Thieves, Snoops and Idiots (episode 1): Edward Snowden – Encryption Expert? – Video


Thieves, Snoops and Idiots (episode 1): Edward Snowden Encryption Expert?
In this inaugural episode of Thieves, Snoops and Idiots, we delve into security advice recommended by government whistleblower Edward Snowden. While Snowden has brought great attention...

By: PKWARE

See the original post:
Thieves, Snoops and Idiots (episode 1): Edward Snowden – Encryption Expert? - Video

Encryption, Privacy, National Security, and Dr. Seuss

Last week, U.S.President Barack Obama, standing with British Prime Minister David Cameron, said that If we find evidence of a terrorist plotand despite having a phone number, despite having a social media address or e-mail address, we cant penetrate that;thats a problem. According to the Wall Street Journal, he then indicated that he believes Silicon Valley companies want to solve this problem, because Theyre patriots.

An interesting statement, given that just a few months ago, Silicon Valley companies were being criticized by U.S. government agencies for adding automatic encryption to smart phonesa move the government sees as not so patriotic. The latest software released for Android and Apple phones and pads automatically encrypts user data, and the companies said they are not keeping a master key, so they cant help the government get into user data, even if they want to. Other communications and social networking apps, like WhatsApp, have also been rolling out automatic encryption.

So whats the story? Is Silicon Valley determined to protect user privacy, or is it ready and willing to turn over data to the government when asked.

You could see it as a delicate dance, or as walking a fine line. Or, you could be a little more cynical, and view it through the eyes of the Dr. Seuss classic, The Sneetches.

I was introduced to this parable back in the 90s. The book is typically used to teach lessons about discrimination. But Silicon Valley venture capitalist Tim Draper had a different interpretation in mind when he gave a copy of the book to my husband. The intent, Draper noted, was to help my husband understand Microsofts moves at the time. Since then,The Sneetcheshas beena story that I think about regularly when I watch the goings on in business and technology today.

Short synoposis: two sets of creaturesstar-bellied Sneetches and plain-bellied Sneetcheslive in a world in which the star-bellied Sneetches are top dogs. An entrepreneur named Sylvester McMonkey McBean comes in with new technologyhe can add stars to plain-bellied Sneetches, for a fee. The plain-bellied crew all signs up, and now nobody can tell the two groups apart. The original elite arent happy, so McBean offers a new tech fix,at a higher fee:star removal. This goes back and forth until the Sneetches are brokeand McBean drives off with all the money. Only then do the two sides work out their differences.

So McBean provides the technology that givesand the technology that takes awaysort of like a tech industry that gives privacy protection, yet is, apparently alsointerested in working with the government to get around privacy protection.

You can see an animated version of the Sneetches here (or read the text here) and think about whether its a good or bad thing that Silicon Valley is in the position of brokering our privacy.

Advertisement

IEEE Spectrums blog featuring the people, places, and passions of the world of technologists in Silicon Valley and its environs. Contact us:t.perry@ieee.org

View original post here:
Encryption, Privacy, National Security, and Dr. Seuss

After The Social Web, Here Comes The Trust Web

Editors note:David Cohen is the founder and Managing Partner of Techstars, the #1 ranked Internet startup accelerator in the world. William Mougayar is an entrepreneur turned angel investor, founder of Startup Management, and currently raising his first fund.

You never change things by fighting the existing reality. To change something, build a new model that makes the existing model obsolete.- Buckminster Fuller

The bitcoin train is really made up of two revolutions in one: money and finance, based on the bitcoin protocol, and exploiting the currency programmability aspects; and decentralized applications, based on the blockchains distributed technology capabilities.

Both are grounded in similar roots (crypto-technology), but they have different branching. Both paths are creating disruptive, innovative and system-changing opportunities for startups, investors, consumers and business players. Both are joined at the hip, and that hip is the blockchain, the backbone of crypto-based transactions.

To fully understand the blockchain concept and the benefits of cryptography in computer science, we need to first understand the concept of decentralized consensus, a key tenet of the crypto-based computing revolution.

Decentralized consensus breaks the old paradigm of centralized consensus, i.e. when one central database used to rule transaction validity. A decentralized scheme (which the bitcoin protocol is based on) transfers authority andtrust to a decentralized network and enables its nodes to continuously and sequentially record their transactions on a public block, creating a unique chain the blockchain. Cryptography (via hash codes) is used to secure the authentication of the transaction source and removes the need for a central intermediary. The combination of cryptography and blockchain technology together ensures there is never a duplicate recording of the same transaction.

This degree of unbundling is enabling a new way of writing software, and it is a spark of innovation for money- and non-money-related decentralized applications.

There are different flavors of crypto-technology-related implementations. Some are based on the bitcoin blockchain itself and others on an independent decentralized one. Some are based on the bitcoin currency and others on alternative cryptocurrencies or branded tokens. All these various permutations are creating a rich ecosystem environment for cryptocurrency-based innovations.

