Will full encryption sideline Google’s targeted ads?

News

By Zach Miners

June 18, 2014 08:39 AM ET

IDG News Service - Mining personal data to deliver targeted ads is the lifeblood of Google's business -- and of many other online firms. But what if that data dries up at the source?

Google released an early version of a new tool recently that will provide full "end-to-end" encryption for email. It's a super-strong cloaking technology that scrambles messages before they leave their browser and keeps them that way until they're decoded by the recipient.

The technology makes use of a private key-string that only the user has access to, meaning even the email provider can't read the contents of messages. Google says anyone will be able to use the tool with their existing web-based email service.

It was hailed as a big step forward in privacy, but the increased use of strong encryption also threatens the ability of online firms to sell targeted ads, altering the calculus that makes it worthwhile for them to offer online services for free. Google, after all, scans emails to deliver keyword-based advertising, and for other purposes like blocking spam and malware. Yahoo also scans email, though Microsoft says it does not.

"This tool is in direct conflict with their business model," said Tyler Cohen Wood, an online security expert and cyber branch chief for the Defense Intelligence Agency within the U.S. Department of Defense. For Google to offer it, she said, is strange.

Google said the tool is intended for a subset of users who want additional security beyond what the company already provides. "We recognize that this sort of encryption will probably only be used for very sensitive messages or by those who need added protection," Google said in its announcement.

But its goal is to eventually make a more polished version available for download in its Chrome Web Store. And as users become more insistent about privacy, other online firms may offer similar capabilities.

Go here to see the original:
Will full encryption sideline Google's targeted ads?

Bitcoin,Litecoin mining rig cryptocurrency 2500W system, 6x 280x ASUS Beast 2014 – Video


Bitcoin,Litecoin mining rig cryptocurrency 2500W system, 6x 280x ASUS Beast 2014
Link: https://www.youtube.com/watch?v=P5TrWC1V7fg Bitcoin,Litecoin mining rig any coin cryptocurrency 2500W system, 6x 280x ASUS Beast Link: https://www.yout...

By: somethint

Read more from the original source:
Bitcoin,Litecoin mining rig cryptocurrency 2500W system, 6x 280x ASUS Beast 2014 - Video

Hacker mines $620K in cryptocurrency under victims’ noses

Computerworld - A German hacker generated more than $620,000 in cryptocurrency after hijacking an unknown number of network storage devices and turning them into digital slaves to mine Dogecoin, researchers said today.

"This wasn't unique, we've seen other malware install [cryptocurrency] miners, but we haven't seen anything this big before," said Pat Litke, a researcher at Dell SecureWorks' Counter Threat Unit (CTU). "That was mostly due to the infection vector. He could just walk in the door."

Litke and David Shear, a network security analyst also with SecureWorks, were referring to vulnerabilities in network-attached storage (NAS) systems manufactured by Taiwan-based Synology that the hacker exploited before planting a customized cryptocurrency miner on the devices.

Synology had issued patches for the vulnerabilities shortly after the flaws were made public last September; the hacked NAS systems had not been updated with the fixes.

Unpatched NAS devices were found and exploited, and then their computing and graphical horsepower -- the boxes were computers in all but name -- were set to work generating Dogecoins, an alternative to the better known Bitcoin. Within months, the hacker's network of compromised devices mined over 500 Million Doge, or just over $620,000, Litke said.

Hackers have long targeted cryptocurrency with specialized malware, but almost all of their efforts have targeted existing digital money, primarily Bitcoins, stored in virtual "wallets." In February, Litke and Joe Stewart, director of SecureWorks' malware research, presented their findings on the rapid increase in cryptocurrency-stealing malware at the RSA Conference.

Planting malware to actually create digital funds, however, is a relatively new development, said Litke, and the evidence they collected on the Synology NAS-hijacking showed how lucrative the practice can be. That bodes ill.

"It will become fairly commonplace, even as an afterthought, for [cyber criminals] to add malware miners [to their payloads]," said Shear, who expects other cyber criminals to quickly adopt the strategy. "We're kind of already there. With a big enough botnet, and we're talking big, they could out-hash anyone."

SecureWorks also dug up some other interesting elements of the NAS hijack, including the native language of the hacker (or hackers), and the fact that the mining of Dogecoins couldn't have been exclusively from the compromised storage devices.

