Daily Archives: February 6, 2017

Opinion: students cannot be ignorant to the First Amendment – Maroon

Posted: February 6, 2017 at 2:55 pm

February 5, 2017 Filed under Op/Ed, Opinions

A Maroon editor asked me to write 400 words on the First Amendment, suggesting that our students know little about the Bill of Rights in general or the First Amendment in particular. What needs to be said to begin to understand the First Amendment can take an entire semester and an entire course; at least Ive not been asked to distil it down to 143 characters, though Ive already gone beyond the limit many students can process (and worse, no emojis.)

Justice William Brennan argued that the Founders included a free speech clause in the Bill of Rights for two reasons: (1) free speech is indispensable to democratic government, and (2) self-expression is a fundamental component of human dignity. Democratic self-government is in danger if freewheeling and uninhibited discussion of matters of public concern is absent. And respect for the equal dignity of each human being requires toleration of individuals speech even when that expression is overwhelmingly unpopular.

More recently, Burt Neuborne described the First Amendment as a chronological description of the arc of a democratic ideafrom conception to codification. The two religion clauses protect freedom of thought. Individual interaction with the community then develops from expression of an idea by an individual to mass transmission of that idea by a free press to collective action by the people supporting that idea to the culmination (in the petition clause)introduction of the idea into the formal process of democratic lawmaking.

A free press transmits important ideas but also provides information vital to public deliberation about the idea. Deliberative democracy is a charade without an informed citizenry. And a government bent on oppression has no better tactic than delegitimization of the press by shrill accusations of fake news whenever a fact the government does not like is reported. (Time to haul out the alternative facts.)

The other ally of such a government is ignorant citizens, and Facebook, Twitter, 90% of what is on television, a good deal of what is on the internet and similar distractions do little to eliminate this ignorance. They deepen it.

Contemporary First Amendment protections are much broader than the understandings of Madison and the Framers. In large part, that is because of the U.S. Supreme Court, beginning in the early decades of the 20th century, elucidated a series of interpretations that made the Amendment the bedrock of the democratic process that it is today.

But what the Court giveth the Court can take away. For the next four years, at least potential appointees will have to face a litmus test of willingness to overturn Roe v. Wade, and a Justice who will do that likely will have few qualms about reversing cases that have protected the rights of women, African-Americans, LGBTQ persons and the First Amendment rights of all of us.

One hopes readers who did not know all of this will seek to learn more. Ignorance is curable, but willful ignorance can be insuperable, and fatal to our democracy.

View original post here:
Opinion: students cannot be ignorant to the First Amendment - Maroon

Posted in First Amendment | Comments Off on Opinion: students cannot be ignorant to the First Amendment – Maroon

Public worker’s speech not protected by 1st Amendment – Cincinnati.com

Posted: at 2:55 pm

Jack Greiner 7:17 p.m. ET Feb. 2, 2017

John C. Greiner, attorney for Graydon Head Legal Counsel. He's a commercial litigator with an emphasis on communications and media law. He serves on the firm's Appellate Practice Group.(Photo: Provided)

Firma Helget, an administrative assistant with the Hays, Kansas Police Department, discovered recently that not all speech by a public employee receives First Amendment protection. As a result, the United States Court of Appeals for the Tenth Circuit upheld the dismissal of her wrongful termination suit against the department.

The case arose when Helget provided an affidavit to assist officer Blaine Dryden in his own wrongful termination suit against the department. The department claimed it fired Dryden based on his unprofessional and inappropriate conduct at a court hearing in December 2010. But Dryden alleged that was a pretext, to cover up the fact that he was fired for his union activities. Part of Drydens proof that that the department had decided to terminate him before the court incident was the fact that the department had decided, before the December court incident, not to issue him a ballistic vest.

At Drydens request, Helget provided an affidavit asserting that she had been instructed to remove Dryden from the ballistic vest ordering list in early December 2010. In May, 2011, the department fired Helget stating four reasons, one of which was her disclosing confidential information in the Dryden litigation.

