Open source users: It’s time for extreme vetting – Techworld Australia

Open source software is the norm these days rather than the exception. The code is being written in high volumes and turning up in critical applications. While having this code available can offer big benefits, users also must be wary of issues the code can present and implement proper vetting.

Josh Bressers, cybersecurity strategist at Red Hat, emphasized this point during a recent talk with InfoWorld Editor at Large Paul Krill.

InfoWorld: Why is Red Hat getting on the soapbox about open source security?

Bressers: We've been on this soapbox for a long time. Fundamentally, there's a supply chain with software. In the past, you've not really thought of software using the supply chain concept. [In the past, it was thought of as] some dude writes software, and that's how it is. We're realizing now that there are vendors, and vendors provide you with a thing that goes into your product and obviously it's designed in a way that with a supply chain if you use low-quality parts, by definition, you're only going to get a low-quality product out the other side.

I think we're starting to recognize that if you're just grabbing any piece of software you find from a commercial vendor or from the open-source community and you don't know what it is or it's not vetted and you don't know the quality, you put your final product's quality at risk.... You have developers going out to GitHub, going out to Stack Overflow, and they are downloading code. They're not necessarily paying attention to what they're getting and how it's being taken care of.

Open source won. It won because it's used everywhere now. But now we have a supply chain problem we need to start thinking about and that is, where did you get it and how is it being taken care of, because software doesn't age well. This is something that you have to take care of and you have to pay attention to. You can't just pull software into your project and you're done.

InfoWorld: Where do you go from here?

Bressers: Fundamentally, what it comes down to is you need to understand where your software came from, which means in the open source context, you have to think of open source as a third-party vendor, which means who's paying attention to it? From an organizational perspective, you need either a team paying attention and taking care of this, or you need to find a vendor to work with who will be your representative here and will do all the heavy lifting in terms of vetting the software, understanding what's good, what's bad, keeping it updated, making sure you understand what that means.

That's the piece that's missing today. There's lots of organizations that have developers that will go out, find what they need in the open source universe, pull it in, and then they don't think about it a second time. Obviously, if you do that, if you never update this stuff, eventually there's going to be some sort of problem that you have to deal with in the software. Think of something like Heartbleed. It's a great example where people had literally just pulled this OpenSSL version into their applications, and a lot of them didn't even realize it was there.

InfoWorld: So what do you do about this situation?

Red Hat: I can tell you what Red Hat does, and every organization will be different. We have a team that's dedicated to paying attention to the open source universe, and they watch for security issues. This is where open source is unique compared to some of the third-party, typical software vendors, we could say, is there's a very understood relationship there where essentially they have a product, you pay them for the product, and the expectation is they will maintain it and you will go to them for help and support. In open source, it doesn't exactly work like that. You have two choices.

Number one is you go to a vendor that specializes in essentially productizing open source. [That is] the traditional software vendor relationship. However, there's the alternative option now where you can actually treat open source as your vendor, but it doesn't work in the same way now because you have to pay attention to the community and you probably have to get involved.

I would say if you have an organization that's concerned about this and they are using open source, they need people in-house who can work with the community, who can understand what's being used, and then they can engage at the appropriate level depending upon what's being used. The other side of this coin is you have to make sure that your developers aren't just pulling any random piece of stuff they find. You have to actually have a vetting process to ensure that the software you're using is accounted for so there are no surprises. [And] it has to be high-quality.

InfoWorld: What kind of vetting do you do of the Linux kernel?

Bressers: At Red Hat, obviously, we're known for Red Hat Enterprise Linux but even Red Hat Enterprise Linux is literally hundreds of other open source components put together. It's not just the Linux kernel. The Linux kernel is a big piece of it. Granted, a very important piece. Even though we have tons of kernel expertise, we still have people who focus on the security of the Linux kernel and making sure that we understand what's going on in these kernels: Does this stuff make sense, what are the security issues that we're seeing? What do we do with them, how do we fix them, what's going on?

Heartbleed affected the OpenSSL library, and that was included in Red Hat Enterprise Linux, but we also included it in some of our middleware products, for example, for shipping web servers. We had various other products that used the OpenSSL from Red Hat Enterprise Linux embedded into their own product like an image that could ship them. We pay attention to all of these pieces, and we have teams dedicated to just paying attention to this stuff to make sure that we're using good software that's being vetted.

InfoWorld: What processes do you use at Red Hat, and what do you recommend for others?

Bressers: This is going to depend on, team size, maturity level and just talent to some degree. We fuzz-test certain libraries and applications inside Red Hat. We do automated source code scanning. We do some level of manual scanning. We have a bunch of internal tools that will look at the artifacts that we build, which are making sure we're not making obvious mistakes or making sure that, for example, when you have an RPM package that installs the application or library onto the system, is it putting things in places that make sense? We have dedicated build systems so we understand what's being built, how it's being built.

InfoWorld: Would you say open source software today is more secure than it was five years ago? Is it more secure than proprietary software?

Bressers: Open source is not more secure than proprietary software nor is it less secure. The concept of proprietary software doesn't really exist anymore because virtually every organization has open source inside of the products they're building.

