Bluefin Boosts Payment Encryption Within The LAC Market – PYMNTS.com

Share

Share

Share

Share

Email

On Tuesday (Mar. 7), Bluefin Payment Systems announced its new partnership with international online payments and fraud and data management solutions provider First Atlantic Commerce (FAC). Through the partnership, Bluefins PCI-validated point-to-point encryption (P2PE) solution will be used to help expand the data security for companies utilizing FACs payment gateway. These companies will also have access to Bluefins Decryptx PCI-validated P2PE solution, enabling merchants and acquiring banks in multiple jurisdictions across Europe, Mauritius and the Latin American Caribbean (LAC) region to get the security and scope reduction of PCI-validated P2PE.

PYMNTS caught up with Ruston Miles, Chief Innovation Officerof Bluefin Payment Systems, to learn more about the partnership announcement and why P2PE is such an integral security component for devaluing data in the fight against malware.

Here is an excerpt of the conversation.

PYMNTS: Why is this partnership so significant?

RM: FAC is the first payment processor to provide a PCI-validated P2PE solution to the LAC market through Bluefins decryption-as-a-service model, Decryptx. Decryptx is our standalone, PCI-validated P2PE offering that enables any processor or gateway globally to connect with our solution via an API and provide it direct through their platform. FAC can now provide a PCI-validated P2PE solution to all of the markets that they serve, including LAC, the European Union and Mauritius.

PYMNTS: How will the partnership help to expand data security in the market?What will it mean for the payments industry as a whole?

RM: FAC is a Level 1 PCI-certified payment gateway and registered ISO in the LAC region, and the partnership enables them to offer PCI-validated P2PE directly to their clients in that region where this solution was not available before. PCI-validated P2PE is an integral component of payment security because itencrypts cardholder data immediately upon swipe or dip in a PCI-approved P2PE terminal, and hardware decryption is done outside of the merchant environment preventing clear-text cardholder data from being present in a merchant or enterprises system or network where it could be accessible in the event of a data breach.

This partnership marks the growth of PCI-validated P2PE solutions globally, solidifying this technologys importance in the payments industry. Now that the EMV liability shift deadline has come and gone, and data breaches keep happening and credit card information keeps getting stolen from point-of-sale (POS) systems, companies understand that EMV does not encrypt card data it only authenticates the credit card. And in order to devalue their card data in the POS and make it useless to hackers, all merchants worldwide need technologies such as PCI-validated P2PE.

PYMNTS: Why was it important for Bluefin to make its solutions available to merchants and acquiring banks in the LAC region? Is this an entirely new market for Bluefin?

RM: The LAC market experiences the same data breach risks as the U.S., but unlike the U.S., where you have many validated P2PE providers, they dont have the PCI-validated P2PE tools within their region to mitigate their risks. So it was important for us to bring this solution to that market through FAC. Further, this solution is available through FACs virtual terminal product, which allows call centers, of which there are many in Latin America, to take payments securely in a card-not-present environment. And as eCommerce grows and there is more need for mail/telephone order transactions, the need for tools like PCI-validated P2PE to protect account data will increase.

PYMNTS: Whats next for Bluefin? Any more updates or news that can be shared?

RM: We will issue several more P2PE partner announcements in the next few months. Also, we invite anyone who wants to learn more about PCI-validated P2PE, including available solutions, how it is implemented and the return on investment to register for our webinar on Wednesday, Apr. 5 at 1 p.m. ET PCI Validated P2PE 3 Years in North America, What Has Changed?

Share

Share

Share

Share

Email

The rest is here:
Bluefin Boosts Payment Encryption Within The LAC Market - PYMNTS.com

Indian State of Kerala Saves $58 Million Each Year By Using Free And Open Source Software – Fossbytes

Short Bytes:Kerala adopted Free and Open Source Software in 2005 in a phased manner and went on to replaceproprietary software. As a result, Kerala annually saves $58 million (Rs 300 crore). Thanks to the Free Software license, people are able to freely copy and distribute the software.

Having said that, weve told you numerous stories that involved European cities and countries choosing open source software. But, today, Im going to tell you about an Indian state that has been doing so for a long time.

In Kerala, IT became a compulsory subject in 2003. It was followed by the phased adoption of Free and Open Source Software (FOSS) in 2005. This was done to replace the proprietary software.

K. Anwar Sadath, executive director [emailprotected], said that they have been given the job for easy classroom teaching, teachers training, and customization ofapplications, reports AINS.

Mr. Sadath said that theproprietary version of asoftware would have incurred a minimum cost of Rs 150,000 per machine in terms of thelicense fee.Considering the 20,000 machines, the annual saving is minimum Rs 300 crore ($58 million). He further adds that the free nature of FOSS allows the people to copy and share software without any restriction.

Kerala IT News reports that Ubuntu Linux is loaded in all laptops and desktops for school. Also, the revised textbook would include GNUKhata as a replacement for Tally and LibreOffice as a replacement for Microsoft Office.

Do you have some interesting local story regarding the adoption of open source software? Feel free to share it with us and we might feature it on Fossbytes.

Bonus Video: 10 InterestingLinux Facts

View original post here:
Indian State of Kerala Saves $58 Million Each Year By Using Free And Open Source Software - Fossbytes

Cryptography@The New York Times

Latest Articles

The new R.W. Kern Center at Hampshire College is not just an environmentally friendly building. There are also brain twisters to be found and figured out.

By KENNETH CHANG

Nonverbal signs from coaches and catchers allow rapid adjustment by batters and pitchers, but players dont always pick them up under the pressure of an at-bat.

By WAYNE EPPS Jr.

As an eagle-eyed staffer at Bletchley Park, home to Britains wartime code-breakers, Ms. Fawcett identified a message that led to the sinking of the fearsome German warship.