In her wrongful termination suit, Helget contended the firing violated her First Amendment right of free speech. The trial court, and ultimately the appellate court, disagreed.

Public employees, unlike private sector employees, are protected by the First Amendment. The reason is simple. The First Amendment prohibits certain conduct by the government, not private conduct.

But courts recognize in the employment setting, the issues are a little different. It would be a pretty tough place to work if a public employee could march into the managers office every morning and tell the manager exactly how inept the manager was. An absolute view of the First Amendment, however, would not allow that employee to be disciplined.

Courts have accordingly, adopted a balancing approach. Public employees may speak out on matters of public concern, but a public employer may protect the efficient operation of the workplace. The daily tongue lashing would no doubt disturb the operation of the office, so in that case, the employee could be disciplined.

Helgets case was not as clear cut. She provided an affidavit in a case that alleged a police officer lost his job for engaging in protected conduct union activity. The affidavit did not immediately affect the operation of the office, in the same manner as the hypothetical.

But in the courts view, Helgets speech was related more to an employment dispute than a matter of public concern, and her voluntary disclosure of confidential information caused her superiors to lose confidence in their ability to trust her with information going forward. Based on this finding, the court had little difficulty rejecting her First Amendment claim.

Given our divisive political climate, it is likely employees public and private will be tempted to air their views. That may result in a lot of tests of the First Amendment over the next four years.

Jack Greiner is a lawyer with the Graydon Head law firm in Cincinnati and represents Enquirer Media in First Amendment and media issues.

Read or Share this story: http://cin.ci/2k6w4nc

See the original post here:
Public worker's speech not protected by 1st Amendment - Cincinnati.com

Posted in First Amendment | Comments Off on Public worker’s speech not protected by 1st Amendment – Cincinnati.com

Jitsi for Mac – Download – jitsi.en.softonic.com

Posted: at 2:54 pm

Jitsi is a free messenger client for Mac, which supports most major protocols and even supports video and audio conversations.

Simply choose the IM protocol that you'd like to connect to including SIP, Google Talk, XMPP/Jabber, MSN or Windows Live Messenger, AIM, Bonjour, ICQ, Yahoo Messenger and Facebook chat. In the main window, you'll find all your personal contacts.

In the Jitsi chat window, you can exchange IM messages or initiate video or audio chats including group chats. There are a limited number of emoticons and the Jitsi keeps a history of your chats. Although the interface isn't quite as intuitive as Adium. However, the fact that you can initiate audio and video chats gives it a serious advantage.

Note that this download link takes you to the nightly build page because Jitsi is being updated so regularly, that you can choose the latest version more easily.

Jitsi might not be quite as slick as other IM clients but wide support of IM protocols plus audio and video chatting makes it a very interesting option.

See the article here:
Jitsi for Mac - Download - jitsi.en.softonic.com

Posted in Jitsi | Comments Off on Jitsi for Mac – Download – jitsi.en.softonic.com

Microsoft’s DRM can expose Windows-on-Tor users’ IP address – The Register

Posted: at 2:53 pm

Windows users running the Tor browser can be tricked into uncloaking themselves, with a pretty straightforward trick based on Microsoft's DRM system.

The discovery was made by Hacker House, which says it's been researching social engineering attacks made using DRM-protected content.

What the UK-based security outfit found is that a pretty straightforward bit of social engineering click on this media file can, at the very least, reveal the user's real IP address.

Here's what's going on: DRM-protected media has to fetch its licence key from a server. If it's not signed properly, Windows raises a dialogue to warn you.

However, this warning DOES NOT appear if the DRM license has been signed correctly and the Digital Signature Object, Content Encryption Object and Extended Content Encryption Object contain the appropriate cryptographic signing performed by an authorised Microsoft License Server profile, the author writes.

