Encrypted chat app Telegram warned by Russian regulator: ‘comply or goodbye’ – The Register

Russia's communications regulator is threatening to lower the boom on popular encrypted messaging application Telegram.

It might look like yet another government attack on user-accessible encryption, but in this letter, the head of regulator Roskomnadzor Alexander Zharov says the messaging app is violating Russian legislation by not providing information about the company that controls it.

Zharov wrote on Friday that Telegram only has to fill in a questionnaire about the company that manages Telegram, so the company can be included in the country's register of service providers.

In the case of an actual refusal to perform the duties of the organiser of the dissemination of information, Telegram in Russia should be blocked, the letter states, adding that Telegram's time is running out.

Telegram founder Pavel Durov told newswire Reuters a ban would mean Russian government officials will be entrusting their communications to messenger apps written in other countries.

In playing the nationalism card, Durov cited WhatsApp, Viber, Apple and Google as companies who might carry messages from Russian officials and their friends.

He is skeptical that the regulator is mostly cranky about corporate structure.

In a VK.com post, he said Telegram was blamed for a terrorist plot three months ago, but that banning such tools is unsafe for everyone: Encryption of these services or equally protects all users Refusal of terminal encryption in a single country will make tens of millions of people vulnerable to attack by hackers and blackmail [by] the corrupt officials.

In an earlier post, he said Roskomnadzor had demanded Telegram give keys to decrypt to special services.

This requirement is not only contrary to Article 23 of the Constitution of the Russian Federation on the right to privacy of correspondence, but also demonstrates the lack of knowledge of how the encrypted communication [works] in 2017.

Moreover, endpoint encryption exists separately to any specific platform, he noted.

More here:
Encrypted chat app Telegram warned by Russian regulator: 'comply or goodbye' - The Register

AES-256 encryption cracked by Dutch researchers with just $200 of equipment – www.computing.co.uk

Researchers in the Netherlands claim to have cracked AES-256 standard encryption using little more than $200 of equipment.

Security firm Fox-IT claims, together with another company called Riscure, to have created a method for eavesdropping on security enabled through proximity, in what is known as a side channel attack.

The researchers put together a piece of kit worth less than $200 and were able to wirelessly extract AES-256 encryption keys from a distance of one metre. They suggested that the attack can be carried out by people on all budgets and with all kinds of means.

"The recording hardware can range from extremely high-end radio equipment, down to 20 USB SDRs. We have found that even the cheap USB dongles can be used to attack software implementations!" they said. "This is not a game exclusively for nation states, but also anyone with pocket money and some free time."

Usually, such an attack would require direct access and manipulation. But Fox-IT found that it was possible just to swan past the target with a bag of SDR, amplifiers, filters, and an antenna and to capture the required information withoutthe target being aware of the attack.

"Using this approach only requires us to spend a few seconds guessing the correct value for each byte in turn (256 options per byte, for 32 bytes so a total of 8,192 guesses)," claimed Fox-IT.

"In contrast, a direct brute-force attack on AES-256 would require 2^256 guesses and would not complete before the end of the universe."

The next challenge is distance. Currently, Fox-IT has only reached a distance of 30cm but claims that afull meter is possiblein the right circumstances.

"Our work here has shown a proof of concept for TEMPEST attacks against symmetric crypto such as AES-256.

"To the best of our knowledge, this is the first public demonstration of such attacks. The low bandwidth requirements have allowed us to perform the attack with surprisingly cheap equipment (20 radio, modest amplifiers and filters) at significant distances," it added.

"In practice, this setup is well suited to attacking network encryption appliances. Many of these targets perform bulk encryption (possibly with attacker controlled data) and the ciphertext is often easily captured from elsewhere in the network."

Read this article:
AES-256 encryption cracked by Dutch researchers with just $200 of equipment - http://www.computing.co.uk

Idea to encrypt Web traffic at rest hits the IETF’s Standard Track – The Register

In spite of the rise of HTTPS, there are still spots where content originating on the Web can remain unencrypted, so a Mozilla engineer wants to close one of those gaps.

In an Internet Engineering Task Force RFC published this month, a proposal by Martin Thomson (also a member of the Internet Architecture Board), first mooted in late 2015, has been updated and pushed into the IETF's Standard Track.

In RFC 8188, Thomson explains that there's a good reason to encrypt HTTP message payloads even when HTTPS isn't in play: TLS (the basis of HTTPS) only encrypts a channel between client and server.

If, for example, you want to store content on a server without exposing it to the server, or replicate it between servers, some other encryption is required. Rather than hoping that engineers remember that, Thomson hopes to embed it in applications with a standard specifying content coding for HTTP.

