Chelsea Manning tweets from prison

Story highlights Manning is serving a 35-year sentence for leaking thousands of classified documents She says she will be using a voice phone to dictate her tweets

Manning, who is serving a 35-year prison sentence for leaking thousands of classified documents, appears to have joined Twitter this week.

In a series of tweets, the prisoner formerly known as Bradley Manning said she will be using a voice phone to dictate her tweets to communications firm Fitzgibbon Media, which will post them on her behalf.

She is not allowed Internet access in prison, according to The Guardian.

"It will be hard, but I don't want this Twitter feed to be a one-way street/conversation," Manning posted to her nearly 26,000-plus followers.

Manning was sentenced in 2013, and in August of that year, she said she wanted to transition to a female.

The Fort Leavenworth Disciplinary Barracks in Kansas, where she is serving her sentence, has authorized hormone therapy for her treatment.

Manning said she suffers from gender dysphoria. Her lawyers describe it as "the medical diagnosis given to individuals whose gender identity -- their innate sense of being male or female -- differs from the sex they were assigned at birth, causing clinically significant distress."

Last year, a Kansas judge granted her request to be formally known as Chelsea Elizabeth Manning.

The former Army intelligence analyst was convicted of stealing and disseminating 750,000 pages of documents and videos to WikiLeaks in what has been described as the largest leak of classified material in U.S. history.

See the original post:
Chelsea Manning tweets from prison

Convicted Leaker Chelsea Manning Apparently Joins Twitter From Prison

World News Videos | US News VideosCopy

Convicted national security leaker Pvt. Chelsea Manning has apparently joined from prison.

A user using her name and photo published her first tweet on Friday afternoon and wrote several more throughout the day.

Born male as Bradley Manning, she was convicted of sending classified documents to the anti-secrecy website WikiLeaks. In 2013, she was sentenced to 35 years in prison.

In her posts, Manning revealed her plans for Twitter, thanked her supporters, and shared the difficulties of tweeting while incarcerated.

She said she would be an active on Twitter - tweeting daily or weekly - but wanted them to be significant posts.

"I'm hoping to stay connected with this account as much as possible but would rather tweet about more meaningful things than not #lessismore," she said.

In another post, Manning revealed the difficulties of posting from prison.

By Saturday morning, Manning had over 30,000 followers.

FitzGibbon Media, which has Manning as a client, is currently handling her account.

Follow this link:
Convicted Leaker Chelsea Manning Apparently Joins Twitter From Prison

The Truth About Edward Snowden | Glenn Greenwald on "Glenn Beck Radio Program" – Video


The Truth About Edward Snowden | Glenn Greenwald on "Glenn Beck Radio Program"
What are some major misconceptions about Edward Snowden? Glenn Greenwald joins Glenn Beck to discuss. Watch the full interview from this episode of the Glenn Beck Radio Program on demand ...

By: TheBlaze

Read the original here:
The Truth About Edward Snowden | Glenn Greenwald on "Glenn Beck Radio Program" - Video

UK spied on Argentina: Edward Snowden – The Times of India

LONDON: Britain spied for several years on the Argentine government over fears of a fresh attempt to retake the Falkland Islands, documents released by American whistle-blower Edward Snowden have claimed.

Snowden said British agents were actively spying on Argentina between 2006 and 2011.

Britain was concerned that Argentina could launch another attempt to reclaim the Falkland Islands, according to reports in the Argentine media.

The two nations fought a war over the islands in 1982. The former CIA worker, who now lives in Russia, has previously leaked sensitive information about US surveillance programmes. He is now fugitive from his native country after leaking the sensitive information.

There has not been any formal response yet from either the British or Argentine government to the allegations, which have been published by a number of South American news agencies.

The claims are that Britain began a large scale operation which may have involved implanting computer viruses, circulating false propaganda and collecting intelligence with the aim of diminishing or discrediting the Argentine government, BBC reported.

The news comes around the 33rd anniversary of the start of the war, which saw more than 900 servicemen killed.

UK defence secretary Michael Fallon said last month that Britain will spend 280 million pounds over the next 10 years on renewing and beefing up its defences of the Falkland Islands, to taking into account any future and possible threats to the islands.

Stay updated on the go with Times of India News App. Click here to download it for your device.

Continued here:
UK spied on Argentina: Edward Snowden - The Times of India

TrueCrypt code security audit complete; software free of back doors

A crowdfunded third-party security audit of popular (and shuttered) personal encryption tool TrueCrypt has concluded. The effort, led by cryptographic expert Matthew Green found that "TrueCrypt appears to be a relatively well-designed piece of crypto software," and that the audit "found no evidence of deliberate backdoors, or any severe design flaws that will make the software insecure in most instances."