By BRUCE WEBER

Intelligence gathering shed its early stigma and became a growth industry only with the start of World War II.

By JOSEF JOFFE

The authorities want him to unlock the drives, which they believe contain child pornography.

By CHRISTINE HAUSER

An information security analyst writes that an entire industry that sells malicious code has emerged that revolves around defeating encryption.

The New York Times reporters Katie Benner, who covers technology, and Matt Apuzzo, who covers national security, debate the iPhone case as it heads to a hearing.

By KATIE BENNER and MATT APUZZO

Seventy-five years after the two began a trade in top-secret information at Bletchley Park in England, their intelligence links are being questioned.

By STEPHEN CASTLE

In the 1970s, Whitfield Diffie and Martin E. Hellman invented the technology that underpins web commerce.

By JOHN MARKOFF

The techie cultures of Silicon Valley and of Argentina have evolved in such a way to become almost polar opposites of one another.

Weaker encryption will only make it easier for malicious hackers and foreign governments to spy on us.

By ZEYNEP TUFEKCI

A Japanese photographer who only knew about Native Americans from Hollywood westerns became a dedicated chronicler of the Navajo people.

By MONICA ALMEIDA

Wickr, a secure messaging app, is turning is splitting into two entities a nonprofit organization that will focus on promoting privacy, and a business arm that will focus on licensing its encryption protocol to businesses, like banks and hospitals, that rely on secure payments and communications.

By NICOLE PERLROTH

The exhibition Decoding the Renaissance: 500 Years of Codes and Ciphers is brimming with documents and insights about cryptography.

By WILLIAM GRIMES

Auction house to sell notebook with writings by Alan Turing, the Enigma codebreaker.

Lynn Lempel encourages us to hang out on street corners. Also, news about the film The Imitation Game: print out and solve the puzzle Alan Turing created to recruit his Bletchley Park code breakers.

Rolando Sarraff Trujillo, who was released Wednesday from a Cuban prison where he had been held since 1995, provided information on codes used by Cuban spies.

By MARK MAZZETTI, MICHAEL S. SCHMIDT and FRANCES ROBLES

The museum at Bletchley Park, the World War II British code-breaking center, sheds light on methods and people, including Alan Turing.

By EDWARD ROTHSTEIN

Twitter or obscure websites can easily transmit polling data, even when that may be an effort to circumvent the law.

By NATE COHN

The creator of Kryptos, a sculpture that contains an 865-character encrypted message, has released a second clue for the final unsolved section.

The new R.W. Kern Center at Hampshire College is not just an environmentally friendly building. There are also brain twisters to be found and figured out.

By KENNETH CHANG

Nonverbal signs from coaches and catchers allow rapid adjustment by batters and pitchers, but players dont always pick them up under the pressure of an at-bat.

By WAYNE EPPS Jr.

As an eagle-eyed staffer at Bletchley Park, home to Britains wartime code-breakers, Ms. Fawcett identified a message that led to the sinking of the fearsome German warship.

By BRUCE WEBER

Intelligence gathering shed its early stigma and became a growth industry only with the start of World War II.

By JOSEF JOFFE

The authorities want him to unlock the drives, which they believe contain child pornography.

By CHRISTINE HAUSER

An information security analyst writes that an entire industry that sells malicious code has emerged that revolves around defeating encryption.

The New York Times reporters Katie Benner, who covers technology, and Matt Apuzzo, who covers national security, debate the iPhone case as it heads to a hearing.

By KATIE BENNER and MATT APUZZO

Seventy-five years after the two began a trade in top-secret information at Bletchley Park in England, their intelligence links are being questioned.

By STEPHEN CASTLE

In the 1970s, Whitfield Diffie and Martin E. Hellman invented the technology that underpins web commerce.

By JOHN MARKOFF

The techie cultures of Silicon Valley and of Argentina have evolved in such a way to become almost polar opposites of one another.

Weaker encryption will only make it easier for malicious hackers and foreign governments to spy on us.

By ZEYNEP TUFEKCI

A Japanese photographer who only knew about Native Americans from Hollywood westerns became a dedicated chronicler of the Navajo people.

By MONICA ALMEIDA

Wickr, a secure messaging app, is turning is splitting into two entities a nonprofit organization that will focus on promoting privacy, and a business arm that will focus on licensing its encryption protocol to businesses, like banks and hospitals, that rely on secure payments and communications.

By NICOLE PERLROTH

The exhibition Decoding the Renaissance: 500 Years of Codes and Ciphers is brimming with documents and insights about cryptography.

By WILLIAM GRIMES

Auction house to sell notebook with writings by Alan Turing, the Enigma codebreaker.

Lynn Lempel encourages us to hang out on street corners. Also, news about the film The Imitation Game: print out and solve the puzzle Alan Turing created to recruit his Bletchley Park code breakers.

Rolando Sarraff Trujillo, who was released Wednesday from a Cuban prison where he had been held since 1995, provided information on codes used by Cuban spies.

By MARK MAZZETTI, MICHAEL S. SCHMIDT and FRANCES ROBLES

The museum at Bletchley Park, the World War II British code-breaking center, sheds light on methods and people, including Alan Turing.

By EDWARD ROTHSTEIN

Twitter or obscure websites can easily transmit polling data, even when that may be an effort to circumvent the law.

By NATE COHN

The creator of Kryptos, a sculpture that contains an 865-character encrypted message, has released a second clue for the final unsolved section.

Read the rest here:
Cryptography@The New York Times

SK Telecom, Nokia team on quantum cryptography – Telecom Asia

SK Telecom and Nokia have teamed up to conduct joint research and development in the field of quantum cryptography for network transport.

