Racist names meet the First Amendment in Minneapolis

Minneapolis officials are reportedly considering legal action to prevent the Washington Redskins name from being used at TCF Bank Stadium.

The Minnesota Daily reports that the city attorney is investigating whether the city has legal authority to ban the football teams name and logo.

I have my doubts, said Cam Gordon, who represents the University and surrounding areas on the City Council.

He said there might be issues with the ban violating freedom of speech. And at a council committee meeting late last month, the councilman called the issue a minefield.

You think?

Its the most horrific name in sports history, said Clyde Bellecourt, founder of the Minneapolis-based American Indian Movement.

Hes right, of course. It is.

And hate speech can be suppressed without violating the First Amendment if it causes the listener to react violently. But, the Supreme Court has made clear that people still have a right to hateful speech.

That officials in Minnesota are being pressed to challenge that right is not without some irony because Minnesota has had more than its share of assaults on the First Amendment.

A 1992 case before the Supreme Court defined the difference between hateful acts of hateful speech when it overturned the conviction of a teenager for burning a cross on the lawn of an African American St. Paul family.

See the original post here:

Racist names meet the First Amendment in Minneapolis

Anonabox promises a portable, streamlined way to use Tor to hide your online tracks

Staying anonymous online could get a lot simpler with Anonabox, a pocket-sized networking device due to launch early next year.

The $51 device plugs into any standard Internet router and pipes all traffic through the Tor network. The traffic then moves through multiple computers on Tors network, erasing its tracks along the way, before finally hitting the open Internet. The result is an anonymous and encrypted connection straight out of the box.

While Tor already offers a Web browser for this purpose, extending Tors capabilities to other programs requires a complicated setup process. Even opening an attachment from Tor can create risk, as the outside program could connect to the Internet without keeping the user anonymous. By plugging directly into the router, Anonabox promises to anonymize all Internet activity regardless of what program youre using.

Why this matters: Between overreaching government data collection in the United States, censorship in other countries and the rise of the darknet, theres a huge demand for products that hide their users online activities. Anonabox is hitting all the right notes at just the right time, with a low-cost product thats supposedly easy to use and to conceal. That may explain why the Kickstarter campaign is nearing $300,000 as of this writingfar beyond Anonaboxs $7,500 goal.

As Wired points out, Anonabox is not the first device of its kind. Devices like Torouter and Portal require technical know-how to replace a routers stock software, while OnionPi arrives as a kit that must be assembled by the user. Anonaboxs closest competitor is SafePlug, a $49 device that plugs into any router, but its larger and potentially less secure. By comparison, Anonabox is small enough to conceal in a pants pocket, and the creators promise to test and configure each unit by hand to make sure theyre working properly.

For now, the Tor community isnt giving a full endorsement, though Tors executive director Andrew Lewman told Wired that the device looks promising. Micah Lee, lead technologist for The Intercept, suggested that users still fire up the Tor browser in conjunction with the box, as it avoids fingerprinting techniques that other browsers use to track individuals around the Web.

Given that this is a Kickstarter project, potential buyers need to reserve some skepticism as well. However, the creators note that the product is already fully functional and ready for large-scale production, with backup vendors in place. At a glance, it seems like a well-organized campaign, and a potentially valuable tool for protestors, privacy paranoids and Internet miscreants alike.

Read more:

Anonabox promises a portable, streamlined way to use Tor to hide your online tracks

This tiny box anonymises all your online actions

No tool in existence protects your anonymity on the Web better than the software Tor, which encrypts Internet traffic and bounces it through random computers around the world. But for guarding anything other than Web browsing, Tor has required a mixture of finicky technical setup and software tweaks. Now routingall your traffic through Tor may be as simple as putting a portable hardware condom on your ethernet cable.

Today a group of privacy-focused developers plans to launch a Kickstarter campaign for Anonabox. The $45 (28) open-source router automatically directs all data that connects to it by ethernet or Wifi through the Tor network, hiding the user's IP address and skirting censorship. It's also small enough to hide two in a pack of cigarettes. Anonabox's tiny size means users can carry the device with them anywhere, plugging it into an office ethernet cable to do sensitive work or in a cybercafe in China to evade the Great Firewall. The result, if Anonabox fulfils its security promises, is that it could become significantly easier to anonymise all your traffic with Tor -- not just Web browsing, but email, instant messaging, file sharing and all the other miscellaneous digital exhaust that your computer leaves behind online.

