DEF CON 8 – Jon Erickson – Number Theory Complexity, Theory, Cryptography, and Quantum Computing. – Video


DEF CON 8 - Jon Erickson - Number Theory Complexity, Theory, Cryptography, and Quantum Computing.
Jon Erickson - Number Theory Complexity, Theory, Cryptography, and Quantum Computing. DEF CON 8.0 was held July 28th - 30th, 2000, in Las Vegas, Nevada US.

By: DEFCONConference

Read more:
DEF CON 8 - Jon Erickson - Number Theory Complexity, Theory, Cryptography, and Quantum Computing. - Video

Dogecoin is an alternative digital coin to the popularly traded cryptocurrency Bitcoin

(CNN) -

The Dogecoin started off as a penniless Internet joke. But Matt Thompson plans on selling his vacation home for this meme-inspired currency.

The 27-year-old entrepreneur has been selling games and gadgets over the Internet for years, but nothing as big as his Wisconsin vacation home, which he is offering for 100 million Dogecoins.

Dogecoin (pronounced DOHJ-coin) isn't something tangible like the dollar bills in your wallet. It's an open source file-sharing form of cryptocurrency that was created by programmer Billy Markus in December 2013. The newbie cryptocurrency started off as a parody of Bitcoin, using the image of a perplexed Japanese dog. Chances are, you've probably seen Dogecoin's mascot somewhere on the Internet already. As the Shiba Inu would say: Wow, much coin-cidence.

But this satirical currency isn't just a punchline anymore. Through trading and transactions between users, the currency went from being worth nothing to being valued at more than $65 million, and it has a uniquely supportive community of users from the site Reddit.

Thompson, a user of bitcoins since 2011, started buying and selling Dogecoins two days after they were made available online. But the early adopter didn't think of selling his vacation home for cryptocurrency until his property got no offers after several months on the market. His three-bedroom, two-bath home is one of 2,300 properties on sale in Sawyer County, in the state's northern woods.

To attract potential buyers, he decided to accept Dogecoins as a payment form. He sees potential in it.

"I don't mind holding on to (Dogecoins) for a multitude of reasons, including that I believe I can use them to further my business," he explained. Thompson, who lives in Minnesota, primarily sells video and electronic game accessories online. He's been able to buy and sell inventory from places such as China by using the digital currency. "It's safe and easy with minimal fees," he said. "To date, I've found it to be very good for supplementing payment methods."

Timothy Lee, who has written about cryptocurrency for The Washington Post, says Dogecoin can be a feasible alternative to Bitcoin, but it is important to put it into context. Bitcoin is the most popularly traded cryptocurrency and has the largest community of users in the digital currency realm. Dogecoin is one of the top 10 cryptocurrencies, but it has a far smaller following.

Ben Doernberg of the Dogecoin Foundation -- yes, the founders even established a nonprofit organization -- says what makes it special compared with its competitors is its community.

Read more here:
Dogecoin is an alternative digital coin to the popularly traded cryptocurrency Bitcoin

Munich opts for open source groupware from Kolab

Munich is continuing its switch to open source software with its decision to start using Kolab Enterprise groupware for its city-wide IT infrastructure.

The city of Munich successfully completed its switch from Windows NT to its own open source Linux distribution, LiMux, in December. It created over 14,800 LiMux workspaces for its approximately 15,500 desktops.

While that part of its switch to open source was completed, it still needed a groupware system to manage mail, mailing lists, calendars and contacts for its employees though. To achieve this, it issued a tender that was won by the Swiss Kolab Systems, the company announced Tuesday.

The Kolab groupware system that was originally developed for the German Federal Office for Information Security (BSI) will be employed as part of Munichs MigMak project, a abbreviation used by the city to describe the migration of its mail and calendar system, Kolab said. The system is to be provided as completely open-source technology, including the necessary professional support, it added.

All the citys LiMux PCs and the remaining Windows PCs will be using the Kolab Desktop Client in combination with the Kolab web client based on Kolab Enterprise 13, it said.

Kolab Enterprise 13 was introduced in December. It was initially made available for Red Hat Enterprise Linux (RHEL) but Kolab promised at the time that the system would be made available for other platforms.

Enterprise 13 is based on the Kolab.org 3.1 community edition and is completely open source. However, the enterprise version comes with paid enterprise support.

