Albanian Central Bank Issues Warning to Cryptocurrency Investors – CoinDesk

Albania's central bank calling on potential investors to avoid buying digital currencies, according to a new report.

According to the English-language weekly Tirana Times, the central bank stated that it hasn't issued any licensure to businesses brokering or exchanging digital currencies in Albania.

"As a result, every company that is involved in these operations in the Republic of Albania is not licensed and its activity does not comply with the regulatory and supervisory framework of the Bank of Albania, the bank reportedly said.

It's a missive that largely echoes those issued by other central banks in the past several years. In some of those cases, investors were warned to avoid specific digital currencies, including bitcoin or Onecoin, the latter of which has earned the particular ire of central banks and regulators worldwide.

As with officials at institutions like the Central Bank of Armenia, Albania's central bank suggested that investors avoid buying digital currencies, pointing to more regulated products instead.

"One should orient investments toward financial products and instruments offered by institutions licensed and supervised by the Bank of Albania and the Financial Supervisory Authority, the message stated.

It's unclear at this time which businesses in Albania would be effected should the central bank move to enforce its stance more concretely, though LocalBitcoins lists a handful of traders in cities including Tirana and Elbasan.

Albania map image via Shutterstock

The leader in blockchain news, CoinDesk is an independent media outlet that strives for the highest journalistic standards and abides by a strict set of editorial policies. Have breaking news or a story tip to send to our journalists? Contact us at [emailprotected].

Follow this link:
Albanian Central Bank Issues Warning to Cryptocurrency Investors - CoinDesk

WikiLeaks reveals CIA tool for SMS spying – BetaNews

The latest addition to WikiLeaks' Vault 7 cache of leaked CIA documents details an app that can be used to intercept SMS messages on Android devices. The HighRise tool can grab messages before sending them on to a CIA-controlled server.

The app itself goes by the name of TideCheck and it serves as an SMS proxy to allow for the interception of messages on a target's phone. The app itself is password protected (with the word "inshallah") to prevent unwanted tinkering. It also seems to serve a dual purpose, acting as a secure communication channel for CIA operatives.

Unlike many of the other CIA tools revealed as part of the Vault 7 leaks, HighRise/TideCheck cannot be installed remotely, and requires physical access to a phone to get it installed and running. The leaked documentation shows that the app only works on Android 4.0 to 4.3, but as the file dates back to late 2013, it's likely that the app was updated for future versions of Google's mobile operating system.

Writing about the SMS tool, WikiLeaks says:

Today WikiLeaks publishes documents from theHighriseproject of the CIA.HighRiseis an Android application designed for mobile devices running Android 4.0 to 4.3. It provides a redirector function for SMS messaging that could be used by a number of IOC tools that use SMS messages for communication between implants and listening posts.HighRiseacts as a SMS proxy that provides greater separation between devices in the field ("targets") and the listening post (LP) by proxying "incoming" and "outgoing" SMS messages to an internet LP.Highriseprovides a communications channel between theHighRisefield operator and the LP with a TLS/SSL secured internet communication.

The documentation for HighRise can be found on the WikiLeaks website.

Image credit: Pakpoom Phummee / Shutterstock

More:
WikiLeaks reveals CIA tool for SMS spying - BetaNews

Asylum hearings begin for deportation-threatened seven who sheltered Edward Snowden in Hong Kong – South China Morning Post

The seven refugees who harboured American whistle-blower Edward Snowden in Hong Kong are attending their first appeal hearings on Monday, as the prospect of detention and deportation looms.

The seven four adults from Sri Lanka and the Philippines, and three stateless children born in the city had their protection claims rejected in May, whereupon they all appealed.

Authorities want me removed from case, lawyer for asylum seekers who helped Snowden claims

The group became well known for having hidden the former US National Security Agency contractor Snowden in their homes for about two weeks in 2013, after he leaked a trove of classified documents revealing the extent of electronic spying by the United States and other governments.

They will attend directions hearings on Monday, preliminary meetings at the Torture Claims Appeal Board, before the actual hearing begins.