"Now all your programs, no matter what you do on your computer, are routed over the Tor network," says August Germar, one of the independent IT consultants who spent the last four years developing the Anonabox. He says it was built with the intention of making Tor easier to use not just for the software's Western fans, but for those who really need it more Internet-repressive regimes. "It was important to us that it be portable and small -- something you can easily conceal or even throw away if you have to get rid of it."

This has happened before Anonabox is by no means the first project to attempt to integrate Tor directly into a router. But Germar argues it will strike the best balance yet of cheapness, easy setup, size and security. Tor-in-a-box projects like Torouter and PORTAL, for instance, require the user to replace the software on a stock router. Another project called OnionPiis designed to be built one from a kit, and costs roughly twice as much as Anonabox.

In terms of consumer friendliness, the closest device yet to a plug-and-play Tor router has beenSafeplug, a $49 (31) variant on a Pogoplug router modified to route all traffic over Tor. But at more than twice the size, the Safeplug isn't nearly as portable as the Anonabox. And it's also been criticized for security flaws; Researchers at Princeton found in Septemberthat it didn't have any authentication on its settings page. That means a hacker could use a technique called a Cross-Site Request Forgery to trick a user into clicking on a link that would change the router's functions or turn off its Tor routing altogether. It also uses an outdated version of Tor, one that had been updated even before the device shipped last year.

Anonabox's security hasn't yet been audited for those sorts of flaws. But its creators point out that it will be entirely open source, so its code can be more easily scrutinised for errors and fixed if necessary.

The community is watching The non-profit Tor project itself is reserving judgment for now. But its executive director Andrew Lewman tells WIRED he's keeping an eye on the project, and that it "looks promising so far." Micah Lee, lead technologist for Glenn Greenwald's The Interceptand a frequent developer on Tor-related projects, says he's mostly encouraged by the idea. One of the potential vulnerabilities for Tor users, after all, is that a website they visit could run an exploit on their computer, installing malware that "phones home" to a server across a non-Tor connection to reveal their real IP address. "If you're using something like this, everything goes over Tor, so that can't happen," Lee says. "A Tor router can definitely have a big benefit in that there's physical isolation."

He nonetheless cautions that Anonabox alone won't fully protect a user's privacy. If you use the same browser for your anonymous and normal Internet activities, for instance, websites can use "browser fingerprinting" techniques like cookies to identify you. Lee suggests that even when routing traffic over Tor with Anonabox, users should use the Tor Browser, a hardened browser that avoids those fingerprinting techniques. (To avoid running their traffic through Tor twice and reducing bandwidth speeds to a crawl, he points to a setting in the Tor Browser called "transparent torification," which turns off the browser's own Tor routing.)

The Anonabox has been in the works since 2010, long enough that its developers have been able to evolve their own custom board as well as an injection-moulded case. That customisation, Germar says, means the tiny device still packs in 64 megabytes of storage and a 580 megahertz processor, easily enough to fit the Tor software and run it without any slowdowns.

Built for civil disobedience Germar says he and his friends began thinking about the possibility for the device around the time of the Arab Spring in late 2010 and early 2011. The Anonabox is ultimately intended for users in other countries where Tor's anti-censorship and privacy properties can help shield activists and journalists. It can be used in a cybercafe, for instance, where users can't easily install new software on computers. And it's capable of so-called "pluggable transports" -- extensions to Tor that often allow its traffic to better impersonate normal encrypted data.

The rest is here:

This tiny box anonymises all your online actions

Anonabox Promises Total Online Anonymity That's Easy, Open Source, and Cheap

Nobody likes giving up their privacy. But as much as we complain about it, relatively few of us are willing to put time,money, or effort into consistently protecting our privacy online. And its not like its that hard, relatively speaking: the Tor Project offers excellent, free software that lets you browse the Internet in complete anonymity, if you use it properly. With Tor, data you send over the Internet are encrypted and stripped of any identifying information (namely, your IP address) before reaching their destination. Its one of the most reliable methods that you can use to protect your identity online. However, it does take some amount of experience to use, along with a conscious decision to choose security over convenience. If that sounds like too much work (and itsure sounds like a lot of work, doesnt it?), the Anonabox could be exactly what you need.

