The Worlds Most Advanced Cryptocurrency Software, BitBay Makes Itself Visible – Yahoo Finance

ENSENADA, Mexico, Feb. 14, 2017 /PRNewswire/ --BitBay, the cryptocurrency software suite offering unbreakable smart contractswas keeping a low profile for some time but has now resurfaced; stronger than ever. The creator and soul developer of BitHalo/BlackHalo David Zimbeck has worked effortlessly the past two years to create the most advanced and secure wallet in cryptocurrency space. The software suite is capable of supporting an entire smart contracting interface with decentralized markets and other features.

A BitBay community member comments,

"How is it that a single developer can deliver such an incredible suite when entire teams of coders have a hard time even delivering a functional wallet? How on earth has this project gone unnoticed, and why is it not in the top 10 coins in the world?"

Unbreakable Smart Contracts

Unlike many other platforms, BitBay is not vaporware. It is a feature rich platform that offersunbreakable smart contractsfor important real world applications. The BitBay contracts are far superior to other smart contracts as they are secured by collateral deposits from both parties, which makes it unbreakable. In the event of a default by one of the parties, their collateral funds will be burnt, making it illogical for them to cheat or exit the contract with the intention of defrauding the other.

The smart contracts system on BitBay eliminates arbitrators, biased third parties, escrow and even fees. Without any middlemen, it can create coins for cash contracts like a decentralized "LocalBitcoins", where cash payments are completely trustless. It can also be used to create "employment contracts", "decentralized eBay-like delivery contracts" (to ensure prompt delivery of working products), and even "barter contracts" that allows people to create a "wish list" and trade any item off that list.

The user-friendly templates on BitBay enable users to create smart contracts by just entering few details. The platform currently has a handful of templates in place, with more to be added shortly. In David Zimbeck's words, all one has to do is use their imagination to create a custom template for any deal they want. The platform's "Cash for Coins" template has already been successfully used by many to automate buying process and complete cash deals without needing escrow or middlemen. The platform will soon release a "buy/sell anything" contract template with reverse and regular auctions support. It will also include a variety of shipping choices.

Decentralized Marketplace

BitBay had a decentralized marketplace almost a year before "Open Bazaar".BitBay's completely anonymous marketis built right into the client, and it allows users to create their own public and private markets. Or they can just check different contracts already available in the main market. The BitBay software allows communication between users by supporting email with end to end encryption like Thunderbird and it also supports Bitmessage for a more decentralized option.

Other features on BitBay include "Pay to Email" which uses steganography to hide payments within photos sent to recipient's email. The feature, originally created for tipping purposes has various other applications as well. Even the wallets' two encrypted keys can be hidden within images using David's steganography based feature. These keys can then be used on two different computers to sign transactions a feature that lays the foundation for "Cold Staking", which will be utilized in both BitBay and BlackHalo. The Cold Staking feature will be almost impossible to crack because the computers used to sign your transactions can be in completely separate locations. BitBay will also make allowance for "exotic spending" such as "locktimes". In addition to the "dead man's switch", "parking of coins", "burn" and other spending types, it also supports automated joint accounts for business partners and spouses. The BitBay platform can also translate to 92 different languages.

About BitBay

BitBay has so far created a whole cryptocurrency ecosystem with its own functional market economy. All these things have turned BitBay into a powerful cryptocurrency software suite that can take on other cryptocurrencies. The platform enjoys avibrant communitythat is regularly attracting and training new users. The "contract faucet" created by one of the team members is currently giving away coins using a unilateral "Guarantor" contract to whoever accepts it.

Read More

See the original post here:
The Worlds Most Advanced Cryptocurrency Software, BitBay Makes Itself Visible - Yahoo Finance

Towards equal access to digital coins – Science Daily

Scientists at the Interdisciplinary Centre for Security, Reliability and Trust (SnT) of the University of Luxembourg have developed an important mathematical algorithm called "Equihash." Equihash is a core component for the new cryptocurrency Zcash, which offers more privacy and equality than the famous Bitcoin. Zcash came into operation as an experimental technology for a community-driven digital currency in late 2016.

Bitcoin is by far the most recognized and widely used digital currency. It was introduced in January 2009 and has garnered much attention since then. But it is not the only one of its kind. Wikipedia lists nearly one hundred cryptocurrencies boasting more than 1 million US dollar market capitalisation.

One of the newest cryptocurrencies is "Zcash," which can be seen as an update to the Bitcoin protocols. In Bitcoin, the transfer of coins is recorded in a global ledger, the so-called blockchain. The validity of the latest transfers in the blockchain is verified about every ten minutes. Verifying the transfers and creating new blocks for the blockchain (the so-called mining) requires a lot of computing power, which is provided by distributed computers worldwide. The "miners" who allocate the processing power are rewarded with new coins.

