IBM India Helps Create Breakthrough Encryption Technology That’s Completely Hacker Proof – Indiatimes.com

An increasing danger of our connected, digital world is the rise of hackers, and their potential to inflict serious damage with real-world consequences.

REUTERS

Nothing is precious for us than our data, and protecting that data at all costs is going to be paramount going forward. Good thing IBM has already perfected a full-proof system to foil the attempts of 21st century hackers!

IBM just released its latest Z series mainframe last month, the z14. What's a mainframe I hear you ask? Well, it's a very powerful computer which is used to handle huge volumes of data transactions -- for e.g. in a bank scenario, or for a flight booking website, or an ecommerce platform, among other things.

This is what the new IBM Z14 mainframe looks like

IBM's mainframes are widely used in the tech industry for delivery of critical services, but what the company has done for the first time ever with the newly released z14 mainframe is to allowdata encryption at every level of the system, and then storing everything inside encrypted containers. Multiple levels of encryption to hoodwink even the most diligent hackers out there.

And on top of that, if the system detects an attack like malware or other intrusion, the z14 mainframe has been designed to shut itself down automatically, as per an IBM statement on Techcrunch. Even if hackers could somehow get through all of these defenses, which is highly unlikely, the multiple levels of encryption would still render the data useless.

According to a report published in The Hindu, IBM's India engineering team had a crucial role in the successful development of the z14 mainframe's "pervasive encryption" technology.

The report quoted Gururaj S Rao, IBM Fellow & VP of System Integration, IBM zSystems as suggesting that a key z14 mainframe component designed by the India team was the encryption unit, which gives the z14 mainframe its unparalleled level of security. More than 100 engineers from IBM's India business unit contributed towards the development of the z14 mainframe.

Hopefully, the adoption and deployment of z14's pervasive encryption technology will cause a major dent in the exploits of hackers in the coming months and years. And we'll know that India had an important role in the scheme of things!

Life Plunge

WomenReality

History In Orbit

Lifestylogy

StyleBistro

Kiwi Report

Read more here:
IBM India Helps Create Breakthrough Encryption Technology That's Completely Hacker Proof - Indiatimes.com

Pervasive Encryption Simplifies Mainframe Security – Security Intelligence (blog)

On July 17, IBM unveiled its z14 mainframe server, which combines the traditional mainframe hardware with new capabilities in areas such as cloud, cognitive, analytics, application management, blockchain, machine learning and more. Most importantly, z14 includes enhanced security features namely, pervasive encryption to help clients stay one step ahead of cyberthreats.

Access protection inside the mainframe is based on the storage security keys mechanism, which is typical of the hardware. These keys ensure that access to data through the hardware and can be locked or unlocked by every software interface within the mainframe. This makes the hardware security-rich by design. In other words, the access protection hardware feature already works with a software interface in an easy and intuitive way.

Figure 1: The new IBM z14 (Source: IBM)

Register for the Aug. 8 webinar: Your Mainframe Environment in a Treasure Trove

Of course, access protection is not the only security measure we need to consider. We must also focus on encryption, especially when security regulations come into play. In the past, mainframe data encryption was based on on-chip cryptography and cryptocards, which limited de facto software interactions with the hardware.

With z14, for the first time in the 50-year history of mainframe technology, encryption is pervasive. This feature adds software-based security intelligence to the mainframes robust encryption mechanism, allowing security solutions to leverage hardware-based cryptography like never before.

Figure 2: The new IBM z14 pervasive encryption feature (Source: IBM)

Pervasive encryption enables customers to encrypt data at the database, data set or disk level. If they so choose, they can even encrypt 100 percent of their data. The most crucial benefit of pervasive encryption, however, is that it does not require customers to change or adjust applications. Each app will have an internal encryption-decryption mechanism, allowing clients to apply cryptography without altering the app itself.

This feature should alleviate many pain points associated with the EUs upcoming General Data Protection Regulation (GDPR), which governs how companies around the world handle personal data belonging to EU residents. Pervasive encryption can simplify security professionals responsibility to protect such information and help them keep up with the evolving regulations surrounding data privacy.

To learn more, register for our upcoming webinar, Your Mainframe Environment in a Treasure Trove: Is Your Sensitive Data Protected? and view our on-demand webinar, Protection Begins With Data at the Center: Encrypt It All With z Systems Pervasive Encryption. You can also read our introductory redbook or view a demo of pervasive encryption from the IBM Client Center in Montpellier, France.

Thanks to Giuseppe Ranieri, Francesco Bertagnolli, Michael Jordan and Nick Sardino for their help and contributions to this article.

Register for the Aug. 8 webinar: Your Mainframe Environment in a Treasure Trove

View original post here:
Pervasive Encryption Simplifies Mainframe Security - Security Intelligence (blog)

UK’s flip-flops on encryption don’t help anyone – CNET

In the battle over encrypting private communications versus giving the government backdoor access to better thwart terrorism, it's hard to tell where the UK government stands.