Hide this dialogue, capture a Tor user's IP address

Microsoft sets high barriers to entry for those who want to start signing media: If you want to build your own Microsoft DRM signing solution the price-tag is around US$10,000, Hacker House notes.

What they've seen in the wild is someone managing to generate signed content, apparently without paying that toll.

As these signed WMV files do not present any alert to a user before opening them they can be used quite effectively to decloak users of the popular privacy tool TorBrowser with very little warning, they write.

The risk that media files could expose users is known to Tor, which warns users to run Tails if they want to run media files.

It's not the first time people have seen social engineering attacks based on media files: the old you need a plug-in to play this file strategy had a Windows DRM variant back in 2013, according to Virus Total.

See the rest here:
Microsoft's DRM can expose Windows-on-Tor users' IP address - The Register

Posted in Tor Browser | Comments Off on Microsoft’s DRM can expose Windows-on-Tor users’ IP address – The Register

Windows DRM Files Deanonymize Tor Browser Users – Virus Guides – Virus Guides (blog)

Posted: at 2:53 pm

The Hacker House security experts have warned that downloading and opening Windows DRM-protected files can decloak Tor Browser users and reveal their IP addresses.

The attacks via DRM-protected multimedia files in Windows have been known for more than 10 years, though until recently, theyve only been used to spread malware.

Some of the previous attacks tried to make users open and play DRM-protected files. Usually, these files would open in Windows Media Player, and users would see a popup that asked them to visit a URL to validate the files license.

PC users who agreed were transferred to an authorization URL. However, what users dont know is that hackers could modify these links and point victims to exploit kits or malware-laced files.

The Hacker House team has found that the pop up asking users if they wanted to visit the authorization URL would only appear for DRM files which have not been signed with the proper tools.

In case the attacker signed the DRM-protected multimedia files with an official Microsoft SDKs such as Windows Media Encoder or Microsoft Expression Encoder, the popup would not show, and the users player would automatically open an Internet Explorer instance and access the authorization URL.

According to the Hacker House security experts, the cost of properly signing DRM multimedia files ranges around $10,000, a sum that many low-end malware authors arent willing to pay for such a niche attack.

Nevertheless, the same thing doesnt relate to determined state-sponsored hackers or law enforcement agencies, who have the financial and physical resources to support such an attack infrastructure.

For example, law enforcement could host properly signed DRM-protected files on websites pretending to host child pornography. When a user would try to view the file, the DRM multimedia file would use Internet Explorer to ping a server belonging to the law enforcement agency.

Also, this tactic can be used to target ISIS militants trying to view propaganda videos, illegal drug and weapons buyers trying to view video product demos, political dissidents viewing news videos, etc.

See more here:
Windows DRM Files Deanonymize Tor Browser Users - Virus Guides - Virus Guides (blog)

Posted in Tor Browser | Comments Off on Windows DRM Files Deanonymize Tor Browser Users – Virus Guides – Virus Guides (blog)

Top 6 Rare Cryptocurrencies – The Merkle

Posted: at 2:53 pm

In the world of cryptocurrency, there is a lot of focus on bitcoin and other major currencies. However, there are quite a few altcoins who take the concept of creating a scarce supply to extreme measures. Although scarcity alone does not give a cryptocurrency intrinsic value by any means, it goes to show it can create an illusion of value over time.

The current cryptocurrency with the absolute lowest supply of coins to be recorded so far is bitGold. Its supply only has 10.2299 coins right now, all of which are quite valuable. In fact, the market cap of US$14,473 may look small, but it does mean every BTGOLD is worth over US$1,400. Unfortunately, bitGold only had less than US$100 worth of trading volume in the past 24 hours, making this cryptocurrency less than attractive to investors.

Rather than trying to create an altcoin with a fancy name, 42-coin simply illustrates the available coin supply. All 41.9999 coins have been brought into circulation, establishing a market cap of US$32,019. Not necessarily a favorite altcoin either, as its volume is even lower than bitGold right now.