Like many asylum seekers in the city, the seven used to report to the Immigration Departments branch office in Ma Tau Kok, Kowloon, every six weeks. But this month, after their protection claims were rejected, they were told their cases had been transferred to Castle Peak Bay Immigration Centre in Tuen Mun, a facility for detainees awaiting repatriation or deportation. Officers told them to report there instead.

Help the refugees who saved me: Snowden hits out at Hong Kong government in damning video

We were told that was a collective decision by immigration, their lawyer, Robert Tibbo, said. No further explanation was offered and the officer did not deny that they could be detained then.

I am concerned because there is no reason to transfer them to the Castle Peak Bay Immigration Centre. They will have to make three times the distance with young children and at a greater cost, he said.

The prospect of reporting at the centre, although there is no official indication they will be detained, alarmed the claimants.

Ajith Pushpakumara, a former soldier from Sri Lanka who was detained for about five months for identity verification in 2006, was visibly shaken by the news.

I am very upset. I cannot sleep or eat I dont know what to do now, he said. I think they will detain me I cannot go back to Sri Lanka.

Hong Kong rejects asylum claims by refugees who sheltered Edward Snowden

Pushpakumara said he feared for the safety of his mother and daughter back home.

There were reports early this year that Sri Lankan police had been in Hong Kong looking for the Sri Lankan refugees who sheltered Snowden, and that their relatives were under pressure back home. Authorities there denied that.

If the Torture Claims Appeal Board rejects their appeal, they can still request a judicial review with the High Court. If such attempts fail, claimants are detained and then deported to their countries of origin.

The director of the Immigration Department holds the discretionary power to order their detention at any moment.

Another of the seven, Vanessa Mae Rodel, from the Philippines, said she was very afraid of being separated from her five-year-old daughter. Rodel was detained in 2010 for almost two months for overstaying a visa before being able to file a protection claim.

Hong Kong does not grant asylum, but the local government is obliged to screen torture and persecution claims. Those whose claims are substantiated are referred to the UN High Commissioner for Refugees for resettlement in another country.

Read the original here:
Asylum hearings begin for deportation-threatened seven who sheltered Edward Snowden in Hong Kong - South China Morning Post

To battle hackers, IBM wants to encrypt the world – Washington Post

There are only two types of companies, it is commonly said: those that have been hacked, and those thatjust don't know ityet.

IBM, the computing giant, wants to get rid of both. The company said Monday that it has achieved a breakthrough in security technology that will allow every business, from banks to retailers to travel-booking companies, toencrypt their customer data on a massive scale turning most, if not all, of their digital information into gibberish that is illegible to thieves with its new mainframe.

The last generation of mainframes did encryption very well and very fast, but not in bulk, Ross Mauri, general manager ofIBM's mainframe business, said in an interview. Mauri estimates that only 4 percent of data stolen since 2013 was ever encrypted.

As the number of data breaches affecting U.S. entities steadily grows resulting in theleakage every year ofmillions ofpeople'spersonal information IBM argues that universal encryption could be the answer to what has become an epidemic of hacking.

The key, according toIBM officials, is an update to the computer chipsdriving the powerful mainframe serversthat house corporate or institutional information and process millions of transactions a day worldwide, from ATM withdrawals to credit card payments to flight reservations.

Cryptography,the scienceofturning legibleinformation into coded gobbledygook, is already commonly used among certain email providers and storage services. But because of the enormous computational power needed to quickly encrypt and decrypt information as it passes from one entity to another, many businesses use encryption only selectively, if at all. A December report by the security firm Sophos found that while 3 out of 4 organizations routinely encrypt customer data or billing information, far more do not encrypt their intellectual property or HR records. Sixty percent of organizations also leave work files created by employees unencrypted, the study found.

All of these represent opportunities for digital criminals, said Austin Carson, executive director of the technology think tank TechFreedom.

One of the big problems is that way too much information is stored in clear text, he said. But universal or pervasive encryption, he added, could help ensure that even if hackers successfully broke into a company's network, any information they found there would be impossible to decode. That would be a huge step forward just in terms of protecting a much larger body of information, Carson said.