It has, for instance, support for mobile phones and tablets, Mac OS X and applications such as Mozilla Thunderbird, while it also has a Web client and provides email, calendar and other standard features for mobile, according to Kolab.

Kolab Enterprise has been developed with a security centric architecture from its beginnings in the Federal Office for Information Security to prevent corporate and governmental espionage , Kolab said.

The system will be implemented by Munich-based general IT contractor ESG, Kolab said. A customized training program will be developed for the employees, it added.

Read more:
Munich opts for open source groupware from Kolab

A Brief Rundown Of The Spying Questions Intel’s CEO Won’t Answer

In a Reddit Ask Me Anything last Wednesday, Intel CEO Brian Krzanich opened the floor for questions, but notably ignored the most popular one in the thread: in light of recent NSA revelations, what will the company do to assure that its chips don't contain a backdoor for the NSA?

While Kzarnich never answered any of the security-related questions--Intel PR says this is because the questions came late and Kzarnich either missed them entirely or couldnt reply in time--one Redditor, Bardfinn, responded at length on the issue of encryption and security.

Bardfinns real name is Steve Akins, and in an email correspondence he describes his interest in cryptography and Internet security as personal and societal/political. But hes quite literate on the subject.

Its an immense problem for the layman, Akins says. Cryptography is difficult to use, touches many parts of our lives, and has not become significantly less difficult in the past 30 years In our tablets and smartphones, and the networks they connect to, cryptography is handled for us by the manufacturers. We never see it, never interact with it, and in many cases *cannot* interact with it. Were placing an immense amount of trust in the cryptography of manufacturers, Akins argues, and therefore were effectively trusting them not to peek.

Of course, everyone cant be a skilled cryptographer, and since absolute security isnt really possible, there will always have to be some element of trust involved between manufacturers and everyday people--but Akins believes that trust needs to be verifiable, mitigated, and distributed:

The problem isn't that we have to trust a black box in our personal devices. The problem is that we have to trust that one black box, and many black boxes on the Internet (or cellular network) which may or may not be as secure as the black box in our devices, and the ones in our computers and the ones in the networks interoperate at the lowest common denominator, and they all probably have back doors (which makes it really hard to actually trust them), and the ones on the Internet are highly targetable by the bored kids, criminals, etc: Bad Actors.

To understand the root cause of this concern, and what can be done about it, it helps to have some understanding of how your computer goes about encrypting things to ensure that prying eyes dont see what you dont want them to see. For your computer to lock your data up tight and send it on its way, it relies on something that computers are in reality quite bad at: randomness.

Random numbers are a necessity for building secure systems, as theyre the only way to make sure your encryption key stays secure. However, generating random numbers can be extraordinarily difficult, especially with software. Programs and computers are run by logic and if-then conditionals--asking them to pull numbers out of thin air without a prescribed formula is the sort of simple thing human minds can do that trip up computers. We call that predictability entropy. The higher your entropy, the harder it is to crack your encryption.

Since its so hard to come up with a software solution that adequately generates random numbers with high entropy for encryption, its become possible to mitigate that by turning to your computers processor. Which is where Intel comes in.

Ever since the company launched its Ivy Bridge line of processors in May of 2012, its included what it calls Secure Key technology for the purpose of random number generation. It is, essentially, a black box--an opaque system built for a specific purpose (random number generation) but with little to no insight as to how it actually accomplishes it.

More here:
A Brief Rundown Of The Spying Questions Intel's CEO Won't Answer

Chelsea Manning: US secrecy breeds unilateralism that …

Published time: February 21, 2014 14:31

Chelsea Manning, formerly known as Bradley (Reuters/Gary Cameron)

The US governments pursuit of secrecy and power lends itself to unilateralism which the Founding Fathers feared, Chelsea Manning has said. The whistleblower spoke out after being awarded the Sam Adams prize for Integrity in Intelligence.

In a written statement posted on the Pvt. Manning Support Network, Chelsea Manning said the US is moving towards what the American constitution was written to prevent. Following the attacks on the Pentagon and the World Trade Center, the American government has been pursuing an unprecedented amount of secrecy and power consolidation in the Executive branch, under the President and the Cabinet, Manning wrote.

Referencing a recent Freedom of Information case, when the US government declined to release documents on targeted killings that it deemed harmful to national security, Manning called the White Houses approach seemingly Orwellian.