Quite a few altcoins have tried to piggyback on the Bitcoin name, including bitBTC. With a supply of 43,8132 it is almost as scarce as 42-coin and generates slightly higher trading volumes. The market cap of US$46,854 is not bad, considering bitBTC has no real world use yet.

Not every altcoin with a smaller supply is worth next to nothing. Jinn is one of the few currencies bucking the trend as every one of the available 56,703 coins is worth US$6.56 each. This puts its market cap at well above the US$280,000 mark right now. Dont be surprised if you have never heard of Jinn, though, as its use cases are virtually non-existent.

One of the surprise entrants on the list of low-supply yet valuable alternative cryptocurrencies goes by the name Byteball. Under the GBYTE ticket, a total supply of 100,000 coins has been made available. With every coin surpassing the US$87.24 value, the market cap is on its way to surpass US$9m. Byteball also generated nearly US$120,000 in trading volume over the past 24 hours, making it quite successful in its own right.

When ZCash launched not too long ago, it became clear the supply of this currency would remain somewhat limited for quite some time. With just over half a million coins in circulation right now, the price per ZEC found a new home around the U$38.82 mark. It is intriguing to see this privacy-centric currency reach a market cap of nearly US$23m in such a short amount of time, though. ZCash continues to generate a fair amount of daily trading volume as well, making it quite a popular cryptocurrency.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

View original post here:
Top 6 Rare Cryptocurrencies - The Merkle

Posted in Cryptocurrency | Comments Off on Top 6 Rare Cryptocurrencies – The Merkle

SibCoin Meets the Needs of Russian Cryptocurrency Community … – newsBTC

Posted: at 2:53 pm

SibCoin is developed on a fork of Dash cryptocurrency platform. Dash is currently the sixth largest cryptocurrency in terms of market capitalization.

The cryptocurrency industry is flooded with hundreds of altcoins. The open source nature of many cryptocurrency platforms offers an easy way to create and deploy new altcoins. However, unless these altcoins serve a specific purpose or solve a particular problem, they will eventually fade into oblivion.

SibCoin, short for Siberian Chervonets is one such altcoin which is out there on a specific mission meeting the blockchain needs of the Russian community. SibCoin is developed on a fork of Dash cryptocurrency platform. Dash is currently the sixth largest cryptocurrency in terms of market capitalization. The highly successful SibCoin recently broke the record after its masternode network volume surpassed that of its parent coin. With increasing adoption, the gap between Dash and SibCoin continues to widen.

Unlike other cryptocurrencies, SibCoin has a unique advantage. The digital currency is created by a group of Russian developers, for the Russian community. In a country where the Western concepts are taken with a pinch of salt due to decades of mistrust, a home-grown cryptocurrency is much easier to accept.

Also, in Siberia and many other Russian cities, people feel that their contributions to the countrys economy are underappreciated. They are also fed up with corruption and bureaucratic inefficiencies plaguing the system. They believe that blockchain, with its transparency, can be a solution to all these issues.

SibCoin has broken the barrier which Bitcoin was unable to surpass since its inception. The creators of SibCoin have made further improvements to the Dash protocol by employing additional encryption algorithms to make it much better and more adaptable among the Russian population. At the same time, the SibCoin team is also involved in active promotion and awareness campaigns across Russia to familiarize the population to SibCoin and blockchain technology in general.

As the SibCoin community grows, the cryptocurrency could turn out to be the driving force behind the countrys blockchain revolution.

Read this article:
SibCoin Meets the Needs of Russian Cryptocurrency Community ... - newsBTC

Posted in Cryptocurrency | Comments Off on SibCoin Meets the Needs of Russian Cryptocurrency Community … – newsBTC

Cryptocurrency: Now in Crimea – Eastern Daily News

Posted: at 2:53 pm

While some countries are busy trying to come up with laws to regulate the use of cryptocurrencies, others are busy coming up with laws to legalize digital currencies. In light of the events by the European Commission, member countries of the European Union are coming up with laws to regulate Bitcoin. Russia has however not made such steps, instead its doing the opposite. Last year Russia announced that it considers Bitcoin transactions and exchanges as legitimate in the eyes of the law. This was good news to the Cryptocurrency world considering that Russia is a country where laws relating to capital control are more strict than in most countries.