But the same technology could frustrate law enforcement, which in recent years has waged a furious battle with Silicon Valley over encryption technology and how extensively it should be used. In a high-profile dispute last year with Apple, the Justice Department argued that the companyshould help officials break into an encrypted iPhone used by one of the San Bernardino shooters. Apple refused, saying that developing tools to break encryption would undermine its customers' security, particularly if the tools were to fall into the wrong hands. Apple's concern is not theoretical: This year's WannaCry ransomware attack, which held thousands of PCs hostage, has been linked to a Windows vulnerability that was secretly discovered and exploited by the National Security Agency long before it leaked into the wild.

In its push to expand universal encryption, IBM is taking Apple's side in the debate.

IBM fully supports the need for governments to protect their citizens from evolving threats, the company said in a statement on the issue. Weakening encryption technology, however, is not the answer. Encryption is simply too prevalent and necessary in modern society.

For IBM, encryption is also a massive business opportunity. Businesses spend over $1 trillion a year making sure that their security meets government standards, according to company officials. One aspect of IBM's new approach to mainframes is the concept of automating that compliance work, using artificial intelligence to check that what's being protected passes regulatory muster in various industries. In doing so, IBM expects to turn a chunk of that annual compliance spending into revenue for itself. And that's on top of the roughly $500,000 it expects to charge new customers for using IBM's newest mainframe technology. Most businesses, said Mauri, will be upgrading from an existing setup, so the cost for those clients could be less.

For some small businesses, that may still be too expensive. Still, the history of technology suggests that with time, those prices may fall.

This is the turning point. The idea here is that you can start to encrypt all data, saidMauri. But even as IBM makes encrypting everything a priority, security experts like Mauri already have their eyes set on the next holy grail: the ability to securely edit and manipulate encrypted files without ever having to decrypt them in the first place.

Read the original:
To battle hackers, IBM wants to encrypt the world - Washington Post

Australian Leader’s Stupid Quote About Laws Trumping Math Is Encryption Fight in a Nutshell – Reason (blog)

Avalon.red/NewscomAustralia's Prime Minister Malcolm Turnbull is getting mocked by the encryption savvy for asserting that the laws of mathematics are subservient to the laws of Australia.

The Australian government is considering legislation that would require online communication companies decrypt messages on demand of law enforcement officials in order to fight crime. The problem is end-to-end encryption blocks companies from decrypting the communications. It's a safety and security measure to make it much harder for people with sinister intentionseither criminals or dangerous governmentsto access users' private data.

Turnbull's quote may make him look like an idiot, but the fundamental attitude he's expressing is shared by lawmakers and government officials in other countries, including the United States and England. These people want to deliberately jeopardize everybody's data privacy and security in order to serve the demands for information by law enforcement and the intelligence community.

Government officials have been wanting to force "back doors" into encryption so that they can get access to data in order to fight crime and terrorism. But there's no such thing as a back door that only the government can access.

Once there is a key to break encryption, it can be (and frequently has been) either discovered or reverse engineered by others. Furthermore, no single government, no matter how powerful it is, has the ability to prevent new, unheard of encryption tools from becoming available for criminals and terrorists to access. The inevitable outcome would be average users of commonly distributed communication apps having their data compromised, and actual criminals finding new ways to keep their communications secret.

In this context, Turnbull was asked whether this mathematical reality trumped government's desire to get access on demand to encrypted communication. His response:

"Well the laws of Australia prevail in Australia, I can assure you of that. The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia."

We should actually appreciate the blunt stupidity of Turnbull's response, because it highlights how stubbornly unwilling government officials have been in recognizing the actual consequences of their proposals. We've seen it from American senators on both the left and the right like Dianne Feinstein (D-California) and Richard Burr (R-North Carolina). We've seen it from British Prime Minister Theresa May's administration.

Throughout this encryption fight we have seen government and law enforcement officials lean on their power to legally demand access to information with warrants and investigatory tools in a bid for the authority to compromise everybody's security. The quote from Turnbull vividly demonstrates their belief that the existence of a government law outweighs consideration of other consequences.

