PayCoin Denver | PayCoin CryptoCurrency Coaching +

Paycoin-Cryptocurrency Coaching & Business Development

By PayCoin

When lots of people think of cryptocurrency they might too be thinking of puzzling currency. Really few folks seem to understand what it is as well as for some reason everybody seems to be discussing it as if they do. This record will with any luck debunk all the aspects of cryptocurrency to ensure that by the time youre completed reading you will have a respectable suggestion of what it is and what its everything about.

You may discover that cryptocurrency is for you or you might not however a minimum of youll have the ability to speak with a level of surety and also understanding that wont possess.

There are lots of people that have already reached millionaire standing by dealing in cryptocurrency. Plainly theres a bunch of cash in this brand-new market.

Cryptocurrency is electronic money, brief and also easy. Nonetheless, whats not so brief and easy is specifically how it comes to have value.

Cryptocurrency is a digitized, online, decentralized money created by the application of cryptography, which, according to Merriam Webster dictionary, is the digital encoding as well as decoding of details. Cryptography is the foundation that makes debit cards, computer system banking as well as eCommerce systems possible.

Cryptocurrency isnt supported by financial institutions; its not supported by a government, but by a very challenging plan of formulas. Cryptocurrency is electrical power which is encoded right into intricate strings of formulas. What lends financial value is their intricacy and their protection from cyberpunks. The method that crypto currency is made is just as well difficult to replicate.

Cryptocurrency is in direct opposition to exactly what is called fiat cash. Fiat money is currency that gets its worth from government ruling or law. The dollar, the yen, as well as the Euro are all instances. Any kind of money that is defined as legal tender is fiat cash.

Unlike fiat cash, one more part of just what makes crypto money important is that, like an asset such as silver and also gold, theres only a finite amount of it. Just 21,000,000 of these incredibly complicated formulas were made. No more, no less. It cannot be changed by printing even more of it, like a federal government printing even more cash to pump up the system without backing. Or by a banking changing a digital journal, something the Federal Reserve will advise financial institutions to do to readjust for inflation.

More here:
PayCoin Denver | PayCoin CryptoCurrency Coaching +

Flaw in open-source PDF viewer could put WikiLeaks users, others at risk

An open-source component used to display PDF files on WikiLeaks.org and other websites contains vulnerabilities that could be exploited to launch cross-site scripting (XSS) and content spoofing attacks against visitors.

The vulnerable component is called FlexPaper and is developed by a company called Devaldi, based in New Zealand. The company confirmed the issues, which were first reported Thursday on the WikiLeaks supporters forum, and released FlexPaper 2.3.0 to address them.

However, it seems that the component hasnt yet been updated on WikiLeaks.org, which was still using FlexPaper 2.1.2 on some pages Tuesday.

The incident comes after Wired reported last week that in 2012 the FBI used a Flash-based component to decloak Tor users and find their real IP (Internet Protocol) addresses in an operation that targeted users of child pornography websites hosted on the Tor network.

Since WikiLeaks audience includes a lot of users that value their privacy and anonymity, any vulnerability in the site that could potentially be used to expose their real location is likely to be viewed as a serious threat.

Given the fact that most browsers use plugins to enable the reading of PDFs, we strongly urge WikiLeaks to link directly to PDF files instead of using third party software that could put users at risk, said a user named Koyaanisqatsi, who reported the flaws on the WikiLeaks forum.

Thats what WikiLeaks did with two secret documents about travelling through airports using false ID that were allegedly leaked from the U.S. Central Intelligence Agency. The site published the documents Sunday and directly linked to the PDF files instead of displaying them in an embedded viewer.

Lucian Constantin writes about information security, privacy, and data protection for the IDG News Service. More by Lucian Constantin

Your message has been sent.

There was an error emailing this page.

See the original post:
Flaw in open-source PDF viewer could put WikiLeaks users, others at risk

Doh! WikiLeaks’ PDF viewer springs XSS vuln

Wikileaks' Flash-powered PDF reader has sprung a vulnerability or two.

The whistle-blowing website uses an open source Flash library called FlexPaper to display PDF files. Unfortunately various coding errors left FlexPaper open to cross site scripting and content spoofing.

Developers behind the open source web based document viewer software have developed a patch to resolve the bugs.

We have confirmed this XSS security vuln in our GPL flash viewer and patched it. New version: http://static.devaldi.com/GPL/FlexPaper_2.3.0.zip, FlexPaper told El Reg. Most Flash security holes were patched in flash version 9 and FlexPaper requires Flash 11 but we have confirmed this XSS.