Dmitry Marinichev, Russias internet ombudsman, has made suggestions to bringthe use of cryptocurrencies to residents of Crimea. With Crimea in need of investors, Mr. Marinichev believes that opening of Cryptocurrency exchanges will help to attract new investors to this region. For this to be successful, a free economic zone will have to be created within the peninsula. Mr. Marinichev also had this to say on regulation of Cryptocurrencies in Russia: Today Crimea is an exclusive economic zone, which makes it possible to start with the opening of Cryptocurrency exchanges operating there absolutely legally. As a result we will see the actual legalization of Cryptocurrencies.

The head of the Working Group For the Assessment of Risks of Cryptocurrencies in the state of Duma of the Russian Federation, Elina Sidorenko highlighted that using Cryptocurrency instruments for international transactions would improve the banking climate on the peninsula. There is truth to that sentiment because major players in the banking industry do believe that the blockchain technology, which is the technology behind cryptocurrency, is the future of global financial system.

There is a significant number of regions in Crimea, which are unbanked. Residents of these unbanked regions of Crimea now have good news because transactions involving digital currencies do not need banks to be validated. Cryptocurrencies are completely decentralized and the blockchain technology ensures that transactions are validated, hence detecting any fraudulent or unauthorized transactions. Alex Fork, CEO of Humaniq had this opinion on the unbanked regions: Unbanked regions usually consist of a financially poor population. the most important thing is to provide them with a new technology available absolutely free of charge.

There have been countries, mostly in the European union, that in recent times are trying to regulate digital currencies because of criminals using them to commitillegal operations. These unbanked regions provide a chance to experiment and finally make a sound decision regarding digital currencies. The residents of these unbanked regions also get a chance to enjoy the exciting advantages of cryptocurrencies. This move by Russia provides a win-win situation for both the regulator and the residents. Its always good news in the cryptocurrency world when a new country joins.

Read the rest here:
Cryptocurrency: Now in Crimea - Eastern Daily News

Posted in Cryptocurrency | Comments Off on Cryptocurrency: Now in Crimea – Eastern Daily News

Malware Alert! A Banking Email That Steals Cryptocurrencies … – newsBTC

Posted: at 2:53 pm

The cryptocurrency community is currently under threat! A new malware is reportedly making rounds on the internet, infecting computers and stealing cryptocurrency from compromised machines.

The yet to be named malicious software was detected by Cyren, the internet security company. According to the companys latest blog, published during the last week of January 2017, the malware disguises itself as an email communication from reputed banking institutions. These emails appear like fund transfer notifications, and they are found to originate from bots in the United States and Singapore. The attachment contained in these emails are embedded with a versatile keylogger malware.

The next time somebody receives an email from reputed banking institutions like Emirates NBD or DBS, they are better off not knowing what the attachment contains unless of course, they are sure about its authenticity. If the user ends up clicking on the malware-containing executable email attachment, the malware executes itself, creating a filename.vbs file in the Windows startup directory. Once the file is created, the attachment deletes itself.

Whenever the computer restarts, the saved .vbs file runs a script, executing the malware. The malware scours the computers registry for passwords and other sensitive information. It goes through the installed browsers and email clients, gathering stored information, usernames, passwords, browsing history, cache, cookies, etc. At the same time, it also looks for well-known cryptocurrency wallets on the computer.