Zcash is trying to resolve two main shortcomings of Bitcoin: its lack of privacy for transactions and the centralization of transaction verification into the hands of a mere dozen miners who have invested in large amounts of specialized mining hardware: Bitcoin is prone to such centralization because the computational load of the bitcoin mining algorithm can be split into many different small tasks, which can be conducted in parallel. The algorithm is easy to implement in dedicated, energy-efficient and cheap microchips, but not suited to standard hardware. Bitcoin mining today is therefore done on special-purpose supercomputers which are located in places with cheap electricity and/or cheap cooling. Such supercomputers are expensive, costing millions of euros, but provide much more mining power than if one were to use standard PC hardware of the same price.

Prof. Alex Biryukov, head of the research group "Cryptolux" and Dr. Dmitry Khovratovich at SnT have developed the algorithm "Equihash" which can resolve this problem. Equihash is a so called memory-hard problem, which can not be split up into smaller working packages. It can be more efficiently calculated on desktop-class computers with their multiple processing cores and gigabytes of memory than on special hardware chips. "If 10,000 miners with a single PC were active, in Zcash the investment to compete with them would be 10,000 times the price of a PC, while with bitcoin, the investment would be significantly smaller," says Khovratovich. This creates a more democratic digital currency by allowing more users to contribute to the mining process. Khovratovich adds: "The strength of a cryptocurrency comes from the fact that the ledger is globally distributed. Our Equihash algorithm reverses the situation back to this more ideal world."

Equihash was first presented at the Network and Distributed System Security Symposium last year -- one of the top-5 IT security events. Prof. Biryukov comments: "Since Equihash is based on a fundamental computer science problem, advances in Equihash mining algorithms will benefit computer science in general. Equihash is so far unique among all the mining algorithms: it is memory-hard on the one hand and very easy to verify on the other." In other words, while mining new coins with Zcash/Equihash is comparatively expensive, hence posing a smaller risk of monopolization because it requires large amounts of computer memory and hard computational work, checking that the new coins are genuine is memoryless, fast and cheap.

Understanding these advantages, the creators of Zcash chose Equihash as the algorithm for mining coins and verifying transfers. Equihash itself is not limited to use in Zcash and can be used in any cryptocurrency, including Bitcoin.

"With our contribution to Zcash, the Cryptography and Security lab (CryptoLux) has shown its strength in innovative research that has immediate applications in the financial technology industry," says SnTs director, Prof. Bjrn Ottersten. "We invite students to follow us in this promising field," adds Professor Biryukov: "There are still lots of challenging research problems to solve."

Story Source:

Materials provided by University of Luxembourg. Note: Content may be edited for style and length.

More:
Towards equal access to digital coins - Science Daily

Leaks Plague Trump White House, Will They Continue? – Voice of America

WASHINGTON

President Donald Trumps administration has been plagued by leaks of confidential information since before Trump was sworn into office, but the nature of the unauthorized disclosures is somewhat different from the leaks that have annoyed or enraged other U.S. presidents.

Leaks themselves, the premature, unofficial release of confidential policies, executive actions or plans, are nothing new, according to Louis Clark, executive director of the Government Accountability Project, a nonprofit group dedicated to protecting whistleblowers.

What's different

What is new, Clark told VOA, is the motive of the leakers, those who divulge the information, usually to journalists.

Clark said leaks coming from a U.S. administration generally are intended to push a particular political or policy decision.

Whats different about the leaks coming from the Trump administration, he added, is the impression many people have that the leaks are intended to harm the president and his reputation.

Direct criticism of a president in that way is somewhat unprecedented, Clark told VOA.

Jesselyn Radack is a former U.S. Justice Department lawyer experienced in national-security and human-rights issues who now works for the Whistleblower and Source Protection Program, established by the Institute for Public Accuracy. She contends there is something more dangerous about the Trump leaks than those that bedeviled former President Barack Obama, whose administration was hit by the largest leak of state secrets in U.S. history.

Oftentimes, administrations leak trial balloons to push policy ideas, Radack told VOA in an interview. Trumps leaks seem much more dangerous. Theyre all over the place. They dont seem like strategic leaks.

Watch: Trump: Flynn Treated 'Unfairly' by 'Fake Media'

Flynn resigns under fire

Those leaks claimed their first victim this week when Trumps national security adviser, General Michael Flynn, resigned under pressure.

In a series of tweets Wednesday morning, Trump said the leaks that brought down Flynn resembled tactics used in Russia, and he accused fake news media of using confidential information to fuel their conspiracy theories and blind hatred.

The real scandal here is that classified information is illegally given out by intelligence like candy. Very un-American! Trump wrote.

The Flynn controversy arose before Trump was inaugurated, while the Obama administration was still in power, when The Washington Post reported on telephone conversations last year between Flynn and Russian Ambassador Sergey Kislyak. They included a chat just before the United States announced the expulsion of dozens of Russian diplomats and intelligence agents as a sanction against the Kremlin for Russias computer-hacking operations connected to the U.S. elections.

The question was whether and to what extent Flynn and Kislyak discussed the full range of sanctions against Russia, which Obama ordered in response to Russias annexation of Ukraines breakaway Crimean territory and for other reasons.

