Chelsea Manning’s Supporters Are Coming Through for Her in a Big Way – ATTN

After seven years of imprisonment, Chelsea Manning is about to go free. But that doesn't mean her troubles are behind her.

She has endured unimaginable abuses for the seven years she has spent in custody, Chase Strangio, an ACLU staff attorney and Mannings lead counsel, told ATTN:, from severe conditions of solitary confinement to the repeated denial of her health care, to the ongoing pain and indignity of being held in a facility for men even though she is a woman. The effects of these experiences will be with Chelsea for the rest of her life.

Manning joined the military in 2007, deploying to Iraq where the Army private saw concealed evidence of wrongdoing U.S. soldiers killing unarmed civilians; detainees being tortured, raped, and murdered by the Iraqi state that she leaked to the public, an offense that got her sentenced to 35 years in a military prison. Ten years and a presidential pardon later and Manning is set to be freed in a matter of weeks.

Awww <3 Thank you all so very much for pitching in & helping me start my new life ^_^ https://t.co/LGSdkQDdvY #welcomehomefund

But shell be free to live in a country where the current president thinks her an ungrateful traitor who should still be behind bars. And shell be broke in a country where housing and health care are anything but free.

Strangio wants to make the rest of her life a little easier: Hes trying to raise $100,000 by the time Manning is released from military prison on May 17. Now 29, Manning is no longer the teenager her parents named Bradley, but a transgender woman named Chelsea with a column in The Guardian. The transition from incarceration to civilization is never easy, and it will be especially hard for someone living in a country that her critics charge she doesnt love.

President Barack Obama commuted Mannings sentence on Jan. 17, one of his last acts while in office. As soon as that happened, her supporters wanted to know how they could help.

Chelseas family and friends wanted to set up a fund that would transfer the money directly into Chelseas bank account, which is what this fundraiser will do, Strangio said. Money raised will go toward everything it takes to live in this free country: rent, health care, and clothes, among other things. It likely wont cover everything, Strangio noted, but we are hopeful that we can reach and exceed that goal.

Since the GoFundMe page was launched on Tuesday, supporters have donated over $47,000.

Another potential cost they might need to cover: protection. Though Manning's supports have hailed her as a whistleblower uncovering injustices perpetrated by the United States, both liberals and conservatives alike have deemed her a traitor.

It will be Chelseas decision to decide what safety and security mean to her and how to plan to meet those needs, Strangio told ATTN:. Hopefully the community of people who recognize Chelsea as a hero will help make sure that she has the financial, emotional and logistical tools to survive.

Read more:
Chelsea Manning's Supporters Are Coming Through for Her in a Big Way - ATTN

Edward Snowden Unafraid of Donald Trump Vladimir … – time.com

Edward Snowden speaks via video link during a news conference in New York City on Sept. 14, 2016. Brendan McDermidReuters

Edward Snowden has said he is not worried about the prospect of Vladimir Putin striking a deal with Donald Trump that could lead to his extradition and trial in the United States.

Speaking on a webchat hosted by the Dutch private search engine StartPage on Nov. 10, the whistleblower and former NSA contractor said it would be "crazy" to dismiss the idea of the Russian President and Trump making a deal over his future, but he "[doesn't] worry about it."

Snowden has been stranded in Moscow since he revealed classified information about the National Security Agency's widespread surveillance three years ago. He was charged in the U.S. with violations of the Espionage Act, but various campaigns and civil liberty organizations have been putting pressure on President Obama to pardon him .

While I cant predict what the future looks like, I dont know whats going to happen tomorrow, I can be comfortable with the way Ive lived today," he said. "And no matter what happens, if there's a drone strike or I slip and fall down the stairs, that's something that won't change. As long as we do our best to live in accordance with our values, we don't have to worry about what happens tomorrow."

Trump, who has vowed to repair U.S. relations with Russia, has previously threatened Snowden with execution. "I think hes a terrible traitor, and you know what we used to do in the good old days when we were a strong country? You know what we used to do to traitors, right?," he said, during an appearance on Fox and Friends in 2013.