He also notes that it wasn't practical to adapt message-based encryption formats (he cites OpenPGP's RFC 4880, the Cryptographic Message Syntax in RFC 5652 and other examples) because those don't meet HTTP's need for stream processing.

Rather, Thomson's RFC suggests using AES 128 in Galois/Counter Mode.

The scheme only provides content-origin authentication, the RFC notes, but that ensures that an entity with access to the content-encryption key produced the encrypted data.

See the original post:
Idea to encrypt Web traffic at rest hits the IETF's Standard Track - The Register

WorldFlix to Enter $100+ Billion Cyber Security Market with Military Grade Encryption Protocol "Parano" – Marketwired (press release)

LOS ANGELES, CA--(Marketwired - Jun 27, 2017) - InvestorsHub NewsWire - WorldFlix (OTC: WRFX) -The British Parliament faced a "sustained" cyber attack last weekend according to Westminster, illustrating just how prevalent sophisticated attacks have become and how easily they can affect even themost secure institutions.There is a reason the cyber security market has grown to over $100 billion worldwide and is projected to grow to over $180 billion by 2021.As the hacking community continues to evolve, so must cyber security.WorldFlix, and its subsidiary Paranotek, are well positioned to take on a significant share of the rapidly growing cyber security market with the introduction of their encrypted security protocol "Parano."

"We are ready to launch our Swantry app and encryption back-end Parano, pending some final IP protection.We have also been testing Parano with third parties in order to prepare to license and utilize our protocol as their encryption layer technology," stated Lauri Tunnela, CTO of Paranotek. "Once launched, we expect to immediately begin monetizing our technology through the Swantry app, and next, finalize our first partnerships with third parties to license the Parano protocol for their use, creating corporate level, long term revenue streams."

WorldFlix's Parano is virtually unhackable, even by next generation supercomputers, and the company is confident that users will flock toward a more secure platform to keep their conversations and data truly private and that third party software providers will seek out a more secure back-end protocol to keep their products secure.

About WorldFlix, Inc.

WorldFlix, Inc. (OTC: WRFX) operates in a variety of niche businesses in the technology and entertainment sphere. WorldFlix divisions include AppFarm, a platform for acquiring, developing, and growing niche apps for mobile and tablet devices; Drobbits, an interactive platform that allows users to create, play and monetize their own video games; Paranotek, a Finnish technology and design company that incorporates its military-grade, proprietary security and privacy features when developing software and apps; Swantry, designed to allow parents to ensure their child is safe on their mobile device; and WorldFlix Entertainment Management, a television and movie development and management business. For more information on WorldFlix, Inc., please visit http://www.worldflix.co.

About Paranotek

Paranotek is a partnership between WorldFlix, Inc., and Finnish-based technology and encryption experts. Lauri Tunnela, CTO, and Johannes Maliranta, CCO, have a combined 20 years of diverse and complimentary information technology experience. Tunnela's thesis on information security vulnerabilities has been featured in major Finnish technology magazines. Paranotek's products range from data storage, sharing and instant messaging services to various software suites, all based on our disruptive security technology. While other popular apps, software and services collect your data, Paranotek's unique security technology never collects user data, thus providing an extra layer of enhanced privacy for our users. For more information on Paranotek, please visit http://www.paranotek.com.

FORWARD-LOOKING STATEMENTS: "Safe Harbor" statement under the Private Securities Litigation Reform Act of 1995: This press release contains forward-looking statements within the meaning of the Securities Litigation Reform Act of 1995. These statements are based on current expectations, and are to a certain degree uncertain. Words such as expects, anticipates, intends, believe, plan, will and similar words are expressions intended to identify these forward-looking statements. These statements involve risk and subsequently are difficult to evaluate. Actual results may vary from descriptions herein due to many factors including but not limited to changes in business conditions, changes in laws and regulations, problems encountered in exploration and obtaining permits, changes in the competitive environment, technological advances, shortages of skilled workers, the need for additional capital and other risks listed in the company's Securities and Exchange Commission filings under "risk factors" and elsewhere. Forward-looking statements speak only as of the date they were made, and the company is under no obligation to update them.

For more information, please visit: http://www.swantry.com, http://www.paranotek.com, http://www.worldflix.co.

Read more:
WorldFlix to Enter $100+ Billion Cyber Security Market with Military Grade Encryption Protocol "Parano" - Marketwired (press release)

GitHub declares every Friday open source day – VentureBeat

GitHub wants to help more people become open source contributors with a new initiative called Open Source Friday. As the name implies, the program encourages companies to set aside time at the end of the week for their employees to work on open source projects.

