myddrn: Cryptocurrency Laundering Theory for Fun and Retirement – Video


myddrn: Cryptocurrency Laundering Theory for Fun and Retirement
The overlay is incorrect for the first half of the video, this is Old Gregg (myddrn) Sometimes Old Gregg just gets tired of it all. Tired of the shoes. Tired of the baileys. Tired of flashing...

By: CarolinaConVideos

The rest is here:
myddrn: Cryptocurrency Laundering Theory for Fun and Retirement - Video

Glenn Greenwald: Edward Snowden, the NSA, and U.S. National Surveillance State (June 23, 2014) – Video


Glenn Greenwald: Edward Snowden, the NSA, and U.S. National Surveillance State (June 23, 2014)
When Glenn Greenwald met an anonymous source in 2013 for The Guardian, he never imagined it would be NSA contractor Edward Snowden. No Place to Hide is the full story of what he learned about ...

By: Mystic Dave2

See the article here:
Glenn Greenwald: Edward Snowden, the NSA, and U.S. National Surveillance State (June 23, 2014) - Video

Tech giants demand end to NSA spying, as Patriot Act is set to expire

A technology coalition headed by Apple, Microsoft, and Google urged President Barack Obama and other government officials to end the National Security Agencys bulk collection of phone call metadata. In a letter addressed to the President and other key figures, the coalition, made up of privacy advocates, technology firms, and trade companies, called the NSA program untenable, and urged the House to move forward with reforms.

The letter, which was also addressed to high-ranking officials such as Senate Majority Leader Mitch McConnell and House Speaker John Boehner, singled out sections 215 and 214 of the Patriot Act, which have been used to legally justify the NSAs data collection. The provision, which sunsets on June 1, was first used in the wake of the 9/11 attacks.

Related:Google, Facebook, ACLU and others urge Senate to fix watered down NSA bill

Many of us have differing views on exactly what reforms must be included in any bill reauthorizing USA PATRIOT Act Section 215, which currently serves as the legal basis for the National Security Agencys bulk collection of telephone metadata and is set to expire on June 1, 2015. That said, our broad, diverse, and bipartisan coalition believes that the status quo is untenable and that it is urgent that Congress move forward with reform, the group wrote.

Critics say that the Patriot Act is being used to unjustly collect the phone records of innocent people. If there were ever a time to reform the NSA, its now because a vote for reauthorization, without comprehensive reform of NSA spying, will very clearly be a vote against the Constitution, said the Electronic Frontier Foundation, one of the organizations that signed the letter.

The NSA data collection program has already been the subject of many reform efforts ever since Edward Snowden leaked classified information from the agency in 2013. To date, none have been successful. The most recent attempt, the USA Freedom Act, failed to even move forward to a final vote in the Senate. Last January, the Obama administration also abandoned a plan that would have designated a third party for the task of collecting and storing phone call data.

More:
Tech giants demand end to NSA spying, as Patriot Act is set to expire

Quantum compute this — WSU mathematicians build code to take on toughest of cyber attacks

IMAGE:This image shows Hamlin and Webb at Washington State University. view more

Credit: Rebecca Phillips

PULLMAN, Wash. -- Washington State University mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer.

Using high-level number theory and cryptography, the researchers reworked an infamous old cipher called the knapsack code to create an online security system better prepared for future demands.

The findings were recently published in the journal The Fibonacci Quarterly.

Quantum computers are near

Quantum computers operate on the subatomic level and theoretically provide processing power that is millions, if not billions of times faster than silicon-based computers. Several companies are in the race to develop quantum computers including Google.

Internet security is no match for a quantum computer, said Nathan Hamlin, instructor and director of the WSU Math Learning Center. That could spell future trouble for online transactions ranging from buying a book on Amazon to simply sending an email.

Hamlin said quantum computers would have no trouble breaking present security codes, which rely on public key encryption to protect the exchanges.

In a nutshell, public key code uses one public "key" for encryption and a second private "key" for decoding. The system is based on the factoring of impossibly large numbers and, so far, has done a good job keeping computers safe from hackers.

More here:
Quantum compute this -- WSU mathematicians build code to take on toughest of cyber attacks

The state of open source security

Recent high-profile vulnerabilities have put the lie to the 'many eyes' theory -- but also driven real progress in securing the open source ecosystem

If there's a poster child for the challenges facing open source security, it may be Werner Koch, the German developer who wrote and for the last 18 years has toiled to maintain Gnu Privacy Guard (GnuPG), a pillar of the open source software ecosystem.

Since its first production release in 1999, GnuPG has become one of the most widely used open source security tools in the world, protecting the email communication of everyone from government officials to Edward Snowden.

Yet Koch found himself struggling to make ends meet in recent years. The estimated $25,000 he collected on average in annual donations since 2001 weren't enough to support his efforts. As reported by Pro Publica, the 53-year-old was close to throwing in the towel on GnuPG when Edward Snowden's NSA revelations shocked the world, convincing Koch to soldier on. "I'm too idealistic," he said.

The story has a happy ending. After the ProPublica story broke, donors from around the world rushed to support Koch. He easily surpassed the $137,000 fundraising goal he had set to support his work, enabling him to hire a part-time developer. Koch was awarded a one-time grant of $60,000 from the Linux Foundation's Core Infrastructure Initiative. Facebook and the online payment processor Stripeeach pledged $50,000 a year to Koch's project.

Underfunded projects, as GnuPG was until recently, form part of a vast open source ecosystem unprecedented in scale. Widespread reuse of open source code fuels today's surging technology development, but the sheer volume of that code discourages security vetting. Only recently have we begun to confront the problem, often on the heels of security breaches that embarrass the industry into action.

Will code for food

The conditions that left Koch high and dry for years are not unusual.

After Google researcher Neel Mehta uncovered Heartbleed, a serious and remotely exploitable vulnerability in a component of OpenSSL, the software community was shocked to learn that the project was largely the responsibility of what Jim Zemlin, executive director of the Linux Foundation, referred to as "two guys named Steve." Dr. Stephen Henson and Steve Marquess labored part-time to keep the code up to date, compensated by a few thousand dollars a year in voluntary contributions.

Technology vendors who rely on open source were quick to swoop in and set the OpenSSL project to rights. The Core Infrastructure Initiative that gave GnuPG's creator a $60,000 grant was established months earlier to help fund the work of Henson and others on OpenSSL. Financial support is provided by such Silicon Valley giants as Amazon, Adobe, Cisco, Facebook, and Google.

Continued here:
The state of open source security