You also asked, is open source more secure today than it was five years ago? There isn't good information on this, necessarily. I would hesitate to say we're more secure. But I think we better understand a lot of the problems, I'm willing to say. Because we have various groups, and Red Hat is one of these and there are also various bug bounties that exist. There are security groups in places like Google that are doing a bunch of testing. There's all these organizations now that everybody is using open source, they're starting to give back. I suspect that as long as things continue the way they are, the future will be better than the past but, of course, it's up to us to make sure we get there because if people stop contributing back to the community, the power of open source is lost. That's the key here around security. You can't just take it and use it. You have to be involved and be a part of it.

InfoWorld: What's next for securing open source software?

Bressers: The big thing that's happening now is this concept of open source needs to be part of your supply chain. The message is starting to get out there, but I don't feel like it's where it needs to be yet because I still think there are a lot of organizations that are treating GitHub or Stack Overflow as a bunch of free software they can just take and that's fine, you never have to worry about it again. But it's not like that. My comparison here would be, what do you think would happen if a car manufacturer literally found some parts in the warehouse? They didn't know where they came from, they didn't know who made them but they're like, "They look great, let's just use those." That would end horribly. That's kind of where we're at in some of these instances where you've got developers just like, "That looks great, I'll take that." We're reaching a point now where we need organizations using this stuff to start understanding their supply chain with open source as part of it.

Error: Please check your email address.

More about GoogleLinuxRed Hat

More:
Open source users: It's time for extreme vetting - Techworld Australia

Encrypted chat app Signal tests next generation voice and video calling – TechCrunch

Signal, the encrypted chatapplication praised by Edward Snowden, is looking to move beyond messaging and into video. A new beta version of the app, now in testing, has enabled next generation voice and video calling features, according to the apps changelog. Beta users are able to try the new features with others who also have the setting enabled.

The changes were first spotted by the blog Android Police, which tracks a number of beta applications across the Google Play Store.

However, it appears that Signals new voice and video calling test isnt limited to Android. The apps release notes also stated that the upcoming Signal iPhone beta release will include the same functionality. (Its available now, were told.)

Signal calls; image credit: Android Police

The feature arrives at a time when Open Whisper System, the not-for-profit software group behind the app and its Signal Protocol cryptography it uses, faced some criticism for spending developer resources working on things like GIF search and stickers, rather than more serious features. Thats a bit unfair, though, because these sort of fun features are what draw in mainstream users.

Of course, support for video calling would be considered a major advance for the Signal app, not a fluffy addition.

According to a report from testers, thefeature can be enabled in the apps Settings screen. Here youll see a toggle for Video calling beta. Users are then able to place encrypted calls to anyone else who adjusted their beta settings in the same way, the changelog on Google Play explains. Though the message also references next generation voice calling as well, no further details on that are provided.

During the call, small voice, video and mute icons appear at the top of the screen.

Though aimed at the privacy-minded, Signal competes more broadly with apps like Facebook Messenger, WhatsApp and Google Duo, all of which support video calling. These feature is now considered table stakes for those entering the messaging app space with their own alternative clients.

Signal may be catchingup with the rest of the market, in terms of feature set, but the app struggles with adoption because itlacks the network effects of other, more social apps. This, of course, is by design. Because of its security and privacy focus, Signaldoesnt pull in your contacts from other social networks, upload your address book, or offer fun tools like Snapchats Snapcodes to make adding new friends easier.

That said,making private video calls possible is something that could attract more users over time, as the feature rolls out more broadly.

Reached for comment, Open Whisper Systems founder Moxie Marlinspike declined to discuss the additions in detail, saying only that theyll have more to say once the features are publicly available.

(Post updated to clarify how Signal referred to thevoice calling changes, with the addition of video.)

Excerpt from:
Encrypted chat app Signal tests next generation voice and video calling - TechCrunch

ChronoBank Raised $4m in Cryptocurrency with a Week Left for the Crowdsale – Finance Magnates

ChronoBank, a blockchain-based initiative aimed at disrupting the short-term recruitment sector, has already raised just over $4 million in cryptocurrency with itscrowdfund which will end in only one week. It recently reached two new partnerships both in the employment and cryptocurrency spaces.

To unlock the Asian market, register now to the iFX EXPO in Hong Kong.

ChronoBank has established a strategic partnership with Instahire, a team that is launching an app to expedite the recruitment process. Instahire is associated with the Clifford Wallace Agency, which supplies hospitality staffing to corporate events and restaurants and receives around 1,000 job applications per month. ChronoBanks team met with representatives from Instahire last week to discuss the possibility of a partnership between the two organisations. They say that both immediately saw the potential opportunities.

Instahire will launch in February 2017, first locally in Sydney and then to Australia in its entirety. The app is currently in the final stages of testing, ahead of first release, and hospitality businesses are actively being sought and added to the list. The immediate synergy for ChronoBank is to help grow the number of pre-registrations for both jobseekers and businesses.

Once the Instahire app is up and running with sufficient numbers of employers and employees, it will make sense to introduce the LH currency used on the ChronoBank platform. As an added incentive, the team are discussing the possibility of offering a free ChronoBank debit card with $20 credit for every new registered user, charging a 2% wage transfer fee.

ChronoBank has also partnered with theNEM cryptocurrency platform to create a separate wallet for the NEM ecosystem. ChronoBank will also issue Labour Hour (LH) tokens on the NEM network and use on-chain multi-sig, one of NEMs flagship security features.

