Weakened and unstable British PM declares war on encryption – Fudzilla

Gotta blame someone

UK PM Theresa May has failed to notice that bringing out too many unpopular policies can make even an unelectable leftie like Jeremy Corban look viable.

In the middle of negotiating with even less electable born-again Christian homophobic climate change deniers from Northern Ireland to prop up her government, May announced that she was going to take out encryption.

"We cannot allow this ideology the safe space it needs to breed," May said.Yet that is precisely what the internet and the big companies that provide internet-based services provide. We need to work with allied democratic governments to reach international agreements that regulate cyberspace to prevent the spread of extremist and terrorism planning. We need to do everything we can at home to reduce the risks of extremism online."

Of course all this shows that she does not understand how it works. It means stopping Britons from installing software that comes from software creators who are out of her jurisdiction.

Digital activist and author Cory Doctorow described May's call as "a golden oldie, a classic piece of foolish political grandstanding.May says there should be no 'means of communication' which 'we cannot read' and no doubt many in her party will agree with her, politically. But if they understood the technology, they would be shocked to their boots.

"If you want to secure your sensitive data either at rest on your hard drive, in the cloud, on that phone you left on the train last week and never saw again or on the wire, when youre sending it to your doctor or your bank or to your work colleagues, you have to use good cryptography.

"Use deliberately compromised cryptography, that has a back door that only the 'good guys' are supposed to have the keys to, and you have effectively no security. You might as well skywrite it as encrypt it with pre-broken, sabotaged encryption."

Excerpt from:
Weakened and unstable British PM declares war on encryption - Fudzilla

Q&A: Flying the open source flag – ComputerWeekly.com

As the flag-bearer of open source software, Red Hat has seen its fortunes grow as more companies turn to Linux and, more recently, containers and microservices to power their businesses.

Access this e-guide with 6 key articles on cloud security and learn how to protect your organisation and its data on the cloud.

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

During its fourth quarter of the 2017 fiscal year, Red Hat raked in revenues of $629m, up 16% year on year. Asia-Pacific was the fastest growing region for the company, contributing 14% of total revenues for the year.

In a wide-ranging interview with Computer Weekly, Damien Wong, vice-president and general manager for Red Hat in ASEAN, sheds light on the companys success, its strategy for tackling the Southeast Asian market that is not used to paying for software, and the role of open source in digital transformation.

Red Hat is widely considered one of the worlds most successful open source companies. What do you think the company got right from the start?

Wong: For a 24-year-old company, our business model has been amazingly consistent. We started off with an open source subscription model, which meant we had to work harder to earn our business and strive to remain relevant to our customers.

As an open source company, we dont have proprietary software, unlike some purported open source companies that have an open core with proprietary add-ons to make their offerings enterprise-ready. That doesnt make them open source companies in the strictest sense. Companies that adopt such software are still beholden to proprietary components.

Neither are we an altruistic company that will only support community versions of open source software, because that does not instil confidence among enterprises. While the open source community is great at delivering innovations and new features at a rapid pace, not everyone is good at maintaining reliable, stable and secure software the not-so-glamorous aspects of software that enterprises need. While we need to leverage the innovations from the community, trying to support the community version is extremely difficult if not impossible because of the rapid evolution of technology.

So what weve done is to provide stable versions of open source software, not only by hardening it, but also making sure it is compatible with different applications and hardware. This enables enterprises to continue using our software, knowing that it will be stable, secure, and will perform well. Our model does not go against the principles of open source, because everything we do goes back to the open source community. But at the same time, were not nave enough to say we will support the latest and greatest community versions of open source software.

During the recent Red Hat Summit, executives acknowledged that open source tends to work better at the infrastructure layer, rather than in applications. Why do you think this is the case?

Wong: Its true that open source software is more mature in infrastructure than in business applications. I think its a case of having a bigger critical mass of users in the infrastructure layer (which is fairly standardised and commoditised), where open source has been proven to deliver a competitive edge in a number of use cases within a snapshot in time. This has made it easier for enterprises to adopt open source software, thrusting it into the mainstream. That said, I think its not a case of open source not being applicable to business applications, which tend be more customised to the needs of a specific organisation or industry. Its just a matter of time before those customisations become open source, which is the preferred mode of innovation today.

Do you think the emergence of microservices will speed up open source developments in business applications, by getting enterprises to think about interoperable open platforms when deploying applications, and not just in the infrastructure layer?

Wong: For sure, one of the key concepts around microservices is reusability. So if you create a microservice and abstract it well enough, it can be used across different applications. I think the evolution of microservices and their maturity in the application ecosystem will lead to a situation where you can pull together microservices from marketplaces in an application that serves a purpose well. When that will happen depends on market demand, and when theres a strong need, the open source community will come together to address that need.

Selling free software can be hard, especially in ASEAN, where a majority of people and businesses are not used to paying for software. Although Red Hat is growing at healthy rates in the region, do you see this as a stumbling block for future growth?

Wong: Southeast Asia has varying levels of economic growth and maturity in technology adoption. Open source provides organisations with access to technology that they otherwise could not afford. While not all organisations will survive, those that do will find that they need security and performance from their software, like any large enterprise would. Take Grab, the ride-hailing company, for example. Its uptime of 87% when it first started out had impacted the livelihoods of its drivers. They worked with Red Hat and made use of Ansible to automate the roll-out of application changes, increasing availability to more than 99%.