The Anonabox, now on Kickstarter, is a tiny little networking tool that will sit there and invisibly do all of the Tor-related stuff that youd want it to do, without you ever having to think about it.

The appeal of Anonabox (relative to other, similar products) is threefold. First, its about as easy to use as you could possibly hope for: plug one end into a free port on your modem or router, add power (USB), and thats it. The Anonabox will set up its own wireless access point (in tandem with any existing network) that you can connect to when you want to, and all the data that are sent through it will be anonymized through Tor. No wireless? No problem, its got an ethernet port, too.

Second, its completely open source, which means that people way smarter than you can make sure that there arent any security holes in the software.

And third, its cheap: the people behind this thing have spentyears refining it for their own use, which has driven the price down to something equivalent to a cheap router. Add all of these things together, and your total investment (time, money, space, effort, frustration, embarrassment, emotional anguish, etc.) drops to the point where even those with a vague interest in the option for online privacy would have a hard time justifying not getting an Anonabox.

So, since Anonabox is entirely based on Tor, why not just use the Tor browser, which is free? The simple answer is that Anonabox anonymizes everything that your computer is sending out over the Internet, not just the websites that you visit through your browser. Email, instant messaging, filesharing, all of it.In that respect,using a piece of hardware that runs everything through Tor like this certainly makes things safer, but it cant keep you perfectly safe.

Most of the time, when a Tor user is compromised, its because thatuser (or the users computer)did something that shouldnt have been done: security and privacy areas much about youusing good browsing practices andexercising caution as they are about anonymizing hardware and software. For example, if you browse the Internet through Anonabox with the same Web browser that youve been using, its possible to identify you through the unique characteristics of the cookies that your browser has probably picked up. Instead, you should be using a different browser, or ideally the Tor browser itself, which is specifically designed to prevent things like that from happening. The point is this: no combination of hardware or software is capable enough to protect your privacy if you use it wrong.

Anonabox was looking for $7,500 for an initial production run on Kickstarter, and theyve surpassed that by just a bit, clocking in at well over $150,000 in funding with 28 days to go. Youve missed the early bird version of the Anonabox ($45), so instead youll have to pay $51, with delivery expected early next year.

Follow this link:

Anonabox Promises Total Online Anonymity That's Easy, Open Source, and Cheap

The Bitcoin Group #51 – Slaying the BearWhale, $50M Funding, Bit License and Saving Journalism – Video


The Bitcoin Group #51 - Slaying the BearWhale, $50M Funding, Bit License and Saving Journalism
THIS WEEK: ---------------------------- Andreas Antonopoulos Schools the Canadian Senate on Bitcoin https://www.cryptocoinsnews.com/andreas-antonopoulos-explains-bitcoin-canadian-senate/ ...

By: World Crypto Network

See the original post here:

The Bitcoin Group #51 - Slaying the BearWhale, $50M Funding, Bit License and Saving Journalism - Video

Better than Bitcoin? BTC loosing money? Bitshares interview Inside Bitcoins Conference Vegas – Video


Better than Bitcoin? BTC loosing money? Bitshares interview Inside Bitcoins Conference Vegas
Bitshares better than bitcoin? Want more crypto / bitcoin related news and interviews? Keep us rollin 1N8VpbPx8Y6exEqFkrdf6d9NUu1wdyWc88 donate address Want to live bet with hot chicks? ...

By: Bit n Mortar

See the article here:

Better than Bitcoin? BTC loosing money? Bitshares interview Inside Bitcoins Conference Vegas - Video

Bitcoin 'inventor' plans to sue Newsweek

A screenshot of Dorian Nakamoto's website, which is soliciting donations for a lawsuit against Newsweek.

NEW YORK (CNNMoney)

Dorian Nakamoto, the subject of a March Newsweek cover story entitled "The Face Behind Bitcoin," is soliciting donations online to fund a lawsuit against the publication. He claims he had nothing to do with the creation of the digital currency, and says Newsweek "must be held accountable for its reckless reporting."