The username the firm's researchers found in the malware's configuration file led them to other digital bits, including a Github account, while multiple hacker forums showed that the hacker communicated exclusively in German.

Go here to see the original:
Hacker mines $620K in cryptocurrency under victims' noses

Chelsea Manning Accuses US of Lying About Iraq | Military.com

Chelsea Manning accused the U.S. of consistently lying about the war in Iraq and slammed the process of embedding journalists in military units in the New York Times on Sunday.

Manning, who has been mostly silent since being convicted and sentenced to 35 years in prison for releasing classified materials to WikiLeaks, said that in light of the recent surge of violence in Iraq it is time to question "how the United States military controlled the media coverage of its long involvement there and in Afghanistan."

"I believe that the current limits on press freedom and excessive government secrecy make it impossible for Americans to grasp fully what is happening in the wars we finance," she wrote in the op-ed, titled "The Fog Machine of War."

Manning cited failures in press freedom when reports described the 2010 Iraq elections as a success -- a milestone that signified the creation a free and democratic system. Contrary to these reports, Manning wrote that at the time, military and diplomatic reports said political dissidents of Prime Minister Nouri Kamal al-Maliki were detained, tortured and killed by the federal police.

The fact that this was never reported by western media, Manning said, shows a lack of press freedom regarding military operations. During her deployment she says she never saw more than 12 embedded journalists in Iraq because the military controls the process.

The process of limiting press access to a conflict begins when a reporter applies for embed status. All reporters are carefully vetted by military public affairs officials. This system is far from unbiased. Unsurprisingly, reporters who have established relationships with the military are more likely to be granted access.

Less well known is that journalists whom military contractors rate as likely to produce 'favorable' coverage, based on their past reporting, also get preference. This outsourced 'favorability' rating assigned to each applicant is used to screen out those judged likely to produce critical coverage.

Manning said military public affairs officers could strip a journalist of embed status if they report something the military does not like.

Freedom of the press in the U.S. did see a significant decline in 2013. Reporters Without Borders released a report in February that showed the U.S. had dropped from the 32nd to the 46th spot in a list of countries ranked by press freedom. Manning's conviction contributed to the drop in ranking.

"Opinion polls indicate that Americans' confidence in their elected representatives is at a record low. Improving media access to this crucial aspect of our national life -- where America has committed the men and women of its armed services -- would be a powerful step toward re-establishing trust between voters and officials," Manning concluded.

See the rest here:
Chelsea Manning Accuses US of Lying About Iraq | Military.com

Chelsea Manning Says She Leaked Classified Info Out Of Love For Country

PVt. Chelsea Manning, formerly named Bradley, was convicted last year of sending classified documents to anti-secrecy website WikiLeaks

For the first time since she was sentenced to 35 years in prison for the leak, Manning writes at length in an opinion column published by The New York Times on Sunday.

Manning, who was formerly known as Bradley, says that as the U.S. considers renewed military action in Iraq, she thinks some of the issues she exposed have yet to be addressed.

Mainly, Manning writes about the lack of information in the United States. Manning says that even back in 2010, she saw a complicated reality on the ground, while the U.S. media painted a rosy picture of successful elections.

Manning writes:

"If you were following the news during the March 2010 elections in Iraq, you might remember that the American press was flooded with stories declaring the elections a success, complete with upbeat anecdotes and photographs of Iraqi women proudly displaying their ink-stained fingers. The subtext was that United States military operations had succeeded in creating a stable and democratic Iraq.

"Those of us stationed there were acutely aware of a more complicated reality.

"Military and diplomatic reports coming across my desk detailed a brutal crackdown against political dissidents by the Iraqi Ministry of Interior and federal police, on behalf of Prime Minister Nuri Kamal al-Maliki. Detainees were often tortured, or even killed.

"Early that year, I received orders to investigate 15 individuals whom the federal police had arrested on suspicion of printing 'anti-Iraqi literature.' I learned that these individuals had absolutely no ties to terrorism; they were publishing a scholarly critique of Mr. Maliki's administration. I forwarded this finding to the officer in command in eastern Baghdad. He responded that he didn't need this information; instead, I should assist the federal police in locating more 'anti-Iraqi' print shops."

The whole piece is worth a read, so we encourage you to click over.

Read more:
Chelsea Manning Says She Leaked Classified Info Out Of Love For Country