Read this article:
Edward Snowden Unafraid of Donald Trump Vladimir ... - time.com

Russia Considers Returning Snowden to US to ‘Curry Favor’ With Trump: Official – NBCNews.com

(Left) Russian President Vladimir Putin at the Moscow State University in Moscow, Russia on Jan. 25. (Right) President Donald Trump in Washington, D.C. on Jan. 25. Alexey Nikolsky/Sputnik/Kremlin Pool via EPA and / Jonathan Ernst/Reuters

The White House had no comment, but the Justice Department told NBC News it would welcome the return of Snowden, who currently faces federal charges that carry a minimum of 30 years in prison. Putin spokesman Dmitry Peskov said talk about returning Snowden is "nonsense."

If he were returned to American soil, Snowden a divisive figure in America who is seen by some as a hero and others as treasonous would face an administration that has condemned him in the strongest terms.

"I think he's a total traitor and I would deal with him harshly," Trump said in July. "And if I were president, Putin would give him over." In October 2013, Trump tweeted: "Snowden is a spy who should be executed."

CIA Director Mike Pompeo has also called for Snowden to face American justice. "I think the proper outcome would be that he would be given a death sentence," Pompeo said last February.

Related:

Snowden was working as a contractor at a National Security Agency facility in Hawaii when he began stealing top-secret documents that he gave to journalists in 2013, exposing details of U.S. domestic surveillance programs.

After Snowden fled to Hong Kong and was charged with violating the U.S. Espionage Act, he ended up in Russia. Moscow granted him refuge and officials say his residency permit was recently extended until 2020.

Related:

In an interview streamed on Twitter in December, Snowden said being forced to return to the U.S. would be a human-rights violation but would also put to rest to accusations that he is a Russian spy.

"A lot of people have asked me: Is there going to be some kind of deal where Trump says, 'Hey look, give this guy to me as some kind of present'? Will I be sent back to the U.S., where I'll be facing a show trial?" Snowden said.

"Is this going to happen? I don't know. Could it happen? Sure. Am I worried about it? Not really, because here's the thing: I am very comfortable with the decisions that I've made. I know I did the right thing."

More than 1 million people signed a White House petition calling for then-President Obama to pardon Snowden. Snowden himself did not file an application and tweeted that Army leaker Chelsea Manning should get clemency ahead of him.

Snowden's Russian lawyer, Anatoly Kucherena, told the state-run news agency last month that his client would like to return to the United States with no criminal charges hanging over his head.

"We hope very much that the new U.S. president would show some weighted approach to the issue and make the one and only correct decision to stop prosecution against Edward Snowden," Kucherena said.

Zarate said there is no way to predict if Putin will deliver Snowden or when.

"I think this is one of those rare cases where the stakes are so high, the diplomatic implications so deep, that anything can happen," he said.

"So this could be a secret diplomatic deal made in the dead of night, or it could be a weeks-in-formation deal with lawyers on all sides," he said.

"I think at the end of the day, Moscow holds the cards here."

Link:
Russia Considers Returning Snowden to US to 'Curry Favor' With Trump: Official - NBCNews.com

Russia ‘considering handing over Edward Snowden to Trump as gift to improve US relations’ – Mirror.co.uk

Russia is considering handing notorious fugitive Edward Snowden over to President Trump as a 'gift', it has been claimed.

Snowden, a former CIA worker, fled the US in 2013 after leaking thousands of classified documents about the government's surveillance techniques.

He remains in Russia where he received asylum.

But NBC News says US intelligence sources have recently gathered evidence that Russia is considering turning Snowden over to Donald Trump.

The new President has called Snowden a "traitor" in the past who deserves to be executed.

Last July, Trump said: "I think he's a total traitor and I would deal with him harshly.

"And if I were president, Putin would give him over."

According to NBC, handing over Snowden is one of a number of tactics being considered by Russia to "curry favour" with Trump.

Ben Wizner, one of Trump's legal supporters in the US, said he had heard of no such rumours.

And Putin spokesman Dmitry Peskov said talk about returning Snowden is "nonsense."

Snowden faces charges back on US soil that carry a minimum of 30 years in jail.

The reports come after Barack Obama commuted the prison sentence of British-raised former soldier Chelsea Manning in one of his final acts as President.

Manning was imprisoned for the biggest military classified leak in American history.

Originally known as Bradley Manning before transitioning from a man to a woman, she will now be freed on May 17 after Obama cut her 35-year sentence.

The 35-year-old was convicted by a court martial in July 2013 for breaking Americas espionage act.

