Bitcoin-Mining: Muss der Energieverbrauch reguliert werden ...

A Look at DCG & Bitfury's Incestuous Ties With the U.S. Government

Peter Todd Tweet in 2014: https://archive.is/vKZ9C
[email protected] I gotta say, looks really bad legally how Austin Hill's been negotiating deals w/ pools/etc. to get control of hashing power.
Board of Digital Currency Group
Glenn Hutchins
Advisory Board
Larry Summers
DCG of course is an investor in both Blockstream and BTCC.
DCG's money comes from:
DCG also owns Coindesk.
BTCC and Bitfury are the only two large mining pools who are outspoken in their support of Bitcoin Core.
The Bitfury Group Leadership to Present at Clinton Global Initiative (https://archive.is/MWKee)
Full Video (Begins at 32:00)
“The Bitfury Group is proud to be the world’s leading full service Blockchain technology company, we are deeply honored to represent this innovation to an audience of extremely dedicated game-changers, and we look forward to highlighting our company’s groundbreaking ‘Blockchain for global good’ work at such an important event, said Smith. “From the White House to the Blockchain, I know this technology has the power to deliver inclusion and opportunity to millions, if not billions, of people around the world and I am so grateful to work for a company focused on such a principled vision.”
Bitfury Lightning Implementation
  • In partnership with a French firm called ACINQ (http://acinq.co)
  • ACINQ is a subsidiary of the larger ACINQ Financial Services
  • CoinTelegraph: Bitfury Lightning Network Successfully Tested With French Bitcoin Company
  • TEAM: https://archive.is/Q5CNU
  • ACINQ’s US Headquarters is in Vienna, Virginia, a small town of only 16,000. Why would a global financial firm choose to locate here? -- Feeder community into Washington, D.C. Has an orange line metro stop. -- Located in Fairfax County, VA. -- The US Federal Government is the #2 largest employer -- Booz Allen Hamilton (NSA front company) is #6 largest employer -- In fact, most of the top employers in Fairfax County are either US Federal Gov’t or companies that provide services to Federal Government -- The county is home to the headquarters of intelligence agencies such as the Central Intelligence Agency, National Geospatial-Intelligence Agency, and National Reconnaissance Office, as well as the National Counterterrorism Center and Office of the Director of National Intelligence.
Chairman: Avinash Vashistha
CEO: Chaman Baid
CSO: Nandan Setlur
  • https://www.linkedin.com/in/nandansetlur https://archive.is/wp3L0
  • From 1986-1993 he worked for Information Management Consultants (imc) Ltd as a Technical Consultant with various federal government agencies. McLean, Virginia
  • 1993-2000 Technical Consultant for Freddie Mac, in McLean Virginia
  • From 2000-2007, President of InterPro Global in Maryland
  • From 2011-2012, Director of VibbleTV in Columbia, Maryland
  • From 2008-Present has been Executive Director at ACINQ and Managing Partner at Vine Management, both in Vienna, Virginia.
BitFury Enhances Its Advisory Board by Adding Former CFTC Chairman Dr. James Newsome and Renowned Global Thought Leader and President of the Institute for Liberty and Democracy Hernando de Soto (Businesswire)
Bitfury Board of Directors
Robert R Dykes
The other board members include two Bitfury founders, and an investor.
Bitfury Advisory Board
James Newsome
  • Ex-chairman of CFTC
  • Dr. Newsome was nominated by President Clinton and confirmed by the Senate to be at first a Commissioner and later a Chairman of CFTC. As Chairman, Newsome guided the regulation of the nation’s futures markets. Additionally, Newsome led the CFTC’s regulatory implementation of the Commodity Futures Modernization Act of 2000 (CFMA). He also served as one of four members of the President’s Working Group for Financial Markets, along with the Secretary of the Treasury and the Chairmen of the Federal Reserve and the SEC. In 2004, Newsome assumed the role of President and Chief Executive Officer of the New York Mercantile Exchange (NYMEX) where he managed daily operations of the largest physical derivatives exchange in the world. Dr. Newsome is presently a founding partner of Delta Strategy Group, a full-service government affairs firm based in Washington, DC.
Hernando de Soto
  • Hernando de Soto heads the Institute for Liberty and Democracy, named by The Economist one of the two most important think tanks in the world. In the last 30 years, he and his colleagues at the ILD have been involved in designing and implementing legal reform programs to empower the poor in Africa, Asia, Latin America, the Middle East, and former Soviet nations by granting them access to the same property and business rights that the majority of people in developed countries have through the institutions and tools needed to exercise those rights and freedoms. Mr. de Soto also co-chaired with former US Secretary of State Madeleine Albright the Commission on Legal Empowerment of the Poor, and currently serves as honorary co-chair on various boards and organizations, including the World Justice Project. He is the author of “The Other Path: the Economic Answer to Terrorism”, and his seminal work “The Mystery of Capital: Why Capitalism Triumphs in the West and Fails Everywhere Else.”
  • Frequent attendee at Davos World Economic Forum
  • Frequent Speaker @ Clinton Global Initiative http://www.dailymotion.com/video/x2ytfrs https://archive.is/MWKee
  • Criticisms: -- In his 'Planet of Slums'[104] Mike Davis argues that de Soto, who Davis calls 'the global guru of neo-liberal populism', is essentially promoting what the statist left in South America and India has always promoted—individual land titling. Davis argues that titling is the incorporation into the formal economy of cities, which benefits more wealthy squatters but is disastrous for poorer squatters, and especially tenants who simply cannot afford incorporation into the fully commodified formal economy. -- An article by Madeleine Bunting for The Guardian (UK) claimed that de Soto's suggestions would in some circumstances cause more harm than benefit, and referred to The Mystery of Capital as "an elaborate smokescreen" used to obscure the issue of the power of the globalized elite. She cited de Soto's employment history as evidence of his bias in favor of the powerful. https://www.theguardian.com/business/2000/sep/11/imf.comment http://www.slate.com/articles/news_and_politics/hey_wait_a_minute/2005/01/the_de_soto_delusion.html
Tomicah Tilleman
  • https://en.wikipedia.org/wiki/Tomicah_Tillemann
  • Dr. Tomicah Tillemann is Director of the Bretton Woods II initiative. The initiative brings together a variety of long-term investors, with the goal of committing 1% of their assets to social impact investment and using investments as leverage to encourage global good governance. Tillemann served at the U.S. State Department in 2010 as the Senior Advisor on Civil Society and Emerging Democracies to Secretary Hillary Clinton and Secretary John Kerry. Tillemann came to the State Department as a speechwriter to Secretary Clinton in March 2009. Earlier, he worked for the Senate Foreign Relations Committee, where he was the principal policy advisor on Europe and Eurasia to Committee Chairmen, Senators Joe Biden and John Kerry. He also facilitated the work of the Senate's Subcommittee on European Affairs, then chaired by Senator Barack Obama. Tillemann received his B.A. magna cum laude from Yale University. He holds a Ph.D. with distinction from the School for Advanced International Studies at Johns Hopkins University (SAIS) where he also served as a graduate level instructor in American foreign policy. http://live.worldbank.org/node/8468 https://archive.is/raDHA
  • Secretary Clinton appointed Tomicah Tillemann, Ph.D. as the State Department’s Senior Advisor for Civil Society and Emerging Democracies in October 2010. He continues his service under Secretary Kerry.
  • Mr. Tillemann and his team operate like venture capitalists, identifying ideas that can strengthen new democracies and civil society, and then bring together the talent, technology and resources needed to translate promising concepts into successful diplomacy. He and his team have developed over 20 major initiatives on behalf of the President and Secretary of State.
  • Mr. Tillemann came to the State Department as a speechwriter to Secretary Clinton in March 2009 and collaborated with her on over 200 speeches. Earlier, he worked for the Senate Foreign Relations Committee, where he was the principal policy advisor on Europe and Eurasia to Committee Chairmen, Senators Joe Biden and John Kerry. He also facilitated the work of the Senate's Subcommittee on European Affairs, then chaired by Senator Barack Obama. Mr. Tillemann’s other professional experience includes work with the White House Office of Media Affairs and five U.S. Senate and Congressional campaigns. He was a reporter with Reuters New Media and hosted a commercial radio program in Denver, Colorado. http://m.state.gov/md160354.htm https://www.newamerica.org/our-people/tomicah-tillemann/ https://archive.is/u2yF0
  • Director of “Bretton Woods II” initiative at New America Foundation Bretton Woods was an international summit that led to the creation of the IMF and the IBRD, one of five members of The World Bank
Jamie Smith
Jason Weinstein
Paul Brody (no longer appears on site, and his LinkedIn has no mention of Bitfury, but he is mentioned in a Press Release
  • https://www.linkedin.com/in/pbrody
  • Ernst & Young since 2015 as “Americas Strategy Leader”, “Global Innovation Leader”, and “Solution Leader”
  • Prior to E&Y, he was an executive at IBM since 2002
New America Foundation
Muskoka Group
[note: this is worthy of much more research]
  • https://www.bloomberg.com/news/articles/2016-08-29/blockchain-s-backers-embark-on-campaign-to-improve-its-image
  • Don Tapscott, co-author of the book “Blockchain Revolution,” hosted the meeting with his son and co-author Alex Tapscott at his family’s summer compound in Lake of Bays, Ontario. The group included some of blockchain’s biggest backers, including people with ties to IBM and JPMorgan. They considered ways to improve the governance and oversight of the technology behind the digital currency bitcoin as a way to fuel the industry’s growth. They included Jim Zemlin, executive director of the Linux Foundation; Brian Behlendorf, executive director of the Hyperledger Project, a blockchain supporter group that includes International Business Machines Corp., Airbus Group SE and JPMorgan Chase & Co.; and Ana Lopes, board member of the World Wide Web Foundation. Participants with blockchain industry ties include former deputy White House press secretary Jamie Smith, now chief global communications officer of BitFury Group Ltd., and Joseph Lubin, founder of startup Consensus Systems.
Blockchain Delegation Attends Democratic National Convention https://archive.is/k16Nu
Attendees:
Jamie Smith — The Bitfury Group & Blockchain Trust Accelerator Tomicah Tillemann— New America Foundation & Blockchain Trust Accelerator Alex Tapscott— co-author: Blockchain Revolution Brian Forde — MIT, Digital Currency Initiative
Brian Forde
  • Was the founding director of the MIT Digital Currency Initiative -Left his 4 year post as White House Senior Advisor for Mobile and Data Innovation to go directly to the MIT DCI
  • Brian Forde has spent more than a decade at the nexus of technology, entrepreneurship, and public policy. He is currently the Director of Digital Currency at the MIT Media Lab where he leads efforts to mainstream digital currencies like Bitcoin through research, and incubation of high-impact applications of the emerging technology. Most recently he was the Senior Advisor for Mobile and Data Innovation at the White House where he spearheaded efforts to leverage emerging technologies to address the President’s most critical national priorities. Prior to his work at the White House, Brian founded one of the largest phone companies in Nicaragua after serving as a business and technology volunteer in the Peace Corps. In recognition of his work, Brian was named a Young Global Leader by the World Economic Forum and one of the ten most influential people in bitcoin and blockchain. https://www.linkedin.com/in/brianforde https://archive.is/WjEGU
Alex Tapscott
World Economic Forum
  • Strategic Partners: https://www.weforum.org/about/strategic-partners
  • Includes Accenture (See Avinash Vashistha), Allianz, Deloitte (Scaling Bitcoin platinum sponsor, Blockstream Partner), Citigroup, Bain & Company (parent of Bain Capital, DCG investor), Dalian Wanda Group (working on blockchain technology), Ernst & Young (see Paul Brody), HSBC (Li-Ka Shing, Blockstream investor, used to be Deputy Chairman of HSBC), IBM, KPMG International, Mastercard (DCG Investor), PwC (Blockstream partner, also sponsor of Scaling Bitcoin)
  • Future of Financial Services Report [PDF] The word “blockchain” is mentioned once in this document, on page 23 (http://i.imgur.com/1SxyneJ.png): We have identified three major challenge areas related to innovation in financial services that will require multi-stakeholder collaboration to be addressed effectively. We are launching a project stream related to each area, with the goal of enabling tangible impact.... Decentralised systems, such as the blockchain protocol, threaten to disintermediate almost every process in financial services
  • The Steering Group who authored the report is a who’s who of the global financial elite. (Pages 4 & 5) http://i.imgur.com/fmYc1bO.png http://i.imgur.com/331FaX6.png
Bitfury Washington DC Office
Washington DC Office 600 Pennsylvania Avenue Suite 300 Washington, D.C. 20003
http://bitfury.com/contacts https://archive.is/ugvII
Bitfury Chosen for Ernst & Young Blockchain Startup Challenge
Deloitte Unveils Plan to Build Blockchain-Based Digital Bank http://www.consultancy.uk/news/12237/deloitte-unveils-plan-to-build-blockchain-based-digital-bank https://archive.is/UJ8Q5
submitted by 5zh8FoCiZ to btc [link] [comments]

