The Linux Foundation’s Core Infrastructure Initiative Announces New Backers, First Projects to Receive Support and …

SAN FRANCISCO, CA -- (Marketwired) -- 05/29/14 -- The Core Infrastructure Initiative (CII), a project hosted by The Linux Foundation that enables technology companies, industry stakeholders and esteemed developers to collaboratively identify and fund open source projects that are in need of assistance, today announced five new backers, the first projects to receive funding from the Initiative and the Advisory Board members who will help identify critical infrastructure projects most in need of support.

CII provides funding for fellowships for key developers to work fulltime on open source projects, security audits, computing and test infrastructure, travel, face-to-face meeting coordination and other support. The Steering Committee, comprised of members of the Initiative, and the Advisory Board of industry stakeholders and esteemed developers, are tasked with identifying underfunded open source projects that support critical infrastructure, and administering the funds through The Linux Foundation.

The computing industry has increasingly come to rely upon shared source code to foster innovation. But as this shared code has become ever more critical to society and more complex to build and maintain, there are certain projects that have not received the level of support commensurate with their importance. CII changes funding requests from the reactive post-crisis asks of today to proactive reviews identifying the needs of the most important projects. By raising funds at a neutral organization like The Linux Foundation, the industry can effectively give these projects the support they need while ensuring that open source projects retain their independence and community-based dynamism.

"All software development requires support and funding. Open source software is no exception and warrants a level of support on par with the dominant role it plays supporting today's global information infrastructure," said Jim Zemlin, executive director at The Linux Foundation. "CII implements the same collaborative approach that is used to build software to help fund the most critical projects. The aim of CII is to move from the reactive, crisis-driven responses to a measured, proactive way to identify and fund those projects that are in need. I am thrilled that we now have a forum to connect those in need with those with funds."

Additional Backers Represent Overwhelming Support for Open Source ProjectsAdditional founding members of CII include Adobe, Bloomberg, HP, Huawei and salesforce.com. These companies represent the ongoing and overwhelming support for the open source software that provides the foundation for today's global infrastructure. They join other members of CII who include Amazon Web Services, Cisco, Dell, Facebook, Fujitsu, Google, IBM, Intel, Microsoft, NetApp, Rackspace and VMware. Comments from some of the newest members are included below.

Range of Projects Prioritized for First Round of FundingUpon an initial review of critical open source software projects, the CII Steering Committee has prioritized Network Time Protocol, OpenSSH and OpenSSL for the first round of funding. OpenSSL will receive funds from CII for two, fulltime core developers. The OpenSSL project is accepting additional donations, which can be coordinated directly with the OpenSSL Foundation (contact at info@opensslfoundation.com).

The Open Crypto Audit Project (OCAP) will also receive funding in order to conduct a security audit of the OpenSSL code base. Other projects are under consideration and will be funded as assessments are completed and budget allows.

Esteemed Industry Experts Will Advise CII on Projects Most in NeedThe CII Advisory Board will inform the CII Steering Committee about the open source projects most in need of support. With highly esteemed experts from the developer, security and legal communities, the CII Advisory Board plays an important role in prioritizing projects and individuals who are building the software that runs our lives.

Alan Cox is a longtime Linux kernel developer and has been recognized by the Free Software Foundation for advancing free software.

Matthew Green is a Research Professor of Computer Science at the Johns Hopkins University and a co-founder of the Open Crypto Audit Project. His research focuses on computer security and cryptography, and particularly the way that cryptography can be used to promote individual privacy.

Go here to see the original:
The Linux Foundation's Core Infrastructure Initiative Announces New Backers, First Projects to Receive Support and ...

Liferay Recognizes Aegif as a Platinum Partner in Japan

Tokyo, Japan (PRWEB) May 29, 2014

Liferay, Inc., provider of the worlds leading enterprise-class, open source portal, announced today that Aegif has achieved Platinum Partner status. The company is a consulting firm based in Japan with a heavy focus on open-source consulting and strong reputation for pioneering Liferay in the Japanese market.

