Factbox: Bitcoin Investments

MOSCOW, September 22 (RIA Novosti) The value of Bitcoin stood at almost $400 as of Monday, September 22, with more and more people and businesses turning to the cryptocurrency because of the speed and low cost of bitcoin transactions.

Bitcoin was first introduced in 2009. Unlike the US dollar, or any other traditional currency, bitcoins aren't printed or backed by a central government. They are created by individuals and businesses using high-powered computers. Creators of bitcoins are allowed to keep some of what they create as payment for the service. The rest is sold on unregulated online exchanges.

After purchasing a bitcoin, the buyer gets two strings of numbers called a public key and a private key. For encryption and convenience purposes, the numbers are often expressed as letters and digits. The public key is the number a person must know in order to send bitcoins to a given individual. The private key is the number that only you are supposed to know. By "signing" a transaction with their private key, a user authorizes the movement of all or some of the bitcoins from their trading account, or virtual" wallet," into another.

CoinDesk, an online publication that tracks digital currencies, estimates that by the end of this year there will be eight million bitcoin "wallets," and 100,000 companies that accept bitcoins.

All bitcoin transactions are instantly published in a ledger so that anyone can keep track of the overall money supply. The ledger floats on a collaborative online document, rather than a centrally managed account. Users have adopted this mechanism for shopping, transferring money and speculation.

For users, the perceived value of Bitcoin, or any other cryptocurrency, can be compared to the price of a tool in limited supply. Demand is fueled by parties interested in peer-to-peer forms of payment that don't involve banks and other intermediaries, making such payments cheaper and faster. For investors, a cryptocurrency becomes attractive the more popular it proves to be among users.

Other virtual currencies, such as Litecoin, Namecoin, Peercoin and Ripple, have developed out of the bitcoin technology and have added improvements on that platform. Litecoin is the second-largest cryptocurrency in terms of market capitalization.

Investors don't have to mine coins or speculate on the exchanges to make money in cryptocurrencies. Some observers recommend investing in companies that use or service cryptocurrency and other peer-to-peer payment forms.

These include companies that process payments, including Colored Coins or Ripple Labs Inc., with open-source protocols that allow users to trade anything of value instantly online for virtually no cost. These companies are in the early stages of development and so, by and large, are not publicly traded.

The most notable danger associated with bitcoin transactions is fraud.

Go here to read the rest:
Factbox: Bitcoin Investments

FBI finds a ‘second Snowden’

WASHINGTON, Oct. 28 (UPI) -- An unidentified "second leaker," after Edward Snowden, is under investigation for disclosing sensitive intelligence secrets.

A suspect under investigation allegedly passed information regarding the U.S. government's terrorist watch list to The Intercept, a news website associated with Snowden, Yahoo News reported Monday. It added law enforcement and intelligence sources said the FBI searched the Virginia home of a government contractor who is believed to have disclosed sensitive information regarding the Terrorist Identities Datamart Environment; they added a criminal investigation has begun in the matter.

Details of the watch list obtained from Snowden, published on the Intercept, were dated August 2013, months after the website first published information obtained from Snowden, a former NSA contractor. It fostered speculation of the existence of a second person providing the website with information, Yahoo News said.

U.S. Department of Justice spokesman Marc Raimondi reportedly commented, "Investigators are continuing to pursue it (the case against the alleged second leaker), but are not ready to charge yet."

Existence of a second person who allegedly turned over sensitive material to reporters was mentioned in the documentary film Citizenfour, directed by The Intercept co-founder Laura Poitras, released last week. The film reportedly shows Snowden excited to learn of a new leak in U.S. intelligence.

The film suggests the second leaker provided Snowden with information outlining "the rulebook for placing people on a variety of watch lists," The Intercept journalist Jeremy Scahill reportedly in an interview on the radio program "Democracy Now" last week. Scahill reportedly added the source is "an extremely principled and brave whistleblower," the International Business Times reported Tuesday.

2014 United Press International, Inc. All Rights Reserved. Any reproduction, republication, redistribution and/or modification of any UPI content is expressly prohibited without UPI's prior written consent.

More:
FBI finds a 'second Snowden'

Documentary on Snowden Debuts in U.S. Theatres

SAN FRANCISCO: "Citizenfour," a documentary about former U.S. intelligence operative Edward Snowden, garnered praise and criticism in its debut at U.S. theatres, while the U.S. remains divided between those who consider him a hero and others who call him a traitor.

The movie, directed by U.S. journalist Laura Poitras, opens with a blurred image of a tunnel filmed from a moving vehicle.

Poitras, who now lives in Berlin, explains how authorities started stopping her routinely at U.S. airports when she took on producing documentaries about government abuses, and recalled how she got an anonymous e-mail from an individual using the "citizenfour" screen name in 2013.

