SafeBoxPro-Encryption to protect your secrets

If the app crash, don't delete it, because the data are stored in it. Please contact technical support immediately:wangping_app@sina.com or qq:673368731.The best and most powerful privacy protection app, encrypted storage for your photo, video, account, diary and contact.How does it work?First, as a encryption app, you most care about the security issues, SafeBoxPro provides multiple protection mechanisms to ensure the safe storage of your secret: Support login password - login password needed to enter the app Support folder password - each folder can set a special password Support photo file encryption - even if others copy your photos, they can't see Support pseudo password - when you enter the pseudo password, only show some irrelevant photo and videoSecond as a good tool for everyone commendable, how can everywhere restrictions, charges? Unlimited storage: no number and capacity constraints Completely free: no functional limitations, enjoy all the thoughtful design Thirdly, as a powerful privacy protection tool, there are many of unexpected features: Support encrypted storage: photos, videos, accounts, diaries, contacts Supports import and export photos and videos Supports sending photos with Email and MMS Support sharing photos to social networking sites: such as weibo, facebook, twitter Support slide show photos Support beautify photo feature Support play videos Support encrypted storage account, so you dont have to worry about remembering passwords What are you waiting for? Just download you can have such a powerful, feature-rich free encryption App, no longer afraid of privacy photos, videos, accounts, diaries, contacts be seen by others!

Go here to see the original:
SafeBoxPro-Encryption to protect your secrets

Groups to push for encryption, secure payments at White House cyber summit

The White House heads west to Silicon Valley on Friday looking for ideas on how to improve the nations cybersecurity, and members of President Barack Obamas administration are likely to get an earful.

The White Houses first-of-its-kind cybersecurity summit at Stanford University will feature remarks from Obama and from Apple CEO Tim Cook, but participants are likely to hear a range of ideas about how to improve cybersecurity at U.S. businesses.

Scheduled panel discussions will focus on improving cybersecurity practices at consumer-facing businesses, on using cybersecurity as a business advantage, and on promoting secure payments.

The use of encryption could be a sticking point during discussions. Obama administration members have voiced concerns in recent months about Apple and Google adding encryption functionality to smartphones running their operating systems. Officials at the FBI and Department of Justice say a larger number of encrypted smartphones will allow criminals to hide their activities from police.

Its unlikely that the Obama administration will push for encryption workarounds at the summit, said Kevin Bankston, policydirector at theNew America Foundations OpenTechnology Institute digital rights group. Instead, Bankston said he expects Obama to promote encryption.

We do hope he will use it as an opportunity to reaffirm the White Houses recognition of encryption technology as a cornerstone of the modern Internet economy and a critical tool for the protection of privacy and cybersecurity, Bankston said.

Other cybersecurity experts and summit participants hope a variety of security tools will be highlighted there.

Participants need to focus on how to improve the sharing of cyberthreat information between businesses and government agencies, said Phil Smith, senior vice president of government solutions and special investigations at cybersecurity vendor Trustwave.

Some U.S. lawmakers and tech trade groups have pushed Congress for years to pass legislation that would protect from customer lawsuits businesses that share this data. But privacy groups have objected to past bills like the Cyber Intelligence Sharing and Protection Act [CISPA], saying it would allow businesses to share too much personal information with the government.

Sharing cyberthreat information between law enforcement, government agencies and the private sector is imperative to protecting the citizens of our country against the latest cyberthreats and I hope the summit will focus on that message, Smith said by email.

Read more:
Groups to push for encryption, secure payments at White House cyber summit

HP’s Marten Mickos: Open Source Is Not a Business Model

By Jack M. Germain 02/23/15 2:58 PM PT

Marten Mickos, senior vice president and general manager of HP's cloud unit, advocates making money from open source. He preaches what at first glance may appear to be two opposing business models.

One is the notion that developing open source software entails meeting a reciprocity requirement. The other is the idea that using open source software does not require any reciprocity.

Marten Mickos, Senior Vice President and General Manager of the HP Cloud Unit

Mickos is a seasoned open source executive with a passion for infrastructure software. He was previously the CEO of Eucalyptus Systems, an open source, AWS-compatible cloud provider. Before that he was CEO of MySQL, where he grew the company from garage startup to the second-largest open source company in the world.

In learning to adapt his business strategies to make open source profitable, Mickos succeeded where many others have failed.

Unlike some who develop open source software or sell services surrounding it, Mickos fervently believes that open source is not a business model unto itself. If you try to upsell free users to paying customers, your business likely will fail.

Mickos should know the risky business of trying to convert free users into paying customers. At MySQL, he had 15 million users of the product and 15 thousand paying customers.

In this exclusive interview, LinuxInsider discusses with Marten Mickos some of the misconceptions about open source as a standalone business model.

LinuxInsider: You once said that the only two ways a company makes money with open source is to affiliate with a foundation or have a business model where the open source project and the open source company are practically the same thing. Is that philosophy still valid with today's open source dominance in the cloud?

Go here to see the original:
HP's Marten Mickos: Open Source Is Not a Business Model

Wikileaks Founder Julian Assange Blasts Canada For Denying …

Canada might as well not have a border, WikiLeaks founder Julian Assange said, when it decided to deny the asylum petition of alleged Anonymous hacker Matt DeHart and then had him turned over to U.S. authorities investigating WikiLeaks and Anonymous.

In a report by CTV, the parents of DeHart said they only learned of his deportation to the U.S. when he was already at the border. They said their son asked to call his parents in Toronto before stepping over the border. One of the Canada Border Services Agency officers had been kind enough to lend him a cellular phone. "We prayed on the phone together. He said he knew he would be OK and God would take care of him,"Paul DeHart told CTV's Canada AM on Monday.

