Hospital in Pakistan Accepts Cryptocurrency Payments, Offers Discounts – newsBTC

Abid Hospital in Pakistan has become the first Asian hospital to accept cryptocurrency payments. Read more...

The healthcare industry has been actively exploring the use of cryptocurrency technology and not the cryptocurrencies itself. While there are a select few places in the world where one can pay for their treatment with Bitcoin, Abid Hospital in Pakistan has become the first Asian healthcare provider to accept cryptocurrency payments.

According to local media reports, the Blue Area, Islamabad-based Abid Hospital has announced the acceptance of PakCoin, a region-specific cryptocurrency created along the lines of Bitcoin. The relatively new hospital started in 2015 has been known for its technology adoption. The multispecialty hospital, offering round the clock healthcare services including emergency room and critical care has also decided to offer an additional discount for those opting to pay with PakCoin.

Healthcare is one of the most expensive services around the world. While Asian countries are known for their inexpensive and efficient healthcare systems, the costs are still high according to local standards. In such a scenario, any discount is good for the patients. The 20 % discount makes Abid Hospital an attractive option for patients. It will also help drive the adoption of PakCoin among the visitors.

Abid Hospital is not new to discount offerings. The institution has been offering 50% discount on frequently used services like the OPD (Out- Patient Department) and lab tests. Also, the hospital has special packages for Islamabads police and traffic police, with a discount rate of 20%. The same is also applicable for admitted, in-patients as well.

PakCoin holds the distinction of being the countrys first cryptocurrency. It is based on Litecoin and can be used not only in Pakistan but across the world. The creators of PakCoin have fixed the total supply of the digital currency at 182 million tokens, out of which 10 percent is already pre-mined. The cryptocurrency platform is also planning to give away 50 PakCoin tokens each to over 150,000 people in the coming days.

The popularity of PakCoin is currently increasing within the country as many people continue to adopt the digital currency and soon it may emerge as a leading virtual currency in Asia. Like Abid Hospital many other healthcare services providers may also join forces and do something similar, driving adoption even further.

Visit link:
Hospital in Pakistan Accepts Cryptocurrency Payments, Offers Discounts - newsBTC

Freewallet Extends Support to Dash Cryptocurrency – newsBTC

Freewallet has announced the launch of a cryptocurrency wallet application for Dash cryptocurrency. Read more...

Dash is one of the fastest growing cryptocurrencies in the market, thanks to the technology prowess continually being showcased by the developer community. As the demand for Dash continues to increase, various cryptocurrency companies are now coming onboard by integrating Dash support to their platforms. Freewallet has become the latest platform to do so.

Freewallet is one of the leading cryptocurrency wallet providers. The company already has wallets for 11 different cryptocurrencies including Bitcoin, Ethereum, Monero, and others. The release of Dash wallet makes it the 12th crypto-wallet in Freewallets portfolio. The company announced the release a few days ago.

Dash Freewallet application is now available for download on Google Play Store, and it is soon expected to arrive on the Apple App Store as well. According to reports, the platform is currently waiting for approval from Apple to be included in the app store. However, given the strict policies regarding cryptocurrency based applications, one cant be sure until the wallet makes an appearance on the App Store.

A recent article on one of the financial website quoted the Freewallet team explaining the reason behind Dash integration. A team member said,

while Bitcoin increases fees, operating extremely slowly, Dash benefits its users providing instant transactions and low fees.

The release comes at a great timing as Dash, with its recent Sentinel upgrade as paved for the future cryptocurrency based payment system codenamed Project Evolution. As Dash works on creating a comprehensive cryptocurrency payments system for merchants, businesses and individuals alike, the number of users switching to Dash is bound to increase. Freewallet now stands to retain its existing customers of other crypto-wallets while attracting new ones at the same time.

Alvin Hagg, the founder of Freewallet said,

Freewallets policy is aimed at supporting the community in a timely manner. We regularly monitor the market to provide user-friendly services to make cryptocurrencies easy to use. Dash presence on crypto-scene has been particularly visible lately, and we did our utmost to release the wallet promptly.