The operators are collaborating to achieve interworking between SK Telecom's Quantum Key Distribution System (QKD) and Nokias next-generation optical transport system by the second half of 2017.

The first prototype from the collaboration the Quantum Transport System was shown off at Nokia's booth at Mobile World Congress 2017 last week.

SK Telecom said quantum cryptography is expected to replace existing security mechanisms in all areas at risk of data hacking, including national defense, finance, autonomous vehicles and the IoT.

In line with this projection, SK Telecom and Nokia have also agreed to cooperate in the area of quantum random number generation, which will be required to apply quantum cryptography to IoT devices.

SK Telecom has developed a quantum random number generator within the world's smallest CMOS Image Sensor (CIS) based silicon, measuring just 5x5mm. The company expects to tape out engineering samples of the chip in the second quarter and commercially launch it by the end of the year.

Since opening Quantum Tech Lab in 2011, SK Telecom has been making constant efforts to develop quantum cryptography technologies, SK Telecom CEO Park Jung-ho said.

Based on the cooperation with Nokia, SK Telecom will create a new paradigm and ecosystem in the field of ICT.

See more here:
SK Telecom, Nokia team on quantum cryptography - Telecom Asia

Will Julian Assange be moving to a new home? Hot Air – Hot Air

posted at 9:31 am on March 5, 2017 by Jazz Shaw

The standoff between authorities from foreign nations and WikiLeaks founder Julian Assange has been going on now for longer than some of you can probably remember. (Its been almost half a decade at this point.) Assange has been living in Great Britains Ecuadorian embassy along with his cat while Sweden and the United States both tussle over who should get their hands on them first if he emerges. That may finally be about to change but it all depends on the outcome of the upcoming Ecuadorian elections. Guillermo Lasso, the candidate from the Creating Opportunities party who is currently leading in the polls, has stated that if he won the election he would be giving Assange the boot. That may not have played very well the public because he has now softened his stance and said that he actually plans to work to find some other countrys embassy who would be willing to take him. (Miami Herald)

WikiLeaks Founder Julian Assange may be able to keep a diplomatic safe haven after all.

Guillermo Lasso, the frontrunner in Ecuadors presidential election, says he intends to evict Assange from that countrys London embassy if he wins the April 2 runoff against ruling party candidate Lenn Moreno.

But he also said he will work with other governments to find Assange a new home which may keep the controversial free-speech advocate from being extradited.

We will ask Mr. Assange, very politely, to leave our embassy, in absolute compliance with international conventions and protocols, Lasso said in an email exchange with the Miami Herald. However, we vow to take all the steps necessary so that another embassy will take him in and protect his rights.

Im not sure how much of a solution that works out to be for anyone. All it really does is shuffle the problem from Ecuadors desk to the doorstep of some other nation. And particularly given the rather tense climate in international relations these days, especially in light of President Trumps publicly stated attitude toward Assange, what country really wants to take on that headache? Also, such a move doesnt get us any closer to finding out whether or not Assange will be going to Sweden to face sexual assault charges or heading to the United States for something much worse.

This doesnt help the Brits out any either. Keep in mind that roughly one year ago we were already seeing reports about the fact that the municipal police have run up a bill in excess of $12 million just to keep watch over the embassy in case Assange chose to step outside the door. (BBC)

Scotland Yard has spent about 10m providing a 24-hour guard at the Ecuadorean embassy in London since Wikileaks founder Julian Assange claimed asylum there, figures show.

Mr Assange, who denies allegations he sexually assaulted two women in Sweden, faces arrest if he leaves the embassy.

A Wikileaks spokesman said the policing costs were embarrassing.

Heres one question to consider. Lets just say that Lasso wins the election and actually finds another host country willing to take on this problem. That still means that a method has to be found to transfer the subject from his current residence to the new location. With cops and international observers keeping an eye on the Ecuadorian embassy 24 hours a day, how do you do that? Does the diplomatic protection and immunity the Ecuadorians enjoy inside their embassy extend all the way out to the edge of the sidewalk? Does it apply to any vehicles that they own and drive on the public streets? Whether Assange is walking or traveling in a car or truck, it seems to me that the British police could immediately nab him as soon as hes off the property.

With all of that in mind, I will frankly be surprised if this actually happens. The challenges of safely getting Assange to a new location combined with the problematic question of who would be willing to take him could very well scuttle this plan before it even gets off the ground.

Originally posted here:
Will Julian Assange be moving to a new home? Hot Air - Hot Air

The Cryptocurrency Funds Have Arrived, And They’re Bringing Wall Street Money – Seeking Alpha

If 2013-2016 was the era of venture investment in bitcoin and blockchain startups - VCs put north of a billion dollars to work, peaking at $290M in the first half of 2016 - then 2017-2020 will in hindsight be seen as the Wall Street era. The startup equity investors have come and - in the absence of unicorn valuations or breathtaking growth - they're starting to move on. But now the bitcoin and cryptocurrency funds have arrived, and they've brought public markets investors with them.

Just about every week I'll discover a new investment fund that gives investors liquid exposure to the cryptocurrency asset class. At latest count, there are at least 5 exchange-listed bitcoin investment products, 3 U.S.-based ETFs under review by the SEC, and hedge funds that cover just about every cryptocurrency asset type and investment strategy. By my estimate, these funds represent roughly 5-10% of the $24B in total that's now invested in cryptocurrencies.

For clarity, I define a cryptocurrency fund as a pool of professionally managed capital, available to outside investors, where the majority of AUM are invested in publicly tradable cryptocurrency assets. Examples of such assets include bitcoin, ethereum, and the 500+ altcoins and 50+ digital tokens listed on Coinmarketcap. Thus venture capital funds who invest in shareholder equity of blockchain startups don't qualify.

