the Ponemon Institute, human error is second only to malicious actors when it comes to the most commonly cited root cause of data leaks. However, these can be avoided by deploying a solution that is easy to use.

There will always be the need for some encryption to be carried out by the user, based on policy and training. If these actions require expert knowledge and the product are not user-friendly, employees might try to find the easy way out and companyrules could be broken. With a simple user-friendly solution, this can be avoided.

A recent IDC survey on ESETs behalf has also shown that ease of management and ability to recover a lost access key are among the most important criteria when a business is in the process of choosing an encryption solution.

To avoid cases where employees are unable to decrypt their data because they have forgotten their keys, search for solutions that use a system of shared encryption keys, managed by on-site system administrators.

This is similar to the use of actual keys, something we all understand before starting elementary school. On top of that, it also makes sharing encrypted data within a predefined group quick, easy and in many cases, transparent for the user.

The solution you choose should be scalable and flexible, so that you can easily add advanced features if necessary, enabling you to vary enforced policies and keys remotely helping you to keep a strong default configuration

Select a product that doesnt require reinstallation for upgrades or renewals. In addition, dont forget that if an encryption solution is available as a perpetual license, including annual maintenance and support, or as a subscription license, it can enable you to manage costsand improve your financial flexibility.

Select a solution that employs industry-standard encryption algorithms that you can trust, and a sophisticated key-sharing system for secure data exchange among all users.

Check if the encryption solution you are considering meets the rigorous FIPS-140-2 standard in the US and is validated by the National Institute of Standards and Technology (NIST). Also verify if it has been certified by key players on the market (i.e. OPSWAT) and has performed well in independent tests.

Set your data protection strategy carefully and choose the encryption solution that helps you fulfill it in a way that suits you best. To make the right decision, dont shy away from any questions you might have about usability and features of the product, even if they sound obvious to you. You might be surprised how many encryption solutions on the market dont cover the basics.

If you want to know which questions you should ask and what answers to seek, we will help you in our next blogpost, so stay tuned and read more on WeLiveSecurity.com.

Author Ondrej Kubovi, ESET

Continued here:
Avoid getting lost in encryption with these easy steps - We Live Security (blog)

China uses a quantum satellite to transmit potentially unhackable data – CNBC

China has demonstrated a world first by sending data over long distances using satellites which is potentially unhackable, laying the basis for next generation encryption based on so-called "quantum cryptography.

Last August, China launched a quantum satellite into space, a move which was called a "notable advance" by the Pentagon.

Using this satellite, Chinese researchers at the Quantum Experiments at Space Scale (QUESS) project, were able to transmit secret messages from space to Earth at a further distance than ever before.

The technology is called quantum key distribution (QKD). Typical encryption relies on traditional mathematics and while for now it is more or less adequate and safe from hacking, the development of quantum computing threatens that. Quantum computing refers to a new era of faster and more powerful computers, and the theory goes that they would be able to break current levels of encryption.

That's why China is looking to use quantum cryptography for encryption. QKD works by using photons the particles which transmit light to transfer data.

"QKD allows two distant users, who do not share a long secret key initially, to produce a common, random string of secret bits, called a secret key," the researchers explained in a paper published in the journal Nature on Wednesday.

"Using the one-time pad encryption this key is proven to be secure to encrypt (and decrypt) a message, which can then be transmitted over a standard communication channel."

State news agency Xinhua called the encryption "unbreakable" and that's mainly because of the way data is carried via the photon. A photon cannot be perfectly copied and any attempt to measure it will disturb it. This means that a person trying to intercept the data will leave a trace.

"Any eavesdropper on the quantum channel attempting to gain information of the key will inevitably introduce disturbance to the system, and can be detected by the communicating users," the researchers said.

The implications could be huge for cybersecurity, making businesses safer, but also making it more difficult for governments to hack into communication.

China successfully sent the data over a distance of 1,200 kilometers from space to Earth, which is up to 20 orders of magnitudes more efficient than that expected using an optical fiber of the same length, the researchers claimed. It's also further than the current limits of a few hundred kilometers.

"That, for instance, can meet the demand of making an absolute safe phone call or transmitting a large amount of bank data," Pan Jianwei, lead scientist of QUESS, told Xinhua.

The Chinese government has made the development of the space sector a key priority. For example, it has laid out plans to get to Mars by 2020 and become a major space power by 2030.

And China has global ambitions for its QKD. It sees its satellite system interacting with ground-based QKD networks to create a global secure network.

"We can thus envision a space-ground integrated quantum network, enabling quantum cryptography most likely the first commercial application of quantum information useful at a global scale," the researchers said.

Original post:
China uses a quantum satellite to transmit potentially unhackable data - CNBC