The quote should be used as a rhetorical weapon against the likes of Feinstein and May to force them (and law enforcement representatives) to deal with the dangerous consequences of the laws they propose.

Read the original post:
Australian Leader's Stupid Quote About Laws Trumping Math Is Encryption Fight in a Nutshell - Reason (blog)

Apple meeting with Australian Attorney-General to discuss proposed ban on end-to-end encryption – 9to5Mac

Australias Attorney-General has said he will be meeting with Apple as the country becomes the latest to demand that the company cease offering end-to-end encryption, reportsSky News.

Attorney-General George Brandis says he will hold talks with tech giant Apple this week in bid to get co-operation on the Turnbull governments proposed laws compelling tech companies to give police and intelligence agencies access to encrypted information messages from suspected terrorists and criminals

Australia is apparently determined to join the US and UK in the hall of fame of governments who dont understand how encryption works. Brandis said that the new laws would be directly modelled on the UKsInvestigatory Powers Act, introduced last year.

So far, there has been no clash between the British government and Apple on the subject, though a future one seems inevitable. The law requires Apple and other tech companies to hand over details of messages sent through services such as iMessage and FaceTime, but Apples use of end-to-end encryption means that it will be unable to comply.

Apple will doubtless be making the point that the only way to comply with such a law would be to cease using end-to-end encryption, compromising everyones privacy.

Brandis says that he will be seeking voluntary cooperation first, and legislating if needed.

Senator Brandis says the government will be seeking voluntary cooperation as a first preference. But we will also be legislating so that we do have that coercive power if need be if we dont get the cooperation we seek, he told Sky News On Sunday.

Apple has of course demonstrated its willingness to stand up to government attempts to force it to compromise user privacy through the San Bernardino case in the USA.

Check out 9to5Mac on YouTube for more Apple news!

View post:
Apple meeting with Australian Attorney-General to discuss proposed ban on end-to-end encryption - 9to5Mac

Government’s encryption backdoor plan flawed: SafeSwiss chief – CIO Australia

Legislating against cryptography will drive encryption underground, says Tim Gallagher

The chief executive of a Swiss digital encryption app provider has lambasted the Australian governments proposed new laws that will compel tech companies to help local security forces access encrypted messages.

Theproposed lawsare expected to be put to Parliament by the end of this year, and are expected to resemble the UKsInvestigatory Powers Act 2016. This legislation obligates messaging platform operators such as Facebook and Google to cooperate with investigators looking to access encrypted messages.

SafeSwiss CEO Tim Gallagher said on Monday that the nature of his companys free messaging service for Android, iOS and Windows devices places it beyond the legal jurisdiction of the Australian government."

Gallagher warned users who are concerned about their privacy that serious design flaws in products such as WhatsApp, Telegram Messenger and WICKR potentially make them vulnerable to government-mandated backdoors.

Banning or legislating encryption apps is not the answer, this is a true paradox of security against privacy, Gallagher said.

Legislating against cryptography will drive encryption underground. It will open the doors to malicious attacks from adversaries everywhere.

Gallagher noted that encryption also applies to banking, purchasing goods online and in keyless ignition systems.

A good preview on how backdoors operate is to look at the US transport security administration (TSA) requirement that all baggage passing or travelling within the USA must be equipped with travel sentry locks that are designed to allow anyone with a readily available master key access.

As a result, a CNN investigation found thousands of incidents of theft, he said.

Gallagher added that to consider governments to be a trusted third-party is extremely misguided.

Governments would be better placed to put resources into the source of the problem the continued brainwashing of predominantly youth under the guise of medieval religion.

We are most certainly not anti-government or anti-police. We are pro privacy, and we firmly believe that both privacy and freedom of speech are two basic fundamental human rights.

Follow CIO Australia on Twitter and Like us on FacebookTwitter: @CIO_Australia,Facebook: CIO Australia, or take part in the CIO conversation onLinkedIn: CIO Australia

Follow Byron Connolly on Twitter:@ByronConnolly

Error: Please check your email address.