I've sorted the different funds into three broad categories and wanted to give a description of each category along with some prominent examples. They are:

Disclaimer: Please consider this information as strictly educational and not meant to represent specific investment advice or recommendations.

1. Publicly traded funds

These funds follow a buy-and-hold strategy and usually focus on a single asset. For now, all of them are bitcoin-only, although I expect publicly traded ethereum funds to come online perhaps as early as this year.

A management fee is charged for the service, which ranges from 1.5-2.5% per year. As more funds enter the space, fees will likely decrease, perhaps to below 1% which is what most vanilla ETFs charge. You may wonder why anyone would invest in a public bitcoin fund when you can just buy bitcoin and hold it yourself, but you could ask the same of gold. The biggest gold ETF - the SPDR Gold Trust - manages $35 billion USD. That's double the bitcoin market cap - all in one ETF. The attractions for investors are varied, from ease of access to peace of mind to lighter regulatory regimes. The consistent price premium of Grayscale's Bitcoin Investment Trust (OTCQX:GBTC) shares over the NAV of its bitcoin holdings is more evidence that such vehicles are desired.

Within the cryptocurrency universe, there are roughly two types of such funds: ETFs and ETNs (what are also called asset backed notes). The main difference is that an ETF's value is collateralized by an equivalent value of its underlying benchmark asset and allows an investor to redeem their ETF shares for the asset.

An ETN doesn't allow redemption and doesn't make the same guarantees about how much e.g. bitcoin it actually holds. An ETN is better thought of as unsecured debt that roughly tracks the price of its benchmark asset but has looser reporting and compliance requirements. Because of these differences, ETNs are a bigger credit risk, and we've already seen this risk manifest when KNC Miner filed for bankruptcy. KNC Miner was the guarantor of the COINXBT and COINXBE ETNs on the Nasdaq Nordic, and the bankruptcy filing forced trading to a halt. Two weeks later, the investment firm Global Advisors stepped in and became the new guarantor and trading was allowed to resume.

Examples of bitcoin ETNs include BTCETI (which is co-listed on the Gibraltar Stock Exchange and the Deutsche Borse) and the above-mentioned Global Advisors' COINXBT and COINXBE.

Thus far no bitcoin ETFs have been approved. There are three U.S.-based funds under review by the SEC. They are, in order of their filing:

GBTC is a hybrid, in that it's currently an ETN which is filing to become an ETF. While it has filed for a $500M IPO on NYSE Arca to become an ETF, it is currently traded on the U.S. OTC exchanges and doesn't allow redemption of shares into bitcoin.

The only ETFs with bitcoin exposure are Ark Investment Management's ARK Innovation ETF (NYSEARCA:ARKK) and ARK Web x.0 ETF (ARKW), but these hardly count as official cryptocurrency ETFs because both hold less than 0.3% of their portfolio in GBTC.

Bitcoin IRA is an interesting outlier in that it's a public bitcoin investment fund, available to any investors who have or want to open an IRA, a type of U.S. retirement savings account. They allow the redemption of bitcoin, but the company is not listed on any publicly traded exchange. You must contact them directly to invest. Bitcoin IRA charge a 15% one-time upfront fee of any money invested.

Finally, while the publicly traded funds are all bitcoin, the ethereum funds are coming. One example is the EtherIndex Ether Trust which filed in July 2016 with the SEC to be listed on the NYSE Arca, but has seen little activity since. Here are my notes on its filing. I have seen some other ethereum-based efforts and I expect at least one will be approved for public trading this year.

2. Private buy-and-hold funds

These differ from public investment funds in that they usually have restrictions either on investment size (e.g., $100K USD and above) or status (e.g., accredited investors only). They're not listed on publicly traded exchanges, without the attendant regulatory requirements and investment disclosures, and you can't use investment software like Bloomberg to obtain quotes and place trades. But otherwise the strategy and product and fees are similar: they offer investors comparatively simple and safe exposure to cryptocurrency and charge an annual fee for the service.

The best known example is probably the Pantera Bitcoin Fund. Pantera Capital is a blockchain investment firm which has multiple funds. One of them specializes in equity investments of blockchain startups. The one relevant for our discussion is a private bitcoin buy-and-hold fund which has over $100M in AUM and charges 0.75% annual management fee and a 1% fee for redemption.

An ethereum example is Grayscale's Ethereum Investment Trust, which has not formally launched but will be a private product that provides qualified investors access to Ethereum Classic.

DLT10 Index is an interesting example of a private buy-and-hold fund which offers a proprietary basket of 10 publicly traded cryptocurrency assets. The index is a mixture of leading cryptocurrencies and digital tokens, with a preference for enduring assets.

3. Hedge funds

Last we have cryptocurrency hedge funds. A hedge fund is a pool of lightly regulated capital that invests in whatever it likes within some broad strategic parameters. They have active trading strategies including e.g., leveraged trading, price arbitrage, and algorithmic trading. In addition to charging a management fee comparable to the above two types of funds, they also charge a performance fee that in this space can range from 15-45%. The performance fee is only paid out when the hedge fund beats an agreed-upon benchmark, such as the price of bitcoin. So if a hedge fund can generate better returns than simply owning bitcoin, they're paid very well for doing so. This benchmark outperformance is called alpha.

Known cryptocurrency hedge funds include:

I believe the above-mentioned funds are all actively seeking outside investment. Coinfund.io is an example of a cryptocurrency hedge fund which is no longer taking outside investors. They focus on digital token investment, what are often called ICOs, and host a knowledgeable and active community chat on Slack.

A final interesting example is the TaaS fund (Token-as-a-Service), which will exist on the Ethereum blockchain and in March will sell up to $100M of their tokens via the ICO process. The fund will keep some proceeds to fund operations and invest the remainder in a proprietary mixture of bitcoin, altcoins, and other digital tokens. Token holders will receive an ongoing percentage of trading profits.

