NSA leaker singles out Amazon on encryption

While Edward Snowdens revelations about domestic spying by the National Security Agency have embarrassed several large tech companies, including Microsoft and Google, for enabling government snooping, one tech giant that avoided Snowdens spotlight was Amazon.

Until Tuesday, that is. At the intellectual gabfest, TED 2014, in Vancouver, B.C., Snowden criticized the lack of encryption on the websites of many U.S. Internet companies.

The reason this matters is today, if you go to look at a copy of 1984 on Amazon.com, the NSA can see a record of that, the Russian intelligence service can see a record of that, the Chinese service can see a record of that, the French service, the German service, the services of Andorra, Snowden said, speaking remotely from Russia. They can all see it because its unencrypted.

Like many Internet companies, Amazon doesnt use HyperText Transfer Protocol Secure, an encryption technology that keeps users communications, identities and web browsing private on its site when shoppers initially look though items. (Web surfers know its in use when the address for the site they are visiting begins with https.)

Amazon does, however, encrypt personal account Web pages, as well as pages where customers buy merchandise.

Snowden said he didnt mean to single out Amazon, but then proceeded to do so.

The worlds library is Amazon.com, but not only do they not support encryption by default, you cannot choose to use encryption when browsing through books, Snowden said. All companies need to move to an encrypted browsing habit by default for all users who havent taken any action or picked any special methods on their own. Thatll increase the privacy and the rights that people enjoy worldwide.

An Amazon spokesman declined to comment.

Jay Greene: jgreene@seattletimes.com

Owning a home remains a goal

Read the original:
NSA leaker singles out Amazon on encryption

What is open source? – Definition from WhatIs.com

1) In general, open source refers to any program whose source code is made available for use or modification as users or other developers see fit. Open source software is usually developed as a public collaboration and made freely available.

2) Open Source is a certification mark owned by the Open Source Initiative (OSI). Developers of software that is intended to be freely shared and possibly improved and redistributed by others can use the Open Source trademark if their distribution terms conform to the OSI's Open Source Definition. To summarize, the Definition model of distribution terms require that:

This was last updated in May 2009

Register now to receive SearchEnterpriseLinux.com-related news, tips and more, delivered to your inbox.

Unified computing systems (UCS) hold the promise of simplicity for data center, but the technology and associated costs may not be appropriate for every application. Learn about the potential of UCS to help your data center, and what you should consider prior to implementation.

The shortfalls of UCS include the potential for vendor lock-in and interoperability issues. Learn more about these and what you need to know to deploy a UCS in your data center. Some implementation considerations include storage, hypervisors, and a contingency plan in case your vendor changes course.

Most machines running Linux are x86 PCs. IBM's System p and Linux go well together, and Ken Milberg explains why and what's new. He gives five reasons to run Linux on System p, and shares some of the options for PowerVM, IBM's virtualization platform.

More here:
What is open source? - Definition from WhatIs.com

BBT Episode 13: 12x R9 270 Twin Frozr Cross Compare – Cryptocurrency of the week: Vertcoin – Video


BBT Episode 13: 12x R9 270 Twin Frozr Cross Compare - Cryptocurrency of the week: Vertcoin
BEST VIEWED IN 1080p HD (once post processing completed!) In this episode the BBT sets out to identify if two different PC configurations yet, same graphics ...

By: Bits Be Trippin #39;

More:
BBT Episode 13: 12x R9 270 Twin Frozr Cross Compare - Cryptocurrency of the week: Vertcoin - Video

CyberPowerPC joins Bitcoin craze with Mega Miner desktop series

Summary: The latest PCs designed for cryptocurrency mining feature AMD Radeon R9 graphics cards and start at $989.

What's good enough for boutique PC builder iBuyPower is usually good enough for CyberPowerPC -- and vice versa. So it shouldn't come as a surprise that a few weeks after the iBuyPowerCoinMine desktops, designed for Bitcoin mining, were released, CyberPower has responded with its new Mega Miner family of PCs, also for cryptocurrency mining.

The Mega Miner lineup consists of three lines, which can be further customized from their base configurations. All feature AMD Radeon R9 graphics cards, which appear to be the coin mining card of choice.Starting at $989, the Mega Miner 100 comes with an AMD FX-4300 quad-core processor, 4GB of RAM, 500GB hard drive, DVD burner, and a pair of Radeon R9 270X video cards. The next step up is the Mega Miner 200, which offers similar specs except it adds a trio of R9 280X cards instead -- and bumps the price to $1,929.

For $2,569, the Mega Miner 300 switches to an Intel Core i3-4130 Haswell CPU, doubles the hard drive space, and features a trio of R9 290 graphics boards. It also deals with the heat from those powerful cards with a Corsair liquid-cooling solution -- the 100 and 200 models only include fan-based cooling, though various liquid-cooling kits are available as options. The systems come withThermaltake DPS power supplies that monitor the electricity usage all of your mining is costing you.

These new PCs, along with other projects like the Dopamine Bitcoin PC case, suggest the continued popularity of cryptocurrency mining, even as troubles like the recent Mt. Gox fiasco dog the nascent industry. Do you use your PC to mine cryptocurrency? Would you buy a new system like the Mega Miner to perform Bitcoin mining? Let us know in the Talkback section below.

Visit link:
CyberPowerPC joins Bitcoin craze with Mega Miner desktop series