"Encryption plays a fundamental role in protecting us all online."

"We need to make sure that our intelligence services have the ability to get into situations like encrypted WhatsApp."

"To be very clear Government supports strong encryption and has no intention of banning end-to-end encryption."

"There is a problem in terms of the growth of end-to-end encryption."

These statements sound contradictory, but they have one thing in common: They can all be attributed to UK Home Secretary Amber Rudd.

Rudd has said all of these things and more about encryption in various speeches, interviewsover the past few months and aself-penned articlesearlier this week.

It's not just you. From reading these statements, even in context, they're pretty confusing.

The comments add more muddle to the debate over encryption, which has become a bugbear of the British government in the wake of multiple terror attacks in the UK over the past year. While encryption guards our privacy, it also prevents authorities from reading messages between terrorists. Prime Minister Theresa May has called multiple times on tech companies to "do more" to tackle the terror threat. Rudd, ahead of attending theGlobal Internet Forum to Counter Terrorismon Tuesday in San Francisco wrote an editorial in the Telegraph saying that the UK isn't looking to ban encryption but does want some kind of change.

The back and forth from Rudd is counterproductive because she's seemingly seeking a middle ground that doesn't exist. By parsing her statements, Rudd appears to suggest a version of encryption that is almost, but not absolutely, unbreakable. But end-to-end encryption means that not even the companies that create and enforce security measures can decrypt your messages, so the idea of an emergency access point seems far-fetched.

"Amber Rudd must be absolutely clear on what co-operation she expects from internet companies," said Jim Killock, executive director of UK digital rights campaign Open Rights Group. "She is causing immense confusion because at the moment she sounds like she is asking for the impossible."

It's not like tech companies aren't willing to help. Facebook, Twitter and Google have shown willingnessto work with governmentsto tackle terrorism.

Home Secretary Amber Rudd speaka at the Global Internet Forum to Counter Terrorism this week.

But they aren't bending on the issue of putting in backdoors for government access. As tech companies and security experts have repeatedly pointed out: If the companies themselves have a way of accessing these communications, so potentially do those with malicious intent.

Breakable encryption could also, as numerous experts including Facebook Chief Operating Officer Sheryl Sandberg point out, chase terrorists onto other platforms that aren't as willing to cooperate with governments.

"If people move off those encrypted services to go to encrypted services in countries that won't share the metadata, the government actually has less information, not more," Sandberg said in aninterview broadcast by the BBC last week.

In fact, it's already happening. On Wednesday, three men were found guilty in the UK of plotting a terrorist attack and had been using the encrypted app Telegram to communicate with one another. Telegram was called out by Europol chief Rob Wainwright earlier this year for "causing major problems," by not cooperating with law enforcement.

One allegation Rudd has leveled at end-to-end encryption is that "real people" don't care about it. People don't use WhatsApp because it is secure, she said in her Telegraph editorial, but because it is convenient, cheap and user-friendly. This is more than a huge generalization, it's an assertion for which she provides absolutely no supporting evidence.

Indeed, her comments have attracted criticism from privacy organization Big Brother Watch, which said they were "at best naive, at worst dangerous."

"Suggesting that people don't really want security from their online services is frankly insulting, what of those in society who are in dangerous or vulnerable situations, let alone those of us who simply want to protect our communications from breach, hack or cybercrime," Renate Samson, the organization's chief executive, said in astatement.

"Once again the government [is] attempting to undermine the security of all in response to the actions of a few," he said. "We are all digital citizens, we all deserve security in the digital space."

Rudd maintains "there are options" for using end-to-end encryption and also making sure terrorists "have no place to hide" online. But these options remain a mystery to everyone but her. For the sake of the British public, many of whom do care that their communications are kept private and secure, she needs to explain how this will work.

The Smartest Stuff: Innovators are thinking up new ways to make you, and the things around you, smarter. Here's what they're up to.

Intolerance on the Internet: Online abuse is as old as the internet and it's only getting worse. It exacts a very real toll.

Read more:
UK's flip-flops on encryption don't help anyone - CNET

WOW! BREAKING=> Julian Assange Suggests Seth Rich – Who Was MURDERED in …

On July 8, 2016, 27 year-old Democratic staffer Seth Conrad Rich was murdered in Washington DC. The killer or killers took nothing from their victim, leaving behind his wallet, watch and phone.

Shortly after the killing, Redditors and social media users were pursuing a lead saying that Rich was en route to the FBI the morning of his murder, apparently intending to speak to special agents about an ongoing court case possibly involving the Clinton family.

Seth Richs father Joel told reporters, If it was a robbery it failed because he still has his watch, he still has his money he still has his credit cards, still had his phone so it was a wasted effort except we lost a life.

The Metropolitan police posted a reward for information on Richs murder.

On Tuesday Wikileaks offered a $20,000 reward for information on the murder of DNC staffer Seth rich.