NEM (New Economy Movement) was originally conceived as a clone of the Nxt blockchain, but rapidly developed into a completely new project with its own codebase. Its ecosystem has since grown with a market cap of around $60 million now, placing it in the top 10 of all cryptocurrencies.

It is important for us to deploy tokens on several blockchains, comments Sergei Sergienko, CEO of ChronoBank.This builds in redundancy and broadens our appeal across many initiatives and communities.

LH will leverage NEMs token asset facility that enables businesses to create blockchain tokens with specific properties and identifiers. The flexibility and ease of use of this system is highly appealing to us, continues Sergienko. NEMs developers have designed a powerful but nevertheless intuitive approach to token operations.

Aside from issuing tokens on the NEM network, ChronoBank is creating a dedicated wallet for the NEM blockchain. This will incorporate another powerful feature of the NEM blockchain: on-chain multi-signature transactions. Up to 32 signatories can be required to sign a transaction and, uniquely to NEM, signatures are propagated across the blockchain as soon as they are created. The developers explain that this means further signatories do not have to worry about an aggregating server going offline there is no single point of failure.

See original here:
ChronoBank Raised $4m in Cryptocurrency with a Week Left for the Crowdsale - Finance Magnates

Will Cryptocurrency Abuse be an Enforcement Focus for the IRS this Tax Season? Blog Subject to Inquiry – Lexology (registration)

Tax filing season began January 23rd, and with its arrival the IRS began rolling out its annual list of the so-called Dirty Dozen. The Dirty Dozen list is an educational effort to inform the public about scams, but it also offers insight into the tax enforcement issues on the IRSs radar.

Particular tax schemes often stay on the Dirty Dozen list for years until the IRS devises an effective strategy for combatting them (if it ever does). Changes on the list reveal new schemes or enforcement priorities that have caught the IRSs attention.

Of particular interest this year: whether cryptocurrency abuse will make the list. Cryptocurrencies, of which Bitcoin is the most well-known, are digital currencies not backed by any government. They trade on public markets called exchanges, and their use has grown rapidly in recent years. The IRS taxes cryptocurrency like property, not foreign currency.

The IRS is presently litigating a summons case against Coinbase Inc., a prominent U.S.-based cryptocurrency exchange, in the Northern District of California. The IRS uses John Doe summons procedure when it believes some type of transaction is being used for tax avoidance, and it wants to find out the identities of currently-unknown taxpayers who have participated in those transactions. John Doe summonses have used to sniff out the identities of, for example, taxpayers using debit cards linked offshore, or holding accounts at certain banks suspected of abuse.

The IRSs resort to John Doe procedure suggests it views cryptocurrency dealing as a widespread tax evasion strategy. But its evidence to date proves only isolated abuse, not pervasive tax evasion. The IRSs summons is supported by interviews with 3 taxpayers who admitted to using cryptocurrency to avoid or evade taxes. But its demand for records is far broader: all cryptocurrency transactions with a U.S. jurisdictional hook at a large cryptocurrency exchange over a 3 year period.

Based in part on this mismatch of the IRSs evidence and the information it demands, some cryptocurrency users and Coinbase itself are litigating to fight the summons. But such efforts seldom succeed at blocking disclosure.

If the IRS viewed cryptocurrency as a common tool for tax abuse, one might expect it to serve John Doe summonses on other US-based cryptocurrency exchanges or payment applications. But it has not done so, probably for lack of evidence they have been abused. Of course, such evidence could emerge from new interviews or from Coinbase records, once produced and digested.

The IRSs disclosures to date create real questions about just how widespread cryptocurrency-based tax fraud really is. If the IRS includes cryptocurrency abuse on its dirty dozen list, it will be sending a signal that it views the Coinbase litigation not as a one-off skirmish, but the first front in a lengthy war to come.

See the original post here:
Will Cryptocurrency Abuse be an Enforcement Focus for the IRS this Tax Season? Blog Subject to Inquiry - Lexology (registration)

The WikiLeaks-inspired war for the Mormon Church’s deepest secrets – The Daily Dot

Two websites are taking aim at the Mormon Church. Last Tuesday, Fred Karger launched Mormon Tips, a WikiLeaks-inspired website designed to go after the Church of Jesus Christ of Latter-day Saints tax-exempt status. The LDS Church, like many faith-based institutions, operates as a nonprofit, with its 501(c)(3) designation absolving the religion from paying taxes.

Karger, a 66-year-old gay rights activist, though, believes that the LDS Church functions more like a corporation than a nonprofit. He recently launched a series of commercials claiming that the Mormon Church is a trillion-dollar business, alleging that it brings in between $8 and $20 billion every year from its membership and spends millions on political lobbying each year, including fighting same-sex marriage. To force the LDS Church to be more transparent about its political and financial dealings, Karger is asking anonymous tipsters to leak information in order to go after the organizations tax-exempt status.

Help us collect any evidence on Mormon Church tax fraud and then we will file a complaint against them with the IRS, he pleads in the minute-long commercial, which he reportedly spent $30,000 to produce. After a battle with Comcast, who initially refused to air it, the ad will be broadcast 60 times in the coming weeks.

The campaign is a means of protesting against the LDS Churchs history of anti-gay policies, practices advocates say have continued even as Mormon leadership appeared to have softened its stance on the LGBT community in recent years.