The easy to use Freewallet, with intuitive interface and support for over seven languages, makes it an ideal wallet for the Dash community. The wallet is expected to soon gain traction, just like the other versions. Meanwhile, other providers are also likely to include support for Dash in the coming days.

Read the original:
Freewallet Extends Support to Dash Cryptocurrency - newsBTC

Bitso Creates Cryptocurrency-Based Remittance Corridor Between Mexico and Canada – The Dash Times (blog)

Cryptocurrencies such as bitcoin and Dash have a big role to play in the future of remittance payments. Cryptocurrencies are easy to transfer across the globe without being hindered by banking requirements. Bitso, one of Mexicos largest bitcoin exchanges, has created a Mexico-Canada remittance corridor with the help of Paycase. Moving funds from bank accounts between the two countries by using blockchain technology is now an official feature.

Finding a way to enable fiat currency-based micropayments has been challenging, to say the least. Using the banking system means these transfers suffer from high fees and unnecessary delays. Cryptocurrencies make a lot more sense in this regard, due to their global accessibility and lower fees. To be more precise, this made a lot of sense for bitcoin, yet its transaction fees have gone up spectacularly these past few weeks.

Bitso, one of the Mexican cryptocurrency exchanges, feels the time is now to put cryptocurrency technology to the test in the remittance sector. Creating a microtransaction corridor between Mexico and Canada is an important first step to make this happen. A bank transfer has been sent to Paycase and relayed to Bitso by using bitcoin. The final transfer between Bitso and the recipient occurred in the form of depositing Mexican pesos into a bank account. This entire process took around three minutes to complete, which is a lot quicker than using regular bank transfers.

For the time being, it remains unclear when the service will be made available to customers in either country. It is evident bitcoin and other cryptocurrencies can support global payments in a quick manner without charging ludicrous fees. Remittance corridors need to be created to keep local economies alive. While Canada is economically healthy, the same does not apply to Mexico right now. The country has been warming up a bit to cryptocurrency over these past few weeks, albeit no significant bullish behavior has been recorded to date.

Although this particular trial makes use of bitcoin technology, it is not unthinkable alternative currencies such as Dash can be used for similar purposes. Dash transfers can even be sent anonymously, which allows users to retain a level of privacy by not exposing personal information to third parties. Bitcoin-based remittance services have been scrutinized by governments these past few years, which only makes a stronger case to use alternative currencies for this type of purpose.

Header image courtesy of Shutterstock

Here is the original post:
Bitso Creates Cryptocurrency-Based Remittance Corridor Between Mexico and Canada - The Dash Times (blog)

WikiLeaks’ CIA Document Dump: What You Need to Know – RollingStone.com

Earlier this week, WikiLeaks published a startling news release announcing what could be the largest-ever dump of CIA documents 8,761 pages, a collection which the website calls "Vault 7." WikiLeaks, the "stateless news organization" led by Julian Assange, claims the leak is the first of a series called "Year Zero" that they plan to release regarding secret information on digital tools and techniques used by the agency. The documents, which are mostly pages of highly technical code, appear to reveal the intelligence agency's hacking capabilities, including how they exploited security flaws in popular smart electronics like iPhones and Samsung TVs to spy on individuals.

There is no evidence the hacking tools were used against Americans, and the CIA has refused to confirm the authenticity of the documents. On Wednesday, the CIA issued a statement declining to comment on the "purported intelligence documents" and said the agency was "legally prohibited from conducting electronic surveillance targeting individuals here at home... and CIA does not do so." That same day, the FBI began preparing to interview people with connections to such government documents and files. Intelligence officers and cyber-security experts are weighing in with varying opinions on whether the leak came from inside the CIA or from foreign hackers outside the agency.

Since the dump, there have been several developments, from Assange announcing he would work with electronics and software companies to help patch the security flaws, to experts questioning just what the document dump reveals. In an effort to make sense of the cluster, here's a guide to how the latest leak of secret information affects the government, tech companies and private citizens.