Now this Julian Assange suggested on Tuesday that Seth Rich was a Wikileaks informant. Via Mike Cernovich:

Was Seth Rich, the source of #DNCleaks, murdered? https://t.co/bKwYQJcmQp

Mike Cernovich (@Cernovich) August 10, 2016

Julian Assange seems to suggests on Dutch television program Nieuwsuur that Seth Rich was the source for the Wikileaks-exposed DNC emails and was murdered.

From the video:

Julian Assange: Whistleblowers go to significant efforts to get us material and often very significant risks. As a 27 year-old, works for the DNC, was shot in the back, murdered just a few weeks ago for unknown reasons as he was walking down the street in Washington.

Reporter: That was just a robbery, I believe. Wasnt it?

Julian Assange: No. Theres no finding. So Im suggesting that our sources take risks.

HOLY SH*T!

UPDATE Brad Bauman, a DC consultant to Democratic candidates, wrote us today. Brad says he is the spokesperson for the Rich family. He asked if we would update our post with this statement.

The entire Rich family is so heartened by the outpouring of support and love that they have felt over the past few weeks as they continue to come to terms with this terrible tragedy. The family is in constant contact with authorities and thank them for their extremely thorough investigation. The family believes this matter is being handled professionally and with the seriousness that it requires.

The family welcomes any and all information that could lead to the identification of the individuals responsible, and certainly welcomes contributions that could lead to new avenues of investigation. That said, some are attempting to politicize this horrible tragedy, and in their attempts to do so, are actually causing more harm that good and impeding on the ability for law enforcement to properly do their job. For the sake of finding Seths killer, and for the sake of giving the family the space they need at this terrible time, they are asking for the public to refrain from pushing unproven and harmful theories about Seths murder.

More:
WOW! BREAKING=> Julian Assange Suggests Seth Rich - Who Was MURDERED in ...

Julian Assange Gets Laughed Off Twitter After Tone Deaf Poll – The Daily Dot

On Friday morning, WikiLeaks founder Julian Assange decided to conduct a Twitter poll. Many people use Twitter polls to jokingly ask for life advice, but Assange seemed serious about the question he posed.

Between Trumps directness & leaks the Trump admin is the most transparent in living memorydespite its policies, he wrote. Good or bad?

The poll doesnt close for a day, but the consensus on Twitter is clear. People think Assanges tweet is one of the worst takes on the Trump administration.

WikiLeaks famously published thousands of emails related to Hillary Clinton and the Democratic Party before the election, which many thought swayed things in Trumps favor. Last summer, Assange said that choosing whether to vote for Hillary Clinton or Donald Trump for president was like choosing between two different STDs. Its unclear who Assange currently supports (if anyone), but he definitely has an opinion about what information should be released to the publicand how.

In July, Assange said that he reached out to Donald Trump Jr. about publishing his emails on WikiLeaks.

Days later, he tweeted in support of a lawsuit that claims Trump is violating the First Amendment by blocking users on Twitter.

Now Assange wants to discuss the administrations transparencyeven if its not intentional.

But many thought Assange whiffed hereand gave him examples of how the Trump administration isnt actually transparent.

Of course, if Assange really cares about transparency, he could always leak more documents on the current administration.

Your move, Assange.

Read the original post:
Julian Assange Gets Laughed Off Twitter After Tone Deaf Poll - The Daily Dot

Why Is the Kremlin Suddenly Obsessed With Cryptocurrencies? – Daily Beast

In early June, Russian President Vladimir Putin attended the annual St. Petersburg International Economic Forum. The headline moment at the event was a wide-ranging and at times combative interview with Megyn Kelly. But Putin quietly made news in another wayhe signaled an official volte-face on the issue of cryptocurrencies, digital financial instruments such as bitcoin.

As recently as a year ago, the Russian government had threatened to jail users of bitcoin for up to seven years. The Kremlin had also toyed with the idea of creating its own digital currency to compete with bitcoin. Many observers speculated that Russia would then make all other digital currencies illegal to force adoption of its coin.

But sometime last year, something changed. Perhaps the Kremlin realized that creating a proprietary digital ruble defeated the purpose of having a dispersed-ledger digital currency. Possibly they observed the huge sums of money being poured into blockchain technology by Silicon Valley, and resolved to make sure Russia didnt get left behind when the technology became popular. (The blockchain is essentially a ledger with thousands of copies that gets updated every time a transaction takes place.)

Or maybe they just woke up to the vast array of possibilities that cryptocurrencies could offer in the service of money laundering.

Putinand the rest of his oligarch friendshave a problem. The Magnitsky Act, which established strict sanctions on named Russian citizens, and the Russian hacking scandal currently consuming American politics, have woken up governments to the colossal amount of ill-gotten Russian cash being invested within in their borders.

Many countries, including France, Switzerland, Ukraine, and Poland, have launched investigations into Russian money passing through their banking systems, while others, such as Cyprus, Greece, and China seem to still be looking the other way. In March, the Organized Crime and Corruption Reporting Project published a study entitled, The Russian Laundromat Exposed, revealing the vast and complex banking mechanisms that oligarchs use to skirt international financial controls.