Traditional enterprises, on the other hand, are used to paying for software, though this is not the case across the board. In some emerging countries, even large organisations have misperceptions about open source. Some may still be using community versions of open source software without enterprise subscriptions, which we dont encourage as they roll out mission-critical applications.

Many people may not realise it, but a lot of innovation such as big data and cloud arose from the open source community Damien Wong, Red Hat

When deploying mission-critical applications, it is no longer just about creating a sandbox to test out new concepts it will affect the customer experience and financial transactions. If a patch for a known vulnerability is available and you dont have access to that patch because youre on a community version, youll face real issues. While we make security patches available to the open source community, it may take weeks before they make their way into community versions because of open source governance processes. If youre a bank, you could potentially expose customers to unnecessary risk and liability.

Why do you think large organisations in ASEAN still use the community versions despite the risks you have just described? It just doesnt seem rational. Is this about saving money, thinking that they can fix any problems on their own?

Wong: We can only guess why they do it. Some companies may hire good technical people, thinking that its a technology risk rather than a business risk. Having a very smart engineer using community software to support a production system may not be an issue. He can check with the forums or download the patches, so its just a technology thing. The business risks that I talked about may not be so apparent to an engineer or developer. We will have to educate them that open source is not just the domain of IT its the domain of the business as well. With software being seen in some countries as something you download from the internet and not what you pay for, it will take some time before software is seen as something that has to be taken seriously.

In recent years, Red Hat has been touting the role of open source in digital transformation, at least in this region. With almost every other technology company spreading the same message, how is Red Hat making itself heard?

Wong: Many people may not realise it, but a lot of innovation such as big data and cloud arose from the open source community. These technologies gave rise to cloud-native, digital disrupters, which have disrupted nearly every industry, from transportation and retail to hospitality. The traditional companies that were being disrupted then started to look at what they needed to do to stay relevant to their customers, and thats when the concept of digital transformation became really popular. So the root of digital transformation has been open source innovation.

Of course, there have been proprietary companies that have tried to emulate open source innovation. But time and time again, weve seen how open source communities have always out-innovated those companies. And Red Hat, being a proponent of open source, is participating in many open source projects that are driving digital transformation. For example, we talk about DevOps because every company needs to develop applications in a faster, more agile manner. That means moving away from monolithic infrastructure to things like microservices and containers, which Red Hat is backing with its contributions to the Docker and Kubernetes projects. As a leader in the open source world, it is natural that we take leadership in digital transformation as well.

Open source projects like Kubernetes were started by companies like Google, one of the biggest users of open source software. Why do you think that is the case? I would think Red Hat, as an open source leader, would be the one starting those projects.

Wong: Thats a good question that captures the success of Red Hat. We dont espouse the belief that if a piece of open source technology is not invented here at Red Hat, its not good. In fact, we actively look at projects developed by others that might be superior. A good example is OpenShift, which is now fundamentally made up of Docker and Kubernetes, as opposed to the original technologies that we had started with. Our customers dont have to be afraid of being stuck with a technology that may be at a dead end, without broad community support and stubbornly backed by only one company. Its the same case with OpenStack, which was created by Nasa and Rackspace. But today, Red Hat is the largest OpenStack contributor.

Red Hat is perceived to be using Linux to cross-sell OpenStack. Is that the strategy Red Hat is pursuing?

Wong: All our technologies are predicated on Red Hat Enterprise Linux, the foundation on which you can build stable infrastructure platforms. Like a building, if your foundation is not stable, it is impossible to build anything substantial on top of it. That is why weve always stood by the position that you have to build your infrastructure on something that we know is stable. If its quicksand, or something that cant withstand scrutiny, we cant back it. So without a stable base in OpenStack, which has many related components, it will be difficult for us to back that project and guarantee that things will work properly. There had been situations where organisations faced challenges because they did not understand how critical the foundation layer was going to be when they rolled out OpenStack.

For now, OpenStacks main adopters are telcos, internet service providers such as MyRepublic and cloud service providers. Do you see other sectors benefiting from OpenStack as well?

Wong: Thats a good observation. Service providers are naturally looking at OpenStack because of the move towards network function virtualisation (NFV). The standards body that governs the NFV movement is the European Telecommunications Standards Institute, which has recommended OpenStack as the underlying infrastructure layer for NFV. This has led internet service providers such as MyRepublic to look at OpenStack. While OpenStack has also been deployed by institutes of higher learning, financial institutions and government agencies in the ASEAN region, you are absolutely right that the most advanced users are telcos and service providers. I hope the carrier-ready advantages of OpenStack will have knock-on benefits for enterprise data centres, because if OpenStack can support a telco service, it can definitely support enterprise applications.

Go here to read the rest:
Q&A: Flying the open source flag - ComputerWeekly.com

Going Open Source to Make Your Own Loupedeck Alternative – PetaPixel (blog)

There is an extremely talented landscape photographer called Thomas Heaton whose YouTube videos I find very instructive and entertaining. Recently he featured a new product he was sent to try out: the Loupedeck, a physical console that lets you control Lightroom (the main software I use to sort, catalog and edit my photographs).