The supposition was that Flynn may have overstepped his role by urging Russia to avoid immediate tit-for-tat expulsions against American diplomats the tactics the White House and the Kremlin have used in such disputes since the beginning of the Cold War and instead wait for the incoming U.S. president to review and possibly reconsider the entire issue of sanctions against Russia.

Mike Flynn arrives for a news conference in the East Room of the White House in Washington, Feb. 13, 2017.

Were calls legal?

If that was what Flynn said to Kislyak, it would have been illegal, because the retired general did not yet have an official role in government and would have been usurping the role of diplomats representing Obama.

Flynn denied last month that he had discussed sanctions with the Russian ambassador, but later changed his story and said he could not remember whether sanctions were discussed. By this time, some details of the Flynn-Kislyak conversations had been leaked to The New York Times as well as The Post.

He resigned late Monday night.

Benefit to the public

The whistleblower advocates VOA spoke with said government employees generally allow confidential information to become public if they believe knowledge of that information would benefit the general public, what they called public interest leaks.

Radack said exposing the conversations between Flynn and Kislyak fit that definition on some level.

To the extent that leaks about Flynn revealed government misconduct, that would count as whistleblowing, she said.

Similarly, Clark told VOA: When theres a leak that involves a false statement, then I dont think you can assume that the agents are engaged in a conspiracy to oppose the president.

A view of the building where offices of Orbis Business Intelligence Ltd are located, in central London, Jan. 12, 2017. Media have identified the author of the Trump dossier, former British intelligence agent Christopher Steele.

Constant stream of leaks

Several other high-profile leaks have shaken Trumps transition team and his young administration.

The president has previously accused unnamed members of the U.S. intelligence community of leaking unsubstantiated information about his reputed personal conduct on a visit to Moscow years ago, long before he ever contemplated a career in politics.

A 35-page dossier summarizing allegations of salacious activity by Trump was published in full last month by Buzzfeed News. The report, compiled by a former British spy, did not include specific evidence against Trump but suggested that Russian intelligence agents had compromising material that could be used to blackmail the president.

It was disgraceful, Trump said of the leaked dossier, disgraceful that the intelligence agencies allowed [out] any information that turned out to be so false and fake. Disavowing the allegations against him completely, the president declared at a news conference last month: Thats something that Nazi Germany would have done and did do.

President Donald Trump speaks on the phone with Prime Minister of Australia Malcolm Turnbull in the Oval Office of the White House, Jan. 28, 2017.

Telephone disputes aired

Embarrassing and unflattering details also have emerged over the past four weeks about some of Trumps telephone calls with foreign leaders, a traditional task for a new U.S. president.

Among those conversations was one with Australian Prime Minister Malcolm Turnbull, which turned from cordial to less than friendly, according to The Washington Post, after Trump bragged about the size of his election victory and denounced a deal struck between Canberra and the White House under Obama, calling for the United States to accept thousands of refugees that Australia had been unwilling or unable to resettle.

Trump disputed all of the colorful reports about his alleged spat with Turnbull as fake news, tweeting: Thank you to Prime Minister of Australia for telling the truth about our very civil conversation that FAKE NEWS media lied about. Very nice!

Another controversial conversation, between Trump and Mexican President Enrique Pena Nieto, was leaked to The Associated Press, which reported that Trump had threatened to send U.S. troops across the border into Mexico to deal directly with bad hombres there if Nieto could not control them. Both the White House and the Mexican government denied that account.

Calls for investigation

Since Flynn left this week he said he resigned, Trump said he was fired leading Republican lawmakers have called for an investigation of the repeated leaks, which House Oversight Committee Chairman Jason Chaffetz said raise serious concerns.

In a letter to the Department of Justices internal investigator, Inspector General Michael Horowitz, Chaffetz and the chairman of the House Judiciary Committee, Bob Goodlatte, asked for an immediate probe to learn whether classified information [about Flynn] was mishandled.

During a lengthy news conference Thursday in which he repeatedly assailed White House reporters for fake news, Trump said he wanted to track down and punish criminal leaks.

I dont want classified information getting out to the public. ... Whats going to happen when Im dealing on the Middle East? Trump said. Whats going to happen when Im dealing with really, really important subjects like North Korea? Weve got to stop it.

These developments have sounded alarm bells, Radack said, along with concerns that Trump will continue or even expand the Obama administrations really unfortunate efforts to uncover government whistleblowers. That really does open a Pandoras box of problems.

Obama cracked down on leaks

The Obama administration aggressively investigated suspected leakers and the journalists who worked with them. At least eight whistleblowers were prosecuted under the Espionage Act, compared with only three other cases since the law was passed in 1917.

Two of the countrys most high-profile leaks cases, involving hundreds of thousands of classified military documents and details of super-secret surveillance programs, occurred during Obamas time in office:

Army Pvt. Chelsea Manning, then-Army Pfc. Bradley Manning, is escorted out of a courthouse in Fort Meade, Md., after the third day of his court martial.