To say that bitcoin and its sole blockchain hold a monopoly on the future of cryptocurrency-based implementations is like saying in 2006 that LinkedIn was the onlysocialnetwork needed when it was barely leading, and when Facebook, Twitter and many othersocialplatforms were still babies.

We need to view what is happening today as a rich ecosystem that represents the best blend of computer and cryptography science, and not just as an ecosystem of bitcoin-centric technologies.

See the original post:
After The Social Web, Here Comes The Trust Web

InnocentCryptoKitty 012 Music VideoMix Liberty Berlin DCBP CCBP Bitcoin CryptoCurrency P2P Startup – Video


InnocentCryptoKitty 012 Music VideoMix Liberty Berlin DCBP CCBP Bitcoin CryptoCurrency P2P Startup
http://www.twitter.com/VanosEnigmA http://www.facebook.com/VanosEnigma http://www.twitter.com/CryptoEEV Thank you mucho meow for your donation: Bitcoin Address: 1FJ9ZZcnKqhiiYWNh...

By: VanosEnigmA Enigmaisland

Continue reading here:
InnocentCryptoKitty 012 Music VideoMix Liberty Berlin DCBP CCBP Bitcoin CryptoCurrency P2P Startup - Video

CryptoCurrency PayCoin | Number One In CryptoCurrency Coaching

Coinbase said it raised $75 million in the single largest venture-capital fundraising by a bitcoin-related startup. Michael Casey joins MoneyBeat. Photo: Getty.

PAUL VIGNAAnd

MICHAEL J. CASEY

Jan. 20, 2015 9:00 a.m. ET

Coinbase said it raised $75 million in the single largest venture-capital fundraising by a bitcoin-related startup.

Investors included banks and the New York Stock Exchange, apparently the first time any traditional financial institutions have taken direct stakes in a bitcoin enterprise.

Coinbase, based in San Francisco, offers a number of financial services for individuals and businesses, such as processing transactions for merchants that accept bitcoin.

Bitcoin, a digital currency created six years ago that allows for peer-to-peer transactions outside the traditional banking system, has been beset by bad news, most prominently a brutal selloff in the currency. After falling 67% in 2014, it careened down another 44% in January before stabilizing.

The Series C funding round was led by the well-known Silicon Valley venture-capital firm Draper Fisher Jurvetson, which has previously invested in Coinbase. Other VC investors include Andreessen Horowitz, Union Square Ventures, and Ribbit Capital, all of which have also previously invested in the firm.

The round included investments from several banks and individuals in financial services: USAA Bank; BBVA Ventures, the San Francisco-based investment arm of multinationalBBVA Group; and the NYSE. The banks all made investments of between $1 million and $10 million, Coinbase Chief Executive Brian Armstrong said.NTT DoCoMo, Japans biggest mobile phone operator, is also an investor.

Read more:
CryptoCurrency PayCoin | Number One In CryptoCurrency Coaching

Vogogo offers free fraud and risk service to cryptocurrency firms

Summary:Vogogo services are being offering for free following a year of cyberattacks against the cryptocurrency industry.

Vogogo's fraud and risk mitigation service is being released as a stand-alone system to help cryptocurrency companies protect themselves against rising rates of cyberattack.

Announced on Monday, the cryptocurrency payment processing and fraud mitigation company said that high demand prompted the release of the service for free, in both use and integration. In the current threat landscape, it is more important than ever that the enterprise invest in cybersecurity measures -- and the crypto industry is no exception.

In recent times, to name but a few, Mt. Gox, Bitfloor and Bitstamp have all been reportedly the victims of cyberattacks. Hackers are able to hijack mining pools or break into a virtual currency exchange's hot wallet system to steal funds, and unfortunately, many exchanges either close or do not have enough funds left in cold storage to compensate traders.

See also: Police suspect Mt. Gox Bitcoin theft was an inside job

Vogogo, which works with companies including CoinTrader, ANXPro, Rock Trading, QuadrigaCX and BitMEX, offers a fraud and risk mitigation service which validates large volumes of high-risk payment transactions. Each separate individual or business involved in a transaction is verified -- as well as each individual transaction itself -- before being processed.

Vogogo CEO Geoff Gordon commented:

It's also frustrating as we believe these types of sophisticated fraud events can be effectively prevented with the right systems in place. Therefore, we have elected to open up our fraud and risk mitigation services to crypto-based businesses, worldwide, free of cost."

Vogogo's chief revenue officer Rodney Thompson said that the decision to open up Vogogo's service was not only to help combat fraud, but to educate players within the fledgling industry on how to manage overall fraud levels and risk.

The offer allows any crypto-based firm free integration and use of the platform for a minimum of three months for free.