Read the original post:
Russia 'considering handing over Edward Snowden to Trump as gift to improve US relations' - Mirror.co.uk

Edward Snowden and ‘How America Lost Its Secrets’ – Yahoo News


Yahoo News
Edward Snowden and 'How America Lost Its Secrets'
Yahoo News
A Mexican immigrant to the United States whose daughter asked Pope Francis for help in stopping her father's deportation attended his first hearing before an immigration judge in Los Angeles on Thursday. Judge Rose Peters made no rulings at the brief ...

and more »

Read this article:
Edward Snowden and 'How America Lost Its Secrets' - Yahoo News

Encryption | Information Technology Services

This InfoCenteris a collection of resourcesaboutencryption for stored informationonportable devices, such as laptops, tablets, and externally attachedstorage. (Refer to SSL certificates in the Related InfoCenters box forinformation related toencrypted network communications.) The Help Desk provides general support for Windows BitLocker and for OSX FileVault2 full disk encryption.Questionsshould normally be handled by a departmental IT support person, and if necessary willbe escalated to the InformationSecurity & PolicyOffice or the ITS Enterprise Client Management team.

Encryption is a method to protect digital information, byscrambling it as it travels across the Internet, or scrambling it when the information is "at rest"or stored on our computers. This ensures that only authorized users can decrypt (un-scramble) the information and use it. Encryption enhances the privacy and confidentiality, as well as the integrity and authenticity of our information. It helps us keep our information safe.

Portable devices such as laptops, tablets, and USB storage are most at risk for being misplaced or stolen. If a device is lost or stolen, encryption prevents unauthorized users from accessing data stored locally on the device. Without encryption, unauthorized users canuse various techniques to bypass the accounts and permissions in order to access the localdrive contents.

In order to meet our legal obligations and our responsibility to protect the privacy of those we serve, The University of Iowa requires full disk encryption to be implemented onall university owned mobile computing devices (i.e.laptops,tablets, USBstorage). The best way to avoid theft or lossof sensitive data is to keepit in a secure file storage offering such as OneDrive, RDSS,or department shared drives, where it's physically secured and regularly backed up. Then,you can easily access the information remotelyfrom your mobile computer. However, encryption is oursafety net for new files,temporary (cached) files, and other information that is stored on a mobile device.

The Verizon 2015 Data Breach Investigations Report indicates15% of all security incidents involved some form of physical loss or theft.

Everyone uses network encryption today: over https connections from your browser to a website, over cellular phone-to-tower communications, and also over wireless networks that require a login or connection password, such as Eduroam, in order to protect the privacy of communications. Full disk encryption is similarly designed to protect information when its stored.

More:
Encryption | Information Technology Services

How to encrypt all your data – The Daily Dot

Whether youre an activist living under an autocratic regime, or a law-abiding citizen in the worlds biggest democracy, you have many reasons to fear for the safety of your data. State-sponsored cybercriminals, fraudsters, three-letter agencies and data-hungry corporations will go to great lengths to lay their hands on your files and data and use them for their own ends.

If theres one thing eavesdroppers and data thieves hate, its encryption. It keeps them away from your private and sensitive dataor at the very least gives them enough headaches to go seek prey elsewhere.

Here are seven tips that will beef up your defenses against hackers by encrypting the data you store and share across your devices and the internet.

We use messaging apps for a lot of our work and personal communications, ignoring the fact that some of them will not protect us against hackers. Server hacks and man-in-the-middle attacks are two popular methods that can give unwanted parties access to your sensitive messages.

Secure messaging apps such as Signal, which feature end-to-end encryption, scramble your messages in a way that allow on the recipient of the message to read them. While there are several end-to-end encrypted messaging apps out there, Signal is by far the most secure because it stores the least amount of information about its users. A more detailed discussion of messaging app security can be found here.

A hacker with your login credentials or a government agency with a search warrant can scan your emails stored on a server. Just ask John Podesta. In order to protect your mailbox from potential hacks, you can use PGP, a technique that encrypts your messages with a key that only you possess.

PGP might not be very intuitive and user-friendly, but its worth the added security. Alternatively, you can sign up for a secure email service such as ProtonMail, which encrypts your emails end-to-end.

A more detailed discussion of email security can be found here.

You might want to prepare in advance for the day your phone or laptop becomes lost or stolen (or gets confiscated by security forces if youre ruled by a tyrannical regime). And no, a good login-screen password will not protect the files on your computer. Anyone with the most basic IT skills can plug your hard disk into another computer and extract your files.

Full-disk encryption (FDE) automatically encrypts everything that is stored on your drive with a key that is only accessible to you, preventing someone with physical access to your device from accessing your files.