Loupedeck gives you knobs and buttons to press and twiddle rather than pointing and clicking with a mouse, which makes editing much more natural and allows you to be looking at the picture youre editing rather than the controls as you make your changes.

Anyhow, I looked at it and was extremely interested! It is being released for sale in the middle of July and so I floated the idea that my nearest and dearest might like to chip in towards it as a Fathers Day gift (it aint cheap, though its $415!) and they seemed amenable so I pre-ordered it.

But then however I started doing some further research, and found out that the same functionality can be obtained using open source software and a much more affordable MIDI controller (a controller made to control electronic musical instruments and digital audio). And as well as being much cheaper, its much more configurable in that you get to choose exactly what each knob and button controls, so you get control of the Lightroom features you use most and get to put them where it makes most sense to you.

And even better, its a project I have to research and put together myself rather than just buy and plug in thats much more fun and satisfying.

So, I cancelled my Loupedeck order and found a very reasonable MIDI controller for $65 from Adorama and ordered it instead (my lovely daughter is going to pay for it for Fathers Day its so nice shes earning her own money), and downloaded the open source midi2lr software (midi to Lightroom, get it?).

The X-Touch Mini controller arrived yesterday, much quicker than I was expecting, and I was very naughty and couldnt wait, so I started playing with it.

With the help of some very helpful websites (especially this post on a Google Group), a few hours, some trial and error, and lots of P-Touch labels, I think I have it configured the way I want it, but the best thing is that if I dont like the way it is set up I can just move things around and print new labels.

This is going to make it so much easier and more organic to edit pictures in future to be able to make adjustments without having to navigate to the tiny toolbars with the mouse, but to do it with physical knobs while keeping your eyes on the changes as you make them will be great. While it only has 8 knobs and 16 buttons, it is a dual layer setup, so each knob and button can be configured to do at least 2 things (and even more with profiles enabled but thats way more detail than you need).

These couple of videos helped me while I was setting this up, theyre a bit long if youre not a photo nerd, but they give you a better idea of why I did this and why Im so excited.

This guy sets it up with two, which I think is a little overkill

So, happy early Fathers Day to me (thanks, Monkey!), I cant wait to use this new set up to edit the church picnic photos I take tomorrow.

About the author: Crispian Thorne is a photography enthusiast who attempts to post one photo per day to his photoblog. You can find his website here. This article was also published here.

View original post here:
Going Open Source to Make Your Own Loupedeck Alternative - PetaPixel (blog)

CTO Praises Open Source, Offers Modernization Guidance – IT Jungle

June 12, 2017 Dan Burger

One of the most influential and productive fields of new development is the open source community. Its magnitude is just beginning to be felt. Its not just people talking about open source development. Its people doing development and deriving benefit from it. And its people using it often times without realizing it.

At the COMMON Annual Meeting last month, I had an opportunity to talk about open source technology with Brendan Kay, chief technology officer at Fresche Solutions, where open source solutions continue to evolve and provide benefits to internal development and the software products that company delivers to its customers.

Theres been an increase in open source technologies in the development of Fresche products, Kay says. Node.js, and particularly AngularJS, allow Fresche to create continuous integration environments. Angular is a development framework for building mobile and desktop Web applications.

Brendan Kay, chief technology officer at Fresche Solutions.

We are big fans of the AngularJS data-binding functionality, he notes. Its one of the technologies Fresche is using to provide higher quality development in a much faster timeframe.

Data-binding is an automatic way of updating the view whenever the model changes, as well as updating the model whenever the view changes. It eliminates document object model (DOM) manipulation, which is used in cross-platform, language-independent programming.

Fresche has been developing PHP and Node.js versions of BCD WebSmart development tools, since the company acquired BCD Software (along with Quadrant Software) in 2016. The development tools are used for creating multi-platform, Web and mobile applications on IBM i. The open source technology integrates with RPG and supports Windows, Unix and Linux platforms. There are thousands of free PHP scripts online that can provide shortcuts when doing new development. Among IBM i developers, PHP is the most widely used of the open source development environments.

Kay says PHP and Node.js will be coming to looksoftware and Quadrant products soon, but no time table is being mentioned. (Kay was president and CEO of looksoftware when it was acquired by Fresche in 2014.)

Where open source provides the best solution for a problem, we will go there, he says. We use particular open source technologies because they deliver something useful as quickly as possible.

Open source software adds options to the development environment. Becoming aware of the options is a lesson in progress for a lot of IBM i shops. Not that long ago, software companies funneled customers into proprietary technology silos. At its worst, this can result in hammering square pegs into round holes. When there is a broader discussion about how an organization wants to use its applications and where it wants to end up in terms of an IT strategy, its far easier to arrive at a precise solution.

People come to a vendor because they recognize they have a problem, Kay says. And in most cases, theyve thought through it pretty well. Information is easier to get than it used to be blogs and websites and resources can be researched before contacting vendors.

The evaluation is, more times than not, good quality, Kay says. If they have done the research, they are generally on the right track. Sometimes the decision makers are conflicted could go one way or the other. Those usually involve complex environments where help developing a proposal is necessary. There are some cases where a customer has a plan thats not well thought out and we advise them to think about it another way. Come up with a different solution. In these cases, they may understand the first step, but not the second third, or fourth.

Kay looks at modernization as a three-level project involving the database, the business logic and the user experience. All three are equally important.

