Was Edward Snowden a Russian agent? – The Australian Financial Review

by Charlie Savage

One evening in the American autumn of 2015, the writer Edward Jay Epstein arranged to have dinner at an Italian restaurant on the Upper East Side with the director Oliver Stone. At the time, Stone was completing Snowden, an admiring biopic about the former intelligence contractor Edward Snowden, who disclosed a vast trove of classified documents about National Security Agency surveillance programs to journalists in June 2013 and had since been living as a fugitive in Russia. Epstein was working on a book about the same topic, which has now been published under the title How America Lost Its Secrets: Edward Snowden, the Man and the Theft.As the writer recounts in that book, their conversation took a testy turn:

"Toward the end of our dinner, Stone told me that he did not know I was writing a book about Snowden until a few weeks earlier. He learned of my book from Snowden himself. He said Snowden had expressed concern to him about the direction of the book I was writing. 'What is it about?' Stone asked me.

"I was taken aback. I had no idea that Snowden was aware of my book. (I had not tried to contact him.) I told Stone that I considered Snowden an extraordinary man who had changed history and was intentionally vague in my description of my book's contents. Stone seemed to be reassured "

Epstein and Stone had a history of rivalry when it came to interpreting another important historical event: the assassination of President John F. Kennedy. Early in his career, Epstein wrote three books about that topic. The first, Inquest(1966), poked holes in the rigour of the Warren Commission's official investigation. The second, Counterplot(1969), brought a sceptical eye to the investigation by New Orleans District Attorney Jim Garrison, who pursued the theory that the Central Intelligence Agency orchestrated the president's murder. And the third, Legend(1978), pointed readers to the conclusion that Oswald's image as a mixed-up loner with half-baked Marxist ideas was an operational cover story a "legend" and that he had been a Soviet intelligence agent. (After the Soviet Union collapsed, the opening of the KGB's archives did not corroborate the theory that Oswald had actually been a trained intelligence agent.)

Stone waded into those same murky waters with his 1991 movie JFK,which used a fictionalised version of Garrison's investigation as a means to explore the theory that a right-wing conspiracy, spanning the CIA and the military-industrial complex, had been responsible for Kennedy's death. The following year, Stone and Epstein were invited to be part of a panel discussion at New York's Town Hall about the Kennedy assassination and the film's controversial blending of fact and fiction. In preparation, according to a diary entry on Epstein's website, he brought an index card on which he wrote:

"Although they may aim at the same purpose of finding truth, non-fiction and fiction are two distinct forms of knowledge. The writer of non-fiction is limited by the universe of discoverable fact. He cannot make up what he does not know no matter how strong his intuition or suspicion. The writer of fiction knows no such boundary: he can fill in whatever gaps exist with his imagination."

Now, years later, the two men once again found themselves eying each other as they circled the Snowden saga.

The conventional understanding of Snowden is that he was what he appeared to be: a computer worker in the intelligence world who became alarmed about the hidden growth of the American surveillance state and decided to reveal its operations to the world, copied archives of documents, and handed them to journalists whom he had summoned to Hong Kong and whom he entrusted to decide what to publish.

Within the mainstream spectrum of interpretations of his actions, at one end are civil libertarians who consider him simply to be a heroic whistle-blower. At the other extreme are members of the national security establishment who consider him nothing more than a destructive traitor. In between are a range of those who think some of his disclosures met the high standard for "whistle-blowing"; that other disclosures brought to light important things that should not have been kept secret in a democracy but that were also not necessarily, in and of themselves, abuses or overreaches; and that still other disclosures went too far and were not a public service.

Stone's movie, which premiered in September, presents a comic-book version of the pro-Snowden narrative in which a wunderkind super-hacker takes on Big Brother. In telling that story, Stone mixes accurate material with fiction, while simplifying away complexities. His movie steps on the genuine privacy issues raised by Snowden's disclosures with melodramatic embellishments, such as a scene in which an invented senior NSA official, his Orwellian face filling a floor-to-ceiling screen, casually reveals that he knows whether the Snowden character's girlfriend is sleeping with another man.

It omits actual Snowden disclosures whose individual privacy rationale was debatable, such as when he showed the South China Morning Post documents about the NSA's hacking into certain institutional computers in China. And its discussion of the volume of internet metadata the NSA collects from equipment inside the United States ignores any distinction between truly domestic emails and foreign-to-foreign messages that are merely travelling across domestic network switches.

Epstein's book, by contrast, presents a negative view of Snowden. But the two works are not equivalent: Epstein does not merely oversimplify with the purpose of downplaying the benefits of Snowden's leaks and emphasising the harms. Rather he contends that the conventional narrative of what happened may have been a deceptive cover story. Epstein lays out the case that behind his image as a whistle-blower Snowden was instead an "espionage source" for Russia perhaps its dupe at first, or perhaps its willing spy all along:

"The counterintelligence issue was not if this USintelligence defector in Moscow was under Russian control but when he came under it. There were three possible time periods when Snowden might have been brought under control by the Russian intelligence service: while he was still working for the NSA; after he arrived in Hong Kong on May 20, 2013; or after he arrived in Russia on June 23, 2013."