Tags WhatsAppdigital encryption appTelegram MessengerWickrswissTim GallagherAustralian GovernmentUSA

More about AustraliaCNNFacebookGoogleMessengerTwitter

Go here to read the rest:
Government's encryption backdoor plan flawed: SafeSwiss chief - CIO Australia

Julian Assange: I tried to get Donald Trump Jr. to publish …

WikiLeaks publisher Julian Assange claimed he tried to persuade Donald Trump Jr. into publishing his email correspondence with British publicist Rob Goldstonebefore the eldest Trump son tweeted them out himself Tuesday morning.

Contacted Trump Jr this morning on why he should publish his emails (i.e with us). Two hours later, does it himself, Mr. Assange tweeted to his 263,000 followers Tuesday afternoon, The Hill first reported.

I argued that his enemies have it so why not the public? he wrote in a series of subsequent tweets. His enemies will just milk isolated phrases for weeks or months with their own context, spin and according to their own strategic timetable. Better to be transparent and have the full context but would have been safer for us to publish it anonymously sourced. By publishing it himself it is easier to submit as evidence.

The younger Mr. Trump on Tuesday released the entire email chainbetween himself and Mr. Goldstone that arranged a meeting with Russian lawyer Natalia Veselnitskaya, who, according to Mr. Goldstone, offered very high level and sensitive information about Hillary Clinton as part of the Russian governments support for Donald Trumps presidential campaign.

Trump Jr. said nothing came of the meeting, but the revelation ramped up allegations from Democratic lawmakers that associates of President Trump may have colluded with the Russian government to influence the U.S. election.

President Trump came to his eldest sons defense later Tuesday, saying he is a high-quality and transparent person.

View original post here:
Julian Assange: I tried to get Donald Trump Jr. to publish ...

Bitcoin Fans: Cryptocurrency Token Economy Is the Future …

Ever since Bitcoin first appeared on the scene several years ago, fans of the cryptocurrency have been searching for a way to apply the idea that might capture the public imagination and broaden the use of the technology beyond just geeks and programmers.

Now, some believe that application has appeared with the rise of the "token" economy, in which companies or startup ventures fund their operations by handing out units of cryptocurrencies. Some companies have even done what are known as "initial coin offerings" or ICOs, in which they distribute tokens instead of shares to investors.

The cryptocurrency market is seen by some as a bubble with hugely inflated prices. Some observers say bitcoin and other similar ventures are similar to Linux , an open-source alternative to Microsoft's Windows operating system that has never really achieved mainstream success.

But entrepreneur and investor Balaji Srinivasan, a partner at Silicon Valley venture capital firm Andreessen Horowitz, believes that token-based systems "may eventually create and capture more value than the last generation of Internet companies."

Get Data Sheet , Fortune s technology newsletter.

In an essay published recently on the blogging platform Medium, Srinivasan and his partner Naval Ravikant, co-founder and CEO of a popular online VC community called AngelList, said they believe the token economy has the potential to become "a Kickstarter on steroids."

The two men, both of whom have been investing in bitcoin-related technology for several years, argue that using tokens as a financing option has the potential to improve the liquidity options that companies have by several orders of magnitude, as well as increasing the size of the available audience that might want to invest in such ventures.

All of this is possible because of an explosion in the cryptocurrency market over the past few years, they argue, in which Bitcoin has survived internal strife but also given birth to alternative currency systems and platforms such as Ethereum.

Initial coin offerings or ICOs are one way of using these new currencies, Srinivasan and Ravikant say. Canadian messaging-app maker Kik recently announced that it is launching its own cryptocurrency called Kin, and plans to offer units of it to supporters through a crowdfunding campaign. The currency is based on Ethereum's blockchain technology.

Kik plans to issue 10 trillion Kin tokens to developers and users via a separate non-profit foundation called the Kin Foundation, which will ultimately hold 60% of all the Kin tokens and be run by a group of independent directors.]