What did the release reveal? The WikiLeaks dump is now being analyzed by cybersecurity experts, who are focusing on what are known as "zero-day" vulnerabilities. These are unknown holes in software that hackers (or government agencies) can use to infect a device with malware or spyware, or gain access to personal information. Since the dump, the CIA has faced criticism from groups such as the ACLU for not turning the security flaws over to the companies so they could be fixed, instead leaving American citizens open for potential cyber attacks.

The alleged CIA documents, which are dated from 2013 to 2016, describe the agency's abilities to use the software flaws to hack into and control devices like the iPhone, Android and Samsung TVs, along with Skype, Wi-Fi networks and antivirus programs. They note, for instance, that agency's malware can infiltrate iPhone and Android mobile devices like the one known to handle the President's Twitter account. "If the CIA can hack these phones then so can everyone else," read one WikiLeaks press release, suggesting that Trump's personal accounts might have already been compromised.

According to the dump, the CIA has the ability to hack into devices remotely and activate cameras and microphones so they can keep tabs on a person's location and private messages. One of the most disturbing aspect of the documents comes in an explanation of how the CIA cooperated with United Kingdom intelligence services to develop techniques to hack into Samsung Smart TVs with a program called "Weeping Angel" that enabled them to record their surroundings while the television appeared to be off.

Does this mean the CIA is spying on me? The short answer is no. Nathan White of the digital rights nonprofit advocacy group Access Now in Washington, DC, says he is not surprised to learn the CIA developed tools and techniques for spying on tech devices, but there is no evidence the agency spies on the American population. "The CIA can hack into phones, TVs, and maybe even cars," he says, "but there is no reason to believe that this means that all of these things have been hacked." While it might be disconcerting that the nation's spy agency has these Orwellian abilities, they're supposed to only use them on foreign targets.

Then again, per Obama-era guidelines, they were supposed to disclose vulnerabilities they found to the tech companies so the security holes could be fixed, and they did not. Cybersecurity expert Stuart Madnick, head of the the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity at MIT, says the CIA is conflicted: "How dangerous is it to you if the vulnerabilities persist, or how valuable are the vulnerabilities if the CIA can use them? We need to decide as a nation.

Who leaked the CIA documents? WikiLeaks says they published the CIA documents "as soon as its verification and analysis were ready." The website, of course, is not outing their source, but write that the "source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons."

James Lewis, an expert on cybersecurity at the Center for Strategic and International Studies in Washington, DC, says that he believes the source is probably an agency contractor. "The insider story has some odd bits: this sort of information is supposed to be compartmentalized, meaning that one person shouldn't have access to all of it," he says. "The agency has extensive new safeguard to detect such a leak after the Snowden incident." He says it's also possible the Russians stole the documents and gave them to WikiLeaks, as part of an ongoing struggle between the two powers, in which, as The Guardian describes, "WikiLeaks is widely seen as sitting firmly in Moscows corner."

How does this compare to Edward J. Snowden's leaks in 2013? WikiLeaks says the number of Vault 7 pages "eclipses" the first three years of the Snowden NSA leaks, but there are considerable differences here. Snowden exposed the NSA was spying on American citizens and uncovered surveillance on a global scale. WikiLeaks does not outright accuse the CIA of hacking its own, but rather keeps the focus on the agency's hacking tools. Also, WikiLeaks alleges the CIA didn't report identified zero-day vulnerabilities, while Snowden proved the NSA talked about actually making them.

Overall, there is no clear similarity between this dump and Snowden's. "The NSA leaks were shocking because they revealed mass surveillance that impacted all of us," White says. "We're not seeing that here at least not yet.

What's going to happen next? At a press conference on Thursday, Assange announced that WikiLeaks will give the affected tech companies access to CIA hacking tools for their defense measures, as the documents in the dump only described portions of agency tools, not full programs needed to run a cyber attack. Microsoft and Cisco Systems said they "have not yet been contacted," but would welcome "submissions of any vulnerabilities through normal reporting channels."