Why the NSA revelations make me worried about the safety of Bitcoin

This has probably been discussed before, but I don't see how Bitcoin can be a safe method of storing wealth, given our current situation where the NSA observes EVERYTHING. Not just that, the NSA has installed backdoors in nearly all of our hardware. Both Intel and AMD processors likely have hardware backdoors for the NSA.
Back in 2010, the NSA broke a variety of cryptographic standards. In addition, we know that the NSA has lobbied organizations to implement weak cryptographic standards. Furthermore, we know that the NSA has pushed for flawed random number generators. Weak random number generators have previously led to the theft of large numbers of Bitcoin on mobile devices.
Bitcoin completely relies on the integrity of the SHA-256 algorithm, which was developed by the SAME NSA that intentionally pushes flawed cryptographic standards. Bruce Schneier no longer trusts the NSA's elliptic curve cryptography standard, as he believes they may have intentionally chosen a weak elliptic curve that the NSA can use. The numbers used are supposed to be random to make it unlikely that anyone could exploit a weak curve, but the NSA provided different numbers, that are non-random.
Vitalik Buterin argues that we can expect Bitcoin not to use a weak curve, as the numbers used in Bitcoin are fairly simple to calculate, whereas arbitrary numbers would create the possibility of Satoshi using an intentionally weak curve.
However, it seems to me that we can argue the exact opposite as well. For p, Bitcoin uses 115792089237316195423570985008687907853269984665640564039457584007908834671663, which is arrived at by calculating 2256 – 232 – 977 and seems fairly arbitrary to me as well.
Perhaps the main cause of my worries is the fact that the NSA in 1996 created a document outlining how to make a digital currency based on cryptography. Thus we know that the NSA has been studying the possibility of cryptocurrencies for a long period. Considering how the NSA manages to keep control over cryptography by releasing weak standards itself, is it possible that the NSA attempts to do the same with cryptocurrency?
Finally, I'm very worried about who this anonymous hacker who calls himself Satoshi Nakamoto might be. The Bitcoin source code contained different incomplete ideas that were never implemented, such as a decentralized marketplace (this is from memory, can't find the link). It all seems very ambitious to be the product of a single individual.
What is most worrying about Satoshi Nakamoto however is what is found in the blockchain. There's a non-random distribution of nonces in the early blockchain. What this means is that Satoshi Nakamoto was mining Bitcoin with a mining rig that was completely different from what everyone else was using back then.
It seems that he used 58 different computers, all with a different ID and all programmed to use different nonces to avoid checking the same possible solution multiple times, and at some point some of the computers broke down and were not put back up. This is not a genius amateur, but rather, someone with access to a lot of equipment. What makes all of this worse, is the fact that most of these blocks appear never to have moved. In other words, whatever entity mined these blocks probably still has control over them and doesn't seem to be motivated by personal gain. Rather, their control over about 1 million Bitcoin seems to have created a kind of "deathswitch", that allows them to crash the market at will.
Finally, Nakamoto's behavior is strange. As noted by others, his timezone seems to indicate he lived on the West Coast, yet his language uses British spelling. Furthermore, he took up to two weeks to respond to comments, indicating that anything he said seemed to require approval from higher ups, or agreement among multiple persons.
In conclusion, there is nothing here that indicates to me that we are dealing with a project designed by a regular Joe. Instead, we seem to be sitting on a ticking time bomb, a ten billion dollar experiment that could be deflated at will and cause economic chaos in the process.
submitted by accountt1234 to Bitcoin [link] [comments]

Reasons to believe Julian Assange is in CIA custody and WikiLeaks under duress.