In November 2015, Ryan McKnightwho would later found Mormon Leaks, a rival website released an internal policy memo showing that progress among Mormon leadership remains slow and turbulent. In response to the Obergefell v. Hodges case, which legalized marriage equality in all 50 states, the Church updated its Handbook of Instructions to state that people in same-sex unions would henceforth be branded apostates. Additionally, the children of same-sex couples would not be able to be baptized in the Church until they turn 18 and disavow their parents marriage.

Because of everything theyve done to brutalize the LGBT community, Karger told the Daily Dot, this is a way of fighting back.

Nine years ago, Karger helped expose the Mormon Churchs role in Proposition 8, the successful ballot initiative that struck down same-sex marriage in California. The Church of Jesus Christ of Latter-day Saints, a religion founded in the mid-19th century by Joseph Smith, a merchants son turned prophet, donated millions of dollars to the effort. The church also offered volunteers and considerable resources to Project Marriage, the anti-LGBT group backing Prop 8. After the church became involved, the campaign was pulling in $500,000 a day in donations.

Kate Kelly, a civil rights lawyer who was excommunicated by the Church in 2012, was a political organizer in San Diego at the time, working for Ralph Naders presidential campaign. She was also an active member in her local congregation. Kelly claims that 80 percent of the time at weekly services was focused on Prop 8whether it be organizing, phone banking, handing out fliers, or preaching against the evils of same-sex marriage during the Sunday sermon.

It was all hands on deck, Kelly said. If anything has changed since then, its that their influence on the political process is more subtle. But from what I can perceive, they are not less engaged.

Getting called out for its support of Prop 8which included a small fine from California's Fair Political Practices Commissionled to a great deal of soul-searching within the church. In 2015, LDS leaders partnered with LGBT advocates in Utah to pass a nondiscrimination ordinance preventing people from being denied housing or employment based on their gender identity or sexual orientation. That bill was the first of its kind not only in Utah but also across the United States. The ordinance remains the only pro-LGBT law ever passed by a majority Republican legislature.

Troy Williams, the executive director of Equality Utah, a local LGBT advocacy group, added that LDS leaders have opposed Religious Freedom Restoration Act (RFRA) laws each time that a state lawmaker has introduced them in the general assembly. Such legislation would allow businesses to discriminate against LGBT people based on proprietors sincerely held religious belief.

The reason that they gave was that these RFRA laws went too farand that they would cause too much divisiveness in our state, said Williams, who worked with the Mormon Church the pass the 2015 nondiscrimination ordinance. The church should really be applauded for that.

But as Kelly points out, even the 2015 law left room for a hearty religious exemption.

Those laws do not apply to religious institutions, she said. If youre employed by the church, they dont have to abide by it. If you live in housing owned by the church, they dont have to abide by it. A lot of people see that ordinance as codifying something that is a very dangerous precedent for other places. If all religious institutions are exempted from not discriminating against gay people, thats a lot of institutions that provide a lot of jobs and a lot of housing.

Videos leaked in October 2016 show that the church did more than protect its blind spots. While LDS leaders worked publicly with LGBT advocates to pass legislation that appears inclusive, the footage shows members of the Quorum of the Twelve Apostles meeting to state their support for so-called religious freedom bills like those introduced in Indiana and Mississippi in recent years. Leaders in the Quorum, the governing body of the LDS Church, discuss building coalitions with other faiths to push such legislation, as well organizing to fight the repeal of Roe v. Wade and the Affordable Care Act.

If they think we will move on these issues, they do not know us, comments Elder Boyd K. Packer, a former apostle who passed away in 2016, in one video. Never will we budge on these fundamental things.

Packers words have proven extremely prophetic. A year after the American Civil Liberties Union estimated that over 200 anti-LGBT bills were introduced across the U.S., Congress will debate the First Amendment Defense Act, a national version of state RFRA laws. Its sponsors in the House and Senate, Rep. Raul Labrador and Sen. Mike Lee, are both Mormons.

Another video further illustrated just how far the Mormon leadership has to go in understanding LGBT issues. The apostles also discuss Chelsea Manning on the tapes, the U.S. Army whistleblower who had not yet publicly come out as transgender at the time the video was filmed. A discussion of whether the LDS could be targeted by a WikiLeaks-like entity is derailed by an obsession about Mannings sexuality. Elder Gerrit Gong states a rumor he heard that Manning did what he did because the army private was jilted by a former lover, which caused the 23-year-old to spiral into depression.

But he is confirmed homosexual? one leader asks. Elder Dallin Oaks adds that the answer to this question is of direct importance to the church. Im suspicious that the news media cover up anything involving homosexuals when it would work to the disadvantage of the homosexual agenda and so on, he says.

In a phone interview, McKnight said that learning the true history of the religion opened up a proverbial rabbit role. Once content and active in the church, he began to question every aspect of his faith, wondering if hed been lied to his whole life. If Im wrong about this, what else am I wrong about? McKnight asked himself.

The 36-year-old believes that the 15 videos he published onto YouTube last year show that the LDS Church isnt what he believed it to be at all. The church acts like both a political lobbying group and a corporationone that protects its business interests. Although McKnight says many Mormons picture gatherings of the Quorum as Jesus sitting at the head of the table counseling his 12 apostles, the reality is that these behind-closed-doors sessions function like board meetings.

He further pointed to the fact the legal name of the Church is actually called the Corporation of the President of the Church of Jesus Christ of Latter Day Saints.