Its designed to bolster the ranks of open source contributors at a time when many businesses rely on freely available projects for mission-critical applications. Open Source Friday isnt just about getting businesses to offer their employees time as a form of charity, its also a way to improve key business infrastructure, according to Mike McQuaid, a senior software engineer at GitHub.

We see this as kind of a mutually beneficial arrangement, both for businesses and their employees, be they aspiring contributors, active contributors, or current maintainers, he said. Because if [businesses] provide those people with time to work on these things during their work hours, thats beneficial to the company, and thats beneficial to the individuals as well.

The idea behind the program came about as a result of GitHubs work with the open source community, which showed that people who want to contribute to open source software dont feel as though they have the time or resources to do so. McQuaid hopes that carving out employees time on Fridays could help provide additional structure and incentive to participate in the ecosystem.

The Open Source Friday website includes resources to help convince employers of the importance of open source work, as well as information about how they can make it a habit at the office. For contributors, the site includes a link to a guide GitHub released last year on how to start adding to an open source project.

Maintainers, the people who shepherd and manage open source projects, get their own resources to help them welcome new contributors, as well as tools to help them explain why their extensive participation in the open source ecosystem is good for business.

GitHub also allows users to set up profile pages that make it easy for people to take what theyve done on these Fridays and show it off to the wider world.

Users dont need to be engineers in order to take part, either. While code contribution is important to the success of a project, creating and maintaining documentation is also key.

Basically, if you have done any programming before, or if youve improved documentation thats related to software before, you can contribute to an open source project, McQuaid said. Maybe not every open source project, but youll definitely be able to find something that you can get involved with.

GitHub is part of a broader consortium of tech companies thats known as the TodoGroup and is designed to encourage the growth and use of open source contributions among industry heavyweights like Facebook, Google, and Dropbox.

See original here:
GitHub declares every Friday open source day - VentureBeat

Enterprise DevOps Bullish on Open Source Software | Business Wire – Business Wire (press release)

SAN FRANCISCO--(BUSINESS WIRE)--NodeSource, the Node.js company, has announced the results of a new survey fielded among enterprise software developers ranking open source projects across a variety of factors, including hiring, entrepreneurism and the likelihood of IPOs in the near future.

The survey, which was aimed at gauging the momentum of Node.js within the open source software ecosystem, revealed that fully 91 percent of enterprise software developers believe new companies will be created from open source projects. While Node.js was the most-chosen option, with 74 percent of respondents expecting new Node companies to appear in the market, Docker came in closely behind at 51 percent, and 22 percent believe it will be MongoDB.

In addition, 89 percent said Node.js projects increase hiring, followed by:

A further 28 percent even said that a surge in IPOs for open-source companies in the next year is extremely or very likely, and 79 percent say it is at least somewhat likely.

Joe McCann, NodeSource Founder and CEO, commented, Open source is truly open for business. Open source projects are permeating every aspect of business operations and digital transformations. They are integral to mission-critical functionality. Node.js is emerging as the runtime of choice for DevOps, because Node.js enables enterprises to be operationally efficient, fast-to-market and fast in the market.

Node.js is a JavaScript runtime built onChrome's V8 JavaScript engine. It uses an event-driven, non-blocking I/O model that makes it lightweight and efficient. Companies like Walmart, Mastercard, PayPal, Intuit, F5, Fidelity, and Netflix rely on Node.js to deliver mission-critical experiences and to ensure quality and reliability. In addition, Node.js' package ecosystem,npm, is the largest ecosystem of open source packages in the world.

The survey further confirms the popularity of Node.js. As reported in TechCrunch, venture firm Battery Ventures has developed the Battery Open-Source Software Index (BOSS Index). It evaluates and ranks 40 open source projects. Not surprisingly, the sprawling and long-established Linux community in the category of IT Operations topped the index. Node.js ranked fourth, just behind Git and MySQL but ahead of Docker, Hadoop and Elasticsearch. McCann added, As witnessed by Node.js projects being used as foundational in developing capabilities for many of the worlds most trafficked sites, the survey underscores recognition of the Node.js communitys efforts to push the envelope by constantly enhancing and expanding the Node.js ecosystem and its value to enterprises.

More information about NodeSource will be available at the upcoming Node Summit conference, taking place at Mission Bay Conference Center in San Francisco, July 26-27, 2017. Node Summit is the largest conference focused exclusively on Node.js and the ecosystem of Node. The event will feature presentations by business leaders and technology experts as they discuss Node.js transformative role in the future of computing.