DeHart fled to Canada in 2014 ahead of a criminal trial on child pornography charges. But such were only false accusations, he claimed, meant to be used as leverage to push a probe into espionage and national security focused on his alleged involvement with the Anonymous and WikiLeaks hacker groups. He had likewise been alleged as to have leaked a number of classified U.S. government documents. While in custody in the United States, the former American serviceman in the Air National Guard claimed he was subjected to torture. The abuse of the law in DeHarts case is obvious, shocking and wrong, Assange said in a statement.

When DeHart was eventually freed, it was then that he and his parents fled to Canada. They filed with the Immigration and Refugee Board a request for his asylum, but was denied. The IRB, in a statement issued Feb 6, said it denied the request because the claimants were not Convention refugees and are not persons in need of protection. Various human rights experts and supporters had slammed Canada for its decision.

It raises important legal questions, including the behaviour of the Canadian asylum system in relation to the United States, the status of data couriers to WikiLeaks and other publications, the status of Anonymous members, the limits of state power during espionage investigations, the abuse of medical procedures, the use of deportation instead of extradition, the exploitation of the mentally vulnerable by investigators and the use of unrelated charges of a taboo nature during a national security investigation, Sarah Harrison, acting director of Courage Foundation and also a WikiLeaks editor, said.

See more here:
Wikileaks Founder Julian Assange Blasts Canada For Denying ...

uTorrent quietly installs a cryptocurrency miner on users’ computers

The popular BitTorrent client uTorrent is facing a backlash after trying to turn a buck through cryptocurrency mining.

On Thursday, users started reporting that uTorrent had silently installed cryptocurrency software from Epic Scale as part of version 3.4.2 build 28913. Once installed, Epic Scale uses some of the computer's spare processing power to generate cryptocurrency (such as Bitcoin or Litecoin).

In response to user complaints, a uTorrent manager confirmed parent company BitTorrent's partnership with Epic Scale, saying the software generates revenue for uTorrent while also contributing some funds to charity. In the future, Epic Scale plans to contribute CPU cycles to other initiatives, such as Genome mapping and other academic studies that require a great deal of processing power.

However, the manager denied that EpicScale was installing without the user's permission, claiming that uTorrent could not reproduce the issue. That's despite complaints from five users on uTorrent's forums who say the software was installed automatically in the latest update.

Update:BitTorrent supplied PCWorld with this comment:

"We have reviewed the issue closely and can confirm there is no silent install happening. It is in fact impossible for partner software to be installed without user permission. We are continuing to look at the issue. But it is almost certain these users accepted the offer during install...

In terms of user complaints in our forums, we always take these claims seriously. We highly value our users, they are a passionate and tech savvy group. In the last 24 hours we have received less than a dozen inquiries out of several million offers. That should put things into perspective."

In any event, users can partially uninstall EpicScale through the Add/Remove Programs menu in Windows. A registry modification will remain in the ProgramData/Epicscale folder, though users can safely delete this folder once the uninstall is complete. That hasn't stopped dozens of outraged users from swearing off uTorrent in favor of alternatives such as qBittorrent, Deluge, and Transmission.

Why this matters: Cryptocurrency mining burns more than just spare system resources. By making the CPU work harder than it normally would, it also consumes more energy, potentially raising users' electricity bills. While it's ironic that users are aghast at an act of leeching from a program that facilitates media piracy, that doesn't let uTorrent off the hook for a lack of transparency. Some quick backtracking seems likely.

Jared writes for PCWorld and TechHive from his remote outpost in Cincinnati. More by Jared Newman

Follow this link:
uTorrent quietly installs a cryptocurrency miner on users' computers

uTorrent accused of bundling cryptocurrency malware with popular BitTorrent client

For years, if youve used BitTorrent, youve probably used Torrent to manage and control torrent files. The software is the most popular Torrent client online with an estimated 100 million users, and its valued for its small footprint and rich feature set. Torrent has been including adware for several years (despite warning people in its install against installations that attempt to charge for the program), but it may have crossed a line this time numerous users are reporting that installing the program also silently installs an application called Epic Scale.

Epic Scale is shady looking, to say the least. The company website claims a straight link between installing Epic Scale and benefiting charities literally.

The impression the website gives is that by installing this program, you literally donate compute time to charity. Its like Folding@Home, or SETI, or another equivalent project right?

Well, no. Not exactly. A little farther down the page, the website notes:

How is money earned?

Solving math problems for weather prediction, physics simulations, cryptography (including cryptocurrency mining) and more has real world value. We solve these problems on behalf of our trusted partners, and donate proceeds to your favorite charities.

Heres a hint: The only one of those activities that actually earns any money is cryptocurrency mining, and thats what Epic Scale does.

The program sets itself to Continuously by default

On the one hand, this is actually kind of baffling. Cryptocurrency mining on CPUs went out years ago. Its incredibly unlikely that Epic Scale could generate much in the way of income even with massive amounts of miners, CPU scaling simply isnt good enough. On the other hand, the company has ambitions its CPU-scanning software notes that my system (a Core i7-3960X) has zero AMD and zero Nvidia cards. Thats not true but obviously Epic Scale wants to, erm, scale out.

Read the rest here:
uTorrent accused of bundling cryptocurrency malware with popular BitTorrent client

Edward Snowden comments on mass surveillance and the future of Western society – Video


Edward Snowden comments on mass surveillance and the future of Western society
To read more about Snowden #39;s comments. http://www.cbc.ca/1.2979923 Subscribe to CBC News to watch more videos: https://www.youtube.com/user/cbcnews?sub_confirmation=1 Connect with...

By: CBC News

Follow this link:
Edward Snowden comments on mass surveillance and the future of Western society - Video