The reader should know that Laura Poitras, one of the journalists to whom Snowden leaked documents in Hong Kong, later shared some of them with me, and we developed several articles from them for The New York Times. In addition, as part of a book on national security, I wrote a history of how surveillance technology, law and policy secretly evolved in the decades following Congress'enactment of the Foreign Intelligence Surveillance Act of 1978.

It explained how the rise of fibre-optic networks in the late 1980s and the internet in the 1990s placed mounting pressure on legal constraints written for the analogue telephone era; how the Bush administration bypassed those rules after September 11 and then enlisted the Foreign Intelligence Surveillance Court and Congress to legalise what it had created lawlessly; and how the Obama administration decided to keep and entrench what it inherited.

I could not have written that history without the files disclosed by Snowden and information the government declassified because of his leaks. While there had been stray glimpses for years suggesting that the NSA was becoming far more powerful, facts were scarce and speculation and conspiracy theories had filled the void. Snowden's disclosures enabled us to understand what was real about the NSA's activities so we could engage in an informed public debate about the rules for 21st-century surveillance. This is why I regret Stone's reintroduction of distortions into discussion of surveillance, and it may also colour my reaction to Epstein's book.

Snowden's disclosures indeed prompted robust debate and policy changes. An appeals court ruled that the NSA's bulk collection of domestic calling records was illegal, rejecting a dubious legal theory that the intelligence court had been secretly relying on for years. Congress ended that bulk collection program and required the intelligence court to tell the public when it issued novel and significant interpretations of surveillance laws.

President Obama imposed unprecedented privacy protections for information about non-Americans that the NSA collects abroad. Technology giants such asGoogle and many ordinary people began taking steps to more firmly secure their private information from hackers. Still, this enlightenment came at an undeniable, if difficult to measure, cost. Some terrorists, criminals and unsavoury regimes learned from Snowden, too, becoming harder to monitor and thereby making the world more dangerous.

Assessing whether Snowden's disclosures served the public interest whether they did more good than harm turns in part on who counts as "the public". Snowden's critics, including Epstein, tend to define the public in nationalist terms, focusing their criticism on his disclosures about NSA operations abroad, where few domestic legal rules apply and the agency can indiscriminately vacuum up private messages in bulk. Snowden's supporters point out that domestic data are also found abroad in the internet era and they argue that consideration of the NSA's work should take account of its effects on human rights: non-Americans have privacy rights, too.

Another complication for judging Snowden's actions is that we do not know how many and which documents he took. Investigators determined only that he "touched" about 1.5 million files essentially those that were indexed by a search program he used to trawl NSA servers. Many of those files are said to pertain to military and intelligence tools and activities that did not bear on the protection of individual privacy. Snowden's sceptics assume that he stole every such file. His supporters assume that he did not. In any case they believe his statements that after giving certain NSA archives to the journalists in Hong Kong, he destroyed his hard drives and brought no files to Russia.

Epstein sees Snowden's supporters as naive. He draws on his connections with the late James Jesus Angleton, the CIA's paranoid hunter for KGB moles both real and imagined during the height of the Cold War; after his dismissal from the agency in 1974, Angleton became an important source for Epstein, including for his book on Oswald. Much of How America Lost Its Secretsconsists of Epstein building "alternative scenarios" like a counterintelligence investigator in Angleton's mould trying to pierce presumed Russian deception. This, he concedes,

"differs from that of a conventional forensic investigation aimed at finding pieces of evidence that can be used to persuade a jury in a courtroom The point is to assure that any alternative that fits the relevant facts, no matter how implausible it may initially seem to be, is not neglected."

And so Epstein asks: what if Snowden told secrets to Russian intelligence officials or brought files to Moscow, despite saying otherwise? What if he meant to end up in Russia all along, and it was just a cover story when he said he was trying to get to South America and was stranded in Moscow because the United States revoked his passport? What if Snowden sold out to China and/or Russia in Hong Kong? What if the Russian intelligence service recruited Snowden when he was still working for the NSA or even earlier? What if some other hypothetical Russian mole still inside the NSA helped him? What if he was working with the Russians unwittingly, manipulated by a handler pretending to be a "hactivist" interested in internet privacy?

In this way, How America Lost Its Secretsplunges down rabbit holes, each leading to its own Wonderland. In building up his scenarios, Epstein deploys dozens of instances of variants of the words "presume", "assume" and "might have". He describes things he believes "could have been", things he interprets as "possible", things he supposes were "likely" and things he maintains were "suggested". He piles inferences atop other inferences, as with "if so, it seems plausible to believe"; "if that is the case, then"; and "if so, it wasn't much of a leap to assume". He weaves cobwebs of conjecture that start with phrases like "it doesn't take a great stretch of the imagination to conclude" and "it is not difficult to imagine'.