The discovery of the bugs by security researcher Francisco Alonso has provoked http://www.wikileaks-forum.com/security-support/608/-flexpaper-pdf-viewer-used-on-wikileaks-org-presents-security-risk-for-users/32700/msg66862#msg668621:3 on WikiLeaks' forums that the vulnerabilities might be abused to de-cloak users, threatening the privacy of WikiLeaks users in the process.

Hackers (state sponsored or otherwise) might use Flash components specifically to de-cloak users. It might also be possible to post links to external content as part of attempts to (further) discredit WikiLeaks. Issues similar to the use by the Feds of Metasploit modules to uncover the identities of Tor users are feared.

Given the fact that most browsers use plugins to enable the reading of PDFs, we strongly urge Wikileaks to link directly to PDF files instead of using third party software that could put users at risk, a WikiLeaks forum member advised.

WikiLeaks did not respond to our requests for comment.

Sponsored: Todays most dangerous security threats

Read the original:
Doh! WikiLeaks' PDF viewer springs XSS vuln

Did Manning Help Avert War in Iran?

From the Archive: A little-noticed disclosure fromcables leaked by Pvt. Bradley (now Chelsea) Manning showedhow the U.S. government putYukiya Amano in as the UNs topnuclear inspector so he could hype claims aboutIranbuilding a nuclear bomb, as Robert Parry reported on the eve of Mannings sentencing in 2013.

By Robert Parry (Originally published on Aug. 19, 2013)

From U.S. embassy cables leaked by Pvt. Bradley Manning, you can easily imagine how the propaganda game might have played out, how Americans could have been panicked into supporting another unnecessary war in the Middle East, this time against Iran. Except that Mannings release of the documents spoiled the trick.

The gambit might have gone this way: One morning, a story would have led the front page of, say, the Washington Post citing how the widely respected International Atomic Energy Agency and its honest-broker Director-General Yukiya Amano had found startling evidence that Iran was nearing a nuclear bomb despite a longstanding U.S. intelligence estimate to the contrary and despite Iranian denials.

A protester marching in support of Pvt. Bradley (now Chelsea) Manning. (Photo credit: bradleymanning.org)

Next, the neocon-dominated opinion pages would ridicule anyone who still doubted these facts. After all, these articles would say, even the IAEA, which had challenged President George W. Bushs claims about Iraq in 2002, and even Amano, who had initially believedIrans denials, were now convinced.

Neocon think tanks would rush to join the chorus of alarm, dispatching WMD experts to TV talk shows bracing the American people on the need for military action. From Fox News to CNN to MSNBC, there would be a drumbeat about Irans perfidy. Then, as hawkish Republicans and Democrats ratcheted up their rhetoric and as Israeli leaders chortled we told you so the war-with-Iran bandwagon might have begun rolling with such velocity that it would be unstoppable.

Perhaps, only years later after grave human costs and severe economic repercussions would the American people learn the truth: that the IAEA under Amano wasnt the objective source that they had been led to believe, that Amano was something of a U.S.-Israeli puppet who had feigned a pro-Iranian position early on to burnish his credentials for pushing an anti-Iranian line subsequently, that after he was installed, he had even solicited U.S. officials for money and had held secret meetings with Israelis (to coordinate opposition to Irans nuclear program while maintaining a polite silence about Israels rogue nuclear arsenal).

However, because of the actions of Bradley Manning, the rug was pulled out from under this possible ruse. The U.S. embassy cables revealing the truth about Amano were published by the U.K. Guardian in 2011 (although ignored by the New York Times, the Washington Post and other mainstream U.S. news outlets). The cables also drew attention from Web sites, such as Consortiumnews.com.

So, the gambit could notwork. If it had been tried, enough people would have known the truth. They wouldnt be fooled again and they would have alerted their fellow citizens. Bradley Manning had armed them with the facts.

Read the original post:
Did Manning Help Avert War in Iran?

PRISM (surveillance program) – Wikipedia, the free …

PRISM is a clandestine anti-terrorism[1]mass electronic surveillance data mining program launched in 2007 by the National Security Agency (NSA), with participation from an unknown date by the British equivalent agency, GCHQ.[2][3][4] PRISM is a government code name for a data-collection effort known officially by the SIGAD US-984XN.[5][6] The Prism program collects stored Internet communications based on demands made to Internet companies such as Google Inc. under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms.[7] The NSA can use these Prism requests to target communications that were encrypted when they traveled across the Internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier,[8][9] and to get data that is easier to handle, among other things.[10]

PRISM began in 2007 in the wake of the passage of the Protect America Act under the Bush Administration.[11][12] The program is operated under the supervision of the U.S. Foreign Intelligence Surveillance Court (FISA Court, or FISC) pursuant to the Foreign Intelligence Surveillance Act (FISA).[13] Its existence was leaked six years later by NSA contractor Edward Snowden, who warned that the extent of mass data collection was far greater than the public knew and included what he characterized as "dangerous" and "criminal" activities.[14] The disclosures were published by The Guardian and The Washington Post on June 6, 2013. Subsequent documents have demonstrated a financial arrangement between NSA's Special Source Operations division (SSO) and PRISM partners in the millions of dollars.[15]