Software such as Symantec Endpoint Encryption offer full-disk encryption, but the latest version of most operating systems already have built-in FDE features. In Windows its called BitLocker, in MacOS its FileVault. Apples iOS 8 and later as well as Android Lollipop (5.x) and higher have full-disk encryption enabled by default.

Encrypting the files you store on the cloud can protect you from unwanted access to your account. A simple option is to store your files in password-protected zip archives before uploading them to your cloud storage. However, the extra manual effort required to zip and unzip your files might be too frustrating.

An alternative is to use third-party tools such as Boxcryptor, which adds client-side encryption to most famous cloud storage services such as Google Drive and Dropbox. You can also opt for secure storage services such as SpiderOak One, which have built-in encryption.

Thumb drives and memory cards easily get lost, so you if youre carrying your data on removable media, you should always plan for the worst.

Your best option would probably be to choose a secure memory stick such as datAshur. These USB drives come with built-in hardware encryption protected by a 7-15 PIN code and are compatible with all major operating systems.

If you want to stick to your old memory drive, there are some decent software alternatives. Windows users can encrypt removable drives with BitLocker to Go, and Mac users can use FileVault. Most third-party full-disk encryption software supports removable drive encryption as well.

While browsing the internet, make sure you only fill in forms on websites that have addresses starting with https (the s stands for secure). Sites with plain HTTP dont encrypt your data and are vulnerable to eavesdropping.

The Electronic Frontier Foundations HTTPS Everywhere extension for FireFox, Chrome, and Opera adds a layer of security by encrypting your traffic when you visit major websites.

However, HTTPS does not conceal everything, and an eavesdropper will still be able to monitor the sites and URLs youre visiting (which sometimes contain sensitive information). A more secure alternative would be to use TOR, a browser that encrypts your entire traffic and forwards it through other computers (called TOR nodes). A malicious actor would no longer be able to extract any information by monitoring your traffic.

If you want to go the extra mile to encrypt everything that comes in and goes out of your device, consider using a virtual private network (VPN). VPNs encrypt and forward all your traffic through a server in another geographical location, which makes it difficult to monitor your activities.

A software VPN that offers decent performance is Psiphon, a free-to-use tool that was designed to help people living under the censorship of repressive regimes. Psiphon can be installed on all major desktop and mobile operating systems.

A hardware alternative is Anonabox, a TOR/VPN router that can secure your traffic while also saving you the processing power required to theextra encryption and decryption.

These tips will help you put up a tougher fight against hackers. However, take note that theres no such thing as absolute security, and encryption per se is not a silver bullet that will fix all your security problems. You still have to adhere to basic cybersecurity principles, such as keeping your operating system and antivirus updated and choosing strong passwords for your account.

Ben Dickson is a software engineer and the founder of TechTalks. Follow his tweets at @bendee983 and his updates on Facebook.

The rest is here:
How to encrypt all your data - The Daily Dot

FOSS February: A month to celebrate open source | Opensource.com – Opensource.com

Join the Twitter Party hosted by National Day Calendar on 2/10

Open source remains a competitive means of distributionone that delivers exceptional software to new and devoted users. Despite this, open source, its methodologies, practices, code, and the communities behind them, can be overlooked or misunderstood if they are inadequately communicated. As a professional in tech marketing in the open source space, I often find that my conversations begin by highlighting the key takeaways of open source before I can begin to graze the surface of product-specific impact.

Open source software has come a long way over the past several years, primarily due to the contributions of active open source communities. Still, convincing an enterprises influencers, IT leaders, and developers of the merits of open source remains a challenge in certain spaces. While it is important that organizations take an honest, objective look at the total cost of ownership of any solution, open source or commercial, it became clear to me that impressions of open source were not always reflective of the extraordinary work and talent that can be found in the space.

To emphasize the merits of open source and create a level ground on which leaders could base these important decisions, I wanted to create a marketing platform for common open source messaging and themes.

In the spirit of open source, I sought to create a shared platform that extended beyond my projecta platform that could be used to benefit the greater open source community.

In order to accomplish this, I proposed a reserved month to create awareness around Free and Open Source Software. The intent is to establish a platform that appeals to general audiences, while simultaneously giving the strongest of open source supporters the underlying support they need to strengthen messaging for their projects. The Registrar at National Day Calendar declared the observance of National Free and Open Source Software Month in 2017. Founded by Onyx Point, Inc., FOSS February (#FOSSFeb) is an opportunity to discuss open source methods.