The hedge fund space - of the three categories - is likely to see the most growth and proliferation because of its light regulatory touch, the speed to market, and the chance for fund managers to make outsized profits in a still volatile and developing asset class.

The next 3 years are a window of opportunity for starting and investing in cryptocurrency funds

We've entered a golden era of professionally managed money moving into liquid cryptocurrency assets. The risks that prevented Wall Street investor types from entering the market earlier - lack of liquidity, regulatory uncertainty, China trading centralization, lack of sophisticated financial products - are now reduced enough that those hungry for returns have taken the lead and others are starting to follow.

There's no better time to start a fund or raise one, and there's no better time to take a cryptocurrency position if you manage money, especially when you consider the past price performance of cryptocurrency assets and research that proves bitcoin's lack of correlation with existing asset classes. An approved U.S. bitcoin ETF will only add fuel to the growing fire.

In the coming years, the above-mentioned three funds types will expand and evolve: Hedge funds will grow larger and develop more exotic trading strategies, increasingly blending cryptocurrency with mainstream asset classes like equities and commodities. Private funds will diversify from one cryptocurrency asset to multiple assets and seek listing on exchanges. Finally, publicly traded funds will expand from bitcoin to ethereum and then cryptocurrency indexes, and fees will likely come down as competition grows.

Thanks for reading! A number of people read drafts of this essay and I'm grateful for their feedback. I look forward to your comments and questions.

Disclosure: I/we have no positions in any stocks mentioned, and no plans to initiate any positions within the next 72 hours.

I wrote this article myself, and it expresses my own opinions. I am not receiving compensation for it. I have no business relationship with any company whose stock is mentioned in this article.

Additional disclosure: I am long bitcoin and altcoins but do not have a personal investment in any of the funds mentioned here.

Read the original:
The Cryptocurrency Funds Have Arrived, And They're Bringing Wall Street Money - Seeking Alpha

Hong Kong Based Cryptocurrencies Exchange Bitfinex Adds Dash … – Finance Magnates

Hong Kong based cryptocurrencies exchange Bitfinex has added support for trading on the privacy-focused cryptocurrency Dash. The venue now enables tradersto buy and sell Dash forUSD and bitcoin (DASH/BTC andDASH/USD).

Dash VP of Business Development, Daniel Diaz said: The partnership is recognition of the way the market has been responding to Dashs vision and roadmap. I am a firm believer that the free market will always recognize true value when growth and performance is sustained over long periods of time. Partnering with Bitfinex is a very important step for Dash as we look to provide good, regulated on and off ramps to the network that really make user applications easier. Dash is in a transition towards the regulated fiat exchanges that will make it a lot easier for users and investors to move in and out of the Dash economy, which will reduce friction and allow Dash to trade directly for fiat currencies in the more popular exchanges in the blockchain industry.

Dash began the year at $11 and is now trading at $44 with a market cap of over $300 million -making it the third most valuable blockchain asset following Bitcoin and Ethereum while its trading volume has also shot up 22 times.

Bitfinex Chief Strategy Officer Phil Potter added, Bitfinex is extremely excited to be adding Dash to our exchange. Dash is currently experiencing its breakout moment right now and we want to be able to provide our growing customer base with seamless access to one of the rising stars in our space. Bitfinex prides itself on being the worlds largest digital asset exchange by USD. We expect an incredibly strong market for Dash and we look forward to a tremendous partnership with their team.

Read the original here:
Hong Kong Based Cryptocurrencies Exchange Bitfinex Adds Dash ... - Finance Magnates

What Is WikiLeaks’ Vault 7? Photos & Clues – Heavy.com

Julian Assange(Getty)

After releasing a series of very cryptic #Vault7 messages in early February, WikiLeaks has finally released a file that contains the mysterious Vault 7. The file wont be readable until tomorrow, when WikiLeaks releases a passphrase at 9 a.m. Eastern. However, WikiLeaks released a new clue about Vault 7, hidden in its tweet. Heres everything we know about Vault 7 so far, along with theories about what might be waiting for us in the morning.

And by the way, according to a tweet WikiLeaks sent out later, this is thefirstin a series of releases related to Vault 7:

Heres what you need to know about Vault 7.

WikiLeaks Vault 7 tweet contained a hidden message, because the background isnt just a black frame. In fact, its a photo that has been darkened.

Lighten it a little and you see this:

The photo says Prefecture beneath the world Vault. Some think it reads Prefecture 333, but it actually reads Prefecture 353. We found the source of the photo. But first, here are the guesses that were wrong:

Some believe that the photo appears to be of Kryptos, a sculpture outside the CIA headquarters in Langley. The sculpture, by James Sanborn, includes four encrypted messages. Since it was dedicated on November 3, 1990, three out of four of the messages have been solved. Heres a photo of the sculpture below. However, this isnotthe sculpture in WikiLeaks photo.

(Jim Sanborn)

Otherssay the photo is actually thissculpture in the D.C. Convention Center.

We found out what it actually is. The photo isLingua, one of two art pieces at the registration area of the Walter E. Washington Convention Center.This is the photo that WikiLeaks used, courtesy of Flickrs open source library:

Vault 7 (Flickr/David) License:https://creativecommons.org/licenses/by/2.0/

As you can see, WikiLeaksdid notedit the Prefecture part into the photo. The sculpture alreadyreads Prefecture 353 A.D. So no, unlike what some theories have surmised, this isnotrelated to Chinas 333 prefecture-level cities.

What happened in 353 AD? There was the Battle of Mons Seleucus, where Emperor Constantius II defeated Magnentius, who committed suicide in Gaul to avoid capture. Constantius then reunified the Roman Empire. Constantius II sent his official, Catena, to Britain to kill opponents supporting Magnentius. Martinus committed suicide after failing to kill Catena.