In the case, the New York Times and the American Civil Liberties Union argued that the practice of targeted killing of US citizens was a matter of public interest, and information pertaining to it should be available.

However, the court concluded the American government had not violated the FOIA (Freedom of Information Act) by refusing to turn over the documents sought in the FOIA requests, and [could not] be compelled . . . to explain in detail the reasons why [the Government's] actions do not violate the Constitution and laws of the United States.

According to Manning, such cases represent a critical problem in US society and raise the issue of the level of secrecy, obfuscation, and classification or protective marking. He argues that although the American government claims it is trying to protect the citizens of their nation, it is breeding a unilateralism that the founders feared, and deliberately tried to prevent when drafting the American Constitution.

When the public lacks the ability to access what its government is doing, it ceases to be involved in the governing process, said Manning, highlighting there is a line to be drawn between tyranny and freedom.

Chelsea Manning (formerly Bradley Manning) was sentenced in August 2013 to 35 years in prison for 20 charges including espionage, theft and violating computer regulations. The charges relate to the 700,000-odd Iraq and Afghanistan battle reports he released to whistleblowing website, WikiLeaks, in 2010 while he was working as an intelligence analyst in Iraq.

Go here to see the original:
Chelsea Manning: US secrecy breeds unilateralism that ...

News from Leavenworth: Chelsea Manning receives a family …

Work, Study, Mail Order Shoes and Junk Mail!

But first London

On Monday 3 February, a group of long-time supporters of Chelsea Manning welcomed her aunt Sharon and uncle Joe to Giuseppe Conlon Catholic Worker House in London. Sharon and Joe were to fly out from Heathrow the next day and would be visiting Chelsea at Fort Leavenworth the following weekend along with Chelseas sister Casey. This was to be the first visit since Chelsea was convicted last August and sentenced to 35 years for telling the truth after over three years in pretrial detention. The Private Manning Family Fund paid for both the Transatlantic and internal flights for this trip along with a contribution to a night in a hotel and other travel expenses. All this came from donations and fundraising events, so a big Thank You to everyone who has given to the fund over the past six months.

Emmy cooked a wonderful lunch for us and we were treated by Razz, John McClean, Dave Turley and Eden Boucher to musical entertainment including solidarity songs that have featured at many of the London vigils for Manning over the past three years. Later the same day Sharon, Joe and Ciaron visited Julian Assange at the Ecuadorian Embassy.

As we wished Sharon and Joe a safe journey and a successful visit, we were anxious about how the trip would work out. They had previously been turned away from Quantico Brig and had very nearly been refused entry on their last visit to Leavenworth over documentation requirements they hadnt been told about in advance, resulting in what should have been a visit of several hours after travelling thousands of miles being cut down to just 40 minutes. When Casey called Joe in the middle of the day to say there was a problem this time over documentation that had to be sorted NOW or the visit would be refused, we feared the worst. So it has been a huge relief for us to hear that the visits were a success and everything went smoothly, although right up to the day before the first visit, Sharon and Joe had still not heard for sure that everything was in order.

Chelsea is focused, keeping busy and in good spirits

Sharon and Joe have brought back reassuring news from Fort Leavenworth of Chelseas living conditions, her mood and how shes occupying her time. Chelsea is busy working on her appeal and has a desk and a typewriter in her room that she can use for this purpose. She also spends a lot of time in the prison library and has a job in the kitchens doing a variety of tasks on a fortnightly rota. The Private Manning Support Network has arranged for her to receive the Washington Post and New York Times every day and family members have set up subscriptions to scientific journals Chelsea requested. Emma from PMSN is assisting Chelsea with organising the educational courses she wants to take and is keeping in regular contact by phone.

The visiting arrangements sound relaxed, with all the prisoners and their visitors in a large visiting room, able to make physical contact and with the guards giving them plenty of space. Casey, who had seen Chelsea during the trial, commented that she was now looking much better and had regained a bit of weight. Chelsea acknowledged this and said she had been under a lot of stress during the trial (no surprises there). The visiting room had vending machines but Chelsea refused the offer of anything you like from them, saying that shes now sticking to a healthy diet and has got used to not eating any junk food!

Go here to see the original:
News from Leavenworth: Chelsea Manning receives a family ...