Documents indicate that PRISM is "the number one source of raw intelligence used for NSA analytic reports", and it accounts for 91% of the NSA's Internet traffic acquired under FISA section 702 authority."[16][17] The leaked information came to light one day after the revelation that the FISA Court had been ordering a subsidiary of telecommunications company Verizon Communications to turn over to the NSA logs tracking all of its customers' telephone calls.[18][19]

U.S. government officials have disputed some aspects of the Guardian and Washington Post stories and have defended the program by asserting it cannot be used on domestic targets without a warrant, that it has helped to prevent acts of terrorism, and that it receives independent oversight from the federal government's executive, judicial and legislative branches.[20][21] On June 19, 2013, U.S. President Barack Obama, during a visit to Germany, stated that the NSA's data gathering practices constitute "a circumscribed, narrow system directed at us being able to protect our people."[22]

Prior to 2013, a number of programs had been authorized and executed by the U.S. government which sought to collect communications or communications data on a large scale. Some aspects had been declared unconstitutional[citation needed](United States v. U.S. District Court)[citation needed], and legislation passed which was expected to resolve this; in at least one case, legal action was impeded by the secret nature of any purported or alleged surveillance (American Civil Liberties Union v. National Security Agency).

The Real Time Regional Gateway was a data collection program introduced in 2005 in Iraq by NSA during the Iraq War that consisted of gathering all electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques.[23] This "collect it all" strategy introduced by NSA director, Keith B. Alexander, is believed by Glenn Greenwald of The Guardian to be the model for the comprehensive world-wide mass archiving of communications which NSA is engaged in as of 2013.[24]

Below are a number of slides released by Edward Snowden showing the operation and processes behind the PRISM program.

Slide showing that much of the world's communications flow through the U.S.

Details of information collected via PRISM

Slide listing companies and the date that PRISM collection began

See the rest here:
PRISM (surveillance program) - Wikipedia, the free ...

As chances of NSA reform fade, opinions remain strong

A total of 19 months after NSA contractor Edward Snowden disclosed details of the National Security Agencys massive surveillance program, the debate has simmered down and a legislative fix looks unlikely.

At the heart of Snowdens disclosures was that the NSA has access to meta-data of millions of phone calls and is also able to access emails, transcripts from online chats and troves of other data directly from internet companies.

While several bills have been introduced and even voted on in Congress, a legislative fix looks unlikely.

In July of 2013, the Amash-Conyers Amendment, sponsored by Rep. Justin Amash, R-Michigan, and Rep. John Conyers, D-Michigan, would have effectively ended NSA collection of data, but narrowly failed the House of Representatives by a vote of 217-205. 211 votes were needed for the bill to pass that day.

More recently, the USA Freedom Act, which would have made some reforms passed the House by a vote of 303-121 in May. Amash sponsored the original bill, but voted against it because it was watered down after changes were made and in his opinion, did not go far enough in reforms. While it passed the House, it failed in the Senate in November, when it could not receive 60 votes to move forward.

One of the bills sponsor, Sen. Patrick Leahy, D-Vermont, blamed the failure on other Senators who were fear mongering, thus stalling debate on the bill.

The program has seen some challenges in court. Several district courts have heard the case against the program, one judge in the D.C. district court called the program likely unconstitutional and almost Orwellian, but other courts have issued opinions in favor of the program.

Dirk Deam, senior lecturer in political science at Iowa State, said the court challenges will likely not spur any changes, rather it is up to Congress.

Itll be up to Congress. At the root of this is application of the Foreign Intelligence Surveillance Act, which is an act of Congress, Deam said. Almost all the issues surrounding things that have been leaked are connected to FISA, so to the extent that people are going to react to that, theyre going to have to [make changes] through legislation.

Several students at Iowa State said they do not approve of the program.

Go here to read the rest:
As chances of NSA reform fade, opinions remain strong

NSA Spying Scandal: SPIEGEL Stands Behind Merkel Cell …

In June, German Federal Prosecutor Harald Range opened an official investigation into allegations the NSA spied on German Chancellor Angela Merkel's mobile phone. So far, though, he hasn't made much progress.

The US signals intelligence agency has ignored all questions submitted by Range's investigative authority. And Germany's own foreign intelligence agency, the Bundesnachrichtendienst (BND), hasn't provided any further assistance.