UPDATE (11/01/2017 - UK Date Format): Julian Assange is alive and still in the Embassy. He confirms WikiLeaks has not been compromised. Julian took questions from the Reddit AmA but answered them via live, current and interactive video. He did this very intentionally, and by so doing, was true to his word. Watch a recording of the live event here:
https://www.youtube.com/watch?v=rC2EjKYMCeg
On the 26th of September 2016 Secretary of State John Kerry (self admitted Skull and Bones member) visited Colombia. WikiLeaks reported that inside sources had confirmed that John Kerry also met with Ecuadorean President Rafael Correa in Ecuador to personally ask Ecuador to stop Assange from publishing documents about Clinton. This was initially fervently denied in the press only later to be confirmed by the Ecuadorian embassy who admitted cutting off Julian’s internet due to pressure from the US. Ecuador wanted to appear impartial.
For over four years, the Ecuadorian embassy has been under surveillance and Julian's human rights violated as he has been unlawfully detained termed "illegal arbitrary detention" by a recent UN ruling. During that time, it has been possible for intelligence agencies to gather critical information and build a detailed profile and plan to circumvent Julian's dead man's switch.
Both John Kerry and US intelligence agencies know perfectly well that cutting off Julian's internet would have no impact on the release of the leaked emails that are damaging to Hillary's campaign. It has been very clear for a long time that many US officials wanted Julian Assange dead, Hillary Clinton even has remarked, "can't we just drone the guy".
The cutting off of Julian's internet access was not for the purpose of preventing the leaks of the Podesta and Hillary emails. Unless intelligence agencies are truly inept, they know that media organisations already have the entire leaked email database and a schedule for release, they also know WikiLeaks staff would continue to leak regardless of Julian's ability to communicate.
Removing Assange would not be enough, they would need to circumvent his dead man's switch and then tarnish WikiLeaks reputation. Removing Assange's internet could have the effect of causing Assange to take steps that can be followed to prevent the automatic triggering of his DMS.
From the day Julian's internet was cut off, a series of peculiar and uncharacteristic events started to take place. The same day that Julian's internet was cut off, CBS reported that Pamela Anderson visited Assange and had "Tortured" him with a vegan sandwich. A few days before on the 14th, John Podesta tweeted "I bet the lobster risotto is better than the food at the Ecuadorian Embassy". Then on October the 16th the SHA-256 prerelease keys were issued on WikiLeaks twitter feed, although these events are odd and seemingly inconsequential, combined with John Kerry being in the UK from the 16th to the 17th sparked concern among the community for Julian's safety.
Assange supporters started to gather at the embassy to keep Assange safe and witness any foul play, some of these witnesses have claimed that a very swift police armed raid took place that lasted only 5 minutes while the crowd was kept under control and prevented from approaching, there have also been reports that they were prevented from taking photographs and that their phones were confiscated. A live periscope feed was also cut off. There have also been some reports of the presence of a mobile jamming van.
If Assange has been seized, any recognition by mainstream media would be detrimental to Hillary's campaign. A covert operation with media blackout would be the only effective way of seizing him at this time. On October the 18th Fox News said that Julian Assange would be "arrested soon, maybe in a matter of hours.". The was video was then promptly removed and articles relating to it have disappeared. However, one reddit user was able to find an alternative source and now the video can be found again on YouTube.
Although Julian's primary DMS (the release of insurance file encryption keys) did not activate, on October the 18th one of Julian's contingencies did activate, a script was activated that made https://file.wikileaks.org/file publicly visible and set all the file date and time stamps to 01/01/1984 (Orwell reference). This file repository contains many documents that had not been released prior.
Staffers Kristinn Hrafnsson and Sarah Harrison, have gone silent while the Ecuadorian embassy is refusing to provide any updates on Assange’s fate. There is a recorded call made to the embassy by a journalist where the receptionist refused to confirm that Julian was at the embassy, she also refused to confirm that Julian was even alive. Julian has not made an appearance at the window of the embassy since being cut off.
WikiLeaks suggested in a tweet that its supporters were responsible for the DDOS attacks on the 21st. Neither Assange or WikiLeaks would ever insinuate such a thing. WikiLeaks deceptively tweeted a video of Michael Moore that was actually recorded in June. The video was posted on the 24th of October giving the impression that Michael Moore had been speaking with Assange in the embassy. Why would WikiLeaks do this when they know they are already under suspicion?
WikiLeaks have been using their Twitter account to give the appearance of his safety while providing no concrete evidence of his safety. They issued a poll asking what proof would satisfy the public that Julian was safe. WikiLeaks have yet to follow up on the conclusive result of a video or window appearance.
Julian Assange is known for his attention to detail and his consistently good spelling and grammar. Currently the twitter feed has very poor spelling, there are numerous uncharacteristic spelling errors, for example, an accomplished cryptographer knows how to correctly spell algorithm and so do WikiLeaks staff.
On the 21st of October, there was a massive widespread DDOS attack that disrupted US and EU internet. Also on the 21st of October London City Airport was evacuated. The next day (the 22nd), Gavin MacFayden is reported dead. WikiLeaks made a further blunder by stating his death as the 23rd.
There has been a number of high level WikiLeaks deaths recently too. John Jones QC - WikiLeaks U.N. lawyer died on April 16th 2016. Michael Ratner - WikiLeaks chief counsel died on May 11th 2016. Seth Rich - Employee of the Democratic National Committee (DNC) was fatally shot on July 10th 2016 and Gavin MacFadyen - WikiLeaks director died October 22nd 2016.
If WikiLeaks has been compromised, it is already preparing the scene for future discrepancy to seriously tarnish WikiLeaks reputation. Nothing WikiLeaks has shared since the 15th of October 2016 should be trusted until Julian has been fully verified as alive.
My speculative fears are that Julian has been seized and removed from the Embassy. His internet being cut not being related to the release of the emails, but rather as a component of a plan of 4 years in the making to as secretly as possible remove Assange from the embassy, circumvent his DMS and hijack WikiLeaks with the key team members silenced or under duress.
My fears would be confirmed by no future public (mass witnessing and recorded/televised) appearance of Julian Assange discussing recent topics. His death by whatever means after the US presidential election would be extremely suspect. Until proof of life, assume the following compromised:
SHA-256 verification Keys posted after the 15th. WikiLeaks submission process and/or platform. WikiLeaks twitter feed. Any WikiLeaks leaks after the 15th October 2016.
EDIT: (01/11/2016 - 17:18GMT) URL and spelling corrections.
EDIT: Update 16/12/2016
Why demanding proof that WikiLeaks is not compromised is necessary:
https://www.facebook.com/events/309760466089922/ (PoL Event @ Ecuadorian Embassy London 17th December 2016) – If you live in the UK please come and let’s get REAL PoL. Please circulate.
1) Still no PGP (GPG) signed short message from WikiLeaks. 2) RiseUp’s warning canary may be dead (RiseUp is believed to host WL Twitter email account) 3) Julian’s internet hasn’t been restored as promised 4) The pre-commitment file hashes released in October do not match the released insurance files 5) Julian’s Swedish defense lawyer Per Samuelson was denied access during case questioning. No one actually saw Julian through the whole process.
Additional points:
-UK disregard for international law -Capabilities of combined intelligence agencies -WikiLeaks down on October 17th -Mass censorship -WikiLeaks reposting old stuff -See timelines below
Various timelines, some with minor errors: https://www.reddit.com/WikileaksTimeline/wiki/index https://www.reddit.com/WhereIsAssange/comments/5dmr57/timeline_of_events_regarding_julian_assange_and/ https://regated.com/2016/11/julian-assange-missing/
[Still no PGP (GPG) signed short message from WikiLeaks] Watch this https://youtu.be/GSIDS_lvRv4 video for a simple and good explanation of public/private key cryptography. Here https://riseup.net/en/canary is an example of how a legitimate cryptographically capable organisation uses PGP to sign a message and prove authenticity. WikiLeaks has this setup too. Why do they not use it and prove they are not compromised?
WikiLeaks could easily do this. They have their private key. The public has WikiLeaks public key. Even if Julian isn’t in possession of the key, WL most certainly is, no excuse for WL not to prove themselves. This has been heavily requested of WikiLeaks. I’d like to hear from the individuals who claim that their requests were removed (please leave comments). Of all the red flags, not posting a PGP signed message is by far the most damming. If we are to believe that the person in the audio recording at the FCM 2016 is Julian Assange, then what he says about the keys is missing the point. If he himself is not in possession of the key, then WikiLeaks will be. If WikiLeaks use the key to prove themselves, then we know they are not compromised. By extension, we will also be assured that Julian is safe as an uncompromised WikiLeaks would be in a position to confirm his safety and be believed. This audio file includes everything that he says regarding PGP keys: http://picosong.com/UyVw/ (I am not convinced this is Julian).
[RiseUp’s warning canary may be dead (RiseUp is believed to host WL Twitter email account)] RiseUp is an activist ISP providing secure services to activists. Its mission is to support liberatory social change via fighting social control and mass surveillance through distribution of secure tools (https://en.wikipedia.org/wiki/Riseup). RiseUp use a warrant canary as a means to protect their users in case RiseUp are ever issued with a NSL or gag order etc (https://riseup.net/en/canary). This is renewed quarterly, assuming no warrant has been issued. However, this is now considerably overdue so the assumption is that the canary is dead, and just like the canaries used in coal mines, everyone should get the hell out of there when it dies. https://theintercept.com/2016/11/29/something-happened-to-activist-email-provider-riseup-but-it-hasnt-been-compromised/. I would be grateful if someone could provide a source for the WikiLeaks twitter email account being hosted by RiseUp.
[Julian’s internet hasn’t been restored as promised] https://twitter.com/wikileaks/status/787889195507417088 https://twitter.com/wikileaks/status/788099178832420865 On the 26th of September 2016 Secretary of State John Kerry visited Colombia. WikiLeaks reported that inside sources had confirmed that John Kerry also met with Ecuadorean President Rafael Correa in Ecuador to personally ask Ecuador to stop Assange from publishing documents about Clinton. This was initially fervently denied in the press only later to be confirmed by the Ecuadorian Embassy who admitted cutting off Julian’s internet due to pressure from the US. Ecuador wanted to appear impartial.