If your average Mormon believes100 percentthat these are Gods servants here on Earth, these videos dispel that myth, McKnight said, comparing it to the famous scene in The Wizard of Oz where the kingdoms all-powerful ruler is revealed to be just a man in a machine. Its like pulling the curtain back a little bit, taking a peek, and saying, OK, thats how its done.

After the videos were released, McKnight started Mormon Leaks, a website with a similar mission to Kargers project: to make the Church transparent and accountable.

For instance, recent documents published by McKnights team last month call into question the assertion that the 89 leaders who make up the LDS Churchs General Authority receive whats been called a modest stipend, a small monthly allowance to cover their general living expenses. McKnight explained that Mormons are told these men were wealthy and successful prior to being called to serve in the church leadership and look at the opportunity as a means of giving back to the community. Pay stubs leaked to the website in January, however, show that these men each make between $116,400 to $120,000 a year.

An article in Deseret News, the official newspaper of the LDS church, claimed that these salaries are comparable those allotted to other religious leaders, but McKnight said that he takes no stance on whether those earnings are fair. He simply believes that as a tax-exempt body, the church has a responsibility to be open with its membership about its financials.

Thats an example where people were misinformed about the reality, McKnight said. Pretty much anyone thats reasonable would be hard-pressed to describe a base living allowance of around $120,000 as a modest stipend, especially when theres quite a bit of evidence thats just the start of it and there are additional benefits on top of it that we dont know of. But our job at Mormon Leaks is not to influence the conclusion one way or the other. We just want to provide the information so people can come to their own conclusions.

Kelly said that at the churchs annual General Conference, which is held in November, LDS leaders do some general accounting but called the process very opaque and vague. She added, No one knows what money gets spent on what.

Although it operates as a 501(c)(3), the LDS Church operates a number of subsidiariesboth non-profit and for-profit. After purchasing 400,000 acres of land in the Florida panhandle for a hefty $565 million, the church became the largest private landowner in the Sunshine State last year, holding even more property than Disney. In Salt Lake City, the Mormon Church operates the City Creek Center, the citys largest outdoor mall. Located near Temple Square, the shopping center includes name brand retailers like Tiffany & Co, Michael Kors, Banana Republic, and Sephora, as well as a Cheesecake Factory. Despite the religions prohibition on consuming alcohol, many of the restaurants serve beer and wine.

If America went bankrupt, the Mormon Church would be totally finefor a long time, Jack Waters, a researcher for Mormon Tips, told the Daily Dot. They have holdings on multiple continents and all 50 states. Theyre doing $40 million a year in humanitarian aid, but thats a drop in the bucket of what they pull in annually.

By following the money, Karger and his team believe that they will put pressure on the LDS Church to change its stance on LGBT issues. Kat Krietemeyer, who appeared in the groups recent commercial, said that growing up as an LGBT youth in the church, you are taught that your orientation is a literal burden.

It was always made very clear that being LGBT is a sin, and if you were having such thoughts, you were going to be whisked away to talk to someonea bishop, a seminary teacher, or a youth leader, Krietemeyer told the Daily Dot. I grew up with some kids that were sent away to programs. Some of those programs tried to convince kids that if they had enough faith theyd be straight, which naturally meant any deviation from that result was your own fault. Others were low-key conversion-therapy camps where kids would carry rocks to simulate the burden of being gay on their family.

Following the LDS Churchs November policy leak, the impact on LGBT youth in the state was devastating. Mama Dragons, a network of supportive mothers advocating for inclusion in the church, estimated that 32 queer and transgender children took their own lives in three months after that document was made public. (That number has been contested by the Utah Department of Health, which claims the actual figure is lower.)

Karger believes that theres precedent for an outside campaign against the Mormon Church being effective in pushing its leadership toward progress. Theyre slow to change, but theyve done it with polygamy, he said.

The LDS Church teaches that the practice of group marriage, an early tenet of the faith, was abolished in 1890 after Smith received a direct revelation from God. The religion still believes in spiritual polygamy, that men will be allowed multiple wives in heaven, just not its earthly equivalent. But in truth, the Mormon Church fought with all its muster to keep the practice in place, even taking the matter to the Supreme Court. In Reynolds v. United States, SCOTUS ruled unanimously that group marriage is unlawful, constituting bigamy. The church lost and the revelation followed.

They succumbed to social pressures, McKnight explained. They made a business decision. It was a smart move.

The LDS Church was later forced to make a similar decision following years of protests over a policy dating back to Brigham Young: Prior to 1978, black men were not allowed to hold leadership positions in the church. No person having the least particle of Negro blood can hold the priesthood, said Young, who served as the second president of the church following Smiths death. He also believed that people of African descent were cursed by God with the seed with blackness. Many black athletes refused to compete against Brigham Young University, the school named in the prophets honor, in collegiate sporting events.

The policy was so unilateral that black children werent even allowed to be leaders in Boy Scouts troops affiliated with the church until 1974, when the NAACP challenged the policy. A 12-year-old boy was blocked from being a Senior Patrol Leader, the highest rank in his troop, and the civil rights organization sued on the childs behalf to overturn the decision. The two parties settled out of court.

Four years later, the church received a revelation that God changed his mind about black people, as the Tony-winning musical The Book of Mormon put it.