Nakamoto is accepting donations via credit card, check, money order or -- of course -- bitcoins.

Bitcoin was created in 2009, but its founder has always been shrouded in secrecy. While its creator was identified as "Satoshi Nakamoto," the popular assumption was that the name was only a pseudonym.

Related: What is Bitcoin?

That changed following the publication of Newsweek's article, the result of a lengthy investigation and interviews with Nakamoto's family members. But Nakamoto's website says he and his family members were misquoted, and that he was "victimized by a reckless news organization."

Newsweek did not immediately respond to a request for comment.

Nakamoto acknowledges that a number of details in the Newsweek article are correct, including his background as an engineer and the fact that he once worked for a defense contractor. But the basic premise about his role in creating the currency, he says, is completely false.

"Newsweek's article terrorized both Dorian and his family, all of them private citizens," the website says.

View original post here:

Bitcoin 'inventor' plans to sue Newsweek

Bitcoin 'inventor' plans to sue

A screenshot of Dorian Nakamoto's website, which is soliciting donations for a lawsuit against Newsweek.

NEW YORK (CNNMoney)

Dorian Nakamoto, the subject of a March Newsweek cover story entitled "The Face Behind Bitcoin," is soliciting donations online to fund a lawsuit against the publication. He claims he had nothing to do with the creation of the digital currency, and says Newsweek "must be held accountable for its reckless reporting."

Nakamoto is accepting donations via credit card, check, money order or -- of course -- bitcoins.

Bitcoin was created in 2009, but its founder has always been shrouded in secrecy. While its creator was identified as "Satoshi Nakamoto," the popular assumption was that the name was only a pseudonym.

Related: What is Bitcoin?

That changed following the publication of Newsweek's article, the result of a lengthy investigation and interviews with Nakamoto's family members. But Nakamoto's website says he and his family members were misquoted, and that he was "victimized by a reckless news organization."

Newsweek did not immediately respond to a request for comment.

Nakamoto acknowledges that a number of details in the Newsweek article are correct, including his background as an engineer and the fact that he once worked for a defense contractor. But the basic premise about his role in creating the currency, he says, is completely false.

"Newsweek's article terrorized both Dorian and his family, all of them private citizens," the website says.

See the original post:

Bitcoin 'inventor' plans to sue

Bitcoin survival relies on community 'growing up'

Summary: According to security experts, the cryptocurrency community needs to grow up in order to thrive -- and become more like the establishment it originally tried to break away from.

ISLE OF MAN The cryptocommunity needs to "grow up" if Bitcoin is going to flourish, according to a prominent member of the security community.

Interest in Bitcoin exploded after the 2008 recession. In 2012, there was a sharp rise in Bitcoin-based merchant services. Since this time, the cryptocurrency has become monetized due to rising demand, which peaked last year at over $1,000 for a single BTC. Many attempted to cash in, but the price fell by over 50 percent following the decimation of major Bitcoin trading post Mt. Gox.

Despite this, faith in virtual currency remains strong but could the lure of cryptocurrency's unstructured and unregulated system also be its undoing?

There are endless possibilities for cryptocurrency, and this is not limited to Bitcoin. Litecoin, Dogecoin and Peercoin to name but a few are also in the mix, and many individuals and businesses are working out how virtual currency will fit in to our future. Traditional financial institutions may underpin transactions using virtual currency, more individual power and privacy could end up in the hands of consumers, and underdeveloped nations may be able to use crypto to circumvent corrupt governments or to allow for easier payments and reduced transfer costs where traditional economies are volatile.

Bitcoin may have had its name tainted by association with underground marketplace Silk Road, but virtual currency's story doesn't have to end there.

Bruce Elliott, anexecutivefrom financial services firm Boston, told attendeesat the Crypto Valley Summit on the Isle of Man:

Bitcoin for us is a nice thing and a nice way to make money. For others, it's a matter of life and death and a way to transform their own lives [...] and control their own destiny.

In short, Bitcoin is more than a "scheme," as a recent report issued by the Bank of England implied.Within the report, the financial institution said that while Bitcoin had the potential to "disrupt monetary policy," the inherent volatility of the currency means crypto is not a threat to traditional currency and the "small size of such schemes" leaves virtual currency outside of the bank's notice.