Both John Kerry and US intelligence agencies knew perfectly well that cutting off Julian's internet would have no impact on the release of the leaked emails that were damaging to Hillary's campaign. The cutting off of Julian's internet access was not for the purpose of preventing the leaks of the Podesta and Hillary emails. Unless intelligence agencies are truly inept, they knew that media organisations already have the entire leaked email database and a schedule for release, they also knew WikiLeaks staff would continue to leak regardless of Julian's ability to communicate.
Now it is long after the election and Ecuador have still not restored Julian’s internet. Ecuador have no grounds to continue to restrict Julian’s internet. It does nothing apart from increase tensions and raise suspicion. Ecuador have always been supportive of Julian. However, after John Kerry applied pressure on Ecuador, that whole dynamic changed. Ecuador cut Julian's Internet. He then essentially threatened Ecuador, the UK and John Kerry by submitting those pre-commitment file hashes on Twitter. Since then we have only seen hostility towards Julian from all three parties. Ecuador didn't restore his internet and didn't let his lawyer interview him and no one actually saw him. The U.K. Denied him access to Gavin's funeral and denied him access to medical treatment. The UK also continually disregard the UN. The dynamic now is totally different. He has no political friends. It seems that both the UK and Ecuador are now working against Julian and Wikileaks. An environment where a collaborated siege would be feasible.
Finally, many have speculated about mobile signals being blocked at the Embassy. I can confirm that there is 4G signal right outside the Embassy door. I was there, with my phone, and tested it. There is no reason to think Julian cannot use a MiFi device (or similar) connected to a cellular network.
[The pre-commitment file hashes released in October do not match the released insurance files] Here are the October tweets with the file hashes:
https://twitter.com/wikileaks/status/787777344740163584 https://twitter.com/wikileaks/status/787781046519693316 https://twitter.com/wikileaks/status/787781519951720449
These 3 pre-commitment Twitter posts are SHA-256 file hashes. SHA-256 file hashes are 64 characters long. They are not encryption keys for insurance files. They simply are a mathematical formula for verifying that later released files are genuine and have not been altered.
These hashes were released because Julian felt threatened and in increased danger. They specifically targeted the UK FCO, Ecuador and John Kerry. All of whom are key players in his current predicament. On November 7th, WikiLeaks released 3 new insurance files. These files names match the names given in the pre-commitment hash tweets:
2016-11-07_WL-Insurance_EC.aes256 2016-11-07_WL-Insurance_UK.aes256 2016-11-07_WL-Insurance_US.aes256
EC = Ecuador, UK = UK FCO, US = John Kerry. Soon after these files were released, the 3 files hashes were compared to the 3 hashes posted on the 16th of October. They did not match. When this was brought to WikiLeaks attention, WikiLeaks released the following statement in a tweet: https://twitter.com/wikileaks/status/798997378552299521
“NOTE: When we release pre-commitment hashes they are for decrypted files (obviously). Mr. Assange appreciates the concern.”
This firstly proved that the hashes and the insurance files were related (a fact that was already clear). Secondly, it was a lie, as it implied historical use of pre-commitment hashes in this manner. Thirdly, the (obviously) comment was also a deception and an insult to supporters. It was not obvious to anyone, not even to our crypto guys in /cryptography/, on the contrary, they thought it highly suspicious. Additionally, what they suggest would be absolutely pointless. Pointless as a threat, as the UK, Ecuador and John Kerry would have no practical way of identifying the documents to confirm the threat. There's absolutely no scenario where an uncompromised WikiLeaks would either post bad file hashes or altered insurance files.
[Julian’s Swedish defense lawyer Per Samuelson was denied access during case questioning] This is highly unusual and very suspicious. Also, Jennifer Robinson was not in the room with Assange. https://www.youtube.com/watch?v=MYR0Pw9LfUQ&feature=youtu.be&t=9m55s and neither was the chief prosecutor http://www.bbc.co.uk/news/world-europe-37972528 “Swedish chief prosecutor Ingrid Isgren will not speak to Mr Assange directly”.
[UK disregard for international law] The UK threat is very real. Back in August 2012 the UK was poised to break international law citing the Diplomatic and Consular Premises Act of 1987 as a basis for entering the Embassy and arresting Assange (http://www.bbc.co.uk/news/world-19259623). It all became very public, very quickly and fortunately never happened (http://www.telegraph.co.uk/news/worldnews/southamerica/ecuado9488996/Ecuadors-president-raiding-embassy-to-snatch-Julian-Assange-suicidal.html). I expressed my concern at the time that the UK shouldn’t have even been contemplating such action, let alone threatening it in writing to Ecuador. More recently, the UK disregarded the UN ruling that Julian Assange was being arbitrarily detained (https://www.theguardian.com/media/2016/feb/04/julian-assange-wikileaks-arrest-friday-un-investigation). The UK appealed, and then finally lost their appeal in November (https://www.rt.com/news/368746-un-ruling-free-assange/). Julian has also been refused to leave the Embassy with a police escort for medical treatment as well as denied to attend Gavin MacFadyen’s funeral. The UK’s behaviour is appalling and clearly has no respect for international law. The reported raid on the Embassy during the latter part of October seems more plausible when taken in the context of past behavior.
This is the Britain I now live in: http://www.independent.co.uk/life-style/gadgets-and-tech/news/investigatory-powers-bill-act-snoopers-charter-browsing-history-what-does-it-mean-a7436251.html. I never used to be ashamed to be British.
[Combined capabilities of intelligence agencies] We know much about the combined powers of the intelligence agencies. We know what they are capable of, thanks to the leaks of Edward Snowden. The combined powers of the NSA, CIA and the UK’s GCHQ are capable of pulling off such a massive takeover of Wikileaks. We know the NSA works with other US intelligence agencies, we know that the NSA works with GCHQ.
We know about Tempora, we know about JTRIG, we know about PRISM, we know about HAVOK. We know that websites can be altered on the fly, we know that real-time voice profiling is trivial for these agencies. We know that censorship is happening.
https://usnewsghost.wordpress.com/2014/07/15/new-july-14-edward-snowden-nsa-leaks-gchq-attacks-and-censors-internet-nsa-leaks-recent/ http://www.independent.co.uk/life-style/gadgets-and-tech/gchqs-favourite-memes-and-sexual-slang-reveals-a-shared-culture-with-trolls-and-hackers-9608065.html https://en.wikipedia.org/wiki/Tempora https://en.wikipedia.org/wiki/PRISM_(surveillance_program)
The NSA has a remit to be 10 years ahead of the curve. We have commercial products that can be purchased off the shelf today that can easily manipulate audio and video. Just imagine what the NSA and the military are capable of.
Real time facial manipulation: https://www.youtube.com/watch?v=ohmajJTcpNk Signs of editing: https://www.youtube.com/watch?v=2O9t_TEE1aw. Both Julian Assange and John Pilger are not filmed together at any time during the interview. There is also no establishing shot. It is also claimed that Assange’s audio is spliced and edited. No recent events mentioned by Assange, only Pilger. Unfortunately, this interview is not sufficient proof of life.
What the NSA can’t do, is that they cannot break PGP encryption. This has been expressed by Glenn Greenwald who was one of the journalists that Edward Snowden leaked to. He commented that he knows how secure PGP is because the NSA keep moaning about not being able to crack it in their documents he is reading. This is another reason why a signed PGP message can be the only true proof that WL isn’t compromised. Mathematics cannot lie, people can and do. A compromised WL can’t sign a message without the private key. Edward Snowden revealed that in 2013 the NSA were capable of 3 trillion password attempts per second. As it is now almost 2017, that number will likely be multiple times higher (anywhere between 9 to 15 trillion attempts per second would be my guess based on Moore’s law).
https://en.wikipedia.org/wiki/Joint_Threat_Research_Intelligence_Group https://en.wikipedia.org/wiki/Tempora https://en.wikipedia.org/wiki/PRISM_(surveillance_program) https://www.schneier.com/gchq-catalog/ https://en.wikipedia.org/wiki/Government_Communications_Headquarters
[WikiLeaks down on October 17th] The alleged raid on the Embassy supposedly took place on the 17th just after 1am GMT. On Monday the 17th of October 2016 WikiLeaks website was reported down (http://www.isitdownrightnow.com/wikileaks.org.html expand the comments) https://postimg.org/image/6t68fe4kj/. The internet was alive with reports of mass censorship around this time. This all coincides with when the alleged WikiLeaks takeover occurred. It also coincides with John Kerry being in the UK.
[Christine Assange audio only radio interview] Julian's family had their identities changed quite a few years ago after receiving death threats. It is odd that his mother has now revealed herself to a news agency. If you do a YouTube search for Christine Assange (her original name), you'll find all the videos are older than 3 years. She's in hiding, not openly talking on radio shows (https://en.wikipedia.org/wiki/Julian_Assange scroll down to the personal life section).
[WikiLeaks bitcoin account was emptied on the 18th of November] Interestingly it was after the bitcoin account was emptied that the encoded message in the blockchain was left. Why would WikiLeaks go to all that trouble when they could just sign a message with their PGP key? Is it because bitcoin accounts can be cracked and the PGP keys can’t?
[Mass censorship] Facebook is censoring this event (https://www.facebook.com/events/309760466089922/). It has been advertised for weeks now any only a handful of people are attending. Recently Wikileaks was live on FB. 50% of the viewers (roughly 2.5k) were commenting #PoL, #Whereisassange, RIP etc. The live event was only a prerecorded video being played in loop. Once it concluded, the whole Live event along with all the comments including the comments asking for PoL and PGP signed message were deleted. It was as if it never took place. When Julian’s DMS had supposedly been activated, I saw posts in threads being deleted within minutes. Supposedly with encryption keys, but it all happened too fast for anyone to collate. I took PDF printouts of the pages and then later noticed that posts and entire links were taken down. I have PDF's of pages that now no longer exist. I've been following this since mid-October and seen the censorship first hand. I know many people here on reddit witnessed the same (please comment with your experiences).
[WikiLeaks reposting old stuff] There are many examples of this already mentioned in the timelines. One for example is the Palantir Technologies report. Palantir Technologies prepared a report on how to destroy WikiLeaks that was leaked in 2011. The proposal was submitted to Bank of America through its outside law firm, Hunton & Williams. Palantir later apologised for their involvement. But WikiLeaks has recently regurgitated it as if it was new. There are many examples of this. I have watched as WikiLeaks have increasingly destroyed their credibility.
submitted by neonnexus to conspiracy [link] [comments]