For Epstein's book to have value for it to be worth reading, not just an object intelligence hard-liners might display on their shelves as a sign of their contempt for Snowden the facts he selects to anchor and discipline his scenario-building cannot be flimsy or cherry-picked to fit his pre-existing beliefs. This is important because he clearly decided early that everything pointed in the direction of the Snowden saga being a foreign espionage plot. In June 2013, as the world was still absorbing the first revelations, Epstein published a column in The Wall Street Journal asking, "Who, if anyone, aided and abetted this well-planned theft of US secrets?"

And in May and June of 2014, he published two more columns laying out the case that "far from being a whistleblower, Snowden was a participant in an espionage operation and most likely steered from the beginning toward his massive theft, whether he knew this at first or not". Given this predisposition, it is unfortunate that Epstein builds his imagined scenarios upon allegations that may not be real facts.

For example, Epstein gives sinister significance to the "fact" that Snowden arrived in Hong Kong 11 days before he checked into the hotel where he met the journalists, leaving his activities during that period a mystery. Snowden has insisted that he was in that hotel the whole time, waiting for the journalists to arrive. In one of his columns written in 2014, Epstein first claimed that there was an 11-day mystery gap, citing his conversation with an unnamed hotel security guard. I am aware of no independent verification of this allegation. So as things stand, this "fact" appears to be vaporous.

Epstein also makes important factual omissions, in places even overlooking crucial information that he had mentioned elsewhere. For example, laying out the case that Snowden may have decided to concoct a whistle-blower cover story at some point after he had already started copying documents for some other purpose, Epstein stresses that Snowden's most famous leaked document a classified intelligence court order requiring Verizon to turn over all its customers' phone records, which "gave him credentials as a whistle-blower" was issued in April 2013, yet Snowden had been copying files since 2012. But other documents described the program for collecting bulk domestic phone records, including a classified inspector general report Snowden also leaked; 87 pages earlier, Epstein had noted that Snowden read that report in 2012.

It would be eye-glazing to compile a comprehensive list of Epstein's doubtful "facts", but one more is worth scrutinising because Epstein hangs such heavy weight on it: the allegation that Snowden brought files with him to Russia, despite his denials. A Hong Kong lawyer who represented Snowden has publicly said he witnessed Snowden destroy his hard drives before leaving that city; Epstein interviewed the Hong Kong lawyer, but does not mention this corroboration. Instead, he focuses on a brief exchange during a September 2013 interview of Snowden's Russian lawyer: the interviewer asked, "So he does have some materials that haven't been made public yet?" and the Russian lawyer replied, "Certainly".

For his book research, Epstein says he asked the Russian lawyer about that interview, which was conducted in Russian but translated into English before being broadcast and published, and whether the exchange was accurate. The lawyer affirmed that it was. Based on this, Epstein repeatedly states that the Russian lawyer disclosed that Snowden brought documents to Moscow; once he even embellishes it, writing that in this exchange the Moscow lawyer had disclosed that Snowden still had access in Russia to additional files that he had not given to the journalists in Hong Kong.

Yet the interview transcript shows that this exchange was ambiguous. The context, which Epstein omits, was a discussion of how the ongoing publication of new articles citing Snowden's leaks did not mean that he was still making new leaks from Russia; rather the journalists were still just working through files he had given them in Hong Kong. So maybe this was a garbled conversational moment, and the Russian lawyer was saying that the journalists had still more unpublished materials to work with. Or maybe, in that 2013 interview, he was just playing along to gin up intrigue.

For that matter, when the lawyer later told Epstein that it was accurate, was he merely affirming the English translation of his 2013 words, or did he understand himself to be confirming the interpretive gloss Epstein placed on them? It seems to me that a journalist who wanted to know the truth, even at the risk of undermining his book project, would have followed up by asking the lawyer to clarify explicitly whether he was saying that Snowden had brought files with him to Russia and, if so, how the lawyer knew that he had done so and how he accounted for his client saying otherwise. By Epstein's account, after obtaining this murky confirmation, he instead changed the subject. That left him free to construe this exchange as having generated a "fact" consistent with his thesis.

There is a related problem. Epstein gets many facts about surveillance issues wrong, calling into question his competence to serve as a guide to thinking seriously about the Snowden saga. He gets dates wrong, calls an important technology by the wrong name, and inaccurately describes various programs and a presidential directive Snowden leaked. His botched discussion of the Prism system, which Snowden disclosed, is a troubling example. The government uses Prism to collect from American webmail providers such asGmail, without a warrant, the emails of non-citizens abroad whose accounts have been targeted by intelligence officials for surveillance. When Americans communicate with those targets, the government also "incidentally" gathers those Americans' emails to and from the target without a warrant. Epstein reassures his readers three times that every few months, the NSA sifts through all the emails it has gathered via Prism in order to filter out and purge "whatever information was accidentally picked up about Americans". That is a fake fact.