Black people eventually gained their civil rights, even if it was a slow, arduous process, McKnight said. The Mormon Churchjust like we see now with LGBT issueswanted to hold onto their racism for as long as humanly possible, even as much of the country had accepted that black people were equal, just as much of the country has moved on and accepted the fact that LGBT people are equal.

Although Karger believes that Mormon Tipswhich launched in response to the recent revelations from McKnights websitewill find evidence of illegal activity within the church, thats where he and Mormon Leaks diverge. Karger, who ran for president in 2012, said that his hope is that in a year or two, his team will show up at the Internal Revenue Service office located in Ogden, a working-class town located an hour outside of Salt Lake, with trucks full of paperwork detailing extensive tax fraud. McKnight has no such expectations.

The Mormon Leaks founder, who reasserted that his only goal is transparency, thinks that the church behaves unethically but not in a criminal manner. Under current U.S. tax law, churches can spend up to 20 percent of their total budget on political organizing, for instance, and still retain their non-profit status.

I believe that the church takes advantage of every loophole that it can when it comes to increasing its net worth, he said. But I will be shocked if its to the point where its engaging in illegal activity. Religion is like the last sacred cow in this country. Religions definitely have wide, sweeping exemptions when it comes to legally being required to offer this kind of transparency. That shouldnt stop them from doing whats right.

Correction:A previous version of this article incorrectly stated Ryan McKnight's age. He is 36 years old. We regret the error. Additionally, this article has been updated to reflect the full, proper title of the Mormon Church: the Church of Jesus Christ of Latter-day Saints.

Follow this link:
The WikiLeaks-inspired war for the Mormon Church's deepest secrets - The Daily Dot

The BBC just tried to call out WikiLeaks. It did not end well. – The Canary

On 6 February, the BBC World Service broadcast its latest episode of The Inquiry. The segment was titled Can You Believe What You Read on WikiLeaks?

Since its airing, the BBC has faced criticism. Not only because it could easily ask the same question about itself. But also because it spends the entire episode indulging in the same practice it warns viewers against WikiLeaks for.

The Inquiry carries the tagline: One pressing question from the news. Four expert witnesses. Challenging answers. And in its WikiLeaks programme, presenter Ruth Alexander began:

Its been reported in the last few days that WikiLeaks, the website that publishes classified information, has interesting material on the three main candidates in Frances upcoming presidential election.

A Russian newspaper headline says Julian Assange, the founder of WikiLeaks, is going to pour oil on the fire of the presidential campaign. Oh, we thought. This, again.

BBC journalist Nick Robinson had caused a stir over WikiLeaks possible release of French presidential election material on 5 February. He had suggested that it was largely targeting one particular candidate:

Could be coincidence but funny how Julian Assange gets leaks of emails that hurt candidates who Moscow oppose. Now it's Macron's turn

Nick Robinson (@bbcnickrobinson) February 5, 2017

But WikiLeaksdenied that it had singled out the former Economy Minister Emmanuel Macron:

Here is UK state TV's @bbcnickrobinson spreading false info to 723k people. Nick, WikiLeaks Tweeted info on all candidates. Macron the least

WikiLeaks (@wikileaks) February 7, 2017

On The Inquiry, Alexander continued:

WikiLeaks caused a big shock last year when it leaked thousands of emails from inside Hillary Clintons party during the US election. Emails the US intelligence services say were hacked by Russians trying to interfere in the campaign.

Its led some to question who WikiLeaks is really working for.

Alexander then interviewed the four expert witnesses. The first was Suelette Dreyfus, the co-author of a book with Assange. Ex-WikiLeaks volunteer Daniel Domscheit-Bergs interview followed. Then, Alexander spoke to journalist James Ball, who also worked with WikiLeaks. And finally, Foreign News Desk Editor at The Age Chris Zappone featured.

Of these four experts, three have had documented fall-outs with WikiLeaks and/or Assange. So while Dreyfus highlighted Assanges strong innate sense of the importance of justice, Domscheit-Berg asserted that sometimes there was basically no fact checking [of the leaked documents] at all apart a plausibility check. Ball, meanwhile,cast Assange as a difficult person.

Yet Domscheit-Berg did say that WikiLeaks has a very good record for not making mistakes. And Ball acknowledged that Assanges stated motivation in

Then Zappone spoke. The obsessive editor focused on WikiLeaks Democratic National Committee (DNC) leaks. He detailed Russias alleged role in those leaks. And he attempted to show Assanges links with that country:

Hes had a show on RT, so the Russian state-sponsored foreign language media network. Hes boasted of having a role in helping the former NSA contractor Edward Snowden find his way to Russia, and counselling Snowden to go to Russia.

In reality, Snowden found his way to Russia because the US revoked his passport on route to South America. Without a passport, Snowden cannot leavethe country.

But for the Kremlin, Zappone suggested, this Russia-linked founders site is the perfect vehicle for releasing anti-Western propaganda.

Yet this BBC programme was a prime example of what it purports to be warning against: propaganda. The views aired were predominantly anti-WikiLeaks or Assange, rather than a range of views. It contained inaccuracies and half truths. And it had ominous interludes where US officials branded WikiLeaks a serious danger that needs to be crushed.

Its overwhelming message was that even if you still trust the organisation despite the programmes evidence to the contrary you cant trust whoever puts the leaked information in WikiLeaks lap. Because they may have an agenda.