The offer comes two months after the American intelligence reported a link between WikiLeaks and the Russians in regards to the Democratic National Committee hack during the 2016 presidential election. It is a growing belief among U.S. officials and lawmakers that Assange is a pawn of Russian President Vladimir Putin in hacking the American government. Russia and the US will continue these battles over whodunnit. But for now, the Kremlin are telling us the CIA information dump is cause enough to turn their phones off.

Sign up for our newsletter to receive breaking news directly in your inbox.

Originally posted here:
WikiLeaks' CIA Document Dump: What You Need to Know - RollingStone.com

Wikileaks Jumps The Shark – The Daily Banter


The Daily Banter
Wikileaks Jumps The Shark
The Daily Banter
Since well before the election, there was a nagging suspicion that the darlings of the anti-Hillary hard left, Julian Assange and Wikileaks, were not all that progressive. It started to feel like they were working very hard to tilt the election towards ...
WikiLeaks aids doubters of Russian election hackingThe Hill
WikiLeaks' CIA dump makes the Russian hacking story even murkier if that's possibleSalon
GOP senator claims he was targeted by hackers after blasting WikiLeaks' Julian Assange as 'an enemy'New York Daily News
Mediaite -Washington Times -Kenai Peninsula Online
all 69 news articles »

Read more:
Wikileaks Jumps The Shark - The Daily Banter

Heritage Action chief: Don’t embrace WikiLeaks for partisan reasons – Washington Examiner

WikiLeaks is a foe and can't be embraced for partisan reasons, the head of an influential conservative group stated Sunday in the wake of the group's disclosure of CIA hacking methods.

"WikiLeaks is an enemy of the United States," said Heritage Action for America CEO Michael Needham, speaking on "Fox News Sunday."

"Both sides need to recognize it cannot be embraced for partisan domestic politics," Needham said of the group.

Some on the right, including President Trump, applauded WikiLeaks for its publication of emails from Hillary Clinton's top campaign adviser. In the past, Needham noted, people on the left backed WikiLeaks when it released damaging disclosures about the Bush administration.

"We have a big problem in this country if there's somebody inside the CIA leaking this kind of information," Needham said. "It's something that we all as Americans need to be deeply concerned about."

Last week, WikiLeaks released stolen documents with information about the CIA's cyber spying methods.

That, said commentator Juan Williams, is far different from past WikiLeaks publications, which shed light on legally dubious domestic spying.

"What was revealed this week was about CIA methods, sources, tactics overseas," Williams noted.

Also from the Washington Examiner

This last election didn't show many gains for women, but more women are running than ever before.

03/13/17 1:01 AM

Read more here:
Heritage Action chief: Don't embrace WikiLeaks for partisan reasons - Washington Examiner

WikiLeaks: What are we to think? – Columbia Daily Tribune

I always have had mixed feelings about unauthorized disclosure of U.S. government surveillance activities. National security officials can make a good case for secrecy as they pursue those who would do us harm, but all of us have reason to feel somewhat uncomfortable at the prospect of Big Brother snooping into our private lives as well.

With each new electronic gadget, the stakes get higher. What are we to think? One thing for sure: We should assume everything we submit to cyberspace is public.

Not that our every interaction via smartphone, tablet, brainy new television and the like will be misused, but the primary restraint stems from the mere volume of human communication and the fact most of it is uninteresting to others. This is sort of security by default, not because of any intentional defense against hacking. Which means for the time being, at least information of interest to others can and will be discovered.

WikiLeaks keeps proving the art of hacking is running ahead of the art of encryption. Certainly the ability of government agencies to know what average citizens are doing with electronic devices is greater than anything we can do in electronic defense. Our only real defense is attitudinal. We should assume we are living in electronic fishbowls and act accordingly.

All of which makes a case for the Luddite life.

Against todays societal norm, I have avoided the use of smartphones altogether, not mainly because of fears of unauthorized snooping but because of a combination of inertia and disdain for the way smartphones take over users lives. I do have an old-fashioned cellphone but rarely turn it on. Our family bill consistently shows my monthly use at less than 10 minutes.

People whose phones are constantly in use volunteer astonishing amounts of information to the internet for easy surveillance. Any government that assumes some of the information on the internet might come from terrorists and other enemies of the state is bound to tap in continually. To tell the bad guys from the good guys, the good guys will receive at least summary attention.