Bitcoin Civil War (the bright sides)

It will be interesting to see how the next couple of months play out. Whatever happens, there are a couple of positive sides to the situation.
For one, we will see if it is possible to change the rules of the Bitcoin network even against considerable resistance.
The Japanese Constitution has never been amended. But it is very clear what is necessary to amend it. Article 96 of the Constitution states the requirements.
The Bitcoin network has never been challenged by an internal faction in the way it is now. In contrast to the Japanese Constitution, it is not very clear what is needed to push through the block size extension the Bitcoin Unlimited camp wants.
So if they succeed in their attempt, we will have a reference case what is needed to change the protocol against substantial resistance. If they fail, we will have a reference case as well, showing that the failed level of support was not enough.
This civil war will also be an interesting case to study when preparing for war with outside attackers. There has been speculation about "51%-attacks" before. But as far as I know, no one has ever actually pulled off a 51%-attack against the Bitcoin network.
In the course of this civil war, that may change. I hear that Peter Rizun, one of the supporters of Bitcoin Unlimited, is advocating for using hash power to shut down the original Bitcoin chain after a fork, mining empty blocks on that chain.
If that happens, that would be an excellent test case. A highly motivated, well-funded adversary trying to shut down the Bitcoin blockchain has not happened yet in real life.
If such an attack happens, and the Bitcoin blockchain survives it one way or another, that would be real-life proof of its resiliency.
Since all of the value of the Bitcoin blockchain comes from this resiliency against attack and the trust created, surviving such a test would be proof of its value. An eight year track record of unbroken service is valuable, but extending it defeating serious attacks shows even more value.
All cryptography has value only as far as people actually try to break it and fail (Schneier's law). It follows that attacks on the Bitcoin network like the one Rizun wants to happen are a good thing.
We also may get a short-term increase in block space (if the Bitcoin Unlimited faction wins the civil war).
Again, interesting times for the Bitcoin network.
submitted by Karl-Friedrich_Lenz to btc [link] [comments]

Quantum Conspiracy

This is not reality changing quantum computing meta-science / Mandela Effect / parallel universes bull.
The following is at least trying to be factual
I some information for you of which you may not be aware, as well as speculation related to such events.
Here is the gist...
TIMELINE
May 11th: WannaCry ransomware was released into the public.
May 15th: A small flurry of news articles on websites about quantum computation not effecting RSA encryption showed up.
June 13th: IOTA is added to the bitfinex exchange.
June 14th: Quantum market value passes 5 billion. Through D-Wave and IBM-Q
June 25th: The Petya ransomware released.
June 27th: A second test revision of the Petya ransomware released as NotPetya.
July 3rd or 4th: We will see. (This is only speculation.)
WHAT YOU NEED TO KNOW
The WannaCry ransomware is a private sector project disguised as a ransomware. The Petya ransomware is a revision of this project with some fixes re-released for testing. NotPeta was released shortly after, so that it was not as noticeable over the current threat.
IOTA is a cryptocurrency that you should probably put some money into, it will be important later. It is not generated via mining. It is does not have a blockchain. It is quantum computationally proof by design. It is currently worth more than 1 billion USD, becoming the 8th largest traded cryptocurrency in 14 days.
The major project is a programming project with the following goals.
@ This might be an attempt by combined forces to create a viral remote administration tool.
@ The active function of this secret tool would be primarily benign malicious. With goal to install this on as many internet of things devices, cellphones, and computers as possible in order to steal an unnoticeable amount of CPU and GPU resources (1%), from computers that stay idle for more than 6 hours. Effectively a world wide zombie botnet.
@ Here is the list of currently involved entities: TPTB, Google, D-Wave Systems, Microsoft, Intel, IBM, CERN, Cisco, CERT, a counter-collective group of approximately 2,200 people with backgrounds in information security, cryptography, mathematics, and quantum physics.
REVELATIONS
This is very important so listen.
@ I feel this is to use this computing power, piping it into the Google network in order to mask the internet traffic as legitimate.
@ These computing resources are being used to assist Google Deepmind in order to finish a computation project that when successful will result in artificially generated design for a cold operating quantum computer, possibly through carbon computation.
@ IOTA may have known about this project in advance. Developing a quantum proof cryptocurrency in order to capitalize from the downfall of other cryptomarkets. IOTA also is working in a very short timescale, implementing smart contracts to automate transactions over internet of things devices, presumably to prevent them from becoming idle.
@ After the project is complete, I assume TPTB will be able to effectively break nearly all encryption, and then all hell will break lose.
CAVEATS
@ I am not saying you should not drop all your bitcoin, because the timescale for this will be a few years. However, just keep in mind I feel this coming. If it is, there is nothing we can do.
submitted by SoaringMoon to conspiracy [link] [comments]