"You ask me why I chose you. I didn't. You did," the director, who is not seen on the screen, reads in a voiceover of one of the messages she received from Snowden.

Snowden, who obtained temporary asylum in Russia after a massive disclosure of National Security Agency's confidential and secret documents, invited Poitras and American journalist Glenn Greenwald to meet him in Hong Kong to tell them about the U.S. government's surveillance of private citizens and foreign countries.

Audiences can see how this meeting evolved between June 3 and 10, 2013, in room 1014 of the Hong Kong Mira Hotel.

"Citizenfour" describes Snowden's "courage and idealism" when confronted with the dark and malicious powers hunting him, which led The New York Times to label the documentary "biased and partisan", an opinion shared by New York Magazine critic David Edelstein.

The Times noted that a number of journalists who cover subjects such as national security and technology, like Fred Kaplan of Slate magazine, and Michael Cohen, a former Guardian reporter, have also criticised "omissions and simplifications" in Poitras's film.

Criticism aside, The Times said "Citizenfour" highlights, as few films have done so far, the invisible and ubiquitous presence of the modern state, a leviathan endowed with far-reaching coercive resources.

The film reveals that Snowden's girlfriend, who lived with him when the then contractor for the NSA gathered the documents, has joined him in Russia.

Continued here:
Documentary on Snowden Debuts in U.S. Theatres

Opinion: TrueCrypt, the NSA, and the Myth of Open-Source Security

Several years ago, in a nod to Linux creator Linus Torvalds, software developer Eric S. Raymond coined a phrase that he called Linus's Law:

"Given enough eyeballs, all bugs are shallow."

So goes the standard argument in favor of open source that more "eyeballs" make for better quality control and better security. It has become the rallying cry for open-source enthusiasts, particularly in the aftermath of Edward Snowden's revelations last year about NSA spying and government infiltration of technology. Reports surfaced that Microsoft, Google, Yahoo, and other tech heavies were compromised. According to the open-source narrative, the Snowden documents proved that commercial software couldn't be trusted.

"There have long been rumors in the networking community about possible backdoors in major networking vendors' firmware and network stacks," Nicholas Merrill, executive director of The Calyx Institute, told Enterprise Networking Planet in an interview last year. "I would suggestthat people strongly consider open-source solutions since their source code is open for peer review and auditing."

Government snoops, however, apparently have no qualms about attempting to hide vulnerabilities in plain sight. For instance, during a keynote panel discussion at this year's LinuxCon, Linus Torvalds was asked if the federal government had ever asked him to insert a backdoor into the Linux kernel. Torvalds verbally told the audience "No" while nodding his head yes.

Additionally, among the Snowden leaks was confirmation that the NSA had inserted a self-serving vulnerability into a pseudorandom number generator and then worked to get it adopted as an international standard.

Certainly, although it has been confirmed that the US government pressures and works with commercial vendors to insert backdoors into their software, so too apparently do they participate in open-source efforts. After all, if open-source development is "open" to everyone, it's just as open to the government and others who wish to weaken software security.

Other factors demonstrate that Linus's Law is just plain false. In his 2003 book Facts and Fallacies of Software Engineering, Robert L. Glass levies numerous criticisms against the "law," writing that, according to research, the law of diminishing returns is at work when it comes to code review. Specifically, that having more than two to four code reviewers is not particularly useful.

"[W]e shouldn't think that a Mongolian horde of debuggers, no matter how well motivated they are, will produce an error-free software product," writes Glass, "any more than any of our other error removal approaches will."

Glass goes on to point out that no scientific evidence exists to show that open source is safer, more reliable, or less buggy. He also observes that the bugs found by the many "eyeballs" may not be the most serious. Other commentators have explicitly posited that security bugs are among the least likely to be found in open-source software because security review is more boring and more difficult than tending to features.

See more here:
Opinion: TrueCrypt, the NSA, and the Myth of Open-Source Security

U.S. Rep. Holt discusses NSA spying, Ebola quarantine at ACLU forum in Princeton

PRINCETON With little more than two months before he closes the book on a 16-year Congressional career, U.S. Rep. Rush Holt (D-12th Dist.) discussed the challenges in store when it comes to preserving civil liberties in the 21st century.

Before a crowd of nearly 100 ACLU members, Holt and ACLU of New Jersey Executive Director Udi Ofer traced a history of the revocation of civil liberties throughout Holts time in the House.

Holt, who announced earlier this year that he wouldnt seek a ninth term in Congress, didnt pull any punches, openly criticizing his affirmative votes on the Patriot Act in 2001 -- hands down the worst vote Ive cast so far in Congress, he said -- and the Authorization for Use of Military Force in 2003 a close second.

