Assassination threats come from the US, says Assange

Wikileaks founder Julian Assange revealed he received death threats as he spoke out about his continued self-imprisonment at the Ecuadorian Embassy in London.

In an exclusive Irish radio interview, Assange told Sen Moncrieff on Newstalk: Theres some limits to the people I can meet because of the number of assassination threats emanating from the United States against me and my family.

He also said that he has received support from Irish politicians.

Several Irish politicians have been good enough to visit me here in the embassy and some have shown public support, he told Moncrieff on the show.

A podcast of the interview has been made available by Newstalk.

On leaving the embassy, he said: I think that things are likely to resolve within the next year but its not a certainty. It depends on how things stand geopolitically.

Assange sought refuge at the embassy in June 2012 to avoid extradition to Sweden to face questioning over alleged sexual offences. He denies the allegations.

Last month, he told Sky News that he will eventually leave the embassy with his asylum status intact.

Chatting with Moncrieff, he quipped: Its quite interesting, Paddy Power, the Irish gambling firm, you can actually make a bet on just that apparently its 100-1 if I leave with a jet pack so I should start a little investment company and ask people to pay in at 20-1 and then we could get a return at 100-1.

-Listen to the interview here

See the rest here:
Assassination threats come from the US, says Assange

Bitcoin Conferences SL SecondLife 3D Virtual Worlds Cryptocurrency Game – Video


Bitcoin Conferences SL SecondLife 3D Virtual Worlds Cryptocurrency Game
http://www.twitter.com/VanosEnigmA + @SoulTradeGame #FollowBack 😉 plus.google.com/+VanosEnigmaisland/about http://www.facebook.com/VanosEnigmA http://www.youtube.com/user/Enigma...

By: VanosEnigmA Enigmaisland

Link:
Bitcoin Conferences SL SecondLife 3D Virtual Worlds Cryptocurrency Game - Video

020 Reading Bitcoin CryptoCurrency Creative Commons Innovation DEAF – Video


020 Reading Bitcoin CryptoCurrency Creative Commons Innovation DEAF
http://www.twitter.com/VanosEnigmA + @SoulTradeGame #FollowBack 😉 plus.google.com/+VanosEnigmaisland/about http://www.facebook.com/VanosEnigmA http://www.youtube.com/user/Enigma...

By: VanosEnigmA Enigmaisland

Read the original here:
020 Reading Bitcoin CryptoCurrency Creative Commons Innovation DEAF - Video

Google, Apple to introduce default encryption

Google has announced that its next mobile operating system, Android L, will encrypt users data by default.

The measure will make it more difficult for private information to be hacked or handed to law enforcement agencies.

On Thursday, Apple said that devices running its new iOS8 software would be encrypted by default, with even the company itself unable to gain access.

Both firms have offered encryption for some time, but many users were unaware of its existence or had not enabled it.

Earlier this week, Apples boss Tim Cook posted an online message assuring users the companys philosophy was that a great customer experience shouldnt come at the expense of your privacy.

As well as announcing default encryption for all devices running the new iOS8 software, Mr Cook took a thinly veiled swipe at Google, saying that Apple would not use its customers information to sell things to them.

We dont monetise the information you store on your iPhone or in iCloud, he wrote, and we dont read your email or your messages to get information to market to you.

He added that although Apple does have an advertising business, called iAd, the function can be disabled by users.

Shortly after, Google announced its stance on privacy, also embracing default encryption. A spokesman said: For over three years, Android has offered encryption, and keys are not stored off of the device, so they cannot be shared with law enforcement.

As part of our next Android release, encryption will be enabled by default out of the box, so you wont even have to think about turning it on.

Read this article:
Google, Apple to introduce default encryption

Tim Berners-Lee has publicly called for programmers to develop better, more user-friendly cryptography. That way, he …

At a time of heightened national security and privacy paranoia, Switzerland holds all the aces. Not only does it have a culture of keeping secrets, but it is also home to a group of physicists who appreciate the universes predilection for privacy.

Tim Berners-Lee, the man widely credited with creating the internet during his time working at Cern, the particle physics facility in suburban Geneva, has publicly called for programmers to develop better, more user-friendly cryptography. That way, hesays, we can all get back to living private lives again.