From Putins perspective, the solution to this dilemma could be cryptocurrencies. And the Ethereum platform (which is based on the blockchain model) appears to be the Russians digital currency framework of choice. Ethereum allows clients to create their own digital smart contracts which can have a multitude of uses that transcend mere currency applications. Using Ethereum, for example, a startup recently raised nearly $4 million in an initial coin offering (think IPO) to begin manufacturing zirconium in Magnitogorsk, Russia. Each ZrCoin, issued by the company represents 1 kilogram of synthetic zirconium.

At a forum in Moscow in April, a Russian politician named Andrei Lugovoi sang the praises of the blockchains versatility. He cited a World Bank study predicting that 10 percent of world GDP would be stored with the help of the blockchain as early as this year. He also said he expected a draft bill in the Russian Duma on regulation of cryptocurrencies would be made public in the second half of 2017.

If Lugovois name sounds familiar, its probably because he was one of two men implicated in the 2006 death of Russian spy Alexander Litvinienko in London, via radioactive polonium-210 poisoning. A former KGB officer himself, Lugovoi is now an MP in the far-right LDPR party. Hes also deputy chairman of the Duma committee on security and anti-corruption.

Last year, Lugovoi told a conference that blockchain-based currencies could become the best way to get around U.S. and EU sanctions. This is is [sic] a rare situation where the sanctions policy of the West gives rise to the opportunity for homegrown business to create something new and allow the national economy to move forward, Lugovoi said, according to Newsweek.

And the Russian blockchain community is indeed growing. A conference held in Moscow in May attracted hundreds of people; another is planned for September. And a group of banks working under the supervision of the Russian Central Bank is currently testing a proprietary Ethereum-based masterchain. Not only that, but Russias largest online retailer, Ulmart, is expected to begin accepting bitcoin in September. And another politician suggested setting up a Crypto Valley on the Crimean Peninsula to raise regional funding in the part of Ukraine that Russia annexed in 2014.

At the St. Petersburg forum, Deputy Prime Minister Igor Shuvalov enthused that Putin had caught the digital economy bug, and that the president had attended a small closed working group on the subject in which he kept them talking about the technology well past midnight. Putin even met privately with the founder of Ethereum, 23-year-old Canadian-Russian Vitalik Buterin on the margins of the conference.

Get The Beast In Your Inbox!

Start and finish your day with the top stories from The Daily Beast.

A speedy, smart summary of all the news you need to know (and nothing you don't).

Subscribe

Thank You!

You are now subscribed to the Daily Digest and Cheat Sheet. We will not share your email with anyone for any reason.

Its no surprise Putin is excited. Even Ethereums most ardent supporters will admit that once money is in the cryptocurrency loopthat is, after its been exchanged for fiat moneyits devilishly hard to track, by design. Cryptocurrency transactions are anonymous, dont respect national borders, and are now nearly instantaneous. In theory, at least, its the holy grail of money laundering.

As I write this, the market capitalization of all cryptocurrencies is still relatively modest, just under $100 billion, approximately what shoe-maker Nike is worth. But the market is growing by leaps and bounds. Ethereums flagship token, the ether, was up 4,000 percent for the year earlier this summer.

Most cryptocurrency transactions are perfectly trackable, thanks to a distributed ledger. (That sort of verification is part the appeal.) But trackable is not attributable. And in order for financial laws to function properly, some level of attribution must be built into the system.

As more governments agree on regulatory regimes to integrate cryptocurrencies into their business, more money will flow into them. Oligarch-sized transactions that would be difficult to impossible now will become more and more possible.

This isnt a problem in countries that operate under the rule of law. The United States and others are already working on laws and regulatory frameworks that will eventually be able to fully accommodate cryptocurrencies and take advantage of their unique properties. For example, its now possible to trade bitcoin and ether as easily as yen and euros.

But what about in kleptocracies like Russia, where laws are bent and molded to facilitate, rather than prevent, corruption? Its not hard to imagine a situation where regulations are either designed to be ignored for the benefit of certain people, or are simply toothless and thus throw the door open to all manner of illicit activity.

The Magnitsky Act has been a thorn in the side of Putin and his cronies for a long time. But as we stand at the threshold of a new era in the world of finance, he may think hes found a way to beat it.

See the original post:
Why Is the Kremlin Suddenly Obsessed With Cryptocurrencies? - Daily Beast

What You Should Know About Cryptocurrency – Lifehacker Australia

Cryptocurrencies are having a moment. Youve probably heard a thing or two about Bitcoin and Ethereum. Namely, their prices seem to be skyrocketing (or plummeting, depending on the day). Theres more to the story, and as the investing cliche goes: dont buy what you dont know. So lets find out more.