We shouldnt sacrifice our liberties for the sake of security. Thats a false choice, Holt said. Its not the loss of privacy that is so upsetting. It is that the government would treat all of us as suspects first and citizens second.

Since those votes, Holt has remained critical of the use of surveillance at the federal level, frequently calling the situation a surveillance state during Mondays discussion.

He detailed his own experience with the NSA when, as chairman of the House Select Intelligence Oversight Panel, NSA leaders unquestionably and unequivocally lied to him when he asked about surveillance.

There is some reason for secrecy but theres no justification for systematically and deliberately lying to people charged with the oversight, said Holt, a Hopewell Township resident.

And while he acknowledged that Edward Snowden unquestionably broke a significant law by leaking evidence of the NSAs domestic surveillance, he said Snowden should have leniency in any prosecution and probably should be pardoned."

He has done a great service. The more I hear him interviewed, theres a little bit of self-righteousness there, but this was done for patriotic reasons, Holt said. He did not do this casually or stupidly. It was quite thoughtful."

Turning to current events, Holt criticized Gov. Chris Christie and New York Gov. Andrew Cuomos policy of mandatory quarantines for medical workers returning from trips to treat Ebola patients in West Africa.

View original post here:
U.S. Rep. Holt discusses NSA spying, Ebola quarantine at ACLU forum in Princeton

Google officially announces Android 5.0 ‘Lollipop’ with default encryption

Google officially announced the latest version of its popular Android mobile operating system (5.0, dubbed "Lollipop") in a blog post Tuesday, which includesa feature that will automatically encryptusers data by default. The updatewill begin rolling out in November.

The company has allowed users to encrypt information storedon some mobile devices running the Android operating system since 2011. But the feature was not widely adopted.

Soon, devices with the latest version of the Android software will be encrypted by default during the activation process -- preventing Google from unlocking the device, even at the request of law enforcement. The new default encryption works by creating a unique key for decryptingthe device that is stored on the phone and not accessible to Google.

Only someone who knows the device's password would be able to see the pictures, messages and videos stores on the device, although law enforcement could still gainaccess to information backed up in the cloud, as well as metadata from wireless carriers throughcourt orders.

Not all Android users are likely to receive the latest versionat the same time. Android devices are made by various manufacturers and supported by various wireless carriers -- each of whom tailors Android updates to consumers. So it may be months before this update makes its way into the hands of most or even some consumers.

The move to default encryption wasrevealedlast month, shortly after Apple announced a similar shift in its latest mobile operating system. It comes as major tech companies have rushed to add layers of security to their products and services in the wake of former contractor Edward Snowden's revelations about the pervasiveness of data collection by the National Security Agency.

Law enforcement figures have sharply criticized the companies for theencryption,arguing that it will limit the ability of investigators to pursue legitimate warrants. Earlier this month, FBI Director James Comey said he was "deeply concerned" about the companies' actions in a remarksataBrookings Institution event -- suggesting they had to potential to create a "black hole" that law enforcement count not penetrate.

Others, including The Washington Post's editorial board,have argued that techcompanies should maintain a "golden key" to be used only in the event of a court-approved search warrant. But security experts widely mockedsuchsuggestions, saying thatsuch a universal key amounted to the creation of a backdoor that would fundamentally weaken the mobile device's security and create an avenue that could be exploited bycybercriminals.

"Software systems are incredibly complex, and it is a challenge to protect them from attack even in the most ideal circumstances," saidTom Cross, director of security research at network visibility vendor Lancope, who has written about problems in systems designed to help law enforcement access data. "Deliberately introducing additional vulnerabilities for law enforcement access just makes matters worse we don't know how to design those backdoors reliably."

Andrea Peterson covers technology policy for The Washington Post, with an emphasis on cybersecurity, consumer privacy, transparency, surveillance and open government.

Read more from the original source:
Google officially announces Android 5.0 ‘Lollipop’ with default encryption

Encryption in demand for backup and replication: Veeam

Patrick Budmar | Oct. 28, 2014

When it comes to backup and replication, Veeam has found encryption is one of the most requested feature by businesses.

When it comes to backup and replication, Veeam has found encryption is one of the most requested feature by businesses.

Product strategy specialist, Rick Vanover, said that functionality became a priority for CloudConnect in Availability Suite v8.

"A lot things had to happen to make CloudConnect work, and adding our own encryption helped with that," he said.

Vanover said it was not enough simply to add encryption as a checkbox on the product to say it also encrypts data.

"We did it to help protect people against losing their password," he said.

If the password to the encrypted data is lost, that typically means that the data is already lost.

What Veeam has done is add a mechanism to CloudConnect that can recover the encrypted data even if the password is lost.

"It does not necessarily mean people need to stop managing passwords correctly, but it something goes wrong we have a way," Vanover said.

Read this article:
Encryption in demand for backup and replication: Veeam