As far as the Year Zero part of the tweet, some surmised that it could mean that the information is sohuge that it could feel like restarting part of history once its released.However, according to a later tweet by WikiLeaks, it actually means that its the first in a series of releases that WikiLeaks plans for Vault 7.

In February, WikiLeaks released six cryptic tweets about Vault 7. The first was this:

The tweet featuresa photo of the Svalbard Seed Vault.The seed vault is on the Norwegian island of Spitsbergen in a remote Arctic archipelago. The vault was started by Cary Fowler and the Consultative Group on International Agriculture Research to preserve plant seeds and make sure there are always spare copies of seeds around the world, in case of a global or regional crisis.What you see above the entrance to the vault, in the photo, is an illuminated public artwork. It was made by Dyveke Sanne and is called Perpetual Repercussion.

The second tweet was this:

It asked Where is #Vault7? Thephoto in the tweet shows Nazi gold stored in Merkers Salt Mine (its referenced in this Wikipedia article.)According to the National Archives, the minecontained gold bullion, gold Reichsmarks, British gold pounds, French gold francs, American gold pieces, gold and silver coins, additional foreign currency, silver bars, platinum bars, artwork, and more. Nazi gold was allegedly transferred by Nazi Germany to overseas banks during World War II, as part of a strategy involving looting victims assets to fund the war. Authorsand conspiracy theorists have long guessed about what happened to the Nazi gold that disappeared.In fact, a group of Holocaust survivorseven brought a civil suit against the Vatican Bank over it, filed in November 1999. The case was dismissed in 2003, but then reinstated in part in 2005.Various parts of the case were dismissed again in 2007-2009.

The third tweet was this:

(Twitter/WikiLeaks)

It asked When Is #Vault7? The photo in the tweet was from 2010, takenat Langley Air Force Base in Virginia, while running a test on a Pratt and Whitney F119-PW-100 jet engine. The jet inspections look for any objects that could damage blades inside the engines.The article that the picture is from talks about soundproof hush houses that are used for jet engine testing. These are sometimes called vaults. The type of engine fed more theories that Vault 7 was about 9/11, because F119 is 911 backwards.

Heres the fourth tweet:

The photosare part of a series of spy posterscreated by the U.S. government. You can see all of the posters in the series at the Center for Development of Security Excellences website. Beneath Snowdens photo the poster reads: Spilled the Beans and Ran. Beneath Assanges it reads: The Hack Behind WikiLeaks. Beneath Mannings it reads: Leaked the Largest Cache of Classifieds.

Heres the fifth tweet:

In Why is #Vault7?, areverse image search reveals this photo to be from an article posted by Whiteman Air Force Base. The caption of the photo reads: Staff Sgt. Adam Boyd, 509th Civil Engineer Squadron structural supervisor, welds a box blade for a snow plow, Feb. 27. Structures Airmen perform jobs such as this one to save the Air Force from having to possibly spend money on parts made by civilian companies. This photo fed more theories that these tweets are about 9/11.

The sixth tweet read: How did #Vault7 Make Its Way to Wikileaks? Here it is:

This photo can be found in several locations, including Open Society Foundations Images from the Secret Stasi Archives here. The caption reads: Whenmailboxes were beingobserved by Stasi agents,every person posting a letter was photographed. Some films found in theStasiarchives also show persons dressed in civilian clothing emptying the mailbox after the conclusion of the surveillance action. Its part of a series of photos of people at mailboxes. Stasi is The Ministry for State Security, which was the official state security service of the German Democratic Republic (East Germany.) Wikipedia cites several sources as saying Stasi was often referred to as one of the most effective and repressive intelligence and secret police agencies to have existed.

George Soros is the founder and chairman of Open Society Foundations, the source of this photo.

There are so many theories about Vault 7, its hard to keep track. Here are just a few.

One of the top theories was that this was about a seventh vault of FBI emails, since the FBI had released six sets of Clinton emails at the time that the tweets were published. But this seems less likely now, since the FBI just released Part 7 of its Clinton vault here. Others believed that it was related to Clintons missing 33,000 emails. However,the Vault 7 file is just about half a gig in size, so it likely doesnt contain Clintons missing 33,000 emails. (Although, as some have pointed out, it could just be part one of a series of leaks.)

Because of the latest photo, some believe this is about the CIA.

Others theorize this is somehow related to a longstanding conspiracy theory about pizzagate, which involves the idea that high-ranking politicians are involved in a pedophile ring. So far no conclusive evidence has been found to support this theory.

Still others believe its related to September 11, 2001, because several pictures can be interpreted as hinting at that.In the third tweet, the engine was an F119. Theoristsalso reference Building 7, which has been the source of many 9/11 conspiracy theories, including a theorythat there was a vault of gold beneath the building. (This conspiracy theory is oftenincorrectly ascribed to Building 7, but its actually about Building 6.) The fifth tweet features a photo of someone welding, which some believe is a reference to a conspiracy theory about an angled cut on a World Trade Center beam. The box blade hes welding, some say, might also be a reference to box cutters used on 9/11.

Others believe it has something to do with George Soros and the Democrats, since his website was the source for one of the photos.

A new theory, derived from the fifth tweet, is that WikiLeaks is going to release something related to government spending or military projects. The fifth tweet referenced a photo from Whiteman Air Force Base, which talked about government spending. In addition, the host unit for the base is the 509th Bomb Wing, which operates the B-2 Spirit Stealth Bomber. Whiteman is the only permanent base for the B-2. B-2 bombers were used in October 2001 in Afghanistan.

In several WikiLeaks Reddit discussions, some have said that it might be a reference to the nextmass extinction event following the sixth, whichsome scientists say we are already in the middle of. This theory is connected to the first tweet, which showed the seed vault, and proposes that #Vault7 has something to do with climate change.