Cyrens lists the vulnerable wallets on its blog,

Among the wallets it tries to find: Anoncoin, BBQcoin, Bitcoin, Bytecoin, Craftcoin, Devcoin, Digitalcoin, Fastcoin, Feathercoin, Florincoin, Freicoin, I0coin, Infinitecoin, Ixcoin, Junkcoin, Litecoin, Luckycoin, Megacoin, Mincoin, Namecoin, Phoenixcoin, Primecoin, Quarkcoin, Tagcoin, Terracoin, Worldcoin, Yacoin, and Zetacoin.

The infected machines stay vulnerable for a long time as the malware creates hooks for mouse and keyboard, logging every keystroke and mouse movement. Even if the software fails to find any sensitive data in the cache, it can easily capture usernames, passwords, etc., as and when it is typed and send it to the command and control server. This leaves the individuals accounts vulnerable to hacking.

Few media reports indicate that this particular malware was reported earlier in 2015 as well. At that time, it was distributed along with pirated video games. The extensive list of targeted cryptocurrencies and the convincing appearance of the email communication makes it much dangerous, capable of targeting a wider group of audience.

Go here to see the original:
Malware Alert! A Banking Email That Steals Cryptocurrencies ... - newsBTC

Posted in Cryptocurrency | Comments Off on Malware Alert! A Banking Email That Steals Cryptocurrencies … – newsBTC

The FBI is Worried Criminals Might Use the Private Cryptocurrency Monero – CoinDesk

Posted: at 2:53 pm

The privacy-focused digital currency monero has captured the attention of the Federal Bureau of Investigation (FBI), which has expressed concerns overits use among criminals.

Joseph Battaglia,a special agent working at the FBIs Cyber Division in New York City, said during an event last week that widespread use of the increasingly popular cryptocurrency might impact the way the agency conducts investigations.

Addressing a group of about 150 law students at New York's Fordham University, hesaid:

"There are obviously going to be issues if some of the more difficult to work with cryptocurrencies become popular. Monero is one that comes to mind, where its not very obvious what the transaction path is or what the actual value of the transaction is except to the end users."

Launched in April 2014, monero (XMR) is a cryptocurrency with enhancedprivacy features. A fork of the Bytecoin codebase, monero leverages identity-obscuring ring signatures to make it unclear which funds have been sent by whom and to whom.

The cryptocurrency saw its price soar in 2016, climbing from about $0.50at the beginning of the year to about $12, a 2,760%increase.

Since 2013, the agency has seen "enormous growth" in the number of cases involving digital currencypayments, according to Battaglia. Of those, 75% involved bitcoin, he said, though he mentioned litecoin and monero as other cryptocurrencies the agency has encounteredthus far.

TheFBI Cyber Division looks into a diverse range of online criminal activity.

In 2015, the agency reportedransomware losses of$18mfroma single type of software. Since at least last October, the agency has been investigating a $1.3m bitcoin theft tied to the hacking of theBitfinex exchange.

Battaglias statements came afterhis "high-level" account of a typicalcryptocurrency investigation given at theevent, which oneof a series of blockchain workshops co-hosted withIBM.

Other panelists included Brigid McDermott, vice president of blockchain business development at IBM; Dan Ramsden, a Fordham Business School adjunct professor; and Gregory Xethalis, a partner at law firmKaye Scholer.

Following the event, the special agent said he couldn't provide additional details specifically pertaining to the FBIs investigative techniques surrounding monero when asked by CoinDesk.

Duringthe panel, however, Battaglia described the FBI as "a reactionary organization", addingthat, instead of trying to predict the direction that cryptocurrency use might go, the agency has adopted await-and-see approach.

Battaglia concluded:

"Were going to look at what catches on, and what becomes mainstream, and then were going to keep an eye on that, because usually not long after that is when you start to see some of the fraud and some of the more nefarious uses of that technology."

Photo credit: Bruce Gilbert / Fordham University

CrimeFBIMonero

See original here:
The FBI is Worried Criminals Might Use the Private Cryptocurrency Monero - CoinDesk

Posted in Cryptocurrency | Comments Off on The FBI is Worried Criminals Might Use the Private Cryptocurrency Monero – CoinDesk