Why demanding proof that WikiLeaks is not compromised is necessary

UPDATE (11/01/2017 - UK Date Format): Julian Assange is alive and still in the Embassy. He confirms WikiLeaks has not been compromised. Julian took questions from the Reddit AmA but answered them via live, current and interactive video. He did this very intentionally, and by so doing, was true to his word. Watch a recording of the live event here:
https://www.youtube.com/watch?v=rC2EjKYMCeg
Why demanding proof that WikiLeaks is not compromised is necessary: https://www.facebook.com/events/309760466089922/ (PoL Event @ Ecuadorian Embassy London 17th December 2016) – If you live in the UK please come and let’s get REAL PoL. Please circulate.
1) Still no PGP (GPG) signed short message from WikiLeaks.
2) RiseUp’s warning canary may be dead (RiseUp is believed to host WL Twitter email account)
3) Julian’s internet hasn’t been restored as promised
4) The pre-commitment file hashes released in October do not match the released insurance files
5) Julian’s Swedish defense lawyer Per Samuelson was denied access during case questioning. No one actually saw Julian through the whole process.
Additional points: - UK disregard for international law
Various timelines, some with minor errors:
https://www.reddit.com/WikileaksTimeline/wiki/index
https://www.reddit.com/WhereIsAssange/comments/5dmr57/timeline_of_events_regarding_julian_assange_and/
https://regated.com/2016/11/julian-assange-missing/
[Still no PGP (GPG) signed short message from WikiLeaks]
Watch this https://youtu.be/GSIDS_lvRv4 video for a simple and good explanation of public/private key cryptography. Here https://riseup.net/en/canary is an example of how a legitimate cryptographically capable organisation uses PGP to sign a message and prove authenticity. WikiLeaks has this setup too. Why do they not use it and prove they are not compromised?
WikiLeaks could easily do this. They have their private key. The public has WikiLeaks public key. Even if Julian isn’t in possession of the key, WL most certainly is, no excuse for WL not to prove themselves. This has been heavily requested of WikiLeaks. I’d like to hear from the individuals who claim that their requests were removed (please leave comments). Of all the red flags, not posting a PGP signed message is by far the most damming.
If we are to believe that the person in the audio recording at the FCM 2016 is Julian Assange, then what he says about the keys is missing the point. If he himself is not in possession of the key, then WikiLeaks will be. If WikiLeaks use the key to prove themselves, then we know they are not compromised. By extension, we will also be assured that Julian is safe as an uncompromised WikiLeaks would be in a position to confirm his safety and be believed. This audio file includes everything that he says regarding PGP keys: http://picosong.com/UyVw/ (I am not convinced this is Julian).
[RiseUp’s warning canary may be dead (RiseUp is believed to host WL Twitter email account)]
RiseUp is an activist ISP providing secure services to activists. Its mission is to support liberatory social change via fighting social control and mass surveillance through distribution of secure tools (https://en.wikipedia.org/wiki/Riseup).
RiseUp use a warrant canary as a means to protect their users in case RiseUp are ever issued with a NSL or gag order etc (https://riseup.net/en/canary). This is renewed quarterly, assuming no warrant has been issued. However, this is now considerably overdue so the assumption is that the canary is dead, and just like the canaries used in coal mines, everyone should get the hell out of there when it dies. https://theintercept.com/2016/11/29/something-happened-to-activist-email-provider-riseup-but-it-hasnt-been-compromised/. I would be grateful if someone could provide a source for the WikiLeaks twitter email account being hosted by RiseUp.
[Julian’s internet hasn’t been restored as promised]
https://twitter.com/wikileaks/status/787889195507417088 https://twitter.com/wikileaks/status/788099178832420865
On the 26th of September 2016 Secretary of State John Kerry visited Colombia. WikiLeaks reported that inside sources had confirmed that John Kerry also met with Ecuadorean President Rafael Correa in Ecuador to personally ask Ecuador to stop Assange from publishing documents about Clinton. This was initially fervently denied in the press only later to be confirmed by the Ecuadorian Embassy who admitted cutting off Julian’s internet due to pressure from the US. Ecuador wanted to appear impartial.
Both John Kerry and US intelligence agencies knew perfectly well that cutting off Julian's internet would have no impact on the release of the leaked emails that were damaging to Hillary's campaign.
The cutting off of Julian's internet access was not for the purpose of preventing the leaks of the Podesta and Hillary emails. Unless intelligence agencies are truly inept, they knew that media organisations already have the entire leaked email database and a schedule for release, they also knew WikiLeaks staff would continue to leak regardless of Julian's ability to communicate.
Now it is long after the election and Ecuador have still not restored Julian’s internet. Ecuador have no grounds to continue to restrict Julian’s internet. It does nothing apart from increase tensions and raise suspicion.
Ecuador have always been supportive of Julian. However, after John Kerry applied pressure on Ecuador, that whole dynamic changed. Ecuador cut Julian's Internet. He then essentially threatened Ecuador, the UK and John Kerry by submitting those pre-commitment file hashes on Twitter. Since then we have only seen hostility towards Julian from all three parties. Ecuador didn't restore his internet and didn't let his lawyer interview him and no one actually saw him. The U.K. Denied him access to Gavin's funeral and denied him access to medical treatment. The UK also continually disregard the UN. The dynamic now is totally different. He has no political friends. It seems that both the UK and Ecuador are now working against Julian and Wikileaks. An environment where a collaborated siege would be feasible.
Finally, many have speculated about mobile signals being blocked at the Embassy. I can confirm that there is 4G signal right outside the Embassy door. I was there, with my phone, and tested it. There is no reason to think Julian cannot use a MiFi device (or similar) connected to a cellular network.
[The pre-commitment file hashes released in October do not match the released insurance files]
Here are the October tweets with the file hashes:
https://twitter.com/wikileaks/status/787777344740163584 https://twitter.com/wikileaks/status/787781046519693316 https://twitter.com/wikileaks/status/787781519951720449
These 3 pre-commitment Twitter posts are SHA-256 file hashes. SHA-256 file hashes are 64 characters long. They are not encryption keys for insurance files. They simply are a mathematical formula for verifying that later released files are genuine and have not been altered.
These hashes were released because Julian felt threatened and in increased danger. They specifically targeted the UK FCO, Ecuador and John Kerry. All of whom are key players in his current predicament.
On November 7th, WikiLeaks released 3 new insurance files. These files names match the names given in the pre-commitment hash tweets:
2016-11-07_WL-Insurance_EC.aes256
2016-11-07_WL-Insurance_UK.aes256
2016-11-07_WL-Insurance_US.aes256
EC = Ecuador, UK = UK FCO, US = John Kerry. Soon after these files were released, the 3 files hashes were compared to the 3 hashes posted on the 16th of October. They did not match. When this was brought to WikiLeaks attention, WikiLeaks released the following statement in a tweet:
https://twitter.com/wikileaks/status/798997378552299521
“NOTE: When we release pre-commitment hashes they are for decrypted files (obviously). Mr. Assange appreciates the concern.”
This firstly proved that the hashes and the insurance files were related (a fact that was already clear). Secondly, it was a lie, as it implied historical use of pre-commitment hashes in this manner. Thirdly, the (obviously) comment was also a deception and an insult to supporters. It was not obvious to anyone, not even to our crypto guys in /cryptography/, on the contrary, they thought it highly suspicious.