It is, of course, credible to criticise WikiLeaks. And many people have done so. But the BBC criticised it for being a propaganda tool while using the propaganda model itself. A model, in fact, that it regularly uses to forward its own agenda.

And that thoroughly weakened its argument. Which is unfortunate for the BBC, if it believes in what its saying.

Get Involved

Watch the full episode of The Inquiry here.

You can call 0370 0100222 to make a complaint to the BBC.

Support The Canary if you appreciate the work we do.

Featured image via Matt Cornock/Flickr and DonkeyHotey/Flickr

Continue reading here:
The BBC just tried to call out WikiLeaks. It did not end well. - The Canary

Pamela Anderson visits exiled Wikileaks founder Julian Assange FIVE times the last four months sparking romance … – The Sun

Assange has been living in the embassy for four years after he was granted political asylum by Ecuador

PAMELAAnderson has visitedWikiLeaks founder Julian Assange five times in the last four months at the Ecuadorian embassy in London sparking speculation that the pair could be romantically involved.

The Baywatch star has even been seen bringing him food, and a source observed that Anderson seems to be wearing sexier outfits every time she visits.

GC Images

GC Images

Anderson was seen visiting Assange on October 15, November 13, December 7, December 12 and January 21.

On one occasion, she was seen carrying a Whole Foods bag and is thought to have been bringing him shopping.

And she has also brought him a sandwich from Pret A Manger.

Getty Images

Getty Images

Assange has been living in the embassy for four years after he was granted political asylum by Ecuador.

He is due to be questioned over sexual assault allegations in Sweden which he denies but fears if he leaves he will be extradited to the United States for his involvement in WikiLeaks campaigns.

Pamela was introduced to Assange by Vivienne Westwood in August 2014, and sought advice from him about her new animal rights charity.

Since then she has visited him in his embassy cell multiple times.

The formerBaywatch star said: I really believe in him and think hes a good person, and Im concerned about his health, his family, and I just hope that by some miracle hes set free.

Getty Images

I brought him a nice vegan lunch and some vegan snacks.She then joked: He said I tortured him with bringing him vegan food.

Pamela set up The Pamela Anderson Foundation at the start of 2014 to help environmental causes and to protect vulnerable people and animals.

She has also campaigned to raise awareness for organisations such as PETA and Mercy For Animals, and joined initiatives to protect the Arctic, combat deforestation and condemn the force feeding of ducks and geese in the production of foie gras.

Assange has recently come under fire for WikiLeaks heavy involvement in the US election.

PA:Press Association

Critics berated the controversial character for allegedly helping Trump to power by exposing thousands of shady emails sent by his rival Hillary Clinton.

In a statement, Assange claimed releasing the emails was bound to attract criticism but was ultimately better for the public.

He said: WikiLeaks remains committed to publishing information that informs the public, even if many, especially those in power, would prefer not to see it.

WikiLeaks must publish. It must publish and be damned.

We pay for your stories! Do you have a story for The Sun Online news team? Email us attips@the-sun.co.ukor call 0207 782 4368

Read more:
Pamela Anderson visits exiled Wikileaks founder Julian Assange FIVE times the last four months sparking romance ... - The Sun

Chelsea Manning’s Attorney is Raising Funds for Her ‘Transition Into the Free World’ – Out Magazine

A GoFundMe page has been launched to support Chelsea Manning as she transitions to life at home after being in prison since 2010.

The 29-year-old former army intelligence analyst and transgender woman was sentenced to 35 years military prison after leaking sensitive, military and diplomatic documents regarding warfare in Iraq and Afghanistan. In the final days of his presidency, president Obama commuted her sentence to grant Manning her freedom.

Related |President Obama Commutes Chelsea Manning's Sentence

"The majority of Chelseas adult life has been spent under the control of powerful institutions," writes Chase Strangio, Mannings attorney and friend, on GoFundMe. "Upon her release she will need logistical, emotional and financial support to safely transition into the free world."

The fundraising campaign, created by Strangio, as well as Mannings family and friends, has raised more than $20,000 of their $100,000 goal in under a day. "Funds raised will be used to pay for Chelseas rent, utilities, health care, clothing and other living expenses for the first year after she is released."

The rest is here:
Chelsea Manning's Attorney is Raising Funds for Her 'Transition Into the Free World' - Out Magazine

4 ways to send encrypted messages on Android – TechRepublic

Image: Jack Wallen

At some point in your mobile life, you're going to need to send an encrypted message. Whether it's mission-critical, sensitive business data, personal information, or a secret family recipe, the need to hide that information away in an encrypted missive will come to the fore. When that moment arises, you want to be ready. If you happen to use the Android platform, worry not...there are plenty of means to that end.

These are four ways you can send an encrypted message on the Android platform. The sending methods will vary, but the end results will be the same: encryption.

SEE: Free ebookExecutive's guide to mobile security (TechRepublic)

If you're looking for an email app that offers solid encryption, you'd be hard-pressed to find a better one-two punch than K-9 Mail and OpenKeychain: Easy PGP. With these two apps together, you can work with encryption keys (generating, importing, and exporting), send encrypted email, and decrypt incoming email.

An important detail about using these two tools is the order in which you install them. Before installing K-9 Mail, you must first install OpenKeychain and then, from the app's main window (Figure A), generate a new PGP key.