About NodeSource

NodeSource is a technology company dedicated to delivering enterprise-grade solutions in support of a sustainable ecosystem for the open source Node.js project. We aim to drive and expand the Node.js ecosystem by providing best-of-breed solutions that specifically target the needs of businesses deploying Node.js. Customers include NASA, Uber, PayPal, Cond Nast, and other progressive Node.js adopters. NodeSource is a founding member of the Node.js Foundation, a Heavybit member company, backed by RRE Ventures, Crosslink Capital and Resolute.vc and our AngelList Open Source Syndicate. For more information, visit NodeSource.com and follow @NodeSource on Twitter.

See the original post:
Enterprise DevOps Bullish on Open Source Software | Business Wire - Business Wire (press release)

Sony’s AI software to become open source – Nikkei Asian Review

TOKYO -- Sony will break from tradition among Japanese tech peers by making its artificial intelligence software freely available, as the company seeks to expand its presence in the field through outside collaboration with other businesses and research institutions.

The Japanese electronics company has developed AI independentlysince the 1990s but has decided to open-source its deep learning software known as a neural network library. The software, which learns by mimicking the neural networks inhuman brains, can be used in products.

Sony's software can be usedforface and voice recognition based ondeep learning abilities. The technology has been applied to predict the contract price of real estate transactions, for instance, and it is expected to be used in the development of home appliances and robots by third parties.

Though Japanese companies have made products that became worldwide hits, the development and application of such technology have been kept from the outside world. Sony has worked on AI since the technology's early days with products such as the Aibo robot dog but has allowed only itself to access the software.

In the global information technology industry, Google and other major U.S. companies have made their deep learning software freely available. Microsoft and Facebook are building followers through open source software, which leads to better quality since the opportunities for improvement increase.

Sony establishedan investment fund targeting AI startups last year. It has become the first Japanese business to join an AI industry group set up by Facebook and others.

(Nikkei)

Read the original post:
Sony's AI software to become open source - Nikkei Asian Review

Australia announces plan to ban working cryptography at home and in the US, UK, New Zealand, and Canada – Boing Boing

The Australian Attorney General and a key Australian minister have published a memo detailing the demand they plan on presenting to the next Five Eyes surveillance alliance meeting, which will be held next week in Ottawa.

The Australian officials will demand that their surveillance partners join with them in a plan to force "service providers to ensure reasonable assistance is provided to law enforcement and security agencies" when spies and police want to read messages that have been encrypted.

The encryption technologies under description are widely implemented in products and services that are often run by volunteer communities, or by companies who operate entirely outside 5 Eyes borders, but whose products can be used by anyone, anywhere in the world.

Working encryption is how we ensure that malicious parties don't hack our voting machines, pacemakers, home cameras, telephones, banking systems, power grids, and other key systems. There is no way to make working cryptography that can defend these applications against "bad guys" but fail catastrophically the moment a police officer or spy needs to defeat them.

The demand to ban working encryption dates back to the Clinton administration and the Electronic Frontier Foundation's groundbreaking victory in Bernstein, which ended the US ban on civilian access to working cryptography. The delusion that authorities can ban working crypto and still secure their national infrastructure persists, and is presently being mooted in Germany, and formed a key plank in Theresa May's party platform in the disastrous UK election.

As a reminder, here's what countries would lose, and what steps they would have to take, to ensure that police and spies could decrypt any communications they wanted to target:

Its impossible to overstate how bonkers the idea of sabotaging cryptography is to people who understand information security. If you want to secure your sensitive data either at rest on your hard drive, in the cloud, on that phone you left on the train last week and never saw again or on the wire, when youre sending it to your doctor or your bank or to your work colleagues, you have to use good cryptography. Use deliberately compromised cryptography, that has a back door that only the good guys are supposed to have the keys to, and you have effectively no security. You might as well skywrite it as encrypt it with pre-broken, sabotaged encryption.

There are two reasons why this is so. First, there is the question of whether encryption can be made secure while still maintaining a master key for the authorities use. As lawyer/computer scientist Jonathan Mayer explained, adding the complexity of master keys to our technology will introduce unquantifiable security risks. Its hard enough getting the security systems that protect our homes, finances, health and privacy to be airtight making them airtight except when the authorities dont want them to be is impossible.

What these leaders thinks they're saying is, "We will command all the software creators we can reach to introduce back-doors into their tools for us." There are enormous problems with this: there's no back door that only lets good guys go through it. If your Whatsapp or Google Hangouts has a deliberately introduced flaw in it, then foreign spies, criminals, crooked police (like those who fed sensitive information to the tabloids who were implicated in the hacking scandal -- and like the high-level police who secretly worked for organised crime for years), and criminals will eventually discover this vulnerability. They -- and not just the security services -- will be able to use it to intercept all of our communications. That includes things like the pictures of your kids in your bath that you send to your parents to the trade secrets you send to your co-workers.