SPIEGEL first drew the German government's attention to the actions in the autumn of 2013 when it reported on information from an NSA database entry about the tapping of Merkel's phone. "That's why I asked the reporters at SPIEGEL to answer questions about the document or to provide it to us. But the newsmagazine, citing the right of the press to refuse to give evidence, did not comply", the federal prosecutor said during his annual press conference in Karlsruhe on Thursday. He seemed frustrated.

In his statement, Range insinuated that "the document that has been perceived by the public as proof of the actual tapping of the mobile telephone is not actually an authentic NSA order for signals intelligence." He also claimed it didn't come from an NSA database. "A SPIEGEL editor produced it himself, stating it was based on an NSA document which had been seen."

There is a risk that Range's statement could be viewed as some kind of finding in his investigation and create the false impression that SPIEGEL somehow concocted its own documents. At least, this is what some press reports about Range's press conference seemed to suggest.

SPIEGEL has never claimed that it presented an original document to the German government. SPIEGEL has consistently stated that its journalists viewed the contents of an NSA document and reported on the details contained therein. The magazine has made this clear throughout its reporting on the issue.

When SPIEGEL approached Merkel's office about the findings of its research for a response, all the details provided by its reporters originated from information included in that specific entry in the database of NSA documents. SPIEGEL did not add anything to this information. SPIEGEL also explicitly noted to the chancellor's office that what it was submitting was a transcription and not the original document.

"When asked by a journalist during the press conference if the document in question was a fake, the federal prosecutor explicitly denied this," Range's spokesperson clarified this week. While conducting research into the NSA in June 2013, several SPIEGEL reporters came across information indicating that the intelligence agency had conducted surveillance of the German chancellor's mobile phone.

The reporters then conducted further investigation into the suspected activities together with encryption expert and freelance journalist Jacob Appelbaum. An entry in an internal NSA database logging targets includes the chancellor's mobile telephone number as well as her name. SPIEGEL attempted to verify the information and subsequently made the decision to request a statement from Merkel herself.

On Oct. 17, 2013, SPIEGEL Berlin bureau chief Nikolaus Blome and reporter Jrg Schindler met with Steffen Seibert, Merkel's official spokesman. They presented him with a letter detailing the information obtained about spying on Merkel's mobile phone. The two made clear to Seibert that the paper was a copy of the details from an NSA database entry SPIEGEL had viewed. Seibert also understood it to be such.

See the original post:
NSA Spying Scandal: SPIEGEL Stands Behind Merkel Cell ...

Pirate Bay publishes mysterious ‘encryption’ key

Reverse countdown: A digital clock at thepiratebay.se marks the amount of time since The Pirate Bay has been out of action. Photo: Screenshot: thepiratebay.se

Renegade torrent site The Pirate Bay has added a digital clock and a line of scrambled text, which may be an encryption key, to its website at thepiratebay.se.

On Monday the site, shut down by Swedish police on December 9, showed the first signs of a potential resurrection when it added a looping video of a black pirate flag.

Now a digital clock has been added, showing roughly the amount of time the site has not been available to search for pirated files 14 days and counting.

Another addition is a line of jumbled characters at the bottom of the screen: "JyO7wNzc8xht47QKWohfDVj6Sc2qH+X5tBCT+uetocIJcjQnp/2f1ViEBR+ty0Cz".

Advertisement

Exactly what it means (if anything), or what it's doing there, is anyone's guess.

The URL of the image of the text is "http://thepiratebay.se/aes.png", which may be a referenceto Advanced Encryption Standard (AES).

AES is aninternationally agreed-upon standard for encrypting transactions, and is widely used by secure websites such as online banking services, among other things.

If this is an AES key, one theory is that it could be a way for people involved with The Pirate Bay to communicate with each other, or send data including pirated material privately.

See the original post:
Pirate Bay publishes mysterious 'encryption' key

Will Red Hat (RHT) Stock be Helped Today by This Ratings Initiation?

NEW YORK (TheStreet) --Red Hat Inc. (RHT) was initiated with a "buy" rating and $81 price target at Cantor Fitzgerald on Tuesday.

The firm said it initiated coverage on the open source software solutions provider as it believes the company is a market leader and will continue to gain market share.

Shares of Red Hat are up by 0.29% to $69.09 in pre-market trading this morning.

Exclusive Report: Jim Cramer's Best Stocks For 2015

Jim Cramer and Stephanie Link reveal their investment tactics while giving advanced notice before every trade.

Access the tool that DOMINATES the Russell 2000 and the S&P 500.

Jim Cramer's protg, David Peltier, uncovers low dollar stocks with extraordinary upside potential that are flying under Wall Street's radar.

Read the original post:
Will Red Hat (RHT) Stock be Helped Today by This Ratings Initiation?