Srinivasan and Ravikant warn that some uses of cryptocurrency tokens, including some ICOs, may be subject to regulation by governments if they are seen as equivalent to doing a traditional equity offering or IPO, in which investors receive shares of the company. But they argue other uses of tokens for crowdfunding could essentially be unregulated.

Token supporters say they aren't really equity but more of a digital IOU, which entitles the holder to redeem their tokens in return for access to a platform like Ethereum's.

That access has value because it can be used to generate Bitcoin-style currency through a computer-intensive process known as "mining," and those coins can in turn be exchanged for other more familiar currencies like U.S. dollars. One bitcoin is currently worth about $2,300.

Some skeptics say token-based fundraising has the potential to turn into a huge boondoggle if it is unregulated, with unwary investors being fleeced of their savings with little to show for it.

Ravikant and Srinivasan, however, argue that tokens will allow companies to raise money much more quickly for new ventures than existing systems do, and will also allow for startups to build valuable services without having to rely on advertising as their only revenue source.

Large technology companies like Google and Facebook offer "have sometimes come under fire for making billions of dollars while early adopters only receive the free service," their essay says . "After the early kinks are worked out, the token launch model will provide a technically feasible way for tech companies to spread the wealth and align their user base behind their success."

See the article here:
Bitcoin Fans: Cryptocurrency Token Economy Is the Future ...

Japan’s Cryptocurrency Business Association Plans for August 1 Guidelines – Bitcoin News (press release)

This week we reported on upcoming events that might be taking place on August 1, concerning potential interruptions connecting to the Bitcoin network. Now the Japan Cryptocurrency Business Association made up of various regional exchanges is preparing to draft service suspension directives for bitcoin users in the country for that specific date.

Also read:Mining, Merchants, and TradersThailands Got the Bitcoin Fever

Japan has had bitcoin fever over the past few months. Since this past April interest in the decentralized currency has grown quite a bit since the Japanese government legalized bitcoin as a form of payment. Now as the country continues to progress in adoption a possible blockchain split may happen in two weeks, and Japanese bitcoin businesses want to be prepared.

According to the Nikkei Asian Review, the Japan Cryptocurrency Business Association (JCBA) is currently deliberating guidelines for a one day to one week freeze on bitcoin transactions. The JCBA organization says it aims to actively investigate and research necessary information, consolidate knowledge and exchange opinions, and aim for sound industry development in Japan. As far as August 1 is concerned, the association made up of fourteen regional cryptocurrency exchanges says it wants to protect customer assets.

The publication also details the trading platform Bitflyer is still undecided on its decision but will release an announcement next week. The Japanese exchanges Bitbank and Tech Bureau has detailed trading will be allowed, but deposits and withdrawals will be suspended until the possibility of a fork is resolved.

The statement from the JCBA and a few Japanese exchanges follows the announcement from the GDAX exchange on July 13. The exchange announced the suspension of deposits and withdrawals on August 1 and the possibility of halting trades as well. GDAX executive Adam White says the decision was based on technical risks and the possibility of network instability.

Masayuki Tashiro, a data analyst at the Japanese trading platform Fisco, says the chance of instability could make some transaction records inaccurate.

If there really is a fork, some transaction records could disappear

Theres still a possibility that nothing happens on August 1 and the industry is just playing it safe as they did this past March. This weekend the code for Segwit2x will be delivered and Segwit activation could happen, which might stop the potential August 1 fork. The JCBA is just following protocol, and other exchanges will likely do so leading up to the next two weeks in order to protect their businesses from legal repercussions.

What do you think about Japan Cryptocurrency Business Association drafting August 1 guidelines? Let us know in the comments below.

Images via Pixabay, Bitcoin.com, Japan Cryptocurrency Business Association.

Do you want to vote on important Bitcoin issues? Bitcoin.com has acquired Bitcoinocracy, and rebranded the project to Vote.bitcoin.com. Users simply sign a statement with a non-empty Bitcoin address and express their opinions. The project focuses on determining truth backed by monetary value and transparency.

Read the original:
Japan's Cryptocurrency Business Association Plans for August 1 Guidelines - Bitcoin News (press release)