The code on any of those three levels is either going to get better or worse. It is not going to stay the same, he advises. If you are not putting the effort into making it better, its going to get worse. And when you have a problem in any one of those three areas, it is going to create problems in the other two. You cant fix the problem by just fixing one of the areas.

Making an educated guess, Kay estimates 80 percent of modernization projects begin with user experience and/or integration as the starting point.

The reason the user interface and integration are good starting places, he says, is because thats where IT gets the organizational buy-in. Changes in the interface or in improved integration allow people to quickly see the benefit. Its usually the area that people are complaining about and fixing complaints is a good place to start. Often the benefit can be quantified and then used to fund the activities of the database and code levels. Taking on all three levels at once is more complicated, so making the project sequential is the better choice. The sequence is usually the user interface, the database and then the code, but thats not a hard and fast rule.

Between 10 percent and 20 percent of IBM i shops chose code cleanup as the first step.

The easiest code to modernize is the code that you delete, Kay says. Getting rid of the code you dont need is a great place to start. Then you are left with a smaller and more manageable database interface.

The shops that have the biggest job ahead of them are those that have done a poor job with documentation and maintenance.

For me, code modernization is a redundant term. Continual code improvement should be the practice, Kay says. Improvement should be reflected by more functionality and by continual improvement of architecture. These are things that people talk about as modernization, but for me thats part of development.

There are two activities that Kay suggests for improving a code base and, with regular maintenance, keeping it operating at a high level. One is refactoring making architectural changes that improve the quality, adaptability, performance and ease of maintenance or performance and the other activity is regularly extending functionality providing a graphical user interface or improving integration. Separate the two and do the refactoring first. These two things combine to accelerate rather than retard progress.

Open Source On IBM i: Let It Grow

Getting Offensive With The Legacy Label

7 Must-Have Open Source Products for IBM i

IBM i Open Source Business Architect Lays Out A Plan

Fresche Partner Plan Aims At Expanded Reach

Skills Shortage Prompts Fresches New View of X-Analysis

Fresche Makes Bold Move In IBM i Modernization Arena

Fresche Brings the Heat(map) to Legacy Modernization

Modernization Projects On The Rise, Says Fresche Legacy

IBM i Modernization Gets A Fresche-look

Tags:

Trinity Guard Gives PentaSafe Customers a Lifeline As I See It: The Hungry Leader

Link:
CTO Praises Open Source, Offers Modernization Guidance - IT Jungle

Top 5 Alternative Cryptocurrencies on the Rise The Merkle – The Merkle

In the world of alternative cryptocurrencies, it is very important to keep a diversified portfolio. Not every coin going up in value has a legitimate use case, and there are quite a few pump-and-dump schemes to be wary of. However, some altcoins are getting a lot of positive attention due to the developers putting in a lot of hard work. Below are some coins which have recently achieved major technological breakthroughs, and are now seeing their value rise as a result.

Although a lot of people have seemingly forgotten about BlackCoin, the cryptocurrency is still around. One of the main areas of focus for this project has always been to find ways to improve the proof-of-stake protocol. In a recent update, the BlackCoin developers have unveiled their Blackcoin Lore launch, which is a solution paving the way for smart contract potential.

Moreover, this new milestone will also make BlackCoin the first proof-of-stake digital currency to implement key components from Bitcoin Core 0.12. More importantly, this update paves the way for smart contracts on the BlackCoin blockchain moving forward. It will be interesting to see when this dream will be realized, but it is definitely something to look forward to. Additionally,the update allows BlackCoin to benefit from projects such as Blockstack and Joinmarket.

A lot of people were caught by surprise when the value of Maidsafecoin suddenly started to explode a few days ago. It seems the most recent development update has something to do with the price momentum, even though none of the updates are major. All of this goes to show the Maidsafe concept is inching closer toward finalization, which is good news for anyone looking into using a decentralized internet.

It has to be said, the Stratis value has been a bit of a rollercoaster these past few weeks. With the value surging non-stop for nearly a week, it almost started to look like a pump. However, the value corrected quickly and is now seemingly stable around the US$9 mark. A new wallet update was released not too long ago, and it looks like developers are making good progress on the Breeze Wallet too. Moreover, it has been confirmed one can effectively mine PoS blocks inside the Breeze Wallet, which is a major development.

Siacoin has been of great interest to cryptocurrency users and speculators over the past few weeks. The world of decentralized file storage solutions is getting a lot more interesting, to say the least. A lot of users are experimenting with these solutions as a way to earn Siacoin for sharing excess hard disk space with people looking for storage solutions. Sia is one of the projects getting very close to providing actual decentralized file storage solutions to the masses. It is only natural the price of this native token goes up as well.

Although a lot of people would rather not think of Ethereum as an alternative cryptocurrency, it still fits into this category. That being said, the recent value increase of Ether has been nothing short of amazing. The value per ETH surpassed US$365 and seems to maintain that value with relative ease. However, there is still a question of how much of this price point is due to speculation, rather than actual value. For a cryptocurrency ecosystem with no supply cap, some people feel Ether is incredibly overvalued. Then again, the token is necessary for people looking to buy into most cryptocurrency ICOs.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

Continue reading here:
Top 5 Alternative Cryptocurrencies on the Rise The Merkle - The Merkle

Chelsea Manning explains why she leaked secret military documents, fought for transgender rights behind bars – ABC News

Chelsea Manning has been called a hero by some, a traitor by others, but when asked how she sees herself, she said, "I'm just me."