Chelsea Manning, a former Army private (known at the time as Bradley Manning), handed over the secrets he stole in 2009 to the group WikiLeaks, which published them all online in what was considered the largest leak of state secrets in U.S. history. He was sentenced to 35 years in prison, a much harsher penalty than anyone else prosecuted under the Espionage Act received, but Obama reduced the sentence before leaving office, and Manning is now due to be set free in a few months.

Edward Snowden, a contractor for the National Security Agency, stole enormous quantities of classified information a few years later, including details of previously unknown surveillance programs that gathered private information from government officials and ordinary people worldwide. He now lives in Russia, where he sought and was granted political asylum, but faces two serious criminal charges if he ever returns to U.S. jurisdiction.

Others prosecuted under the Obama administration include former CIA analyst John Kiriakou, sentenced to 30 months in prison for revealing the CIAs secret torture program, and Shamai Leibowitz, a former FBI translator who got 20 months in prison for telling a blogger about U.S. spy operations against Israeli diplomats.

Will the leaks continue?

Both whistleblower advocates interviewed by VOA, Louis Clark and Jesselyn Radack, said they believe the leaks will continue to hamper Trumps presidency, even though, as Clark said, There has been an extraordinary amount of leaking from this administration in just the first month.

Radack said the leaks are meant to serve a corrective purpose for people in government who disagree with Trumps policy decisions.

To the extent that Trump continues to operate in excess of his authority and outside the normal boundaries of the presidency, I think the leaks will keep coming, she said. Leaks are the American way. They go all the way back to Benjamin Franklin; theyre a time-honored tradition in America.

Trump, who has offered several conflicting theories about who leaks information and their motivation during the past month, has his own take on the problem. He blames government employees who are holdovers from the Obama administration, and adds: I think youll see its stopping now [that] we have our people in.

See the original post here:
Leaks Plague Trump White House, Will They Continue? - Voice of America

Laverne Cox on transgender rights, her new role – WDEF News 12

Laverne Cox has carved a path not just for herself as an actress but for others in the transgender community defining their own identities.

Her roles range from an inmate in Netflixs Orange is the New Black to a high-powered, Ivy League-educated attorney on CBS new series Doubt. Cox says being an actress has given her a platform to engage in activism and speak out about transgender rights.

Over the years, shes made history as the first transgender person to be nominated for an Emmy in 2014 and the first to appear on the cover of TIME magazine.

Cox is one of a number of public figures whose advocacy has helped raise awareness and advance the rights of transgender men and women in recent years markedly transforming not just the entertainment world but Americas public discourse, business, law and policy.

Here is a look at some of the recent milestones covered by CBS News:

Then-President Obama signs hate crime legislation, the first in U.S. history to provide federal civil rights protections for transgender men and women. The legislation expands the definition of federal hate crimes to include offenses committed against people for their gender identity.

Chaz Bono comes out as transgender. Formerly known as Chastity, the child of Cher and Sonny Bono shocked the world when he shared his struggle as a transgender male.

The Girl Scouts of Colorado council publicly stated that if a child identifies as a girl and the childs family presents her as a girl, Girl Scouts of Colorado welcomes her as a Girl Scout. This prompted a backlash, including calls to boycott Girl Scout cookies; however, it set a precedent for the Boy Scouts of America to take the same stand this year.

The American Psychiatric Association removes gender identity disorder from its diagnostic manual, replacing it with gender dysphoria. This was a critical step towards defining the terms associated with the transgender community and destigmatizing the idea of gender identity.

Bradley Manning announces he is transgender and identifies as female. As I transition into this next phase of my life, I want everyone to know the real me. I am Chelsea Manning. I am a female. Given the way that I feel, and have felt since childhood, I want to begin hormone therapy as soon as possible, the 25-year-old said in a statement. Manning was originally sentenced to 35 years in prison for sending classified military documents to Wikileaks but recently had that sentenced commuted by President Obama.

Laverne Cox, a transgender actress who plays Sophia Burset in Netflixs Orange is the New Black, is the first transgender person to be nominated for an Emmy. She also becomes the first transgender person to be featured on the cover of TIME Magazine.

Bruce Jenner comes out as transgender. Now known as Caitlyn Jenner, the former Olympic gold medalist appeared on the cover of Vanity Fair and launched a reality TV show, I am Cait, that chronicled her transition. She won the Arthur Ashe Courage Award at the ESPYs in Los Angeles in July 2015 and has remained a vocal activist for the transgender community.

The Obama administration appoints the first openly transgender officialto serve in the White House. Raffi Freedman-Gurpsan was appointed Outreach and Recruitment Director for Presidential Personnel.

A fresh legal battle over the rights of transgender people in public places is sparked when the governor of North Carolina signs the controversial HB2 law, also known as the bathroom bill,preventing transgender individuals from using public bathrooms according to the gender they identify with. Some corporate leaders opposed the bill and entertainers including Bruce Springsteen andPearl Jam boycotted the state in protest.