Additionally, what they suggest would be absolutely pointless. Pointless as a threat, as the UK, Ecuador and John Kerry would have no practical way of identifying the documents to confirm the threat.
There's absolutely no scenario where an uncompromised WikiLeaks would either post bad file hashes or altered insurance files.
[Julian’s Swedish defense lawyer Per Samuelson was denied access during case questioning]
This is highly unusual and very suspicious. Also, Jennifer Robinson was not in the room with Assange. https://www.youtube.com/watch?v=MYR0Pw9LfUQ&feature=youtu.be&t=9m55s and neither was the chief prosecutor http://www.bbc.co.uk/news/world-europe-37972528 “Swedish chief prosecutor Ingrid Isgren will not speak to Mr Assange directly”.
[UK disregard for international law]
The UK threat is very real. Back in August 2012 the UK was poised to break international law citing the Diplomatic and Consular Premises Act of 1987 as a basis for entering the Embassy and arresting Assange (http://www.bbc.co.uk/news/world-19259623). It all became very public, very quickly and fortunately never happened (http://www.telegraph.co.uk/news/worldnews/southamerica/ecuado9488996/Ecuadors-president-raiding-embassy-to-snatch-Julian-Assange-suicidal.html). I expressed my concern at the time that the UK shouldn’t have even been contemplating such action, let alone threatening it in writing to Ecuador.
More recently, the UK disregarded the UN ruling that Julian Assange was being arbitrarily detained (https://www.theguardian.com/media/2016/feb/04/julian-assange-wikileaks-arrest-friday-un-investigation). The UK appealed, and then finally lost their appeal in November (https://www.rt.com/news/368746-un-ruling-free-assange/). Julian has also been refused to leave the Embassy with a police escort for medical treatment as well as denied to attend Gavin MacFadyen’s funeral. The UK’s behaviour is appalling and clearly has no respect for international law. The reported raid on the Embassy during the latter part of October seems more plausible when taken in the context of past behavior.
This is the Britain I now live in: http://www.independent.co.uk/life-style/gadgets-and-tech/news/investigatory-powers-bill-act-snoopers-charter-browsing-history-what-does-it-mean-a7436251.html. I never used to be ashamed to be British.
[Combined capabilities of intelligence agencies]
We know much about the combined powers of the intelligence agencies. We know what they are capable of, thanks to the leaks of Edward Snowden. The combined powers of the NSA, CIA and the UK’s GCHQ are capable of pulling off such a massive takeover of Wikileaks. We know the NSA works with other US intelligence agencies, we know that the NSA works with GCHQ.
We know about Tempora, we know about JTRIG, we know about PRISM, we know about HAVOK. We know that websites can be altered on the fly, we know that real-time voice profiling is trivial for these agencies. We know that censorship is happening.
https://usnewsghost.wordpress.com/2014/07/15/new-july-14-edward-snowden-nsa-leaks-gchq-attacks-and-censors-internet-nsa-leaks-recent/ http://www.independent.co.uk/life-style/gadgets-and-tech/gchqs-favourite-memes-and-sexual-slang-reveals-a-shared-culture-with-trolls-and-hackers-9608065.html https://en.wikipedia.org/wiki/Tempora https://en.wikipedia.org/wiki/PRISM_(surveillance_program)
The NSA has a remit to be 10 years ahead of the curve. We have commercial products that can be purchased off the shelf today that can easily manipulate audio and video. Just imagine what the NSA and the military are capable of.
Real time facial manipulation: https://www.youtube.com/watch?v=ohmajJTcpNk Signs of editing: https://www.youtube.com/watch?v=2O9t_TEE1aw. Both Julian Assange and John Pilger are not filmed together at any time during the interview. There is also no establishing shot. It is also claimed that Assange’s audio is spliced and edited. No recent events mentioned by Assange, only Pilger. Unfortunately, this interview is not sufficient proof of life.
What the NSA can’t do, is that they cannot break PGP encryption. This has been expressed by Glenn Greenwald who was one of the journalists that Edward Snowden leaked to. He commented that he knows how secure PGP is because the NSA keep moaning about not being able to crack it in their documents he is reading. This is another reason why a signed PGP message can be the only true proof that WL isn’t compromised. Mathematics cannot lie, people can and do. A compromised WL can’t sign a message without the private key.
Edward Snowden revealed that in 2013 the NSA were capable of 3 trillion password attempts per second. As it is now almost 2017, that number will likely be multiple times higher (anywhere between 9 to 15 trillion attempts per second would be my guess based on Moore’s law).
https://en.wikipedia.org/wiki/Joint_Threat_Research_Intelligence_Group https://en.wikipedia.org/wiki/Tempora https://en.wikipedia.org/wiki/PRISM_(surveillance_program) https://www.schneier.com/gchq-catalog/ https://en.wikipedia.org/wiki/Government_Communications_Headquarters
[WikiLeaks down on October 17th]
The alleged raid on the Embassy supposedly took place on the 17th just after 1am GMT. On Monday the 17th of October 2016 WikiLeaks website was reported down (http://www.isitdownrightnow.com/wikileaks.org.html expand the comments) https://postimg.org/image/6t68fe4kj/. The internet was alive with reports of mass censorship around this time. This all coincides with when the alleged WikiLeaks takeover occurred. It also coincides with John Kerry being in the UK.
[Christine Assange audio only radio interview]
Julian's family had their identities changed quite a few years ago after receiving death threats. It is odd that his mother has now revealed herself to a news agency. If you do a YouTube search for Christine Assange (her original name), you'll find all the videos are older than 3 years. She's in hiding, not openly talking on radio shows (https://en.wikipedia.org/wiki/Julian_Assange scroll down to the personal life section).
[WikiLeaks bitcoin account was emptied on the 18th of November] Interestingly it was after the bitcoin account was emptied that the encoded message in the blockchain was left. Why would WikiLeaks go to all that trouble when they could just sign a message with their PGP key? Is it because bitcoin accounts can be cracked and the PGP keys can’t?
[Mass censorship]
Facebook is censoring this event (https://www.facebook.com/events/309760466089922/). It has been advertised for weeks now any only a handful of people are attending. Recently Wikileaks was live on FB. 50% of the viewers (roughly 2.5k) were commenting #PoL, #Whereisassange, RIP etc. The live event was only a prerecorded video being played in loop. Once it concluded, the whole Live event along with all the comments including the comments asking for PoL and PGP signed message were deleted. It was as if it never took place.
When Julian’s DMS had supposedly been activated, I saw posts in threads being deleted within minutes. Supposedly with encryption keys, but it all happened too fast for anyone to collate. I took PDF printouts of the pages and then later noticed that posts and entire links were taken down. I have PDF's of pages that now no longer exist. I've been following this since mid-October and seen the censorship first hand. I know many people here on reddit witnessed the same (please comment with your experiences).
[WikiLeaks reposting old stuff]
There are many examples of this already mentioned in the timelines. One for example is the Palantir Technologies report. Palantir Technologies prepared a report on how to destroy WikiLeaks that was leaked in 2011. The proposal was submitted to Bank of America through its outside law firm, Hunton & Williams. Palantir later apologised for their involvement. But WikiLeaks has recently regurgitated it as if it was new. There are many examples of this. I have watched as WikiLeaks have increasingly destroyed their credibility.
submitted by neonnexus to WhereIsAssange [link] [comments]