Since the beginning of Liferay Japan, Aegif has positively supported our business by leading us to mutual success," said Brian Endo, Liferay Japan's General Manager. "In the past two years, Aegif has steadily increased sales and trained many excellent engineers who qualified for Liferay authorization. They have met all the necessary conditions to become a Liferay Platinum Partner.

From 2009 to 2012, when Liferay Japan was first established, Aegif had been responsible for supporting all Liferay customers in Japan. Now, Aegif is engaged in product development including the localization of the Liferay product in Japanese, and is recognized as a high-value contributor with partnerships in approximately 140 countries.

We are proud to become the first Liferay platinum partner in Japan, said Terunao Nakura, Aegif's Liferay Technology Lead. We have seen the upward scale of supply and demand in Japan for global enterprise open source software. Liferay Portal's quality product coupled with a modularity that can be introduced at ease at the enterprise level is a requirement for our open source business."

Aegif has gained recognition from many satisfied customers as a consulting firm with abundant product knowledge and technical capabilities that include comprehensive customer services. In addition, as the only authorized training partner in Japan, Aegif has the unique opportunity to host Japanese trainings throughout the year.

"We would like to continue contributing to the growth of Liferay Portal in Japan by serving as the one-stop shop of adoption consulting, support, and training, said Nakura.

For more information about Liferay, visit http://www.liferay.com.

For more information about Aegif Corporation, visit http://www.aegif.jp.

About Liferay

Go here to see the original:
Liferay Recognizes Aegif as a Platinum Partner in Japan

Cryptography ( Windows ) – MSDN – the Microsoft …

Purpose

Cryptography is the use of codes to convert data so that only a specific recipient will be able to read it, using a key.

Microsoft cryptographic technologies include CryptoAPI, Cryptographic Service Providers (CSP), CryptoAPI Tools, CAPICOM, WinTrust, issuing and managing certificates, and developing customizable public key infrastructures. Certificate and smart card enrollment, certificate management, and custom module development are also described.

CryptoAPI is intended for use by developers of Windows-based applications that will enable users to create and exchange documents and other data in a secure environment, especially over nonsecure media such as the Internet. Developers should be familiar with the C and C++ programming languages and the Windows programming environment. Although not required, an understanding of cryptography or security-related subjects is advised.

CAPICOM is a 32-bit only component that is intended for use by developers who are creating applications using Visual Basic Scripting Edition (VBScript) programming language or the C++ programming language. CAPICOM is available for use in the operating systems specified in Run-Time Requirements. For future development, we recommend that you use the .NET Framework to implement security features. For more information, see Alternatives to Using CAPICOM.

For information about run-time requirements for a particular programming element, see the Requirements section of the reference page for that element.

CAPICOM 2.1.0.2 is supported on the following operating systems and versions:

CAPICOM is available as a redistributable file that can be downloaded from Platform SDK Redistributable: CAPICOM.

Certificate Services requires the following versions of these operating systems:

About Cryptography

Read the original:
Cryptography ( Windows ) - MSDN – the Microsoft ...

Quantum Cryptography with Ordinary Equipment

Researchers in Japan have come up with a way of doing quantum cryptography that could overcome two of the technology's big problems. The new protocol is designed to work with off-the-shelf equipment and use less bandwidth than existing methods. Its just a mathematical proposal, but it could help make quantum key distribution more commercially viable.

With an encrypted message, the sender and recipient share a key that unscrambles its contents. Ensuring that the key hasn't been stolen is the problem. With quantum cryptography, the key is created at the sender and receiver by transmitting photons over fiber-optic lines. The polarity of a photona quantum property that says whether it is oscillating vertically or at anglecan be determined by the receiver and compared with a second "entangled" photon created at the same time. The polarity of the photons is translated into bits that make up a key to decrypt messages.

With quantum key distribution, the security of the transmission is assured by the Heisenberg uncertainty principle. If an eavesdropper tries to intercept the key, it will change the state of the paired photonsan event that can be detected by the sender of the key.

In research published in Nature last week, the Japanese team describes a method for securing communications that doesnt rely on the uncertainty principle and needs no regular measurement to see if the key's been tampered with.

With this technique, photons are sent over an optical fiber using ordinary lasers, rather than specialized equipment usually needed to create quantum keys. The laser emits a train of photons and a device called a phase modulator imparts a phase on them.