Cryptography has to do with coding to keep data secure, and cryptocurrency is a digital or virtual asset that uses cryptography as a security measure. For that reason, its hard to counterfeit. Bitcoin is one of the first cryptocurrencies to hit the scene. It was launched in 2009 by Satoshi Nakamoto, a pseudonym that could be a person or a group (it was open source and peer to peer). The thing is, theres no central agency (like the government) that issues or regulates these cryptocurrencies.

Bitcoin, the decentralized digital currency dominated by white men, seemed on the verge of

Which is why its been such an attractive option for shady business activities, like money laundering. You can buy and sell it just like any other investment, from company stock to Beanie Babies. But while companies have IPOs, or initial public offerings, cryptocurrencies have ICOs, initial coin offerings, and any entity can launch it as an investment. The Atlantic illustrates the problem with not having a central authority regulating these currencies:

Last month, the technology developer Gnosis sold $12.5 million worth of GNO, its in-house digital currency, in 12 minutes. The April 24 sale, intended to fund development of an advanced prediction market, got admiring coverage from Forbes and The Wall Street Journal. On the same day, in an exurb of Mumbai, a company called OneCoin was in the midst of a sales pitch for its own digital currency when financial enforcement officers raided the meeting, jailing 18 OneCoin representatives and ultimately seizing more than $2 million in investor funds. Multiple national authorities have now described OneCoin, which pitched itself as the next Bitcoin, as a Ponzi scheme; by the time of the Mumbai bust, it had already moved at least $350 million in allegedly scammed funds

As they put it, ICOs are catnip for scammers because there are no checks and balances the way there are with IPOs. So if youre going to invest in a coin, which is an iffy enough move as it is, you certainly want to make sure its not just any random cryptocurrency that could just be a scam.

So what about tokens like Bitcoin or Ethereum, which are popular, widely covered options? (And that are actually used as currency.) Are they smart investments?

Some people say investing is like playing the lottery. Thats not entirely accurate, though. Long-term, broad investing, the kind of investing weve advocated here and the kind that will help you build a nest egg over time, is very different from speculative, active trading, which is a lot more like gambling. Cryptocurrency, a volatile, unpredictable investment, falls into that category.

Many people dont invest because it seems overly complicated. But if you want to build wealth,

With active trading, youre taking a guess at how a specific investment (or investments) will trade on a short-term basis. The goal isnt to simply keep up with the stock market like it is with long-term investing; the goal is to make a bunch of money and get rich quickly. And you know, some Bitcoin and Ethereum investors did get rich quickly! Seems like a good deal, right? But the thing is, the price of these cryptocurrencies often swings from one extreme to another. (In one day in June, the price of Ethereum plummeted from $319 to $0.10!)

Plus, any time the value of something skyrockets too quickly, a bubble often follows, and thats exactly what Forbes contributor Clem Chambers predicts:

Crytocurrencies, of which bitcoin is the leader, will fall back in value and more than the fat drop bitcoin has already had.

Despite its reputation for getting constantly hacked, cryptocurrency like Bitcoin remains a hot

Not to mention, theres also the old investing adage, buy low and sell high. If you bought Ethereum right now, youre buying high. If you still need reasons to avoid it, though, the Motley Fool makes a good case for keeping digital currency out of your portfolio: your investment options are limited, there arent any safety protocols, and most of us dont really completely understand how they work. Most people have no clue how Bitcoin or Ethereum work, or understand how theyre challenging monetary theory. Thats a dangerous formula for volatility and potential money loss, writer Sean Williams says.

The bottom line: get rich quick schemes rarely work out well. Sure, people occasionally win the lottery, but for most of us, investing shouldnt feel like playing the lottery. It should be a long game, allowing you to gradually build wealth over time with much less risk.

That said, if youre going to invest in cryptocurrencies anyway (maybe you dont want to replace your entire retirement portfolio, you just want a small taste), heres how to go about it.

Website Coinbase seems to be the most popular option for buying Ethereum, Bitcoin, or Litecoin. Its also the easiest, according to Inc.coms Brian Evans. You have to verify your account and then you can add different payment methods for buying your tokens (bank accounts, wire transfers, credit or debit cards). Evans explains:

Other options for exchanges that will take U.S. dollars for coins are Kraken, and Gemini in the U.S. Typically you will need to verify your account with a drivers license and add other details to expand your buy limits. Since cryptocurrencies are hard currencies, the exchanges dont want to risk getting ripped off, since you cant reverse a cryptocurrency transaction once its done.

These websites will also let you sell your coins when youre ready. If you have extra cash to invest on hand, it might be an interesting experiment. Ive dabbled in day trading myself, just to understand it better, and while I earned a decent return in a short amount of time, I also lost a lot of money after that. Over time, it all evened itself out. Some short-term investors have much better luck; others have much worse luck. The point is, you dont want to put most of your money to work this way.

You might get lucky with these new, shiny investments, but in reality, wealth building is pretty boring: buy some broad, diverse funds and hold onto them over the years. Its not quite as sexy as cryptocurrency, but its probably a safer bet for your hard-earned cash.