Artwork is licensed under aCreative Commons Attribution 4.0 International License. Originated by Amanda Arnold. Attributable to Onyx Point, Inc. 2017.

Synchronous use of the platform in open source channels will create resonance surrounding project goals ranging from community expansion, new developments, introduction to new spaces, etc. We selected February to observe the holiday, as it is the month in which the Open Source Initiative (OSI) was founded in 1998.

FOSS February is our chance to open the door to open source, to face the larger market, and to increase overall interest in the open source community and its projects.

Together, we can use the platform to promote open source initiatives, market open source projects, and dispel general misconceptions. Here are some ideas on how to participate:

See more here:
FOSS February: A month to celebrate open source | Opensource.com - Opensource.com

The UK government’s crackdown on encryption threatens to undermine London’s fintech boom – City A.M.

Talk of calamity befalling corporate Britain as we negotiate our EU exit is typically overblown.

Nevertheless there is a potentially serious conflict in the making between the UK governments stated desire to maintain access to certain online data for reasons of national security and the continental European determination to institute a modern system of information rights. This divergence, which lies at the heart of the Investigatory Powers Act, has the potential to inflict damage on Londons standing as a global financial centre post-Brexit.

In her final Home Office legislative initiative before entering Downing Street, Theresa May sought to weaken the global communication service providers stranglehold over strong cryptography. This came at precisely the time that the EU was moving towards enacting a General Data Protection Regulation (GDPR), an EU-wide protocol allowing individuals to control their data that depends implicitly on strong cryptography.

On the continent, the example of what happened in Estonia in 2007 still looms large. Following a Russian cyber-offensive that year, the Estonians created a much-admired national system of identity where individuals control their data and the state can only request access to it for transactions. Indeed, under the Estonian protocol, the state is only permitted to ask once for the recording of a particular data item and must request access to individuals data on a case-by-case basis.

Read more: An eye for an eye, a hack for a hack: The cyber arms race is heating up

The Estonian system was an early variant of distributed ledger technology (aka blockchain) the fintech innovation that is designed to increase the security of financial and other security-conscious transactions. Indeed the UK Office of the Government Scientist recently praised the Estonian system for providing secure, cost-effective technological protection, and this approach is the model many EU technology specialists have in mind when they consider how to implement GDPR.

No one doubts that the field of secure technology is one of the most exciting in the fintech boom underway in London right now. Some commentators believe the financial technology revolution will have as transformative an impact on the City of London as Big Bang after 1986.

Yet London-based businesses, particularly international banks, are beginning to take the potential impact of the EU-wide GDPR extremely seriously. Established firms or startups naturally seek to serve not just the UK market but also the entire European continent, and are increasingly aware of the financial and legal costs of security violations.

Read more: Few businesses are ready for the biggest ever overhaul of data regulation

While the Data Protection Act 1998 allows the UK Information Commissioner to impose a monetary penalty on any firm breaching data rules, that fine is capped at a maximum of 500,000. The potential amount that can be fined under the GDPR, on the other hand, is now set at up to 20m or 4 per cent of total worldwide annual turnover of the preceding financial year whichever is higher for specified infringements.

Naturally any company handling money or requiring confidentiality online takes cryptography seriously since their entire business model and market reputation depends on it. The recent high-profile controversy between the FBI and Apple over iPhone security immediately resulted in some US technology firms relocating their data centres to Europe, most notably to Germany which has become known for its strong data protection laws and enforcement.

So to summarise the dilemma facing tech firms in dealing with these issues, one technologist recently advised Wired magazine, the British Prime Minister wants to break crypto while my bosses tell me the gargantuan risk to our business is losing our customers faith through a data breach or being seen to pander to governments by handing over their personal data.

Read more: Yahoo would be liable to pay a $198m fine were GDPR already enforced

Modern finance depends on cryptography, without which online services from credit card payments to derivatives trading would not function. The advent of GDPR is moving technologists across the EU to use blockchains much more widely, especially when it comes to establishing identity.

The claim by the UK government that cryptography can be compromised by the state without impairing commercial security and usability is simply not believed by technologists or businesses in this sector. If we continue to weaken encryption, or make it subject to greater scrutiny by law enforcement authorities, the simple and uncomfortable truth is that the UK will be risking the future of financial services businesses domiciled here.