Revelations by WikiLeaks remind us of the brave, disturbing new world of the internet. By our eager embrace of the new technology, we invite its abuses as well as its attributes.

So, Im not ready to blame anybody, including WikiLeaks, when new evidence of hacking shows up.

Defense officials blame insiders who leak information, but this is nothing new. Now its done more efficiently electronically, but the acts are no more heinous than similar thefts by yesterdays spies using yesterdays technology. Every combatant will snoop to find the bad snoops. The new technology guarantees ordinary citizens will be examined in the process.

Managers of the CIA and other intelligence agencies bemoan todays massive cyber leaks as threats to the ability of their agencies to perform their protective duties. We want them to continue the race against hacking, but we also want them to successfully hack enemy files, an activity that will always imply they could be looking at information provided by all of us.

The only words that dont offend a single human being are words delivered without a purpose.

See more here:
WikiLeaks: What are we to think? - Columbia Daily Tribune

Chelsea Manning: White House Must Respond to Petition | Time.com

Chelsea Manning poses for a photo wearing a wig and lipstick. U.S. Army/AP

Updated: Dec 11, 2016 9:16 PM UTC

The petition calling on President Obama to shorten Chelsea Manning's prison sentence has received more than 106,000 signatures as of Sunday afternoon, surpassing its 100,000-signature goal and requiring the White House to respond.

Manning, who admitted leaking secret military and government documents to WikiLeaks, asked Obama to commute her current 35-year sentence down to the time she has served, a little more than six years.

"Chelsea has already served more time in prison than any individual in the United States history who disclosed information in the public interest," the petition said. "Her disclosures harmed no one."

The New York Times reported that Manning wrote in a statement in the petition that she took "full and complete responsibility for her actions," calling them "wrong."

"The sole relief I am asking for is to be released from military prison after serving six years of confinement as a person who did not intend to harm the interests of the United States or harm any service members," she wrote.

The White House has 60 days to officially respond to the petition, which was created on Nov. 14.

"I am just grateful that I am not forgotten," Manning said Sunday on a Twitter account that posts on her behalf.

Read the original here:
Chelsea Manning: White House Must Respond to Petition | Time.com

VeraCrypt – Home

Project Description

VeraCrypt is a free disk encryption software brought to you by IDRIX (https://www.idrix.fr) and that is based on TrueCrypt 7.1a.

Windows / MacOSX / Linux / Raspbian/ Source Downloads

Online Documentation (click here for latest User Guide PDF)

Release Notes / Changelog

Frequently Asked Question

Android & iOS Support

Contributed Resources & Downloads (Tutorials, PPA, ARM, Raspberry Pi...)

Warrant Canary

Contact US

VeraCrypt adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. VeraCrypt also solves many vulnerabilities and security issues found in TrueCrypt. The following post describes some of the enhancements and corrections done: https://veracrypt.codeplex.com/discussions/569777#PostContent_1313325

As an example, when the system partition is encrypted, TrueCrypt uses PBKDF2-RIPEMD160 with 1000 iterations whereas in VeraCrypt we use 327661. And for standard containers and other partitions, TrueCrypt uses at most 2000 iterations but VeraCrypt uses 655331 for RIPEMD160 and 500000 iterations for SHA-2 and Whirlpool.

This enhanced security adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data.

Starting from version 1.12, it is possible to use custom iterations through the PIM feature, which can be used to increase the encryption security.

Starting from version 1.0f, VeraCrypt can load TrueCrypt volume. It also offers the possibility to convert TrueCrypt containers and non-system partitions to VeraCrypt format.

UPDATE October 17th 2016 : VeraCrypt 1.19 has been released. It includes fixes for issues reported by Quarkslab audit that was funded by OSTIF. This release also brings many enhancements and fixes, like Serpent algorithm speedup by a factor of 2.5 and the support of Windows 32-bit for EFI system encryption. Please check therelease notes for the complete list of changes. Download for Windows is here.