The software isn't perfect. The audit team did find "a few glitches and some incautious programming" related to the Windows random number generator, and vulnerability to cache timing attacks. Neither problem poses much in the way of issues to users unless encryption and decryption are performed on a shared machine, or a physically insecure machine where miscreants can run code directly on the encrypting computer.

TrueCrypt was an open-source freeware application used for on-the-fly encryption. It could create a virtual encrypted disk within a file, encrypt a disk partition, or the entire storage device with pre-boot authentication. In the wake of the Snowden revelations, a non-profit agency was crowdfunded and created to audit the utility's encryption methodology, with the first phase of the report having been completed in April.

Speculation about the shutdown of the popular encryption software was wide-ranging, with the most prevalent theory being that the shutdown was a "warrant canary," meaning that the group may have received a subpoena from US courts demanding encryption keys. Internet skeptics believe that the group may have chosen to shut down, rather than fight or concede the keys to the court.

The repository hosting the utility, SourceForge, claims that there is "no indicator of account compromise" and "current usage is consistent with past usage." Additionally, the last major update was over two years ago with limited support on newer operating systems, so all signs point to the program being abandoned, rather than interfered with by external forces.

By Electronista Staff

Original post:
TrueCrypt code security audit complete; software free of back doors

Twisted light increases efficiency of quantum cryptography systems

Researchers at the University of Rochester and their collaborators have developed a way to transfer 2.05 bits per photon by using "twisted light." This remarkable achievement is possible because the researchers used the orbital angular momentum of the photons to encode information, rather than the more commonly used polarization of light.

The new approach doubles the 1 bit per photon that is possible with current systems that rely on light polarization and could help increase the efficiency of quantum cryptography systems.

Quantum cryptography promises more secure communications. The first step in such systems is quantum key distribution (QKD), to ensure that both the sender and receiver - usually referred to as Alice and Bob - are communicating in such a way that only they know what is being sent. They are the only ones who hold the "key" to the messages, and the systems are set up in such a way that the presence of any eavesdropper would be identified.

In the paper, published in New Journal of Physics today, Mohammad Mirhosseini and his colleagues describe a proof-of-principle experiment that shows that using OAM to encode information rather than polarization opens up the possibility of high-dimensional QKD.

Mirhosseini, a Ph.D. student in Robert W. Boyd's group at the University of Rochester's Institute of Optics, explains that they were able to encode a seven dimensional "alphabet" - that is, seven letters or symbols - using both the orbital angular momentum (OAM) of the photons and their angular position (ANG).

These two properties of the photons form what physicists refer to as mutually unbiased bases, a requirement for QKD. Using mutually unbiased bases, the correct answer is revealed only if Alice encodes the information using a particular basis and Bob measures in that same basis.

In QKD, once they have generated a long, shared key, Alice and Bob publicly announce the basis (or "alphabet") they have used for each symbol in the key. They then compare what alphabet was used for sending and which one for receiving.

They only keep the part of the key in which they have used the same "alphabet." The letters they keep produce a secure key, which they can use to encrypt messages and transmit these with regular encryption without the need for quantum cryptography.

If for any reason their communication is intercepted, because of a fundamental property of quantum mechanics, there will be discrepancies between Alice and Bob's keys. To check for this, Alice and Bob sacrifice a short part of their key. They share this publicly and identify any discrepancies. This lets them know whether their connection is secure and, if not, they will stop the communication.

The researchers showed that using their system they were able to generate and detect information at a rate of 4kHz and with 93% accuracy. A long term goal of the research is to realize secure communications at GHz transmission rates, which is desirable for telecommunication applications.

View post:
Twisted light increases efficiency of quantum cryptography systems

#BTC4 Bitcoin Game Juego English Español ProTip P2P Innovation Money Dinero CryptoCurrency Simpsons – Video


#BTC4 Bitcoin Game Juego English Espaol ProTip P2P Innovation Money Dinero CryptoCurrency Simpsons
http://www.twitter.com/VanosEnigmA http://www.facebook.com/VanosEnigma http://www.twitter.com/CryptoEEV Thank you mucho meow for your donation: Bitcoin Address: 1FJ9ZZcnKqhiiYWNhbpBaqy9QQHTBSmsP8 ...

By: VanosEnigmA Enigmaisland

See the original post:
#BTC4 Bitcoin Game Juego English Español ProTip P2P Innovation Money Dinero CryptoCurrency Simpsons - Video