"It's as simple as that," Manning told "Nightline" co-anchor Juju Chang in an exclusive interview that will air in an upcoming special edition of "Nightline."

Manning, a transgender U.S. Army soldier, was in prison for seven years at the U.S. Disciplinary Barracks at Fort Leavenworth, Kansas, after being convicted by a military tribunal under the Espionage and Computer Fraud and Abuse Acts and sentenced to 35 years in prison for releasing over 700,000 documents to WikiLeaks, of which only small amount of those documents ultimately lead to her conviction (some of them were published by The New York Times, The Guardian, and Der Spiegel).

When asked if she felt she owed the American public an apology, Manning said she has accepted responsibility for her actions.

"Anything I've done, it's me. There's no one else," she said. "No one told me to do this. Nobody directed me to do this. This is me. It's on me."

Manning at that time was a 22-year-old Army private named Bradley Manning. The information she disclosed included low level battlefield reports from Iraq and Afghanistan, evidence of civilian deaths in Iraq and Afghanistan, Guantanamo prison camp detainee profiles and U.S. diplomatic correspondence.

In referring to the military documents she was reviewing and what compelled her to risk her career and break the law by leaking them, Manning said, "We're getting all this information from all these different sources and it's just death, destruction, mayhem."

"We're filtering it all through facts, statistics, reports, dates, times, locations, and eventually, you just stop," she continued. "I stopped seeing just statistics and information, and I started seeing people."

Manning said she leaked the documents because she wanted to spark public debate. She said she didn't think leaking them would threaten national security.

"I work with this information every day," Manning said. "I'm the subject matter expert for this stuff. You know, we're the ones who work with it the most. We're the most familiar with it. It's not, you know, it's not a general who writes this stuff."

When asked why she, a low-level analyst, didn't raise her concerns up through the chain of command, Manning said, "the channels are there, but they don't work."

Manning pleaded guilty to some charges and was acquitted of the most serious charge brought against her: aiding the enemy. Her imprisonment was longer than any leaker in U.S. history. President Obama commuted her sentence to time served three days before he left office.

Days after Manning was sentenced, she came out as transgender on August 22, 2013. The military would not provide her with any treatment for her gender dysphoria, which she claimed resulted in her escalating distress. Her ACLU lawyer, Chase Strangio, filed a lawsuit on her behalf in September 2014. According to Strangio, Manning became "the first military prisoner to receive health care related to gender transition and was part of a shift in practice that lead to the elimination of the ban on open trans service in the military."

Fighting for hormone treatment was important for her, Manning said, because "it's literally what keeps me alive."

"[It] keeps me from feeling like I'm in the wrong body," she added. "I used to get these horrible feeling like I just wanted to rip my body apart and I don't want to have to go through that experience again. It's really, really awful."

Manning was released from prison on May 17 and has been documenting moments from her daily life on her Instagram and Twitter account, @xychelsea, from taking her first steps out of prison, to playing videos games to hanging out with friends.

Being on the outside, "it's a culture shock for anyone to go through any set of circumstances like that," Manning said.

When asked how she feels about the military today, Manning said, "I have nothing but utmost respect for the military."

"The military is diverse, and large, and it's public, it serves a public function, it serves a public duty," she continued. "And the people who are in the military work very hard, often for not much money, to make their country better and to protect their country. I have nothing but respect for that. And that's why I signed up."

Manning said she hasn't spoken to Obama since he commuted her sentence, but she would want to tell him thank you.

"I've been given a chance," she said. "That's all I asked for was a chance. That's it, and now this is my chance."

Excerpt from:
Chelsea Manning explains why she leaked secret military documents, fought for transgender rights behind bars - ABC News

Comey hailed as ‘intelligence porn star’ by Assange, as Snowden defends ‘leak’ – RT

Published time: 8 Jun, 2017 22:03 Edited time: 9 Jun, 2017 10:20

James Comey's revelation Thursday that he leaked information to the media received mixed reactions from NSA whistleblower Edward Snowden and WikiLeaks founder Julian Assange.

Assange seized the opportunity to play on the former FBI Directors own words, when he coined the term "intelligence porn" in his criticism of WikiLeaks' activities.

READ MORE:Intelligence porn: FBI directors new nickname for WikiLeaks

Meanwhile, Snowden, reacted somewhat more empathetically, tweeting: sometimes the only moral decision is to break the rules.

Comey confirmed under oath to the Senate Intelligence Committee that he leaked details of a meeting with President Donald Trump to the media via a friend. The leaked memo included the claim that Trump asked Comey to drop the investigation into former national security advisor Michael Flynns contacts with Russian officials.

READ MORE: Ex-FBI chief Comey: Many news stories about Russia are just dead wrong

Weighing in on Thursdays proceedings, Snowden subtly pointed out the similarities in their situations.

The whistleblower added that he was sympathetic to Comeys reasoning for the leak but noted that the government was not convinced when the same argument was made by former CIA director General David Petraeus over his leaks.

Snowden also responded to claims by Trumps lawyer that Comey made unauthorized disclosures of privileged communications, with the former NSA contractor saying the public interest in this case is superior.