Bitcoin Civil War (the bright sides)

It will be interesting to see how the next couple of months play out. Whatever happens, there are a couple of positive sides to the situation.
For one, we will see if it is possible to change the rules of the Bitcoin network even against considerable resistance.
The Japanese Constitution has never been amended. But it is very clear what is necessary to amend it. Article 96 of the Constitution states the requirements.
The Bitcoin network has never been challenged by an internal faction in the way it is now. In contrast to the Japanese Constitution, it is not very clear what is needed to push through the block size extension the Bitcoin Unlimited camp wants. So if they succeed in their attempt, we will have a reference case what is needed to change the protocol against substantial resistance. If they fail, we will have a reference case as well, showing that the failed level of support was not enough.
This civil war will also be an interesting case to study when preparing for war with outside attackers. There has been speculation about "51%-attacks" before. But as far as I know, no one has ever actually pulled off a 51%-attack against the Bitcoin network.
In the course of this civil war, that may change. I hear that Peter Rizun, one of the supporters of Bitcoin Unlimited, is advocating for using hash power to shut down the original Bitcoin chain after a fork, mining empty blocks on that chain.
If that happens, that would be an excellent test case. A highly motivated, well-funded adversary trying to shut down the Bitcoin blockchain has not happened yet in real life.
If such an attack happens, and the Bitcoin blockchain survives it one way or another, that would be real-life proof of its resiliency. Since all of the value of the Bitcoin blockchain comes from this resiliency against attack and the trust created, surviving such a test would be proof of its value. An eight year track record of unbroken service is valuable, but extending it defeating serious attacks shows even more value.
All cryptography has value only as far as people actually try to break it and fail (Schneier's law). It follows that attacks on the Bitcoin network like the one Rizun wants to happen are a good thing.
We also may get a short-term increase in block space (if the Bitcoin Unlimited faction wins the civil war).
Again, interesting times for the Bitcoin network.
submitted by Karl-Friedrich_Lenz to Bitcoin [link] [comments]

BTC-E.com safety checklist for noobs

DISABLE JAVA There's java zero day exploits being discovered all the time. One exploit still hasn't been fixed. You should do this permanently with your browser java is an exploit factory. IE you can't completely disable java so don't use it.
INSTALL NOSCRIPT ADDON https://addons.mozilla.org/en-US/firefox/addon/noscript/ or whatever shit script blockers Chrome/Safari use because Chrome is still lacking the required infrastructure for selective script disablement and object blocking so noscript isn't available, but inferior clones are. Whitelist only sites you need, like btc-e.com so it doesn't automatically load harmful scripts on untrusted sites.
GET AN ENCRYPTED PASSWORD SAFE http://www.schneier.com/passsafe.html Don't use any solution that 'encrypts in your browser' because it will need java and we disabled java remember?
MAKE NEW GMAIL ACCOUNT JUST FOR TRADING Make a random account name + password that can't be guessed. http://www.passwordgenerator.eu/
Store them in your password safe so you don't forget them. Never reuse that password on any site. ENABLE TWO FACTOR AUTHENTICATION.
Note that 2factor ID sometimes doesn't work if your phone time is off. You get 30 seconds to type in the code, if off by 10 seconds derp run out of time. Set your time manually if the shitty telco time server is off www.timeanddate.com
MAKE BTC-E ACCOUNT Use impossible to guess passwords from password generator + throw in your own random letters. Save in password safe. Do not pick a name anywhere close to being your email username.
ENABLE 2FACTOR ID Click Profile, then click 'Edit'
https://btc-e.com/profile#edit/home - confirm your email.
https://btc-e.com/profile#edit/security - enable "Withdraw only with request on E-Mail"
DO NOT CLICK ANY LINKS IN THE TROLLBOX!!!! No matter how innocent the link looks don't click anything in the chatbox. Hackers are dropping links full of java zeroday, redirectors that look just like btc-e login page and phish for passwords, all sorts of bad. Trollbox is also prone to misinformation being that it is a trollbox. Avoid.
If you chat on there, expect every PM sent to you will be from a hacker trying to mine information or get you to click a link. Assume every link is an exploit attempt. Notice how it displays your name, if you picked same name as your email, they can go to work on both by trying to break into your gmail account. This is another way how people get their coins stolen. Hacker takes chat name and tries it on gmail/hotmail/yahoo. If they get in because you didn't set up 2 factor expect to be robbed of coins.
DO NOT ENABLE API Unless you know what you're doing, do not enable this. Liberty Reserve disabled their API by default because of so many drained accounts.
DISCLAIMER Of course, be aware the exchange is in Russia or possibly Bulgaria and if anything happens the owner could just disappear, but this is highly unlikely. Why would you walk away from a money machine. Remember bitfloor (US) lost all it's customers bitcoins once, CryptoXchange (Australia) stole from users and disappeared, Bitcoinica (China?) stole or lost all the coins, and bitcoin-24 (German) has just lost their bank account and owner MIA. All exchanges carry risk no matter what country they are in.
You can fund btc-e through cash deposit in India, Singapore, Malaysia, Bangladesh, Nepal, Australia with http://www.ecurrencyzone.net/ which are authorized exchange listed on the Okpay.com site. They sell btc-e vouchers and Okpay. So does http://liliontransfer.org/ for wires and other methods.
If you want a really secure platform (you fear your comp is probably already infected with hidden java zeroday botnet) then download any linux live distro and make bootable USB or burn to CD. I recommend Liberty Linux http://dee.su and just use the non private browser (disable java and javascript!), NOT the Tor browser you don't want to trust SSL over Tor and risk a malicious exit node capturing traffic and running sslstrip on it or feeding you a MITM attack with spoofed certs.
If you want to know why watch this, nothing has changed since this talk was given: https://www.youtube.com/watch?v=Z7Wl2FW2TcA
submitted by Derpcoin to Bitcoin [link] [comments]

New mining site like vixice,rapidminers Bitcoin-mining company to open data center in Virginia Beach How to Make Money With Bitcoin - YouTube RHY比特币矿场(RHY Bitcoin Mine) [172] Bruce Schneier talks data-mining, surveillance & embedded computing systems

Regulating Bitcoin. Ross Anderson has a new paper on cryptocurrency exchanges. From his blog:. Bitcoin Redux explains what’s going wrong in the world of cryptocurrencies. The bitcoin exchanges are developing into a shadow banking system, which do not give their customers actual bitcoin but rather display a “balance” and allow them to transact with others. Craig Wright hat mit seinem ehemaligen Partner Dave Kleiman ein Bitcoin-Mining-Unternehmen betrieben, das zwischen 2009 und 2011 knapp 1,1 Millionen BTC geschürft haben soll. Wohlgemerkt: Bei gegenwärtiger Umrechnung beläuft sich der Wert auf ungefähr 9,3 Milliarden US-Dollar. Kleiman verstarb jedoch 2013 und ließ Wright alleine auf dem Bitcoin-Berg sitzen. I’ve not checked in the last few weeks but I’m told the fall from ~20KUSD/bitcoin to less than 3.5k at the begining of december which is a fall to ~1/6th of it’s value caused a lot of bitcoin mining to stop as it was nolonger productive to mine. Oh and other crypto-currencies that are designed specifically to be mined on PC hardware saw a related drop that in turn caused the price of ... Schneier raises concerns regarding bitcoin mining’s energy footprint. Source: Shutterstock. While the other criticisms may have had some measure of technical accuracy, Schneier also cites the hackneyed “crypto-mining-uses-vast-amount-of-energy” argument to back up his belief that cryptocurrency is pointless. According to him – you’ve certainly never heard this before – it ... Im Fall von Bitcoin werden neue Einheiten nach einem Prinzip verteilt, das die Unterstützung des Netzwerks durch Zur-Verfügung-stellen von Rechenleistung belohnt (Bitcoin-„Mining“, das Erzeugen bzw. Entdecken neuer „Münzen“ durch Lösung einer mathematischen Aufgabe, analog zum Schürfen nach Edelmetallen). Aufgrund des steigenden Wertes des Guthabens stellt dies im Fall einer ...

[index] [21777] [41229] [27147] [25239] [38703] [46573] [10905] [3744] [29495] [10678]

New mining site like vixice,rapidminers

Bitcoin ASIC Miner Tests and FinFET 16nm Transistor Technology. 2048 - 8192 bit Encryption Development & Data Compression. Cryptography, Steganography. Crypt... On Wednesday, Twitter’s share price soared after the company’s second quarter earnings beat expectations and its outlook on full year revenue proved better than expected. With a count of 271 ... Bitcoin-mining company to open data center in Virginia Beach BCause LLC plans to invest about $65 million in a bitcoin-mining facility in Virginia Beach, where it will add 100 jobs, The Virginian ... How to build a Bitcoin Mining Rig!!!! 2020 - Duration: 6:04. Hamster Channel Recommended for you. 6:04. Qoocam 8K Enterprise 360 Livestream Sample: Unbox TECHE 360Anywhere ... https://goo.gl/KqV7nB bitcoin mining rig,bitcoin mining,bitcoin miner,cryptocurrency,blockchain,ethereum,bitcoin,bitcoins,mining bitcoin,free bitcoin,VIX ICE,VIX ICE ...

#