The Pentagon announces that transgender people will be allowed to serve openly in the U.S. military. Then Defense Secretary Ash Carter made the announcement and laid out an implementation plan. Carter said, Americans who want to serve and can meet our standards should be afforded the opportunity to compete to do so.

The Boy Scouts of America announced they will allow transgender boys to enroll in its boys-only programs. This shift came just a month after an 8-year-old transgender boy was asked to leave a Cub Scouts troop.

The mayor of a Texas town came out as a transgender woman in an open letter to residents. Jess Herbst is believed to be the first openly transgender mayor in the states history. She detailed the experience further in a Facebook post.

Atransgender doll based on Jazz Jennings, of the TLC show I am Jazz, is introduced at the New York Toy Fair.

And the Grammys adds the first transgender presenters at the awards ceremony. The president of the Recording Academy said in a statement that the idea of a trophy girl felt antiquated and that the ability to present a trophy has nothing to do with ones gender.

Read this article:
Laverne Cox on transgender rights, her new role - WDEF News 12

‘Whistleblower,’ ‘Edward Snowden’: Many defend student suspended for recording anti-Trump professor – The College Fix

Whistleblower, Edward Snowden: Many defend student suspended for recording anti-Trump professor

Theyre crucifying this poor guy.

Mr. ONeil is the Edward Snowden of the college system and kudos to him for exposing this kind of leftist hyperbole.

Mr. ONeil is a de facto whistle blower who has sunshined an instructor that is wasting the taxpayers monies and the students tuition.

Thats just some of the comments culled by the Orange County Registerfrom residents and public figures recently regarding the plight of Caleb ONeil, a 19-year-old Orange Coast College student recently suspended for allegedly violating a policy that prohibits recording professors.

Shortly after the election, instructor Olga Perez Stable Cox told herhuman sexuality class of Trumps election we have been assaulted, its an act of terrorism, among other comments. She also called Donald Trump a white supremacist and said Mike Pence is one of the most anti-gay humans in this country.

ONeil, a member of the College Republicans and an open Trump supporter, recorded the rantand gave it to his College Republican peers, who then uploaded it on YouTube. The video went viral and ultimately led to the sanctions handed down against ONeil late last week.

In addition to his semester-long suspension, as well as being suspended for the summer term, he must also write an apology letter to the professor and a three-page, double spaced essay discussing why he videotaped the professor despite knowing that it was a violation of the course syllabus.

Now his attorney is fighting the punishment. Meanwhile, many have rallied to ONeils defense. For one, a GoFundMe page has been created to help pay his legal bills, stating these excessive punishments against Caleb come as the campus fails to have addressed Professor Coxs comments.

The Orange County Register also reports thata Republicanstate senator told constituents if the college is going to punish the student, it should also punish the instructor, and the Orange Coast College spokesman confirmed the school is hearing from people across the country, and most of that feedback is in support of ONeil.

ONeil can continue to attend classes during his appeal.

MORE:Professor tells students: Trumps election an act of terrorism (VIDEO)

MORE:Student who recorded profs anti-Trump rant suspended, lawyer fights sanctions

Like The College Fix on Facebook / Follow us on Twitter

About the Author

Fix Editor

Here is the original post:
'Whistleblower,' 'Edward Snowden': Many defend student suspended for recording anti-Trump professor - The College Fix

Greenwald: Democrats Seem to Consider Snowden’s & Manning’s Leaks Evil & Leaks Under Trump Heroic – Democracy Now!

This is a rush transcript. Copy may not be in its final form.

NERMEEN SHAIKH: Well, Glenn, I want to turn to something NSA whistleblower Edward Snowden said to you nearly three years ago, when he first spoke out against NSA abuses.

EDWARD SNOWDEN: Any analyst at any time can target anyone, any selector anywhere. Where those communications will be picked up depends on the range of the sensor networks and the authorities that that analyst is empowered with. Not all analysts have the ability to target everything. But I, sitting at my desk, certainly had the authorities to wiretap anyone, from you or your accountant to a federal judge, to even the president, if I had a personal email.

NERMEEN SHAIKH: So, Glenn, can you talk about that and the response that was received to the leaks of Edward Snowden compared to now, the leaks of intelligence officials now?

GLENN GREENWALD: So, on the question of the eavesdropping powers of the NSA as revealed by the intercepts of General Flynns communications, we dont actually know for certain what the methodology was that was used to eavesdrop on him. Was the NSA legally, pursuant to a FISA warrant, targeting General Flynn as part of an investigation, either an intelligence investigation or a law enforcement investigation, conducted by the FBI? Were they, as they claim, only doing routine surveillance on officials of an adversary countryin this case, Russiaand just coincidentally and by accident happened to catch the conversation that General Flynn was having with those targets of the surveillance in Moscow? We dont know.