But this is just for starters. These officials don't understand technology very well, so they doesn't actually know what they're asking for.

For this proposal to work, they will need to stop Britons, Canadians, Americans, Kiwis and Australians from installing software that comes from software creators who are out of her jurisdiction. The very best in secure communications are already free/open source projects, maintained by thousands of independent programmers around the world. They are widely available, and thanks to things like cryptographic signing, it is possible to download these packages from any server in the world (not just big ones like Github) and verify, with a very high degree of confidence, that the software you've downloaded hasn't been tampered with.

Australia is not alone here. The regime they proposes is already in place in countries like Syria, Russia, and Iran (for the record, none of these countries have had much luck with it). There are two means by which authoritarian governments have attempted to restrict the use of secure technology: by network filtering and by technology mandates.

Australian governments have already shown that she believes she can order the nation's ISPs to block access to certain websites (again, for the record, this hasn't worked very well). The next step is to order Chinese-style filtering using deep packet inspection, to try and distinguish traffic and block forbidden programs. This is a formidable technical challenge. Intrinsic to core Internet protocols like IPv4/6, TCP and UDP is the potential to "tunnel" one protocol inside another. This makes the project of figuring out whether a given packet is on the white-list or the black-list transcendentally hard, especially if you want to minimise the number of "good" sessions you accidentally blackhole.

More ambitious is a mandate over which code operating systems in the 5 Eyes nations are allowed to execute. This is very hard. We do have, in Apple's Ios platform and various games consoles, a regime where a single company uses countermeasures to ensure that only software it has blessed can run on the devices it sells to us. These companies could, indeed, be compelled (by an act of Parliament) to block secure software. Even there, you'd have to contend with the fact that other states are unlikely to follow suit, and that means that anyone who bought her Iphone in Paris or Mexico could come to the 5 Eyes countries with all their secure software intact and send messages "we cannot read."

But there is the problem of more open platforms, like GNU/Linux variants, BSD and other unixes, Mac OS X, and all the non-mobile versions of Windows. All of these operating systems are already designed to allow users to execute any code they want to run. The commercial operators -- Apple and Microsoft -- might conceivably be compelled by Parliament to change their operating systems to block secure software in the future, but that doesn't do anything to stop people from using all the PCs now in existence to run code that the PM wants to ban.

More difficult is the world of free/open operating systems like GNU/Linux and BSD. These operating systems are the gold standard for servers, and widely used on desktop computers (especially by the engineers and administrators who run the nation's IT). There is no legal or technical mechanism by which code that is designed to be modified by its users can co-exist with a rule that says that code must treat its users as adversaries and seek to prevent them from running prohibited code.

This, then, is what the Australian AG is proposing:

* All 5 Eyes citizens' communications must be easy for criminals, voyeurs and foreign spies to intercept

* Any firms within reach of a 5 Eyes government must be banned from producing secure software

* All major code repositories, such as Github and Sourceforge, must be blocked in the 5 Eyes

* Search engines must not answer queries about web-pages that carry secure software

* Virtually all academic security work in the 5 Eyes must cease -- security research must only take place in proprietary research environments where there is no onus to publish one's findings, such as industry R&D and the security services

* All packets in and out of 5 Eyes countries, and within those countries, must be subject to Chinese-style deep-packet inspection and any packets that appear to originate from secure software must be dropped

* Existing walled gardens (like Ios and games consoles) must be ordered to ban their users from installing secure software

* Anyone visiting a 5 Eyes country from abroad must have their smartphones held at the border until they leave

* Proprietary operating system vendors (Microsoft and Apple) must be ordered to redesign their operating systems as walled gardens that only allow users to run software from an app store, which will not sell or give secure software to Britons

* Free/open source operating systems -- that power the energy, banking, ecommerce, and infrastructure sectors -- must be banned outright

The Australian officials will say that she doesn't want to do any of this. They'll say that they can implement weaker versions of it -- say, only blocking some "notorious" sites that carry secure software. But anything less than the programme above will have no material effect on the ability of criminals to carry on perfectly secret conversations that "we cannot read". If any commodity PC or jailbroken phone can run any of the world's most popular communications applications, then "bad guys" will just use them. Jailbreaking an OS isn't hard. Downloading an app isn't hard. Stopping people from running code they want to run is -- and what's more, it puts the every 5 Eyes nation -- individuals and industry -- in terrible jeopardy.

Thats a technical argument, and its a good one, but you dont have to be a cryptographer to understand the second problem with back doors: the security services are really bad at overseeing their own behaviour.