In reality, the NSA does not filter out Americans' messages gathered via Prism. Indeed, it shares raw messages gathered via the Prism system with the Central Intelligence Agency, the Federal Bureau of Investigationand the National Counterterrorism Centre. Once-secret rules permit officials at all those agencies to search that trove for intelligence purposes using the names of Americans and to read any private emails they find. FBI agents may also do so when investigating ordinary criminal suspects. When Congress in 2017 extends the law that authorises Prism, reformers are hoping to close this so-called "backdoor search loophole" by requiring warrants to search for Americans' emails within the Prism trove. Because this policy debate is attributable to Snowden's leaks, Epstein's misinformation about Prism is no small detail.

Epstein argues that views differ about Snowden because the public and the media lack good information, accepting what Snowden says at face value and omitting whatever does not fit that narrative because of their "confirmation bias". By contrast, he writes, those who hold darker views about Snowden include lawmakers and officials who "base it on classified reports" and "have been at least partially briefed" about the NSA's investigation. Here he cites several of the latter group who said Snowden's leaks were damaging and unjustified, including two who said in 2014 that they thought he must be a spy, although Epstein only names one of those two. But Epstein omits what Chris Inglis, who was deputy director of the NSA from 2006 to 2014 and oversaw that investigation, said last March when asked whether Snowden had acted as a spy or from his own convictions:

"Here is what I surmise based upon a careful observation of the facts available to me. It does seem clear that his intention was to go to Latin or South America after he revealed all of this material in Hong Kong. He worked very hard and his lawyers worked very hard on his behalf to actually achieve that in the days and weeks afterwards I don't think that he was in the employ of the Chinese or the Russians. I don't see any evidence that would indicate that. And even if they are careful in terms of practising denial and deception, I think there would be certain tell-tales "

Epstein also says little about Snowden's comments criticising Russia's internet policies and human rights record. But those comments have heightened chatter about what will happen to him under the Trump administration: might Vladimir Putin extradite him to the United States as a gift or a bargaining chip? In a recent interview, Snowden said he found such talk perversely encouraging, since nations do not trade away their spies.

The premise of this chatter dovetails with an odd twist at the conclusion of Epstein's book. Without much warning, he writes that he sees "no reason to doubt [Snowden's] explanation that he stole NSA documents to expose its surveillance because he believed that it was an illicit intrusion into the privacy of individuals".Epstein continues to criticise Snowden for taking documents that did not concern "domestic" spying, and he still maintains, vaguely, that by the end Snowden's "mission evolved, deliberately or not, into one that led him to disclose key communications intelligence secrets to a foreign power". But he states that he "fully" accepts that Snowden "began as a whistle-blower, not as a spy," and was still acting as a whistle-blower when he reached out to the journalists.

By pulling back at the end of his book, Epstein tries to have it both ways: weaving conspiracy theories while maintaining plausible deniability and some veneer of evidence-based journalism. But his indulgence in speculation, his treatment of questionable claims as established facts, and his misunderstanding of surveillance combine to undermine his book's credibility. How America Lost Its Secretsfails to live up to Epstein's own principle, jotted down on that card for his debate with Oliver Stone about "JFK" so many years ago: when a non-fiction writer reaches the limits of discoverable fact, he is supposed to stop not fill in whatever gaps exist with his imagination, no matter how strong his intuition or suspicion.

The New York Review of Books

How America Lost Its Secrets: Edward Snowden, the Man and the Theft, by Edward Jay Epstein, published by Knopf. Snowden, a film directed by Oliver Stone. Charlie Savage is a Washington correspondent for The New York Times. His latest book is Power Wars: Inside Obama's Post9/11 Presidency.

2017 The New York Review of Books, distributed by the New York Times Syndicate

Visit link:
Was Edward Snowden a Russian agent? - The Australian Financial Review

‘Secrets’ shows it’s the government, not Edward Snowden, we should be worried about – Kansas City Star


Kansas City Star
'Secrets' shows it's the government, not Edward Snowden, we should be worried about
Kansas City Star
A catastrophic data breach. Russian complicity. Blundering institutions. Distrust of government. Reading Edward Jay Epstein's gripping and devastatingly even-handed account of Edward Snowden, How America Lost Its Secrets, provides a Faulknerian ...

Go here to see the original:
'Secrets' shows it's the government, not Edward Snowden, we should be worried about - Kansas City Star

Edward Snowden talks in real time with Pitt students | Pittsburgh … – Pittsburgh Post-Gazette

Former Central Intelligence Agency employee, National Security Agency contractor and whistleblower Edward Snowden spoke via live stream to a full room of Pitt students on Wednesday at the William Pitt Union Assembly Room in Oakland.

The Pitt Program Councils lecture committee organized a conversation with Mr. Snowden exclusively for Pitt students, allowing him time to speak at an undisclosed location on cybersecurity and privacy. He also took questions submitted by the students, according to Niki Iyer, 19, the public relations director for the council.