However, in order for virtual currency to succeed, more is needed than ideas, glue and tape. Major ingredients including investment, security and regulation may also be necessary.

See original here:

Bitcoin survival relies on community 'growing up'

Blue Comets top Storm in four to reach MPC final

ASHEBORO The Asheboro High School varsity volleyball team entered Tuesdays Mid-Piedmont Conference semifinal undefeated.

Sometimes its good for a team to have a bit of a scare before the postseason.

The top-seeded Blue Comets overcame a rough first game to top No. 5 Southern Guilford 22-25, 25-17, 25-12, 25-12 at AHS. Asheboro (19-2) plays No. 2 Southwestern Randolph (17-7) in todays final at 6 p.m.

Give Southern Guilford credit, Blue Comets coach Karen Blanchard said. They looked great. We had a few calls on us that we havent all year. That got us down a bit. I told the girls they had to have fun. It took one of the girls doing something to make the other laugh to get us going.

Courtney King paced Asheboro with 16 kills and 15 digs, while Amy Yates and Salem Davidson each added eight. Yates had three blocks, while Davidson had six aces and 11 digs. Gilliam Foscue dished out 20 assists with Hannah Ferguson adding 13.

The first game was streaky as the Blue Comets started with a 5-0 run and the Storm answered with seven straight point to take a 7-5 lead. Asheboro scored the next six to go ahead by three. After that, there were six ties and a lead change before Asheboro went ahead 22-19 on a Yates kill. Southern Guilford responded with the next six points, taking the game and a 1-0 match lead on a Carlin Bailey ace.

The Storm took an early 5-1 lead in the second game. The Blue Comets came back, tying the score twice before going ahead 8-7 when a SG player was called for crossing the net. After that, Asheboro upped its lead to as many as nine (21-12). Southern Guilford cut it to six (23-17), but a King push and kill tied the match at a game apiece.

After back-and-forth play to start the third game, the Blue Comets went on a 6-0 run to go ahead 8-2 and then a 9-1 streak to up their lead to 16. Southern Guilford scored the next five points to pull within 11 (23-12), but a Davidson kill and ace put Asheboro ahead 2-1 in the match.

The fourth game started with five ties and two lead changes before the Blue Comets went on a 6-0 run to go ahead 13-8. The Storm couldnt recover as Asheboro scored the last eight points of the game to win the match.

View original post here:

Blue Comets top Storm in four to reach MPC final

Knights caught chasing Comets

Blink and you may have missed out on a Comet shower hitting the northeast edge of Okotoks on Friday.

The Raymond Comets soared to a 28-0 lead at the half and held on for a comfortable 37-13 triumph over the Holy Trinity Academy Knights in high school football action, Friday night at Knights Field.

We talked about it during the week and last year they did the same thing they jumped on us out of the gate, lamented Knights head coach Matt Hassett. And were just not a team that can play from behind. Were a running football team, were a power football team.

Raymond, seven-time Tier 1 provincial champions, opened the scoring late in the first-quarter with some flair as slotback Rhett Ellingson kickstarted a brilliant evening with a one-handed touchdown reception.

The Grade 12 Comet would soon double the advantage on special teams. Ellingson returned a punt from 45 yards out untouched into the end-zone for a backbreaking score early in the second quarter.

I remember running through the middle and all the green guys shifted over to the left of the field and I cut back through the middle, he said. It was wide open to the end-zone.

The Comets would add to the Knights misery by taking advantage of an HTA fumble at midfield and converting on a 30-yard run through the posts. HTA would again turn the ball over with just 10 seconds on the clock when quarterback Spencer Kiranas was picked off at midfield. Raymond would quickly get itself into the red-zone on a hook-and-ladder reception and took advantage of a gap in the Knights cover-four defence with a 20-yard touchdown reception on the final play of the half.

The hosts performance was Knight and day after the restart.

Nick Villarreal showcased his foot speed and returned the second half kickoff 70 yards for a touchdown, the second straight week the Grade 12 receiver registered a special teams score, to finally give the HTA faithful something to talk about.

I was just angry. I couldnt believe it was 28-0, we let our guard down, Villarreal said. I just wanted to kick the second-half off with a bang.

See the article here:

Knights caught chasing Comets