The receiver splits the signal into two separate signals with a randomly generated delay between them. Then those two signals, which are oscillating waves, are superimposed and detected on the receiving end. The combined waves could be out of phase and cancel each out or they could be in phase and create a bigger wave.

The phase difference between pulses can then act as bits that can make up a key to decrypt the message. For example, pulses with the same phase are a bit value of zero, while pulses with a different phase are a bit value of one. When the receiverwho, by convention, is called Bobdetects a photon, he learns whether the superimposed pulses have the same or different phase. Then he tells the sender, called Alice, what the relevant pulse numbers are. Because the sender records all the pulses, she can determine the bit value based on what Bob tells her, explains co-author Masato Koashi from the University of Tokyo.

In an email, Koashi from the University of Tokyo describes how the key is protected from theft by an intruder, called Eve:

One of the keys to securing the communication is to send a large number of optical pulses but they are very weak such that they amount to only a few photons in total. Hence, even if Eve waits forBob to announce the numbers for two pulses and then measures Alice's signal, the chances of Eve's detecting any photon in the two relevant pulses are very low.

Another key is the fact that Bob generates the delay randomly. Eve may measure Alice's signal immediately and learn the phases of a few pulses. Eve then tries to manipulate Bob's announcement to fall on those pulses for which she has learned the phases. The random delayprevents such a manipulation.

Read more:
Quantum Cryptography with Ordinary Equipment

Julian Assange Goes Where Glenn Greenwald Wouldn’t …

Though they're often lumped together as crusaders against state secrets, WikiLeaks founder Julian Assange and journalist Glenn Greenwald dont always see eye to eye.

Their differences spilled into public view this week, when the WikiLeaks Twitter account took Greenwald and his site, The Intercept, to task for redacting the name of a country where the United States government is recording every phone call.

On Monday, Greenwald, Ryan Devereaux, and Laura Poitrasrevealed that American national-security operatives have been recording all calls in the Bahamas, and that the same program, MYSTIC, is scooping up metadata in Mexico, Kenya, and the Philippines.

Thats a significant reveal, and it goes much further than The Washington Post did in March, when Barton Gellman and Ashkan Soltani wrote on the N.S.A.s capability to record full-take audio.

But Greenwalds The Intercept wasn't ready to reveal the name of a second nation where such capabilities were being applied, in response to specific, credible concerns that doing so could lead to increased violence. That act of caution caught the attention of the WikiLeaks Twitter account, which went on a tear and accused Greenwald of painting future publications into a corner with this Pentagon line.

Though WikiLeaks tweets dont carry an individual signature, its widely believed that Assange controls the account.

Greenwald responded by pointing out that WikiLeaks had redacted information in the past, and noted that the government had strongly urged The Intercept to redact the names of all the countries involved. Though the debate continued for some time, it ended somewhat abruptly, when WikiLeaks tweeted, We will reveal the name of the censored country whose population is being mass recorded in 72 hours.

After a slight delay curiously blamed on media cycle reasons, WikiLeaks delivered: the site released a statement Friday morning that identified Afghanistan as the country redacted from The Intercepts reporting.

We do not believe it is the place of media to aid and abet a state in escaping detection and prosecution for a serious crime against a population, Assanges statement read. Consequently WikiLeaks cannot be complicit in the censorship of victim state X. The country in question is Afghanistan.

The Intercept stated that the U.S. government asserted that the publication of this name might lead to a rise in violence, Assange continued. Such claims were also used by the administration of Barack Obama to refuse to release further photos of torture at Abu Ghraib in Iraq.

See the rest here:
Julian Assange Goes Where Glenn Greenwald Wouldn’t ...

Whistleblower Snowden to US TV: ‘I was trained as a spy’ – Video


Whistleblower Snowden to US TV: #39;I was trained as a spy #39;
In his first full interview with US television, fugitive NSA whistleblower Edward Snowden has insisted that he used to be a fully-fledged American spy. Granted asylum in Russia, Snowden spoke...

By: euronews (in English)

Continue reading here:
Whistleblower Snowden to US TV: 'I was trained as a spy' - Video