Its so cool because its a very unique opportunity, Ms. Iyer said. You cant always say, Im going to teleconference a guy in Russia who is wanted by the U.S. government. Who else better to hear his opinion from?

Mr. Snowden was behind massive document leaks in 2013 that exposed actions including government snooping on citizens and made him an international fugitive.

Read this article:
Edward Snowden talks in real time with Pitt students | Pittsburgh ... - Pittsburgh Post-Gazette

Why We Need Encryption, Explained By Sci-Fi Dystopias – Vocativ

As the age of Trump gets into full swing, the specter of surveillance is once again brimming back to the surface of our collective imagination. In no small part thanks to the Obama administration, Trump has inherited an increasingly sophisticated system of surveillance, one which in the near future could include omnipresent facial recognition technology, backed by existing tools that can hack into our cell phones or monitor our social media accounts with little hassle.

In light of these threats, says Kevin Bankston, the director of New Americas Open Technology Institute, the best offense is a good defense. Namely, the encryption of our vastdigital lives.

Turning to science fiction, Bankston explains that the near future of surveillance could broadly veer down one of two paths. Either we get the dystopian world of George Orwells 1984, where governments keep an oppressive boot on the necks of their citizenry by monitoring their every move. Or we could end up with the chaotic wasteland seen in the cyberpunk works of Peter Watts, where the concepts of privacy and security on the internet have long since disappeared and every person is only out for themselves laid out in his book, Maelstrom.

Neither scenario is wildly far-fetched: regimes in China, Russia and elsewhere already use surveillance to monitor their citizenry and block content and Western democracies may not be far behind. But encryption, as Bankston puts it, can be a double duty dystopia destroyer.

It protects your data from identity thieves and stalkers and hackers, he says. But it also protects us from 1984, by making it much, much harder for governments to engage in mass surveillance.

At the end of the day, Bankston says, encryption should be seen as a right that we need to fight for one thatll protect us from the worst of all futures.

Here is the original post:
Why We Need Encryption, Explained By Sci-Fi Dystopias - Vocativ

5 Open Source Software Defined Networking Projects to Know … – Linux.com (blog)


Linux.com (blog)
5 Open Source Software Defined Networking Projects to Know ...
Linux.com (blog)
Throughout 2016, Software Defined Networking (SDN) continued to rapidly evolve and gain maturity. We are now beyond the conceptual phase of open source ...
Edgecore Networks and ADARA Partner to Deliver Industry-Leading High-Performance Networking SolutionsIT Business Net

all 4 news articles »

View post:
5 Open Source Software Defined Networking Projects to Know ... - Linux.com (blog)

OpenToonz: Making high-end animation software accessible – Opensource.com

Kostanstin Dmitriev isone of the pioneersmaking professional animation tools available for Linux users. His primary focus over the years has been the ongoing development of Synfig Studio, a 2D animation program. Konstantin has proven Synfig's power with the completion of his short film, "The Beautiful Queen Marya Morevna: Demo."

To help other artists and to promote his work, Kostanstin chronicled the progress of his animation on the Morevna Project.What started as a simple blog quickly evolved into a rich resource for anyone interested in using open source tools for animation.

The Beautiful Queen Marya Morevna: Demo |Morevna Project, CC BY-NC-SA 3.0

Recently, when I was visiting the Morevna Project, I discovered the Linux version of OpenToonzavailable for download. For those of you who don't know about OpenToonz, it's an open version of the software that Studio Ghibli co-developed with Digital Video and uses to create their breathtaking animations. In 2016, Dwango launched the OpenToonz project in cooperation with Digital Video and Studio Ghibli, opening up their code to users.

There was a lot of press and buzz on social media regarding OpenToonz in the animation community, soI was surprised and excited to see OpenToonz available to Linux users. Making high-end software like OpenToonz accessible to professionals and aspiring animators is exciting, but making that same software available on Linux makes even a stronger case for people to convert to an open system for their work.

I thought that I would reach out to Dmitriev and talk to him about his thoughts about supporting a Synfig competitor and what this means for Synfig's development in the coming year.

Photo of Kostanstin Dmitriev |Denis Kholodilin, CC BY 4.0.

Stephen Egts (SE): Are you still teaching animation? In the past, I know you have worked with young people, sharing your knowledge of animation, Synfig, and open source tools.

Kostanstin Dmitriev (KD): Yes, as part of my volunteer activities I am teaching offline animation classes at the local art school. This is a kind of testing ground for all free animation software developments made by my team. I have a group of 8 to 10 students ranging in age from 11 to 24 years old who are learning animation with free software. I provide free admission to the classes for everyone.

Kostanstin Dmitriev teaching a class. |Denis Kholodilin, CC BY 4.0.

SE: Being one of the lead developers of Synfig, why did you think properly porting OpenToonz to Linux was important?