In March, Snowden called out Comeys statement on leaks to the media in which the then-FBI director suggested such releases could be deterred by locking some people up.

In June 2013, federal prosecutors, led by Comey, filed criminal charges against Snowden under the Espionage Act over the leaking of classified information regarding the National Security Agency's surveillance programs.

Two years later, Comey called Snowden a fugitive, adding, Id love to apprehend him so he can enjoy the benefits of the freest and fairest criminal justice system in the world.

However that hasnt stopped the whistleblower coming to the defense of the former FBI director in the aftermath of his firing by Trump. This FBI Director has sought for years to jail me on account of my political activities. If I can oppose his firing, so can you, he tweeted last month.

Read more here:
Comey hailed as 'intelligence porn star' by Assange, as Snowden defends 'leak' - RT

Enigma: Why the fight to break Nazi encryption still matters – CNET – CNET

This is the Enigma machine that enabled secret Nazi communications. Efforts to break that encoding system ultimately helped make D-Day possible.

It was night when three British sailors and a 16-year-old canteen assistant boarded a sinking U-boat off the coast of Egypt. A spotlight shone on them from the HMS Petard, the Royal Navy destroyer that had hunted down the German submarine and now slowly circled the vessel. The U-boat's commander lay dead below the hatch as water poured in from a crack in the hull.

The four men began searching the ship, but not for survivors. They were looking for codebooks.

These red-covered guides were vital to breaking a diabolical code that made Nazi radio messages unintelligible. The Germans had been using a typewriter-like machine to encrypt their communications. They called it Enigma and were sure the code was unbreakable.

The British were determined to prove them wrong.

Wading past bodies through slowly rising water, First Lieutenant Anthony Fasson, Able Seamen Colin Grazier and Kenneth Lacroix, and young Tommy Brown found the captain's quarters and began searching drawers and breaking into cabinets. They found two codebooks written in red, water-soluble ink: the Short Weather Cipher, used to condense weather reports into a seven-letter message, and the Short Signal Book, used to report convoy sightings, along with other documents.

While Grazier and Fasson continued to search below, Brown carried the books up the ladder of the sub's conning tower to a waiting boat. They were racing against time as seawater poured into the submarine.

On his third trip up the ladder, Brown called for his shipmates to come up, too -- but it was too late. U-559 sank before Fasson and Grazier could escape that night in October 1942. As Hugh Sebag-Montefiore recounts in "Enigma: The Battle for the Code," their bravery helped changed the course of World War II.

The U-boat codes created by Enigma were especially hard to break, and the Allies found themselves locked out for weeks or months at a time. But several months after they recovered the codebooks from U-559 -- on March 19, 1943 -- cryptographers stationed in Britain's Bletchley Park broke through into U-boats' Enigma-coded messages and were never fully locked out again.

From then on, their efforts only improved. By September of that year, the Allies were reading encrypted U-boat messages within 24 hours of intercepting them. The breakthrough allowed the Allies to decrypt detailed field messages on German defenses in Normandy, the site of the impending D-Day invasion. And the machines themselves advanced the world's technology -- pushing forward ideas about computer programming and memory.

"I'd call it the key to computing," says Ralph Simpson, a retired computer expert and amateur Enigma historian.

The years since have given us a cat-and-mouse game between codebreakers and cryptographers, with each side trying to outwit the other. Those battles are still raging. But they're no longer confined to blackboards and spinning rotors on crude computers. They move at the speed of electrons flowing through your computer's processor.

Today's computer-enabled encryption -- technology that scrambles what unauthorized viewers see -- is so complex that computers can't break it unless it's been used incorrectly. It's so powerful that the US government and others have tried to legally require tech companies to unlock their own encryption, as was the case with Apple and the government last year over a terrorist's locked iPhone.

And today's encryption is so useful that dissidents, spies and terrorists rely on it to protect their conversations.

The innovation won't stop. Future advances in quantum computing might be able to crack even perfectly implemented encryption. That's led mathematicians to pre-emptively try to make encryption even stronger.

It's a cycle without end in sight.

Before the internet wove its way into our lives, encryption was pretty much something businesses and governments used to protect sensitive data, like financial documents and Social Security records.

"Mostly it was banks, diplomatic services and the military who used cryptography throughout history," says Bill Burr, a retired cryptographer from the US National Institute of Standards and Technology.

The internet increased the use of encryption, as business and governments sent information over networks that hackers and spies could easily intercept. But few regular people went out of their way to use encryption as part of daily life. Maybe your paranoid friend would encrypt his email, forcing you to use extra software to read it.

That changed after disclosures by former NSA contractor Edward Snowden, who in the summer of 2013 revealed the existence of government mass surveillance programs designed to collect reams of information from everything -- our emails, calls and texts. Though we were told the programs weren't designed to target Americans, the disclosures forced us to ask how much information we want to put on the internet -- and potentially expose.

The tech industry has tried to address the problem by offering us another option: encrypting as much of our lives as we can.

What's made this possible was the Engima, and the men, women, mathematicians, computer scientists and linguists who ultimately beat it.

This is their story.

The Enigma has a surprisingly understated design for being such a deadly tool. It could easily be mistaken for a typewriter with a few extra parts, housed in a plain wooden box.