CNBCreported in October that a newFBI release featuredclaims of a shadow government composed of high-ranking state officials, whom some referred to as The 7th Floor Group. So some believe that Vault 7 is somehow connected to this.

EmbassyCat, a Twitter account run by Assanges cat, only posted one thing possibly related to Vault 7.

On Twitter, @gal_deplorable provided a translation of the comic:

It talks about how the Papyrus proved that Caesar was lying and all Gaul was not conquered. The whole empire will tremble when the scandal comes out. The year 353 AD was referenced in WikiLeaks tweet about Vault 7s release, which also relates back to Gaul, so there could be a connection there. What do you think? Let us know in the comments below.

Find out what 7z (7-Zip) is and why WikiLeaks referenced it today, including where to find the program.

See original here:
What Is WikiLeaks' Vault 7? Photos & Clues - Heavy.com

Trump confidant Roger Stone admits WikiLeaks collusion, then … – AOL

By Josh King, Buzz60

Former Trump campaign advisor Roger Stone admitted that he had a "perfectly legal back channel" to Wikileaks founder Julian Assange.

The Huffington Post reports that Stone, a close friend of President Donald Trump tweeted the statement, then deleted it on Saturday.

See more on recent news regarding Donald Trump:

5 PHOTOS

President Trump accuses Obama on Twitter of wiretapping him

See Gallery

Terrible! Just found out that Obama had my "wires tapped" in Trump Tower just before the victory. Nothing found. This is McCarthyism!

Is it legal for a sitting President to be "wire tapping" a race for president prior to an election? Turned down by court earlier. A NEW LOW!

I'd bet a good lawyer could make a great case out of the fact that President Obama was tapping my phones in October, just prior to Election!

How low has President Obama gone to tapp my phones during the very sacred election process. This is Nixon/Watergate. Bad (or sick) guy!

HIDE CAPTION

SHOW CAPTION

Stone denied having direct contact with Assange but said in October that he and Assange "have a good mutual friend".

He even tweeted this tweet about Hillary Clinton campaign chairman John Podesta before the Wikileaks emails were released.

Stone's admission of a link between himself and Assange comes at a time when allegations against him and the Trump administration having ties with Russia are being investigated.

In an interview with CBS, Stone said this about an investigation into his ties with Russia

"Sure, they'll get my grocery lists. "They may get the emails between my wife and I, but here's what they won't get any contact with the Russians."

He calls the investigation into his alleged ties with Russia a "witch hunt". Something President Trump, himself has said in a tweet about the Russian investigation.

More from AOL.com: Obama administration officials left intelligence trail suspicious of Trump on Russia, report says 'This is Nixon/Watergate': Trump accuses Obama of wiretapping Trump Tower during campaign FBI made deal with ex-spy for Trump dossier

Read the original post:
Trump confidant Roger Stone admits WikiLeaks collusion, then ... - AOL

Blog: NSA whistleblower shows how candidate Trump could have … – American Thinker (blog)

A former top intelligence official-turned-whistleblowerat the National Security Agency says surveillance programs by the NSA could have been keeping tabs on the Trump campaign and that their intelligence could have been shared with other agencies.

William Binney, a legend at the NSA, laid out the case for warrantless wiretapping of Trump Tower and how other intel agencies like the CIA could have had access to the wiretaps.

Fox News national security correspondent James Rosen himself bugged by the Obama administration says Trump may be right:

ZeroHedge Blog:

Washington's Blog asked the highest-level NSA whistleblower in history - Bill Binney - whether he thought Trump had been bugged.

Binney is the NSA executive whocreatedthe agencys mass surveillance program for digital information, who served as theseniortechnical director within the agency, who managedsix thousandNSA employees.

He was a 36-year NSA veteran widely regarded as a legend within the agency and the NSAsbest-everanalyst and code-breaker.

Binney also mapped out the Soviet command-and-control structure before anyone else knew how, and so predicted Soviet invasions before they happened (in the 1970s, he decrypted the Soviet Unions command system, which provided the US and its allies with real-time surveillance of all Soviet troop movements and Russian atomic weapons).

Binney told Washington's Blog:

NSA has all the data through the Upstream programs (Fairview/Stormbrew/Blarney) [background] and backed up by second and some third party country collection.

Plus the FBI and CIA plus others, as of the last month of the Obama administration, have direct access to all the NSA collection (metadata and content on phones,email and banking/credit cards etc.) with no attempt at oversight by anybody [background]. This is all done under Executive Order 12333 [the order whichallows unlimited spyingno matter what intelligence officials claim] ....

FBI would only ask for a warrant if they wanted to be able to take it into court at some point given they have something meaningful as evidence. This is clearly true given the fact the President Trump's phone conversations with other country leaders were leaked to the mainstream media.

In other words, Binney is saying that Trumps phoneswerebugged by the NSA without a warrant - remember, top NSA whistleblowers have previously explained that the NSA is spying onvirtuallyallof the digital communications of Americans. - and the NSA shared the raw data with the CIA, FBI and other agencies.

If the FBI obtained a warrant to tap Trump's phone, it was a "parallel construction" to "launder" improperly-gained evidence through acceptable channels.

As we've previouslyexplained:

The government islaundering information gained through mass surveillancethrough other agencies, with an agreement that the agencies willrecreate the evidence in a parallel construction so they dont have to admit that the evidence came from unconstitutional spying. This data laundering is gettingworseandworse.

So does it mean that the NSA spying on Trump Tower actually turned up some dirt?

Maybe ...

Binney has no direct knowledge of any surveillance of Trump Tower. What he has is a roadmap for how it could have been done. He also shows the likelihood that agencies could have used whatever information was captured by the NSA's information dragnet.