KD: Well, first of all, let me clarify one thing: My team didn't actually "port" OpenToonzat least on a code level. The hard work of porting OpenToonz code was done by Campbell Barton (who is well known forhis contributions to Blender) and Franois Revol, with additional help from the community. Thanks to their efforts, it became possible to compile, and use, OpenToonz on Linux.

But when the actual porting was done there was only one way to run OpenToonz on Linuxto compile it from source. This is obviously not a comfortable option at all for many users. There were one or two custom binary packages, but they all were distribution specific (i.e., for specific version of Ubuntu or OpenSuse) and required to have particular libraries installed in your system.

So we decided to fill this gap and build a portable binary of OpenToonz capable of runningon any Linux distro. This is generally not a trivial task, but I already had experience on making such binaries for Synfig. Also, I wanted to make running with minimal efforts possible, so it was decided to deliver it as anAppImage package.

This is why I feel "port" is not really correct word here. What did our team actually do? We delivered OpenToonz to Linux users.

SE: Yes, the AppImage installation process for OpenToonz was seamless and very easy to install. Do you see that as a path Synfig is going to follow when it comes to future updates?

KD: Yes. Right now, we're almost done with rewriting Synfig packaging scripts, so the next update will be shipped as AppImage.

Synfig interface |Image and Artwork by Anastasia Majzhegisheva, CC BY 4.0.

SE: Let me rephrase my initial question then. Many people would wonder why you would contribute to software that may compete with Synfig. What would you say in response?

KD: To get a better understanding of my reasons it would be best to rewind eight years and remember my initial motivation of contributing to Synfig and how I ended up as its maintainer.

My involvement began in 2008, and was heavily influenced by the concepts of the free software movement and was inspired by the idea of open movies as introduced by Blender Foundation. I was looking for a way to make my own open movie. Since I was a fan of Japanese animation, I wanted it to be hand-drawn in anime style (i.e., "not 3D"), soI was looking for a free tool for 2D animation that wascapable of doingwhat I wanted.

I think it worth it to put a special emphasis heremy initial motivation was to create animation with free software.

So, I found Synfig. Of course, it was far from perfectit had a clumsy multi-window UI, lots of important features missing, and it crashedevery fiveminutes. But it had very good concept and according to my analysis, it was the most powerful open source tool for 2D animation. Back then I already had experience with commercial 2D animation software (Flash, Moho, Anime Studio, CreaToon), so I knew what was comparable. Instead of "just complaining" () about its imperfection, I started to do my own code tweaks, and this is how my contributions to Synfig started.

Marya Morevna, Episode 3.0.1 |Morevna Project, CC BY-SA 4.0

SE: Didn't you receive a grant from the Shuttleworth Foundation in 2013 Synfig's development?

KD: Although it was called a grant,it actually was more of a sponsorship,and I was free to use it for whatever I liked. At the time, my team was still suffering while working with the limited functionality of existing open source 2D animation tools, and it was holding my projects back. I then decided to hire a developer to work on Synfig. This is how Ivan Mahonin come to project.

Bringing Ivan onboard was a key decision. Thanks to this sponsorship and additional crowdfunding campaigns, with just one hired developer during 20132014, we made more progress than the previous seven years Synfig was open sourced. Working with Ivan made it possible to implement asingle-window mode, port GUI to Gtk3, finish the bone animation system (with the support for cutout animation, image distortions, and vector rigging), add some sound support via Sound Layer, and add many more features and fixes.

Synfig: Tool for cutout animation

Since then, I have been handling all funding responsibility and acting as Ivan's coordinator. For many people, I have become a stakeholder of Synfig or as some used to say, "the man of Synfig." In fact, the scope of my work was a bit broaderbesides my work with Synfig, I maintain the Papagayo fork and develop RenderChan, an automated build system for animation projects.

Synfig + Papagayo: A lip-sync tutorial

Managing animation projects with RenderChan

To sum up, my efforts were put into Synfig for one particular reason: I wanted a tool for 2D animation and Synfig was the most powerful and most promising open source software option. Period.

The key words here are it was. Since March 2016, we all have OpenToonz.

SE: Have you tried OpenToonz on projects with students yet? Has it been an easy learning curve? Do you have any examples?

KD: Usually, before I start teaching a tool to my students, I spend several months learning it and trying to use in my own projects. Right now, I am exactly at this stage. Still from time to time, I cannot hold myself back from sharing my discoveries, and some of my students have already tried the powerful vector drawing features of OpenToonz.

Drawings in OpenToonz | Anastasia Majzhegisheva, CC BY 4.0

SE: What would you like to see improved on OpenToonz?

KD: I haven't dug too deep, so I am apprehensive to complain about OpenToonz's existing shortcomings. Anyway, I will give it a tryit would be really awesome to improve bitmap drawing tools by integrating MyPaint brushes. There is even a bounty posted about that.

SE: Are you going to start developing OpenToonz for Linux or are you going to just be making AppImage updates that are pushed out for Mac and PC?