But what this does illustrate islets assume for the moment that the NSA and the CIA for once are actually telling the truth and that the way that they eavesdropped on General Flynn was not by targeting him, but by targeting the Russians with whom he was communicating. What this reveals is something very important, which is, when the Edward Snowden story first broke and the debate around the world was triggered, the U.S. government kept saying over and over, "If youre an American citizen, we cant listen in on your calls unless we first get a warrant from the court, and therefore theres nothing you have to worry about." Now, that was a very warped sort of thing to say, because that meant that for 95 percent of the world who are called non-Americans, what the government was saying: "Oh, for you, you have no protections. We can listen in on your calls at any time without getting a judge to approve," which is actually true. And thats one of the reasons why people all over the world outside of the United States were so horrified to learn of what the NSA was doing. But the broader and more important point is that what the U.S. government was saying was actually completely false. The U.S. government constantly eavesdrops on the telephone calls of American citizens without getting a warrant of any kind, despite what the Constitution requires. And thats because the law that was enacted in 2008, called the FISA Amendments Act, with President Obamas approval, withhe was a senator at the time, he voted for itactually authorizes the U.S. government to listen in on Americans calls with no warrant, as long as theyre talking to someone outside of the United States who the government says theyre targeting. And thats what this episode shows, is they were able to listen in on General Flynns calls, if you believe them, with no warrant, because they say that they were targeting someone with whom he was communicating.

As far as the reaction is concerned in terms of how Edward Snowdens leaks were received versus this leak, its like night and day. I have not yet heard, literally, not one Democrat condemn the leakers inside the CIA or the intelligence community who leaked signals intelligence and, in the process, alerted these Russian officials to the fact that their communications have been compromised. Thats what these leaks did. They told these Russian officials with whom General Flynn was communicating, "We have successfully penetrated your communications systems." And you can be sure that they are now, in response, fortifying the communications that they use and blocking out the NSA and CIA. There was probably harm done by whoever did this leak. I havent heard one Democrat condemn it on the grounds that its criminal. I havent heard one Democrat say that there should be an investigation to find these leakers and put them in prison for violating the law. And yet, all I heard from Democratsnot all I heard, because there were a lot of Democrats who supported Manning and Snowden and Drakebut certainly Democratic officials in D.C. were almost unanimous, under Obama, in saying that leaksleakers should be prosecuted to the fullest extent of the law, that theyre traitors. Chelsea Manning just spent seven years in prison under harsh conditions for leaking information way less sensitive than what these leakers about General Flynn just leaked. And, yes, President Obama commuted her sentence, but only after his administration imprisoned her, under conditions that the U.N. said was basically torture, and kept her in prison for seven years, even though there was no harm demonstrated from anything she leaked. So what Democrats seem to think is, leaks under President Obama, even if they show that high-level officials are lying, as Edward Snowden showed James Clapper was, are evil, are criminal, and the whistleblowers should be thrown in jail; leaks under President Trump, by contrast, are heroic and noble, and we should celebrate the people who are doing it and oppose any effort to hunt them down and investigate them and find them and punish them, as President Trump is vowing to do. The reality is that whistleblowers are a very valuable part of our democracy. They should be cherished and heralded and protected, regardless of which party controls the White House.

NERMEEN SHAIKH: And, Glenn, what about the Republican response? Youve talked about the DemocratDemocratic Party response, but how did the Republican Party, for the most part, respond to the Snowden leaks versus whats happened now?

GLENN GREENWALD: Well, ironically, the Republican response is actually consistentconsistently heinous, but at least its consistent. There were a few Republicans, usually former officeholders or some outliers in the Republican Party, like Rand Paul or Justin Amash, people from the libertarian wing, who were somewhat supportive of the Snowden leaks. But, overall, the Republican establishment was contemptuous of Edward Snowden. In fact, Mike Pompeo, the former Republican congressman who is now Donald Trumps chief at the CIA, called for Edward Snowdens execution. Donald Trump himself called for Edward Snowdens execution. Lindsey Graham and John McCain and Marco Rubio all called Edward Snowden a traitor. So, in some sense, the Republicans are being consistent, because theyre now saying the same thing, which is that whoever leaked this information ought to be investigated, hunted down and punished to the fullest extent of the law, which is more or less the same thing they said about leakers and whistleblowers under President Obama. Its the Democrats who have completely switched their position, as they so often do, the minute that the party controlling the White House changed.

AMY GOODMAN: Were going to break and then come back to this discussion, also talk about what happened at the White House yesterday with the Netanyahu-Trump meeting and so much more. Were speaking with Pulitzer Prize-winning journalist Glenn Greenwald, one of the founding editors of The Intercept. His piece in The Intercept, "The Leakers Who Exposed Gen. Flynns Lie Committed Seriousand Wholly JustifiedFelonies." Stay with us.

Continue reading here:
Greenwald: Democrats Seem to Consider Snowden's & Manning's Leaks Evil & Leaks Under Trump Heroic - Democracy Now!

RSAC17: Geopolitical changes driving encryption usage, survey … – ComputerWeekly.com

Recent geopolitical changes are driving concern about data privacy in the security industry, resulting in the increasing use of encryption to protect data, a survey has revealed.