Once these same people have a back door that gives them access to everything that encryption protects, from the digital locks on your home or office to the information needed to clean out your bank account or read all your email, there will be lots more people wholl want to subvert the vast cohort that is authorised to use the back door, and the incentives for betraying our trust will be much more lavish than anything a tabloid reporter could afford.

If you want a preview of what a back door looks like, just look at the US Transportation Security Administrations master keys for the locks on our luggage. Since 2003, the TSA has required all locked baggage travelling within, or transiting through, the USA to be equipped with Travelsentry locks, which have been designed to allow anyone with a widely held master key to open them.

What happened after Travelsentry went into effect? Stuff started going missing from bags. Lots and lots of stuff. A CNN investigation into thefts from bags checked in US airports found thousands of incidents of theft committed by TSA workers and baggage handlers. And though aggressive investigation work has cut back on theft at some airports, insider thieves are still operating with impunity throughout the country, even managing to smuggle stolen goods off the airfield in airports where all employees are searched on their way in and out of their work areas.

The US system is rigged to create a halo of buck-passing unaccountability. When my family picked up our bags from our Easter holiday in the US, we discovered that the TSA had smashed the locks off my nearly new, unlocked, Travelsentry-approved bag, taping it shut after confirming it had nothing dangerous in it, and leaving it completely destroyed in the words of the official BA damage report. British Airways has sensibly declared the damage to be not their problem, as they had nothing to do with destroying the bag. The TSA directed me to a form that generated an illiterate reply from a government subcontractor, sent from a do-not-reply email address, advising that TSA is not liable for any damage to locks or bags that are required to be opened by force for security purposes (the same note had an appendix warning me that I should treat this communication as confidential). Ive yet to have any other communications from the TSA.

Making it possible for the state to open your locks in secret means that anyone who works for the state, or anyone who can bribe or coerce anyone who works for the state, can have the run of your life. Cryptographic locks dont just protect our mundane communications: cryptography is the reason why thieves cant impersonate your fob to your cars keyless ignition system; its the reason you can bank online; and its the basis for all trust and security in the 21st century.

In her Dimbleby lecture, Martha Lane Fox recalled Aaron Swartzs words: Its not OK not to understand the internet anymore. That goes double for cryptography: any politician caught spouting off about back doors is unfit for office anywhere but Hogwarts, which is also the only educational institution whose computer science department believes in golden keys that only let the right sort of people break your encryption.

Tackling Encryption and Border Security key Priorities at Five-Eyes Meeting in Ottawah [Office of the Australian Attorney General]

Australia advocates weakening strong crypto at upcoming Five Eyes meeting [Cyrus Farivar/Ars Technica]

(via /.)

(Image: Facepalm, Brandon Grasley, CC-BY)

Read the original post:
Australia announces plan to ban working cryptography at home and in the US, UK, New Zealand, and Canada - Boing Boing

Blockchain: a new foundation for media, entertainment and broadcast – IBC365 (registration)

On January 3rd 2009, the first bitcoin block was processed, or mined.

Known as the genesis block, its special for a variety of reasons.

Most notable is the colossal achievement in establishing a secure digital store of value, or currency, a culmination of some 30 years mathematics, cryptography, game theory and coding.

Some hundred years earlier, Marconi demonstrated it was possible to transmit radio waves across the Atlantic.

Ironically, his innovation had multiple detractors, from his Italian compatriots who showed little interest in his work, to those who believed radio waves would not follow the curvature of the earth.

Marconis radio waves didnt follow the curvature of the earth, but with a little help from the ionosphere, did reach Newfoundland.

In 1909, Marconi received the Nobel prize. Radio is a foundational technology.

It created new bedrock for economies, transforming how we understand ourselves and our place in the universe.

But it took more than a hundred years of innovation to reach where we are today.

Bitcoin, and its underlying transaction record, blockchain, has a cryptographic elegance allowing the creation of digital events that are persistent, secure and unique enough, to which value can be ascribed.

It can be thought of as a collapsing protocol, combining the ability to store value, indelibly record ownership and make payments.

Interestingly, some eight years after the genesis block was created it still contains encoded, for as long as a single bitcoin node exists, in hexadecimal, the text: The Times 03/Jan/2009 Chancellor on brink of second bailout for banks.

This was a nod to the economic difficulties of those few months included by bitcoins creator, the pseudonymous Satoshi Nakamoto.

It took only a further year for bitcoin to acquire value when in May 2010, after a four day quest, Laszlo Hanyecz convinced Jeremy Sturdivant, to exchange 10,000 bitcoins for two Papa Johns pizzas.

At todays bitcoin price of roughly $2,500, those were special pizzas.