KD: It is possible that at some point my team will start contributing to OpenToonz code.At the moment, we have automatic builds that deliver all the latest changes from official OpenToonz code to Linux users. If at some moment we want to make some feature or fix, then our first step will be to submit a pull request back to the official OpenToonz code repository. However, as practice shows, merging pull requests can take weeks, even months. I can perfectly understand why, since I am managing the official repository of Synfig and deal with all these routines. While a pull request will be waiting for approval, we will ship a custom build of OpenToonz with our own fixes. That way Linux users will be able to test our changes before the pull request gets merged. This even can make the merging procedure faster. That's the plan.

Horizontal timeline in OpenToonz

Agnyy Ignatyev, Used with permission

SE: Do you think making OpenToonz available for Linux makes people think twice about adopting Linux as they operating system?

KD: I don't dare to make any bold statements here. Although I would say it another way: If a 2Dartist or animation studio decided to migrate to Linux, it would be much easier to do now.

I think in the first place itchanges the gameplay for the ones who already uses Linux; they have a really powerful animation tool now.

Before March2016 all Linux-based 2D animation artists were starving for good tools. Now, suddenly, they have plenty of choices. There is OpenToonz with its powerful toolkit. Synfig still has an appealing simplicity for motion graphics and a fast learning curve with rich multi-language educational resources. Since September 30, 2016, Blender has featured Grease Pencil as what itcalls its full 2D drawing and animation tool. And don't forget Krita, which is on its way to adding what it says are "interpolation and keyframing for layers and masks and their properties." For Krita this is surely a step beyond simple "frame-by-frame only animation" and should bring it on par with other full-featured animation tools.

Daniel M. Lara, Used with permission

Announcement of Grease Pencil on official Blender website.

Blender Foundation, CC BY-SA 3.0

As you can see, the competition in 2D animation software niche is getting stronger, and this is absolutely awesome to see.

Wolthera van Hvell tot Westerflier, CC BY-SA4.0

SE: 2015 saw Synfig 1.0 and in 2016 we've got integration with Papagayo and a rewritten rendering engine. What developments do you see for 2017?

KD: In the near future, I plan to release a new stable version with all our developments from the past months. After that, I am going to invest some time into Synfig infrastructure. We already redesigned the Synfig front page and you can expect more infrastructure changes soon. Also, putting our efforts into bug fixing and iron out the current feature set is important.

SE: How are fundraising efforts going to support Synfig's development?

KD: There is no fundraising in its traditional way planned for the nearest future. At the moment, we are trying to shift focus to funding development using "bounties" via the Bountysource platform.

The idea is that a user can place a small reward (or bounty) for a bug or issue he or she wants to see addressed. Then the user spreads a word about the bounty to convince other users to join in and pitch the amount. In turn, the bounties attract the attention of developers as "most demanded" issues, and they fix them for a given reward. You can think each bounty as micro-crowdfunding, originated and driven by users.

You can view active bounties and submit new ones on the Synfig page at Bountysource.

Image courtesy of Bountysource.com, Used with permission

SE: How dependent is Synfig on donations?

KD: I think past years have proventhat intensive development of Synfig is 100% dependent on donations. Right now, this is more true than ever. At the moment, we are completely without funds to handle an "on-staff" developer. This is why, starting in September 2016, all development activities of Synfig are Bounty-based.

To help Synfig development:

As part of our Patreon activities we are contributing not only to Synfig, but also to thePapagayo lip-sync software, RenderChan automatic build system, and now also OpenToonz. By contributing to our Patreon you can help us to make all them better.

Denis Kholodilin, CC BY 4.0

Read the original:
OpenToonz: Making high-end animation software accessible - Opensource.com

SnapRoute secures $25 million Series A investment for open source … – TechCrunch


TechCrunch

See the article here:
SnapRoute secures $25 million Series A investment for open source ... - TechCrunch

How to Manage the Security Vulnerabilities of Your Open Source Product – Linux.com (blog)


Linux.com (blog)
How to Manage the Security Vulnerabilities of Your Open Source Product
Linux.com (blog)
The security vulnerabilities that you need to consider when developing open source software can be overwhelming. Common Vulnerability Enumeration (CVE) IDs, zero-day, and other vulnerabilities are seemingly announced every day. With this flood of ...

See original here:
How to Manage the Security Vulnerabilities of Your Open Source Product - Linux.com (blog)

Physicists, Lasers, and an Airplane: Taking Aim at Quantum Cryptography – WIRED

Slide: 1 / of 1. Caption: Getty Images

On a clear night last September, at a little Ontario airport, two pilots, two scientists, and an engineer took off in a small plane. Theyd pulled the left-side door off its hinges, and a telescope poked out of the portalnot at the night sky, but at the ground below. The team was about to play a very difficult, very windy game of catch.