UPDATE August 18th 2016 : The Windows installer for VeraCrypt 1.18 has been updated to include drivers signed by Microsoft that allow VeraCrypt to run on Windows 10 Anniversary Edition. Windows Installer version was incremented to 1.18a but there is no changed at VeraCrypt level. Linux and MacOSX installers remain unchanged.

UPDATE August 17th 2016 : VeraCrypt 1.18 has been released. It brings EFI system encryption for Windows (a world first in open source community) and it solves a TrueCrypt vulnerability that allows attacker to detect the presence of hidden volume. This release also brings many enhancements and fixes. Please check therelease notes for the complete list of changes. Download for Windows is here.

As usual, a MacOSX version is available in the Downloads section or by clicking on the following link. It supports MacOSX 10.6 and above and it requires OSXFUSE 2.3 and later(https://osxfuse.github.io/). MacFUSE compatibility layer must checked during OSXFUSE installation. Also a Linux version is available in the Downloads section or by clicking on the following link. The package contains the installation scripts for 32-bit and 64-bit versions, and for GUI and console-only version (choose which script is adapted the best to your machine).

All released files are signed with a PGP key available on the following link : https://www.idrix.fr/VeraCrypt/VeraCrypt_PGP_public_key.asc . It's also available on major key servers with ID=0x54DDD393. Please check that its fingerprint is 993B7D7E8E413809828F0F29EB559C7C54DDD393.

SHA256 and SHA512 sums for all released files are available in the Downloads section.

VeraCrypt on the fly encrypting the system partition :

VeraCrypt creating an encrypted volume :

Changing the GUI language of VeraCrypt

See original here:
VeraCrypt - Home

Cable System Encryption | Federal Communications Commission

Cable operators with all-digital systems may encrypt their services. This lets cable operators activate and deactivate cable service without sending a technician to your home. If your cable operator chooses to encrypt its services, you will need a set-top box or CableCARD for every television set in your home on which you want to continue to view cable programming.

Why allow encryption?

Encryption of all-digital cable service allows cable operators to activate and deactivate cable service remotely, relieving many consumers of the need to wait at home to receive a cable technician when they sign up for -- or cancel -- cable service, or expand service to an existing cable connection in their home. In addition, encryption reduces service theft, which often degrades the quality of cable service received by paying subscribers. Encryption also reduces the number of service calls necessary for manual installations and disconnections.

What does this mean for cable subscribers?

If you are a cable subscriber, you should be aware:

If you currently rely on unencrypted cable service to receive broadcast channels from your cable operator (i.e., your digital television connects directly to the cable system without the addition of a set-top box or CableCARD), and your cable operator begins to encrypt, you will need a set-top box or CableCARD to continue to view those channels after your operator encrypts them.

If, at the time your cable operator begins to encrypt, you subscribe

Then you are entitled to

only to broadcast basic service and do not have a set-top box or CableCARD

a set-top box or CableCARD on up to two television sets without charge or service fee for two years from the date your cable operator begins to encrypt.

to a level of service other than broadcast basic service but use a digital television to receive only the basic service tier without use of a set-top box or CableCARD

a set-top box or CableCARD on one television set without charge or service fee for one year from the date your cable operator begins to encrypt.

only to the basic service tier without use of a set-top box or CableCARD and you receive Medicaid

a set-top box or CableCARD on up to two television sets without charge or service fee for five years from the date your cable operator begins to encrypt.

What if I subscribe to cable service after an all digital cable operator has commenced encrypting their service?

What does this mean for over-the-air television viewers and Direct Broadcast Satellite (DBS) subscribers?

Cable System Encryption Guide (pdf)

File a Complaint with the FCC

Visit our Consumer Complaint Center at consumercomplaints.fcc.gov to file a complaint or tell us your story.

Request Accessible Format

To request this article in an accessible format - braille, large print, Word or text document or audio - email fcc504@fcc.gov, or write the address or call the phone number at the bottom of this page.

Consumer Help Center

Learn about consumer issues - visit the FCC's Consumer Help Center at http://www.fcc.gov/consumers.

See more here:
Cable System Encryption | Federal Communications Commission