This is the dilemma that faces the UK government as it rightly seeks to carve a dominant niche in the booming fintech industry. The public demands that government keeps a watchful eye on those seeking to use the web for altogether darker motivations. Yet citizens and businesses also expect the internet to be a secure place for day-to-day financial and social transactions.

The UK risks finding itself in the perverse situation of successfully negotiating a Brexit equivalence deal on financial services, but being unable to sell the products of our burgeoning tech industry into the EU by failing to qualify as an identity-and-data responsible country.

See the article here:
The UK government's crackdown on encryption threatens to undermine London's fintech boom - City A.M.

University of Luxembourg: Researchers develop Zcash cryptocurrency – Science Business

Scientists at the Interdisciplinary Centre for Security, Reliability and Trust (SnT) of the University of Luxembourg have developed an important mathematical algorithm called Equihash. Equihash is a core component for the new cryptocurrency Zcash, which offers more privacy and equality than the famous Bitcoin. Zcash came into operation as an experimental technology for a community-driven digital currency in late 2016. Competing cryptocurrencies

Bitcoin is by far the most recognised and widely used digital currency. It was introduced in January 2009 and has garnered much attention since then. But it is not the only one of its kind. Wikipedia lists nearly one hundred cryptocurrencies boasting more than 1 million US dollar market capitalisation.

One of the newest cryptocurrencies is Zcash, which can be seen as an update to the Bitcoin protocols. In Bitcoin, the transfer of coins is recorded in a global ledger, the so-called blockchain. The validity of the latest transfers in the blockchain is verified about every ten minutes. Verifying the transfers and creating new blocks for the blockchain (the so-called mining) requires a lot of computing power, which is provided by distributed computers worldwide. The miners who allocate the processing power are rewarded with new coins.

Zcash is trying to resolve two main shortcomings of Bitcoin: its lack of privacy for transactions and the centralisation of transaction verification into the hands of a mere dozen miners who have invested in large amounts of specialised mining hardware: Bitcoin is prone to such centralisation because the computational load of the bitcoin mining algorithm can be split into many different small tasks, which can be conducted in parallel. The algorithm is easy to implement in dedicated, energy-efficient and cheap microchips, but not suited to standard hardware. Bitcoin mining today is therefore done on special-purpose supercomputers which are located in places with cheap electricity and/or cheap cooling. Such supercomputers are expensive, costing millions of euros, but provide much more mining power than if one were to use standard PC hardware of the same price.

New algorithm for cryptocurrency

Prof. Alex Biryukov, head of the research group Cryptolux and Dr. Dmitry Khovratovich at SnT have developed the algorithm Equihash which can resolve this problem. Equihash is a so called memory-hard problem, which can not be split up into smaller working packages. It can be more efficiently calculated on desktop-class computers with their multiple processing cores and gigabytes of memory than on special hardware chips. If 10.000 miners with a single PC were active, in Zcash the investment to compete with them would be 10.000 times the price of a PC, while with bitcoin, the investment would be significantly smaller, says Khovratovich. This creates a more democratic digital currency by allowing more users to contribute to the mining process. Khovratovich adds: The strength of a cryptocurrency comes from the fact that the ledger is globally distributed. Our Equihash algorithm reverses the situation back to this more ideal world.

Equihash was first presented at the Network and Distributed System Security Symposium last year one of the top-5 IT security events. Prof. Biryukov comments: Since Equihash is based on a fundamental computer science problem, advances in Equihash mining algorithms will benefit computer science in general. Equihash is so far unique among all the mining algorithms: it is memory-hard on the one hand and very easy to verify on the other. In other words, while mining new coins with Zcash/Equihash is comparatively expensive, hence posing a smaller risk of monopolisation because it requires large amounts of computer memory and hard computational work, checking that the new coins are genuine is memoryless, fast and cheap.

Understanding these advantages, the creators of Zcash chose Equihash as the algorithm for mining coins and verifying transfers. Equihash itself is not limited to use in Zcash and can be used in any cryptocurrency, including Bitcoin.

With our contribution to Zcash, the Cryptography and Security lab (CryptoLux) has shown its strength in innovative research that has immediate applications in the financial technology industry, says SnTs director, Prof. Bjrn Ottersten. We invite students to follow us in this promising field, adds Professor Biryukov: There are still lots of challenging research problems to solve.

See the original post here:
University of Luxembourg: Researchers develop Zcash cryptocurrency - Science Business