A couple of caveats. First, Obama's executive order allowing other intel agencies access to the NSA's raw data was signed after the campaign was over. That doesn't mean that any wiretapped information from the Trump campaign wasn't gathered or even shared by NSA. It means that it is less likely thatintelligence agencies hadaccess to Trump campaign phone and email records before the election.

Secondly, from what we know so far, the FBI was not operating under any warrants, nor were there any FISA warrants issued to spy on the Trump campaign. Again, this doesn't mean that it didn't happen. In fact, Binney's roadmap shows it's more likely that if surveillance occurred, it was done without a warrant. But if we're looking for hard evidence or a paper trail proving Trump's charge, we may never find it.

Astronomer Carl Sagan popularized the adage, "Extraordinary claims require extraordinary evidence." Sagan was talking about alien visitation of Earth and the fact that to date, solid "evidence" has been lacking. The same should hold true in politics. Accusing the former president of the United States of conducting a secret wiretapping program against an oppositionpresidential candidateis just about as extraordinary as it gets. So far, those who claim that the charges are true including the president are lacking solid evidence that the bugging occurred. What is offered as "proof" is more opinion and supposition than substantiation of facts.

But Binney's roadmap, along with what we know of surveillance during the Obama years, points to extremely troubling questions that Democrats cannot dismiss as "conspiracy-mongering." In this case, there were a will and a way. For the sake of the country, Congress needs to get to the bottom of the matter.

A former top intelligence official-turned-whistleblowerat the National Security Agency says surveillance programs by the NSA could have been keeping tabs on the Trump campaign and that their intelligence could have been shared with other agencies.

William Binney, a legend at the NSA, laid out the case for warrantless wiretapping of Trump Tower and how other intel agencies like the CIA could have had access to the wiretaps.

Fox News national security correspondent James Rosen himself bugged by the Obama administration says Trump may be right:

ZeroHedge Blog:

Washington's Blog asked the highest-level NSA whistleblower in history - Bill Binney - whether he thought Trump had been bugged.

Binney is the NSA executive whocreatedthe agencys mass surveillance program for digital information, who served as theseniortechnical director within the agency, who managedsix thousandNSA employees.

He was a 36-year NSA veteran widely regarded as a legend within the agency and the NSAsbest-everanalyst and code-breaker.

Binney also mapped out the Soviet command-and-control structure before anyone else knew how, and so predicted Soviet invasions before they happened (in the 1970s, he decrypted the Soviet Unions command system, which provided the US and its allies with real-time surveillance of all Soviet troop movements and Russian atomic weapons).

Binney told Washington's Blog:

NSA has all the data through the Upstream programs (Fairview/Stormbrew/Blarney) [background] and backed up by second and some third party country collection.

Plus the FBI and CIA plus others, as of the last month of the Obama administration, have direct access to all the NSA collection (metadata and content on phones,email and banking/credit cards etc.) with no attempt at oversight by anybody [background]. This is all done under Executive Order 12333 [the order whichallows unlimited spyingno matter what intelligence officials claim] ....

FBI would only ask for a warrant if they wanted to be able to take it into court at some point given they have something meaningful as evidence. This is clearly true given the fact the President Trump's phone conversations with other country leaders were leaked to the mainstream media.

In other words, Binney is saying that Trumps phoneswerebugged by the NSA without a warrant - remember, top NSA whistleblowers have previously explained that the NSA is spying onvirtuallyallof the digital communications of Americans. - and the NSA shared the raw data with the CIA, FBI and other agencies.

If the FBI obtained a warrant to tap Trump's phone, it was a "parallel construction" to "launder" improperly-gained evidence through acceptable channels.

As we've previouslyexplained:

The government islaundering information gained through mass surveillancethrough other agencies, with an agreement that the agencies willrecreate the evidence in a parallel construction so they dont have to admit that the evidence came from unconstitutional spying. This data laundering is gettingworseandworse.

So does it mean that the NSA spying on Trump Tower actually turned up some dirt?

Maybe ...

Binney has no direct knowledge of any surveillance of Trump Tower. What he has is a roadmap for how it could have been done. He also shows the likelihood that agencies could have used whatever information was captured by the NSA's information dragnet.

A couple of caveats. First, Obama's executive order allowing other intel agencies access to the NSA's raw data was signed after the campaign was over. That doesn't mean that any wiretapped information from the Trump campaign wasn't gathered or even shared by NSA. It means that it is less likely thatintelligence agencies hadaccess to Trump campaign phone and email records before the election.

Secondly, from what we know so far, the FBI was not operating under any warrants, nor were there any FISA warrants issued to spy on the Trump campaign. Again, this doesn't mean that it didn't happen. In fact, Binney's roadmap shows it's more likely that if surveillance occurred, it was done without a warrant. But if we're looking for hard evidence or a paper trail proving Trump's charge, we may never find it.

Astronomer Carl Sagan popularized the adage, "Extraordinary claims require extraordinary evidence." Sagan was talking about alien visitation of Earth and the fact that to date, solid "evidence" has been lacking. The same should hold true in politics. Accusing the former president of the United States of conducting a secret wiretapping program against an oppositionpresidential candidateis just about as extraordinary as it gets. So far, those who claim that the charges are true including the president are lacking solid evidence that the bugging occurred. What is offered as "proof" is more opinion and supposition than substantiation of facts.

But Binney's roadmap, along with what we know of surveillance during the Obama years, points to extremely troubling questions that Democrats cannot dismiss as "conspiracy-mongering." In this case, there were a will and a way. For the sake of the country, Congress needs to get to the bottom of the matter.

Here is the original post:
Blog: NSA whistleblower shows how candidate Trump could have ... - American Thinker (blog)