Interestingly, it is out of Cern that the best hope for the fulfilment of that vision may arise. A gaggle of its particle physicists became so concerned at last years revelations of mass surveillance by the US National Security Agency (NSA) that they decided to do something about it. The result is ProtonMail, an email encryption service that Forbes describes as the only email system the NSA cant access.

That inaccessibility is partly because ProtonMails servers are in Switzerland, where the law prevents government agencies from gaining access to them. It is also partly because the servers wont even contain decryption keys. But mostly its because maths shows that its not hard to conceal information if you know what youre doing.

There are ways to perform reversible mathematical operations on data that will render it indecipherable to prying eyes. As long as you have the key that is, you know exactly what the mathematical operation was you can undo the obfuscation. If you dont have the key, there is no way to winkle out the original data. In many ways, it is astonishing how reluctant we are to take advantage of this. But things do seem to be changing.

ProtonMail was quickly oversubscribed there is a waiting list for accounts even though the system is still in its beta-testing phase. The company has rejected offers of investment from venture capital firms. Instead, it raised more than $500,000 through crowdfunding.

In August, ProtonMail held a hackathon at the Massachusetts Institute of Technology. The idea was to improve security by allowing the experts to look for weaknesses. Now, with that exercise complete, a more secure version will be released. The aim is to make it open-source, so that its code can be checked and strengthened.

The laws of physics actually allow researchers to go much further than maths-based encryption. The technology known as quantum cryptography uses a fundamental rule, one that governs the smallest scales of the natural world, to achieve the ultimate freedom from eavesdropping.

When natures basic particle building blocks interact,in the right circumstances, theycan become entangled. Information encoded on entangled particles is shared between them. In a weird twist of nature, these particles can retain a link even when separated physically. Its almost like a telepathic connection: reading the information on one can affect the other in ways that allow monitoring of any eavesdropping activity.

Physicists have exploited this to create tamper-proof seals for information encoded on photons, the particles that make up light. The technology is not yet perfect, but its good enough that it is starting to be used for financial transactions and various other sensitive communications. The market leader, ID Quantique, was developed at a fundamental physics lab based in you guessed it Switzerland.

Read the rest here:
Tim Berners-Lee has publicly called for programmers to develop better, more user-friendly cryptography. That way, he ...

Volokh Conspiracy: Apple’s dangerous game

Apple has announced that it has designed its new operating system, iOS8, to thwart lawful search warrants. Under Apples old operating system, if an iPhone is protected by a passcode that the government cant bypass, the government has to send the phone to Apple together with a search warrant. Apple will unlock at least some of the contents of the phone pursuant to the warrant. Under the new operating system, however, Apple has devised a way to defeat lawful search warrants. Unlike our competitors, Apples new privacy policy boasts, Apple cannot bypass your passcode and therefore cannot access this data. Warrants will go nowhere, as its not technically feasible for [Apple] to respond to government warrants for the extraction of this data from devices in their possession running iOS 8. Anyone with any iPhone can download the new warrant-thwarting operating system for free, and it comes automatically with the new iPhone 6.

I find Apples new design very troubling. In this post, Ill explain why Im troubled by Apples new approach coded into iOS8. Ill then turn to some important legal issues raised by Apples announcement, and conclude by thinking ahead to what Congress might do in response.

Lets begin with a really important point: In general, cryptography is an awesome thing. Cryptography protects our data from hackers, trespassers, and all sorts of wrongdoers. Thats hugely important. And under Apples old operating system, cryptography protects iPhones from rogue police officers, too. Thanks to the Supreme Courts recent decision in Riley v. California, the Fourth Amendment requires a warrant to search a cell phone. Apples old operating system effectively enforced the warrant requirement technologically by requiring the government to serve a warrant on Apple to decrypt the phone.

Up to that point, I think its all good. But the design of Apples new operating system does something really different.

If I understand how it works, the only time the new design matters is when the government has a search warrant, signed by a judge, based on a finding of probable cause. Under the old operating system, Apple could execute a lawful warrant and give law enforcement the data on the phone. Under the new operating system, that warrant is a nullity. Its just a nice piece of paper with a judges signature. Because Apple demands a warrant to decrypt a phone when it is capable of doing so, the only time Apples inability to do that makes a difference is when the government has a valid warrant. The policy switch doesnt stop hackers, trespassers, or rogue agents. It only stops lawful investigations with lawful warrants.