Figure A

Generating a PGP key with OpenKeychain.

After installing OpenKeychain and generating a key, install K-9 Mail and walk through the process of setting up your email account. Once the account is properly set up, tap the menu button (bottom right corner of K-9 Mail), tap Settings | Account settings, tap Cryptography, tap OpenPGP App, select OpenKeychain (Figure B), and grant OpenKeychain access.

Figure B

Selecting the key to use for encryption.

Select the key you generated with OpenKeychain, and now you're ready to start sending encrypted emails. The usual encryption rules apply here, such as the need to import any PGP public keys from users that you want to send encrypted messages; otherwise, you're good to go.

If you're looking for a way to encrypt your SMS messages, Signal may be your best bet. Signal allows you to use your existing contacts, do group chats, and make private phone calls. Signal communicates, via SMS or voice, using advanced end-to-end encryption called TextSecure.

The one caveat to Signal is that anyone you are communicating with must be using Signal to view encrypted messages. Anyone not using Signal will be sent unencrypted messages. If you send an unencrypted message to a user, a message will appear at the top of the chat encouraging them to install the app.

Installing Signal is handled as you would any Android app. During the installation, you must first verify your phone number. Then, Signal will automatically generate your encryption key and apply it to your phone number. When the installation is complete, Signal behaves like any other SMS client. Messages to users who are already using Signal will be automatically encrypted, so there are no extra steps for the user to take.

SEE: Don't use Android pattern lock to protect secrets, researchers warn (ZDNet)

If you're looking for a really simple means to encrypt a quick message so that you can paste that message into an email or an SMS message, you can't go wrong with Encrypt text with CryptMax. With this tool, you install it, type in your message to be encrypted, enter an encryption password, and tap ENCRYPT (Figure C). Now copy the encrypted message, paste it into your email or SMS client, and send away.

Figure C

Encrypting a message with CryptMax.

The recipient of the message will need to install the same app and know the encryption password used for the message. Once the recipient has that, they paste the message into CryptMax, type the encryption password, and tap DECRYPT.

If you don't want to bother installing an application, you can always use something like the Encrypt Easy website. In the designated box, you enter the text you want encrypted, enter an encryption password, tap Encrypt (Figure D), and then copy the resultant message.

Figure D

Encrypting a message via a web-based service.

Paste the encrypted message into an email or SMS message and send it. The recipient of the message will need to either go to the same site used to encrypt the message or make sure whatever app/service they use to decrypt it works with the same encryption algorithm; if it doesn't, encryption will fail.

There are a number of variations on each of these types of apps; the route you take and which app you choose is up to you.

Some people might consider the web-based route a bit less secure because a third-party is involved. If you're looking to send sensitive company information, you'll probably want to work locally and use an app specifically designed for the sending of such data.

From this list, the K-9/OpenKeychain combo would be your most secure and best bet.

See more here:
4 ways to send encrypted messages on Android - TechRepublic

Encryption of data ‘manageable’ for law enforcement, think tank says … – The Hill

The challenges that data encryption pose for law enforcement are manageable, according to a new analysis by a Washington, D.C., think tank, to be released laterThursday.

The research from the Center of Strategic and International Studies, which was shared with The Hill, found no instances in which encryption played a determinative role in recent major terrorist attacks in Europe and the United States.

The think tank also concluded that encryption does not play a major role in terrorists efforts to recruit followers over the internet.

Privacy advocates and cybersecurity experts largely favor encryption and have raised alarm over the possibility of agencies like the FBI and NSA creating a backdoor to access secured data.

Still, the rise of encryption in mobile and online communications has created hurdles for law enforcement and counterterrorism operations.

The new research estimates the number of law enforcement cases affected by encryption is small, ranging from a few dozen to several hundred. Still, the experts recommend that officials monitor any increase or decrease in the number of investigations thwarted by encryption as well as terrorists use of encryption in their operations.

Our research suggests that the risk to public safety created by encryption has not reached the level that justifies restrictions or design mandates, the report states. The encryption issue law enforcement faces, while frustrating, is currently manageable.

It is not yet clear how the Trump administration will handle encryption, though the president has signaled he is on the opposite side of the debate as privacy advocates. Last year, Trumpcalledfor a boycott against Apple to force the company to help the FBI unlock the iPhone of one of the San Bernardino attackers.

Sen. Jeff SessionsJeff SessionsAla. attorney general to fill Sessions's Senate seat: report Elizabeth Warren rails against Jeff Sessions confirmation in tweet storm ACLU vows to sue Sessions if he violates Constitution as AG MORE (R-Ala.), Trumps choice for attorney general, has said that he wants federal investigators to be able to lawfully overcome encryption in order to pursue leads.

Encryption serves many valuable and important purposes. It is also critical, however, that national security and criminal investigators be able to overcome encryption, under lawful authority, when necessary to the furtherance of national-security and criminal investigations, Sessionssaidin response to questions from Sen. Patrick LeahyPatrick LeahyEncryption of data 'manageable' for law enforcement, think tank says Dems blast Sessions's ties to Trump ahead of final vote Dem senator blasts Trump's 'bromance' with Putin MORE (D-Vt.) ahead of his confirmation hearing last month.

Read the original here:
Encryption of data 'manageable' for law enforcement, think tank says ... - The Hill