Read the original here:
Vogogo offers free fraud and risk service to cryptocurrency firms

Jim Blasko Explains BitCoin Spinoff ‘Unbreakable Coin’ (Video 1 of 2)

Las Vegas seems an appropriate place for cryptocurrency businesses to emerge, both because the coins themselves are so volatile that some gambling instinct may be required, and because Vegas is a high-tech outpost with lower taxes and lower rents than many other West Coast hot-spots, well-suited to risky startups with ambition but without huge venture backing.Jim Blasko moved there to work on low-voltage engineering for Penn & Teller, and is a qualified Crestron programmer, too (useful in a town that looks from the air like one giant light-show), but has shifted to a quite different endeavor, or rather a complex of them all related to cryptocurrency. I ran into Blasko during this month's CES, at a forum with several other cryptocoin startups, and the next day we met to talk about just how hard (or easy) it is to get into this world as an entrepreneur.

Blasko has some advice for anyone who'd like to try minting a new cryptocurrency. Making your own coin, he says, is the easy part: anyone can clone code from an existing entrant, like Bitcoin, and rename the result and that's exactly what he did. The hard work is what comes after: making worthwhile changes, building trust, and making it tradeable. Blasko's done the legwork to get his own currency, which he's bravely called "Unbreakable Coin," listed on exchanges like Cryptsy, and is working on his own auction site as well. He's also got an interesting idea for cryptocoin trading cards, and had a few prototypes on hand. (Part 1 is below; Part 2 to follow.) Alternate Video Link

Tim: So, Jim you have a couple of different Cryptocoin related businesses or enterprises that are all going on at once. But Im going to start out talking about one thing that intrigues me, which is that you have created your own coin, can you talk about how that came to be?

Jim Blasko: Creating UnbreakableCoin?

Tim: Yes.

Jim Blasko: It started off with seeing what was happening out there with other Crypto coins, seeing what was going on. This was about a year ago now. I registered the name a few months before I actually finished the coin. I knew what I wanted to call it. I am a Crestron Control Systems programmer and those are systems that we use here in large houses or casinos and it controls everything, the lights, the security, the cameras, the doors, I mean, the sound, everything is controlled by Crestron these days. So, by taking that experience I have been working with that since 1998 and by taking that experience I said, lets make our own Crypto coin, lets use bitcoins core, so lets call them bitcoin, but lets modify it a little bit, so that its faster, so that its bigger, it gives us an opportunity to give the Crypto world a second chance because not everybody got into bitcoin, a lot of people found out about it later and it was like, oh man, so we thought we can do this, I thought at least that I can do this, I always say we because we have a team now and I dont like to not include my team, my team is great, the Unbreakable team is awesome. But, I thought lets make this coin and lets not pre-mine it, lets give it to the world from day one. So, like I said we took bitcoin, we just cloned it, we made it faster and little bigger and we just said, here it is world, here it is, start mining it.

Tim: When you call it unbreakable, talk about what makes it deserve that name?

Jim Blasko: Well, SHA-256D is the same encryption algorithm that the government uses and its pretty much the best thing on the planet, it is unbreakable, even the government says its about 10 to 15 years away from being cracked itself and by then they will have improvements to it to keep it from being that, so thats what bitcoin is based on, SHA-256D, so thats why I chose that instead of what the Scrypt coin. There are too many vulnerabilities in Scrypt that I dont like and I saw that, if the government thinks SHA-256D is the best encryption, I think they are probably right, we got a pretty smart group of guys out there.

Tim: If they are telling the truth.

Jim Blasko: If they are telling the truth, but it seems to be, thats what they send all the mission data over, SHA-256D encryption. So thats pretty important stuff.

See original here:
Jim Blasko Explains BitCoin Spinoff 'Unbreakable Coin' (Video 1 of 2)

Former Swiss Banker Found Guilty in WikiLeaks Trial, Avoids Jail – Video


Former Swiss Banker Found Guilty in WikiLeaks Trial, Avoids Jail
A former Julius Baer banker found guilty on Monday of breaching Swiss banking secrecy laws by handing over data about offshore clients to WikiLeaks will avoid jail time. The trial of Rudolf...

By: WochitGeneralNews

Continue reading here:
Former Swiss Banker Found Guilty in WikiLeaks Trial, Avoids Jail - Video

Snowden leaks documents that show China stole F-35 designs from US – Video


Snowden leaks documents that show China stole F-35 designs from US
Top secret documents released by former US intelligence contractor Edward Snowden show Chinese cyber spies stole vast amounts of important military data from the US. The documents suggest...

By: TomoNews US

Go here to read the rest:
Snowden leaks documents that show China stole F-35 designs from US - Video

Next Media video: Leaked documents show China stole key designs of F-35 jets – Video


Next Media video: Leaked documents show China stole key designs of F-35 jets
Top secret documents released by former US intelligence contractor Edward Snowden show Chinese cyber spies stole vast amounts of important military data from the US. The documents suggest that.

By: The Malay Mail Online

Here is the original post:
Next Media video: Leaked documents show China stole key designs of F-35 jets - Video