Apples design change one it is legally authorized to make, to be clear. Apple cant intentionally obstruct justice in a specific case, but it is generally up to Apple to design its operating system as it pleases. So its lawful on Apples part. But heres the question to consider: How is the public interest served by a policy that only thwarts lawful search warrants?

The civil libertarian tradition of American privacy law, enshrined in the Fourth Amendment, has been to see the warrant protection as the Gold Standard of privacy protections. The government cant invade our private spaces without a showing that the invasion is justified by the expectation that the search will recover evidence. And the government must go to a neutral magistrate and make that case before it conducts the search. When the government cant make the showing to a neutral judge, the thinking runs, the public interest in privacy outweighs the public interest in solving crime. But when the government does make that showing, on the other hand, the public interest in solving crime outweighs the privacy interest. Thats the basic balance of the Fourth Amendment, most recently found in the stirring civil libertarian language in Riley just a few months ago.

Apples new policy seems to thumb its nose at that great tradition. It stops the government from being able to access the phone precisely when it has a lawful warrant signed by a judge. Whats the public interest in that?

One counterargument I have heard is that there are other ways the government can access the data at least some of the time. With the warrant required under Riley, agents could take a stab at guessing the passcode. Perhaps the phones owner used one of the popular passwords; according to one study, the top 10 most often-used passcodes will unlock about 15% of phones. Alternatively, if the phones owner has backed up his files using iCloud, Apple will turn over whatever has been backed up pursuant to a lawful warrant.

These possibilities may somewhat limit the impact of Apples new policy. But I dont see how they answer the key question of whats the public interest in thwarting valid warrants. After all, these options also exist under the old operating system when Apple can comply with a warrant to unlock the phone. And while the alternatives may work in some cases, they wont work in other cases. And that brings us back to how its in the public interest to thwart search warrants in those cases when the alternatives wont work. Id be very interested in the answer to that question from defenders of Apples policy. And Id especially like to hear an answer from Apples General Counsel, Bruce Sewell.

Read more:
Volokh Conspiracy: Apple’s dangerous game

Julian Assange on Snowden, disliking Google, and his …

It would be too much to say that WikiLeaks founder Julian Assange feels optimistic. He's been holed up in the Ecuadorean embassy in London for more than two years now, withcameras and police"a 3 million surveillance operation," he calls itjust meters away.

"There's a sense of inevitability now," Assange saidwhen we asked if his situation mightchange.

Assange: "Thesituation is clarifying politically and legally."

Ars: "I just want to be clear on this pointare you saying you're hopeful you'll be free soon?"

Assange: "I wouldn't say hopeful. I would say it's inevitable. It's inevitable that we will win the diplomatic standoff we're in now."

It's getting late in London, where Assange is doing a barrage of press interviews on the eve of his new book, When Google Met Wikileaks(it goes on sale in the US later this week). We called at the agreed upon time, and a man who didn't identify himself answered the number, which was for a Londoncell phone. He saidcall back in five minutes, and onlythen was the phone finally handedto Assange.

We're supposed to focus on thebook.But first, we want to know whatlife trapped in the embassy involveswhere doeshe eat, sleep, do laundry?What isthe roomhe's in now like?

"For security reasons, I can't tell you which sections of the embassy I utilize," he said. "As to the rest, in a way, it's a perfectly normal situation. In another way, it's one of the most abnormal, unusual situationsthat someone can find themselves in."

Assange usheredWikiLeaks through severalmassive leaks of secret US government reports and a tumultuous relationship with some prominent newspapers. first came the disclosure of hundreds of thousands of military reportsonthe Iraq and Afghanistan conflicts, thena leak of more than 250,000 diplomatic cables from the State Department.

Hesought asylum from Ecuador when he was on theverge of being extraditedto Sweden to face sexual-assault charges in that nation. If he leaves the embassy, he'll be arrested, although it isn't clear where he'll be sent first. It'swidely assumed the US has an ongoing investigation intoAssange over the leaks.

See more here:
Julian Assange on Snowden, disliking Google, and his ...