Learn about fighting the ever evolving ransomware, IoT botnet malware and data manipulation attacks.

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Nearly three-quarters of more than 900 RSA Conference 2017 attendees polled at the event in San Francisco said recent political events had made them more concerned about privacy.

As a result, two-thirds (66%) said their organisations are looking to increase their use of encryption, according to the survey by Venafi, a provider of protection for cryptographic keys and digital certificates.

The tension between data privacy and national security is going to continue to escalate, said Jeff Hudson, CEO of Venafi.

Encryption is the lynchpin of our entire global digital economy. It controls the privacy and security of everything from our personal photos to the most sensitive national security data.

Our collective ability to secure encrypted data has a profound impact on digital privacy and trust around the world, he said.

However, only 29% of security professionals polled said they are 90% confident in their organisations ability to secure and protect encrypted communication.

Nearly a third said they are not confident or have only 50% confidence in their organisations ability to protect and secure encrypted communication, while 7% admitted they have no idea if their organisation can protect encrypted communication.

Around three-quarters of security professionals said they are more concerned today about encryption backdoors than they were a year ago.

Encryption plays a fundamental role in data privacy, whether its protecting data from hackers or governments, said Paul Turner, CTO of server products at Venafi.

The challenges organisations are already facing in managing and securing encryption keys, combined with concerns about the integrity and strength of encryption implementations, is undermining confidence in the privacy and security of data, he said.

See more here:
RSAC17: Geopolitical changes driving encryption usage, survey ... - ComputerWeekly.com

Privacy Versus Security: How Americans View The Issue Of Encryption [Infographic] – Forbes


Forbes
Privacy Versus Security: How Americans View The Issue Of Encryption [Infographic]
Forbes
Remember last year when Apple refused to give the FBI the ability to unlock a cell phone that belonged to Syed Rizwan Farook of the December mass shooting in San Bernardino, CA? Apple said that by creating new software to break into the iPhone it could ...

Continued here:
Privacy Versus Security: How Americans View The Issue Of Encryption [Infographic] - Forbes

Encrypted chat app Wickr opens code for public review | TechCrunch – TechCrunch

Security researchershave wanted a peek at Wickrs code since the secure messaging app launched in 2012, and now theyre finally getting that chance. Wickr is publishing its code for Wickr Professional, the subscription-based enterprise version of its free messaging app, today for public review.

The public review builds on private third party code reviews by security experts like Dan Kaminsky and Whitfield Diffie, and has been a long time in the making for Wickr.

For years, Wickr has been at the forefront of ephemeral communication. With Wickr Professional, they are allowing teams to be confident that what is discussed is not distributed. And by opening their code, they are giving the engineering community strong reasons to trust their platform, Kaminsky said in a statement.

Users might not be interested in the inner workings of most of the apps they use, but for encrypted messaging, trust is paramount. Users need to know that the apps security claims are verified that theres math behind the marketing and so its common for the makers of encryption products to make their code available for public inspection. This makes it possible for experts to reassure users that their messages are private, and lets researchers hunt for bugs that could make the app less secure.

But Wickr hasnt gone open-source until now. Thats made it tough for Wickr to gain the trust of the most privacy-conscious users. The Electronic Frontier Foundation marked Wickr down in a 2015 edition of its Secure Messaging Scorecard because the company had no public documentation of their encryption protocol and had not made their code available for review.

Wickr tried to strike a balance later that year, when it published a white paper describing its methods. But the company still stopped short of making its code public.

After all, Wickr is a business, andits easy to see how offering up code for free could cut into the companys profit. But Signal, a competing encrypted messaging app that has surged in popularity, has open-sourced its code from the beginning. Google, Facebook, and WhatsApp all implemented Signals encrypted messaging protocol in their own apps last year, demonstrating that open-source doesnt inherently harm a companys growth.

Joel Wallenstrom, who joined Wickr as CEO in Nov. 2016, says thathis willingness to publish the code is based on what he sees as a change in the way Wickr competes in the marketplace.

Where were going to compete is really good customer service and customer support, Wallenstrom tells TechCrunch. Id like to collaborate on crypto and really go out there and stake our claim in the marketplace by helping people understand how to use ephemeral communications. The next thing is, how does a general counsel really understand and wrap his or her brain around how to use this? How does this work within our organization? These are big challenges. People are looking to us and maybe to others as well, saying, I need help with that part too, not just the math.'

Wallenstrom also wanted to please the security community, which has embraced open-source as a way to ensure the integrity of encrypted communication. It was important to some corporations, and it was very important to the security community, obviously, Wallenstrom says. What I found is that Wickr messenger users typically are in the security community and there was just a big, Why not?'

The encryption protocol Wickr releasedtoday is only used in Wickr Professional, an enterprise messaging service the company launched in private beta last month. (Think of Professional as the encrypted and ephemeral competitor of Slack.) Wickr Professional allows group chats of up to 30 people and enables file transfers, calls, and video chat. The company also offers SCIF, an enterprise product that enforces rapid destruction of messages. Professional and SCIF will be available for an annual subscription fee, while Wickrs main chat app will remain free.