Over the next few years, what was a triumph in coding and cryptography, ran into rougher waters. Dogged by a reputation for extreme volatility, criminal activity, money laundering and financing terrorism, bitcoin suffered a lot of bad press.

Silk Road, using bitcoin as a medium of exchange, was probably the low point, the FBI eventually shutting the site down and seizing control of some 26,000 bitcoin in October 2013. Notwithstanding, the curious technology persisted, with hobbyists and enthusiasts working hard to develop and evolve the open source protocol, spawning in turn numerous derivatives.

As of today there are some 800 cryptocurrencies, all leveraging the thinking behind the original bitcoin protocol.

Many thought technology would lead nowhere, and mass adoption of bitcoin, or some other derivative cryptocurrency, was considered ridiculous.

And whilst the concept of bitcoin does seem ridiculous, it works.

Its nigh on impossible to shut down because of the distributed nature of the record of ownership; every single node needs to be destroyed.

It is easily accessible via a mobile phone allowing payments to be made with relative ease without the need for fiat currency, central counterparties, payment systems or general ledgers.

And the protocol itself has never been hacked.

In 2014, it started attracting the attention of the Bank of England.

In their third quarterly review of the year, examining payment technologies and the emergence of digital currencies, the authors conclude the key innovation is the distributed ledger allowing payment systems to operate in an entirely decentralised way, without intermediaries such as banks.

A year later, the Economist ran a piece called the Trust Machine, proclaiming how the technology behind bitcoin could change the world. And Ginni Rometty, CEO of IBM, made an equally bold claim in The Wall Street Journal, late in 2016, that blockchain, once widely adopted would transform the world.

IBC2017 -Blockchain and Broadcasters: A Masterclass Exploring the Opportunities for Broadcasters - in Distribution, Transparency, Anti-Piracy and Other Areas.

So where are we? For the media, entertainment and broadcast industry, there is little reference to the technology, which is strange, given the opportunity.

Aside from the obvious use cases relating to transaction processing, content is unique information, which is exactly what digital currencies are.

This means the cryptographic ecosystem created to record ownership can be applied to video, audio and text.

Content can be cryptographically secured, key pairs generated to control authorship and progress through production phases.

Blockchain allows a family tree of variants to be created, each with its own metadata, and cryptographic index, accessible anywhere.

Digital identities, anonymous or otherwise, can be created, capturing consumption data, and linking that to payment frameworks, operating without the need for fiat currency. This would also allow the synchronisation of payment at the point of consumption, at a micro level.

Finally, capital can be raised by issuing digital tokens, similar to bitcoin, funds being held in escrow, released in tranches, after peer-to-peer validation of the different phases from the treatment to preview.

Unique digital experiences can even be attached to those tokens; augmented and virtual reality, content gamification and curated viewing. I have even had a conversation about using a blockchain-jam to reach consensus as part of originating music or video content.

In exploring the immense opportunity this technology offers, there are seemingly three challenges. The first is understanding.

Presentation of blockchain and digital currency technology, largely focuses on describing it as a distributed ledger, or database, that maintains a continuously growing list of records, called blocks. Whilst technically correct, this doesnt engage the imagination.

Its the equivalent of describing radio as the simultaneous periodic variation of electric and magnetic fields.

Both of these descriptions do little to highlight the importance of their underlying importance.

The second is the general omission of any reference to the digital currency part. Most articles discuss blockchain, making some passing reference to bitcoin, without discussing the higher order of efficiency possible when considered together.

The net result are blockchain projects, that are nothing more than databases, still referencing the real world via fiat currency, versus including the digital currency part.

Finally, bitcoin is generally perceived as bad, so nobody talks about it, despite having current aggregate value of some $42bn.

Blockchain is a collapsing protocol; it acts as a store of value, a payments platform, and a ledger to record changes in data, whether an ownership record, or otherwise.

True blockchains are also immutable. Their distributed nature, the cryptography they employ and the consensus mode of operation which ignores bad actors creates a trust fabric, where every node on the network can trust every other node, without the need for a trusted intermediary.

The store of value is a unique cryptographic event, in the same way content is, making the blockchain ecosystem perfectly suited for managing the secure capture, creation, distribution and consumption of content asymmetrically; it puts the author back in control.

Ignoring or dismissing the technology at this stage is as dangerous as ignoring Marconi.

Founder and Managing Director of Blockchain Hub, an advisory company promoting and supporting the use of Blockchain across business sectors.

He is a former General Manager of Fujitsu and has held senior operational and technology strategy roles in the Bank of England, A.T. Kearney and Deutsche Bank.

Next week: Mark Mayne examines the size and scope of the blockchain market.