Lifting the lid of an Enigma, a German operator saw what might on first glance seem like two typewriters squished together. One set of keys, closest to the operator, was the actual keyboard to be typed on.

Above it was a second set of keys, laid out just like the keyboard. But when you type on the real keyboard, these letters light up. Type an "a" on the normal keyboard, for example, and "x" lights up above.

So if you start typing a word, each letter lights up in code.

This was Enigma's genius. The German operators didn't need to understand the complex math or electronics that scrambled what they typed on the keyboard. All they knew was that typing "H-E-L-L-O" would light up as "X-T-Y-A-E," for example. And that's the message they sent around.

This jumbling of letters changed each day at midnight, when Nazi commanders would send new settings that Enigma operators would use to turn dials and change the plugs on a board below the keys, all designed to match the day's code. Without the code, the message couldn't be unscrambled.

Enigma was so sophisticated it amounted to what's now called a 76-bit encryption key. One example of how complex it was: typing the same letters together, like "H-H" (for Heil Hitler") could result in two different letters, like "L-N."

That type of complexity made the machines impossible to break by hand, Simpson says.

How impossible? If you gave 100,000 operators each their own Enigma machine, and they spent 24 hours a day, 7 days a week testing a new setting every second, "it would take twice the age of the universe to break the code," Simpson says.

Obviously, codebreaking by hand wasn't going to cut it.

"Because we now have machine encryption for the first time, it took a machine to break it," Simpson says.

Equally fascinating is that Nazi military leaders knew, in theory, that someone could develop a machine-assisted way to speed up their code cracking. But they didn't believe their enemies would put in the time and resources needed.

They were wrong.

14

See Alan Turing's lost notes, found in the walls of Bletchley Park 70 years later

Of course, the UK was very motivated to break the Enigma. German U-boats were sinking hundreds of British ships, costing thousands of lives and choking the country off from vital supplies being shipped from the United States and Canada. What's more, the country was desperate for any advantage in the early days of the war, filled with German bombing campaigns and fears of a land invasion.

So resources, manpower and the lives of sailors like Fasson and Glazier were poured into cracking the Enigma codes. The first result of these efforts was the Bombe.

Custom-designed by British mathematicians like Alan Turing, Bombes were about the size of three vending machines stacked side by side, with a series of spinning rotators connected in the back by a 26-way cable. They were based on the Polish "Bomba" codebreaking machine, which the Poles were forced to abandon in 1939, after their country was invaded by Germany.

Housed at a secretive intelligence program on the grounds of manor house Bletchley Park, less than 50 miles outside of London, and other nearby installations, the Bombes were run by teams of Navy women.

Each of the Bombe's rotators had letters on it and, as they spun, the machine tested possible solutions to a given Enigma code much faster than a human could.

Researchers like Turing and his team were able to make the Bombes more efficient by using "pinched" codebooks from U-boats and other clues, eliminating thousands of possible solutions.

"If we understand the book, we then know what the submarines are likely to say," says David Kenyon, a research historian at the Bletchley Park Trust.

Breaking into the U-boat's "Shark" code in 1943 set in motion a series of dominoes that ultimately led to the Nazi defeat. Intercepted U-boat messages made the Allies better at sinking the vessels, which contributed to the German Navy's decision to pull its U-boats out of the Atlantic later that year, Kenyon says. That respite allowed the Allies to prepare for D-Day in 1944 and to end the war in 1945.

While codebreaking alone didn't win World War II, it was one of the most powerful weapons invented for that purpose.

"There was no point in the Second World War where the outcome was a foregone conclusion," Kenyon says. There's no telling what might have happened "if you took away any of the factors that were working in the Allies' favor."

35

Photo Tour of Bletchley Park

The work done on the Bombes and other codebreaking machines didn't just aid in the fight against the Nazis. They proved theories about computer programming and data storage, the lifeblood of today's modern computers.

One of these breakthroughs came when the Joseph Desch of the US Navy found a way to speed up the Bombe. The machines could only run so fast, because operators read the results of the codebreaking analysis right off of the wheels themselves. Go any faster and the wheels would spin right past the correct answer.

Desch's solution was a primitive form of digital memory. When the Bombe came upon the correct answer, electrical relays would detect and record it. That let the US Bombes spin more than 17 times faster than the British Bombes.

Then there was Colossus. This machine -- designed not to break Enigma, but rather the more sophisticated Lorenz codes used by the German High Command -- advanced vacuum tube tech that later came to power the world's first true computers, like the ENIAC and Mark-1, and then the first generation of IBM mainframes.

To create a codebreaking machine powerful enough to crack Lorenz, British engineer Tommy Flowers found a way to run more than 2,000 vacuum tubes at once. While it had been theorized this approach could power a programmable computer, Flowers was the first to make it happen.

Flowers himself didn't get a chance to push this technology to its next logical conclusion. But Turing and other Bletchley alums worked at the University of Manchester after the war, creating the Ferranti Mark 1 -- a programmable computer run with vacuum tubes.

That the work at Bletchley showed up later in the first general-purpose computers doesn't surprise Burr. The codebreakers were able to fully understand the workings of Enigma and the Lorenz code create machines to break them at a time when the principles of computing only existed in theory.

"It's hard for me to imagine people smart enough to do that," says Burr, who's an expert in cryptography.