Read more:
What You Should Know About Cryptocurrency - Lifehacker Australia

Bitcoin Has Split Into Two Cryptocurrencies. What, Exactly, Does That Mean? – Slate Magazine (blog)

This picture taken on April 7, 2017, shows a man walking past a signboard informing customers that bitcoin can be used for payment at a store in Tokyo.

AFP/Getty Images

If you owned bitcoin prior to Aug. 1 and slept in a little that morning, you would have woken up to find your stash had doubledsort of.

Before Aug. 1, there was a single bitcoin currency simply called bitcoin, or BTC. Like most cryptocurrencies, bitcoin avoided having a central bank that verified transactions by maintaining a constantly verified ledger of transactions that was distributed across thousands of computers. This ledger is called the blockchain, and up until Aug. 1, there was only one of it. That day, at 8 a.m. Eastern, an alternative coin called Bitcoin Cash, or BCC, was born when the bitcoin blockchain split in two. Bitcoin Core, as the original currency is now called, and Bitcoin Cash have identical ledgers until Aug. 1. Now each currency maintains a separate ledger, and since cryptocurrencies are represented by their blockchains, that means bitcoin has effectively split in half, giving each user a bank account filled with both currencies.

The question of why bitcoin split is a deeply political one, as much about the philosophy of what bitcoin should be as it is about practical concerns of payment speed and per payment surcharges. As David Z. Morris described in Future Tense in June, the dispute centers on the maximum size allowed for any block in the blockchain. This is a technical point, but you can think of it as arguing over how many transactions are allowed on one page of the ledger. The original limit, imposed by pseudonymous creator Satoshi Nakamoto either as doctrine or temporary fillerdepending on whether you support BTC or BCCwas 1 MB of data. This low limit is leading to delays in the amount of time it takes a transaction to be verified, which is itself leading to higher surcharges for premium verification. (For a primer on how this all works, click here.)

If transaction time were the only issue, though, there wouldnt be a three-year-long flame war and a battling subreddits, one for each coin. There are two other issues. One is that the BTH folks think that allowing larger blocks hinders small players from mining bitcoins, centralizing power in the hands of large mining entities. Bitcoin was created as an alternative to centralized currencies, however, so greater centralization is a serious accusation. Point for BTC.

BTC has proposed a size increase of its own, one that comes with an even greater philosophical change. Segregated Witness, also known as SegWit2x, aims to fit more transactions on one page of the blockchain ledger by doubling the size of the page (that is, doubling the blocksize limit), and by reserving all space on the page for transactions. Right now, each page (each block) contains transaction details (Alice gave Bob 2 BTC), and signatures (I, Alice, agree to give Bob these 2 BTC). Instead of making the page much longer, SegWit2x wants to create more space on the page by erasing the signatures and reserving that space for transactions. Many believe this proposal changes the fundamentals of bitcoin more than BCC does, and in terms of structure of the chain, they are right. Thats why some supporters of BCC oppose the name alternative coin, they view what theyre doing as closer to Satoshis vision than BTC. Point for BCC.

However, the Highlander there can be only one approach is a false choice. To understand why, we need to look at the recent history of another cryptocurrency, Ethereum. Back in June 2016, $50 million were siphoned away from the Ethereum blockchain by some clever thieves. However, the thieves werent quite as clever as they thought. Because of the way they drained the money, they had to wait 28 days before they could withdraw it and, presumably, retire to some tropical locale. In that time, Ethereum made a hard choice, one that Gavin Wood, co-founder of Ethereum, called the single most important moment in cryptocurrency history since the birth of Bitcoin. Rather than let the thieves make away with the money, a large portion of Ethereum users forked the blockchain so that the transactions that stole the ETH never happened.

A lot of people were upset by this. It violated the spirit of the blockchain. The purists split off and started their own cryptocurrency called Ethereum Classic (ETC). A year later, both currencies are still used (though ETH is worth far more than ETC) and are fairly stable. In fact, their combined value is greater than the original value.

The same thing seems to be happening with bitcoin. According to Quartz, BCC is already the third most valuable cryptocurrency, behind BTC and ETH. And, just like the Ethereum split, the BTC-BCC market is worth more than the original market was. However, while there can be more than one currency, thats not to say there will be. It took six hours for the first BCC block to be mined, a process which usually takes about 10 minutes on BTC. That block was 1.9 MB, larger that BTC would allow, but the next block on BCC was only .04 MB, stoking fear that not enough miners had adopted BCC. Whether the achievement of BCCs debut as a new cryptocurrency is a Pyrrhic victory for the founders or a resounding success will hinge on the answer to that question.

Read more:
Bitcoin Has Split Into Two Cryptocurrencies. What, Exactly, Does That Mean? - Slate Magazine (blog)

The War on WikiLeaks and Assange Consortiumnews – Consortium News

Helping government authorities discredit Julian Assange and destroy WikiLeaks, mainstream media outlets twisted a recent interview to make Assange look like a Donald Trump backer, write Randy Credico and Dennis J Bernstein.