Original post:
Blockchain: a new foundation for media, entertainment and broadcast - IBC365 (registration)

Julian Assange: The CIA director is waging war on truth …

By Julian Assange By Julian Assange April 25

Julian Assange is editor of WikiLeaks.

Mike Pompeo, in his first speech as director of the CIA, chose to declare war on free speech rather than on the United States actual adversaries. He went after WikiLeaks, where I serve as editor, as a non-state hostile intelligence service. In Pompeos worldview, telling the truth about the administration can be a crime as Attorney General Jeff Sessions quickly underscored when he described my arrest as a priority. News organizations reported that federal prosecutors are weighing whether to bring charges against members of WikiLeaks, possibly including conspiracy, theft of government property and violating the Espionage Act.

All this speech to stifle speech comes in reaction to the first publication in the start of WikiLeaks Vault 7 series. Vault 7 has begun publishing evidence of remarkable CIA incompetence and other shortcomings. This includes the agencys creation, at a cost of billions of taxpayer dollars, of an entire arsenal of cyber viruses and hacking programs over which it promptly lost control and then tried to cover up the loss. These publications also revealed the CIAs efforts to infect the publics ubiquitous consumer products and automobiles with computer viruses.

When the director of the CIA, an unelected public servant, publicly demonizes a publisher such as WikiLeaks as a fraud, coward and enemy, it puts all journalists on notice, or should. Pompeos next talking point, unsupported by fact, that WikiLeaks is a non-state hostile intelligence service, is a dagger aimed at Americans constitutional right to receive honest information about their government. This accusation mirrors attempts throughout history by bureaucrats seeking, and failing, to criminalize speech that reveals their own failings.

President Theodore Roosevelt understood the danger of giving in to those foolish or traitorous persons who endeavor to make it a crime to tell the truth about the Administration when the Administration is guilty of incompetence or other shortcomings. Such endeavor is itself a crime against the nation, Roosevelt wrote. President Trump and his officials should heed that advice.

Words matter, and I assume that Pompeo meant his when he said, Julian Assange has no First Amendment freedoms. Hes sitting in an embassy in London. Hes not a U.S. citizen. As a legal matter, this statement is simply false. It underscores just how dangerous it is for an unelected official whose agencys work is rooted in lying and misdirection to be the sole arbiter of the truth and the interpreter of the Constitution.

Pompeo demonstrated a remarkable lack of irony when he suggested that WikiLeaks focus instead on the autocratic regimes in this world that actually suppress free speech and dissent even as he called for a crackdown of such speech. In fact, Pompeo finds himself in the unsavory company of Recep Tayyip Erdogan of Turkey (257,934 documents published by WikiLeaks); Bashar al-Assad of Syria (2.3 million documents); and the dictatorship in Saudi Arabia (122,609 documents), to name just a few who have tried and failed to censor WikiLeaks.

Pompeo was once a WikiLeaks fan. On July 24, then partisan politician Pompeo gloatingly tweeted: Need further proof that the fix was in from Pres. Obama on down? BUSTED: 19,252 Emails from DNC Leaked by WikiLeaks. Pompeo liked WikiLeaks when he perceived it was publishing material revealing the shortcomings of his political rivals. It was only when our publications touched Pompeos rice bowl that WikiLeaks became his target. Pompeo subsequently deleted the tweet, but he is learning that in the digital age, the truth is hard to hide. You dont get to love the truth one day and seek its suppression and the incarceration of its publisher the next.

As a candidate, Trump tweeted: Very little pick-up by dishonest media of incredible information provided by WikiLeaks. The president mentioned WikiLeaks 164 times during the last month of the election and gushed: I love WikiLeaks.

All democratic governments are managed by imperfect human beings. And autocracies are much worse the benign dictator is a myth. These human beings, democratic and autocratic alike, make mistakes and commit crimes, and often serve themselves rather than their countries. They are the focus of WikiLeaks publications.

The Pompeo doctrine articulated in his speech ensnares all serious news and investigative human rights organizations, from ProPublica to Amnesty International to Human Rights Watch. The logic that WikiLeaks, or these organizations, are somehow intelligence agencies would be as absurd as the suggestion that the CIA is a media outlet. Both journalists and intelligence agencies cultivate and protect sources, collect information and write reports, but the similarities end there. The world cannot afford, and the Constitution does not permit, a muzzle placed on the work that transparency organizations do to inform the American and global public.

Fundamental issues of free speech and freedom of the press, and of the interplay between liberty and security, date to the Republics founding. Those who believe in persecution and suppression of the truth to achieve their parochial ends are inevitably forgotten by history. In a fair fight, as John Milton observed, the truth always wins.

Read the original post:
Julian Assange: The CIA director is waging war on truth ...