In terms of global politics, encryption was pretty straightforward during World War II. One nation tapped its linguists and mathematicians -- and relied on the heroism of men who boarded sinking U-boats -- to crack the encryption tech of an enemy force.

The world's gotten a lot more complicated since then.

Just as in World War II, law enforcement and spy agencies today try to read the communications of criminals, terrorists and spies. But now that almost everyone uses encryption, a government's ability to break it doesn't just worry our country's enemies -- it concerns us, too.

And despite the advances in computing and encryption since Bletchley Park, we haven't come close to agreeing on when it's okay to break encryption.

Case in point: the 2016 conflict between Apple and the US Federal Bureau of Investigation. The FBI wanted Apple's help breaking into the iPhone of a suspected terrorist, but Apple argued that this could put everyone who uses an iPhone at risk.

Burr, who saw the inside of public controversies over the government breaking encryption during his time at the National Institute of Standards and Technology, says there's no clear path forward.

"There's just a big dilemma there," he says. Creating ways to break encryption "will weaken the actual strength of your security against bad guys of ability. And you have to count among those the state actors and pretty sophisticated and organized criminals."

In their laser-focused effort to crack Nazi encryption, codebreakers like Turing and soldiers like Fasson and Grazier were unlikely to have imagined a world like this. But here it is: the catch-22 of computerized encryption. And it's not going away anytime soon.

Special Reports: CNET's in-depth features in one place.

Tech Enabled: CNET chronicles tech's role in providing new kinds of accessibility.

Read more:
Enigma: Why the fight to break Nazi encryption still matters - CNET - CNET

MIA to Host Talk With Julian Assange, Slavoj iek, More at Meltdown Festival – Pitchfork

M.I.A. previously announced that WikiLeaks founder Julian Assange would be speaking at this years Meltdown Festival, which she curated. Now, more details on Assanges involvement have been revealed. M.I.A. will host a talk with Assange (who will appear remotely over a live link), along with philosophersSlavoj iek andSreko Horvat. The discussion, titled Whats Coming Next, will cover the complexities of global activism and art in a changing world, according to a rep for the festivals venue. The talk will go down from 10:30-11:45 a.m. on June 11 at theWeston Roof Pavilion of the Royal Festival Hall in the Southbank Centre.

After it was announced last month that Swedish authorities were dropping its investigation of sexual assault by Assange, M.I.A. penned an impassioned statement defending him. She recently shared a new song, GOALS.

Read M.I.A. vs. the System: A Complete Timeline of Her Controversies andThe Survivor: A Conversation With M.I.A.

Read the rest here:
MIA to Host Talk With Julian Assange, Slavoj iek, More at Meltdown Festival - Pitchfork

New Cryptocurrency Mining Malware Targets Raspberry Pi Devices – The Merkle

Cryptocurrency mining malware has come a very long way over the past few years. Whereas Bitcoin used to be the center of attention in the beginning, this type of mining malware has expanded to include Dogecoin, Monero, Ethereum, and ZCash as well. However, the latest iteration of mining malware uses Raspberry Pi devices to mine coins. Not the most efficient approach, but it is still an interesting development.

A lot of people have shown great interest in the Raspberry Pi devices. These pocket-sized computers are quite powerful and very affordable. Although they will not replace traditional desktops or laptops anytime soon, they make for appealing home theater devices, among other things. Every Raspberry Pi usually runs some form of the Linux operating system, although there is a slimmed down Windows 10 IoT version in the works as well.

Up until now, the Linux operating system has been relatively safe when it comes to malware. Criminals often only develop nefarious tools to harm Windows computers, with a few exceptions going after Apple users as well. This new variant of cryptocurrency mining malware is a Linux Trojan, which goes by the lackluster name of Linux.MuLDrop.14. It is also purposefully designed to attack Raspberry Pi devices and use the machines resources to mine cryptocurrencies.

As most people are well aware of, the Raspberry Pi is not the most powerful device by any means. It doesnt have a powerful CPU or integrated graphics chip by any means. In fact, the device is entirely unsuited to mine cryptocurrency whatsoever. However, if you control a few thousand of these devices without having to pay for their electricity, things can start to look a lot better from now on.

It appears this new cryptocurrency mining malware has been around since May of 2017. It appears the Raspberry Pi devices are infected through the SSH protocol, assuming the device owner leaves this port open to external connections. That is the case more often than not, though, as a lot of people connect to their Pi over SSH. If the mining malware is installed successfully, it also changes the password of the standard account to a long string of characters.

It is quite interesting to see developers go out of their way to only target these smaller devices, though. Cryptocurrency mining on a cluster of Raspberry Pis will still not generate much income by any means. It is unclear which cryptocurrencies are mined exactly using this malware, though. It would take millions of enslaved devices to make even a dollar per day, which makes this entire effort not exactly worthwhile by any means.

The bigger problem is how this could signal an era of Linux-oriented malware. Considering many people feel Linux is the safest operating system, it is certainly possible criminals will try to prove them wrong. In the case of this mining malware, however, it appears victims can get rid of the malware by flashing the operating system again. There is no ransom demand to regain control over the device whatsoever. Still, it is quite a troublesome development, to say the least.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

Read more:
New Cryptocurrency Mining Malware Targets Raspberry Pi Devices - The Merkle