The protocol used in Wickr Me, the free app for iOS and Android, is still closed-source. Wallenstrom says that the open-source protocol will be implemented in Wickr Me as soon as possible, but for now the company is focused on its enterprise offering.

This is a multi-party, multi-device protocol, explains Tom Leavy, one of the creators of the protocol.

Wickr launched as a one-to-one communication service, allowing a single user with a single device to securely chat with another user. But over time, usershave begun to use more devices and gravitate toward group chat, so Wickr added those features too. But these featurescan cause problems for encrypted messaging because of the slow, sometimes data-heavy process of key exchange and encryption.

We collected a lot of overhead, to the point where it was becoming difficult to scale, Leavy says. For Professional, we had an opportunity to say, Okay, lets take apart all the components here and really decide what operations need to happen in order to maintain end-to-end encryption between all the parties. The end result of that process was figuring out that there was a lot of replication of data and calculations in the key exchange and we were able to get a 50 percent reduction in larger group chats in the size of the message.

The result is a faster, more agile protocol that Wickr hopes will attract enterprise customers who are warming up to the idea of encrypted communication but want more hands-on customer support than other apps can offer. Researchers who find errors or security vulnerabilities in the code can report the problems through Github and Wickrs vulnerability disclosure program.

The best way for us to understand what were going to be doing ten years from now is to be part of this dialogue, Wallenstrom says.

You can read Wickr Professionals white paper below and check out the code on Github.

Go here to see the original:
Encrypted chat app Wickr opens code for public review | TechCrunch - TechCrunch

RSA: Elite cryptographers scoff at idea that law enforcement can ‘overcome’ encryption – Network World

U.S. Attorney General Jeff Sessions call for a way to overcome cryptography met with scorn from a panel of elite cryptographers speaking at this weeks RSA Conference 2017 in San Francisco.

Any one of my students will be capable of writing good crypto code, says Adi Shamir, the S in RSA and a professor at the Weizmann Institute in Israel.

Sessions use of the term overcome during his confirmation hearings actually means installing backdoors, says Ronald Rivest, the R in RSA and a professor at MIT. He cited a joint Congressional study that concluded that weakening encryption works against the national interest, and that encryption is global anyway -- so the U.S. cant call all the shots.

Shamir noted that the current, most respected encryption algorithm was devised by Belgians, and noted that other major crypto advances were made by Japanese, Israelis and others. Its not uniquely American, he says. Forcing backdoors in American crypto products would be shooting U.S. interests in the foot, he says. Other countries would be happy to step in with un-backdoored cryptography, he says.

+ MORE FROM RSA: Hot products at RSA 2017 +

Susan Landau, another panelist and professor at Worcester Polytechnic Institute, says there are other ways to get around cryptography than backdoors, so the call for them is overblown. These include court-authorized, legal hacking of end devices.

Landau notes that in the Apple v. FBI case last year, the problems of decrypting a terrorists iPhone were overblown by the FBI, which said it could only get in with Apples help. Later, the FBI hired a private firm to do the work, and a researcher demonstrated how to do it with about $150 worth of off-the-shelf gear.

Shamir says that the Israeli company that purportedly helped the FBI was later hacked and its methods publicly disclosed by the attackers. You need to be careful about helping the FBI, he says with a smile.

The group was asked about the impact artificial intelligence will have on security and seemed unimpressed.

Shamir says AI will be good for security defense because it can find anomalous behaviors and make associations quickly that humans would take longer to make or not make at all. But as an offensive weapon to devise zero-day attacks, AI is lacking. That requires ingenuity and originality, something only humans can contribute, he says.

The group seemed unafraid of the advent of quantum computing and the threat it might pose to cryptography, but said that work is needed to create cryptography that can withstand quantum-backed cracking.

Shamir says if RSA were to be broken, its more likely to be broken by advances in math that will make it possible to crack keys much faster than current brute-force techniques.

Landau says there needs to be more math research into quantum-resistant cryptography. The current efforts lag behind what went into creating the Advanced Encryption Standard (AES) and should be stepped up.

The security of the U.S. presidential elections should have been audited to erase doubts of their validity, Rivest says. Election officials had the ability to check the integrity of the hardware and software used, but didnt. Theres no proof now, he says. Auditing would have been good hygiene to determine whether the election technology was hacked. Rivest calls for 100% paper ballots which can be readily recounted and verified.

+ MORE ON THE ELECTION: Q&A: The myths and realities of hacking an election +

Landau, who is a professor of cybersecurity policy, says the hack of Democratic National Committee emails was nothing new in terms of what was stolen and how. The way the information was used was new, she says. The drip, drip, drip of information, had a more powerful effect on public opinion than dumping it all at once would have.

See more here:
RSA: Elite cryptographers scoff at idea that law enforcement can 'overcome' encryption - Network World