A couple miles away, their colleagues gathered in a trailer to lob the tiny baseballs: infrared photons, beamed from a laser that tracked the plane along its mile-high trajectory. In the craft cruising above, physics graduate student Chris Pugh and the others pivoted their telescope to catch the photons, one by one. On their best run, they caught over 800,000 photons in just a few minutes, but it wasnt easy. Out of every 10,000 photons they sent, wed get one, says Pugh, who studies at the University of Waterloo. One to a hundred of them.

The point of this high-altitude game was to test a technology known as quantum cryptography. For decades, experts have claimed that if executed properly, quantum cryptography will be more secure than any encryption technique used today. They also say it will be one of the lines of defense when quantum computers crack every existing algorithm. But its hard to pull off; quantum cryptography requires precise control of individual photons over a long distance. Pughs group was the first to successfully test the technology from ground to airplane.

It works like this: The sender transmits carefully prepared photons, over optical fiber or through the air, to a recipient. The recipient reads the photons like Morse code, with physical signals corresponding to a letter or a number. Instead of listening for long and short beeps, Pugh and his colleagues measured how the photons are orientedwhat physicists call polarization. In their setup, photons could be polarized in four directions, and the team translated that polarization into 1s and 0s: a binary message known as a cryptographic key. Using that key, a sender can encrypt their information, and only a recipient with the key can unscramble the message.

Quantum cryptography is so powerful because its physically impossible for a hacker to steal a key encoded using quantum particles. In the quantum world, when you measure or observe a particle, you change it. Its like Schrodingers cat, which is both dead and alive when youre not looking, but immediately becomes one or the other when you look. If you try to measure a quantum key, you immediately change itand by design, the sender will know and throw the key out. Its secure by the laws of nature, says physicist Thomas Jennewein, who led the work at the University of Waterloo.

Commercial quantum cryptography products have been around for over 15 years, but they have limited range. You can guarantee security between the White House and the Pentagon, or from the corner of one military base to another, says Caleb Christensen, the chief scientist at MagiQ Technologies, a Boston-area company that makes commercial quantum cryptography systems. In the telecom business, thats way too short. So far people have been able to send quantum keys just 250 miles.

This tech will be important when computers become too powerful for current encryption algorithms. It takes todays computers far longer than the age of the universe to decode an encrypted message, but itll be a cinch for quantum computers. It might take hours or days as opposed to age of the universe, says Pugh.

Still, quantum cryptography wont be techs security savior. Most hacks today are due to simple human error. Most times when a corporation gets hacked, its not necessarily because someone went in and spliced into their telephone line, says Christensen. If you lose all your secrets because someone phishes the e-mail of your middle management, youre not going to spend millions of dollars installing a quantum cryptography backbone.

For those with higher security standards, the eventual goal is to deliver quantum keys to a satellite, which could make it possible to send quantum-secured messages across the globe. Last August, the Chinese Academy of Sciences, collaborating with Austrian physicists, launched a satellite called Quantum Experiments at Space Scale, although they havent successfully sent it a key.

Jenneweins team has been rehearsing for a satellite mission for over three years. In 2013, they started by sending quantum keys to a moving truck. Now that theyve shown they can transmit enough quantum signal through a mile of Earths atmosphere, Jennewein wants to beam a key 300 miles into the air, to a satellite in low-Earth orbit. With proper funding, Jennewein thinks his team could do it in two or three years. Hes optimistic: The airplane experiment is, in some respects, harder than an actual satellite, he says. A satellite has much smoother and more predictable motion than an aircraft. Just ask Pugh.

Read more here:
Physicists, Lasers, and an Airplane: Taking Aim at Quantum Cryptography - WIRED

Israeli scientist wins Japan Prize for cryptography work | The Times … – The Times of Israel

An Israeli computer scientist was among three winners of the 2017 Japan Prize, an award honoring achievement in science and technology, for his work in the field of cryptography.

Adi Shamir, a professor at the Weizmann Institute in Rehovot, was recognized for his [c]ontribution to information security through pioneering research on cryptography, according to the prizes website. The Japan Prize Foundation announced the awards Thursday.

Shamir, 64, is the second Israeli to win the prize. Ephraim Katzir, a biophysicist and former Israeli president, was honored in 1985, the inaugural year of the award.

In 2002 Shamir, with Ronald Rivest and Leonard Adleman, won the Turing Award, widely considered to be the worlds most prestigious computer science prize.

My main area of research is cryptography making and breaking codes, Shamir explains on the Weizmann website. It is motivated by the explosive growth of computer networks and wireless communication. Without cryptographic protection, confidential information can be exposed to eavesdroppers, modified by hackers, or forged by criminals.

The Japan Prize Foundation selected Shamir and the other two winners Emmanuelle Carpentier, director of the Max Planck Institute for Infection Biology in Berlin, and Jennifer Doudna, professor at the University of California, Berkeley, for their research in gene editing from 13,000 nominations.

The winners will each receive the yen equivalent of approximately $443,000. They will be honored in Tokyo on April 19.

More:
Israeli scientist wins Japan Prize for cryptography work | The Times ... - The Times of Israel