By Randy Credico and Dennis J Bernstein

Italian journalist Stefania Maurizi, who now reports for La Repubblica and has worked on WikiLeaks releases of secret documents, complains that her recent interview with Julian Assange was distorted by the Guardian, the Washington Post and others to assign Assange a pro-Trump agenda.

The Guardian recently amended its reporting on her interview with Assange, but for the feisty, seasoned reporter it wasnt nearly enough. I appreciate the Guardian amending the article, but at the same time the damage is done and Im not convinced it was a solution, she said.

Maurizi is going to court in September in Great Britain to fight for the release of key documents that related directly to the process of Assanges treatment and his pursuit by various governments collaborating to shut his operations down.

This is the first time that a reporter has tried to get access to these files, she said in a rare interview on Aug. 1, which tells you something about the state of journalism these days.

Before joining la Repubblica, Maurizi spent ten years working for the Italian newsmagazine lEspresso. Maurizi also partnered with Glenn Greenwald to reveal the Edward Snowden files as they pertain to Italy. She is author most recently of Dossier WikiLeaks.

Dennis Bernstein: Tell us about your multiple struggles to get key documents that will shed light on the entire Assange affair.

Stefania Maurizi: I have spent the past two years struggling to access the documents on the Julian Assange case. I was finally forced to go to court and sue the UK government to get them to hand over the documents. This is the first time that a reporter has tried to get access to these files, which tells you something about the state of journalism these days.

Dozens of newspapers have talked with Assange over the past ten years and yet no one has attempted to get full access to these documents about the case. Here we have a high-profile publisher who is being arbitrarily detained by two of the most respected Western democracies, Sweden and the United Kingdom, and no one is trying to get to these documents. It is incredible to me.

Randy Credico: Are any newspapers in London writing amicus briefs on your behalf?

SM: Honestly, I dont know. I can imagine there is some embarrassment about the fact that no newspaper has yet asked for these documents.

DB: What kinds of information do you expect to be in these documents? What could be the case in terms of freeing Julian Assange?

SM: First of all, I want to access the full correspondence between the UK authorities and the Swedish prosecutors. In 2015 I filed a Freedom of Information Act request and I obtained some documents from the Swedish authorities which made very clear that the UK put pressure on the Swedish authorities not to question Mr. Assange in London, which he and his lawyers had requested, but rather to extradite him to Sweden. This is why we have been in this legal quagmire for five years now with Julian stuck in arbitrary detention at the Ecuadorian embassy.

Julian Assange has never refused questioning. He has fought against extradition because he knows that extradition to Sweden would result in extradition to the United States. So the UK authorities advised the Swedish prosecutor against questioning him in London, which would have avoided this arbitrary detention.

I know for certain that there are thousands of documents pertaining to this case. I want to be able to access any documents pertaining to the exchange between the US and UK authorities and I want to access any documents about the exchange between the UK and Ecuador. I believe that there is a strong public interest in shedding light on this important and high-profile case. Can you imagine a high-profile editor in Europe under arbitrary detention? And yet no one is asking for the documents in this case!

RC: Why did you write Dossier WikiLeaks?

SM: That book is based on my access from 2009 to 2011 to the WikiLeaks documents about the wars in Afghanistan and Iraq, the Guantanamo files and those pertaining to the diplomacy cables. I read something like 13,000 pages of the diplomacy cables. Basically, I attempted to share with my readers the most important revelations contained in these documents.

For example, I acquired some solid information about how the US tried to stop the Italian prosecutors investigating the extraordinary rendition of Abu Omar. Or how the US authorities tried to pressure the Italian government to buy the Lockheed Martin fighter. Or how they tried to block the International Criminal Court.

This is the kind of information that many reporters dream of getting access to and for the first time with WikiLeaks we were able to. I really appreciate WikiLeaks publication strategy of making these documents available exclusively to certain media partners like myself and then later to the general public, to activists, journalists, lawyers, etc.

I believe that information needs to be free and accessible to everyone without restrictions. Of course, there is information which should be kept secret, regarding the security of nuclear facilities, for example. But these documents are different. These secrets are used by countries like the United States to protect themselves from inquiry, from prosecution, from embarrassment. These secrets are less legitimate.

DB: For the last six months, WikiLeaks has been publishing a series of documents on the CIA which they entitle Vault 7. Could you talk about the significance of Vault 7?

SM: Basically, Vault 7 consists of documents concerning the cyber weapons the CIA uses to penetrate our computers, our mobile devices, and so on. For the first time we have solid evidence concerning the use of these kinds of weapons by the CIA. Of course, these documents are of a highly technical nature so we have tried to make them accessible to the general public. But it is very important to have an insight into these tools, so that we can understand what they can and cannot do.

As far as we have been able to determine, they have no magic wand, no wonder weapon. They have come up with some smart solutions, they have some impressive tools, but no magic wand. At the end of the day, we verified the documents as genuine and we made them accessible to the public.

In the case of technical documents, you go to a trusted expert to check whether a procedure makes sense, whether the software makes sense, classification marks, etc. I dont want to go into too much detail on how we verify documents because that might compromise our work. But the tough part of this work is verifying the documents. I can tell you that in my eight years of work with WikiLeaks I have been to court several times and was able to verify that the documents were genuine and my coverage was correct. We have won libel cases in court.

RC: What has motivated you to cover the WikiLeaks case these past eight years?

SM: Before I went into journalism, I got a degree in mathematics. One of my sources in cryptography put WikiLeaks on my radar screen back in 2008, when very few journalists had even heard of WikiLeaks. In 2009 they contacted me and wanted me to verify the authenticity of some important documents concerning Italy. That was our first partnership together. Since then I have been involved in all of WikiLeaks releases.

The reason I am very interested in this work is that, first of all, it gives you access to documents which you would never have access to otherwise. In Italy there are families of people who were massacred who sixty years later are still unable to get access to information about their loved ones, they cannot get to the truth. I believe it is very important to be able to get access to unauthorized disclosures or secret documents like CIA and NSA documents. WikiLeaks provides us with unprecedented access to these documents. People at the CIA and the NSA have no accountability, there is no serious oversight. In this case there is a real need for unauthorized disclosures. They want to continue to operate in darkness.

DB: Do you feel that your recent interview with Julian Assange has been distorted by publications such as the Guardian and the Washington Post and across the internet to present Assange as a Trump supporter?

SM: Absolutely. They completely distorted that interview, putting into his mouth things he never said. No one paid any attention to my protests. They were focused on their own interpretations. Finally it took Glenn Greenwald to expose this. The Guardian was forced to amend their article.

DB: How does this throw a spotlight on the political realities faced by Assange in detention?

SM: I have been there from the beginning so I have seen all kinds of attacks on Julian, with high-profile reporters and the international media just parroting what the Pentagon was saying; That Wikileaks had blood on its hands because they exposed the names of Afghan informants. When the US government began complaining that WikiLeaks was putting diplomats at risk, once again the media adopted the government position. The latest is they are crucifying Julian because he has not published Russian documents, saying that he is a Russian spy, etc. But I can tell you that WikiLeaks is obsessed about publishing, they will publish whatever they can get.

There is no way they can kill Julian Assange, it is not possible. We are in Europe, they cannot get to him with drones. But they can certainly destroy his reputation. And when it comes to journalism, reputation is everything.

RC: With all of its power and influence, why are the US government and its allies so obsessed with this one individual?

SM: Julian was able to hit them very hard, to expose them, to expose their secrets. Here you have an organization exposing the truth behind two wars with facts, without resorting to any propaganda. Never before have they faced such revelations. I can well imagine they are furious.

DB: Why do you think it is so important that Julian Assange be freed and allowed to continue his work?

SM: Access to information is crucial for democracy. Take Afghanistan, we have been there since 2001 and what do we know about what has been going on there? It took Edward Snowden to expose the NSA. Before that we knew very little. This kind of information is crucial for our democracy. Unauthorized disclosures are crucial in the case of democracies and in the case of regimes. WikiLeaks is taking huge legal and extralegal risks to get this information out.

RC: The UN Working Group on Arbitrary Detention has determined that Julian Assange is in fact being arbitrarily detained, that he is a political prisoner and must be released and compensated for all that he has been through. The British have yet to comply with this finding.

SM: This sends a terrible message to other countries which are holding people under arbitrary detention. What can the UK say to Iran or other rogue nations when they detain journalists or political and human rights activists? How can the UK say anything when they have a very high-profile editor under arbitrary detention in London?

Dennis J Bernstein is a host of Flashpoints on the Pacifica radio network and the author of Special Ed: Voices from a Hidden Classroom. You can access the audio archives at http://www.flashpoints.net.

Read the original:
The War on WikiLeaks and Assange Consortiumnews - Consortium News

Murdered DNC staffer confirmed as Wikileaks source by Pulitzer prize winning journalist – The London Economic

Murdered DNC staffer Seth Rich has been confirmed as being aWikileaks source by Seymour Hersh in a leaked telephone call.

The journalist, who has high level FBI sources, discussed what he knows about the murder in the call and revealed some interesting details about what is in the FBI report following the cyber unit investigation.

Seth Rich was an American employee for the Democratic National Committee (DNC) who was fatally shot in the Bloomingdale neighbourhood of Washington.

His murder has spawned severalconspiracy theories that Richhad been involved with the leaked DNC emails in 2016, although these have since been debunked by US intelligence.

In the recording Hersh confirms that Rich had made contact with Wikileaks, submitting a series of juicy emails from the DNC for money.

He also shared the data with friends in case anything happened to him.

Watch the audio tape in full below:

RELATED

Read the original here:
Murdered DNC staffer confirmed as Wikileaks source by Pulitzer prize winning journalist - The London Economic