Daily Archives: December 19, 2014

One Thin Dime by Dustin Owens & The First Amendment – Video

Posted: December 19, 2014 at 2:48 pm


One Thin Dime by Dustin Owens The First Amendment
The First Amendment are: Michael Branch - Bass Nolin McAlister - Alto Sax Matthew Myers - Drums Dustin Owens - Voice, Guitar, and Songwriter.

By: Dustin Owens

See the original post here:
One Thin Dime by Dustin Owens & The First Amendment - Video

Posted in First Amendment | Comments Off on One Thin Dime by Dustin Owens & The First Amendment – Video

Excelente: Champion of the First Amendment – Video

Posted: at 2:48 pm


Excelente: Champion of the First Amendment

By: kevinv1964

Read the rest here:
Excelente: Champion of the First Amendment - Video

Posted in First Amendment | Comments Off on Excelente: Champion of the First Amendment – Video

First Amendment Center news, commentary, analysis on …

Posted: at 2:48 pm

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.

The Newseum Institutes First Amendment Center in Nashville, Tenn., serves as a forum for the study and exploration of free-expression issues through education, information and entertainment.

Founded by John Seigenthaler on Dec. 15, 1991, the 200th anniversary of the ratification of the Bill of Rights to the U.S. Constitution, the Newseum Institutes First Amendment Center has offices in the John Seigenthaler Center at Vanderbilt University in Nashville, Tenn., and at the Newseum in Washington, D.C.

The Center provides education and information to the public and groups, including First Amendment scholars and experts, educators, government policy makers, legal experts and students. The Center is nonpartisan and does not lobby, litigate or provide legal advice. It has become one of the most authoritative sources of news, information and commentary in the nation on First Amendment-related developments, as well as detailed reports about U.S. Supreme Court cases involving the First Amendment, and commentary, analysis and special reports on free expression, press freedom and religious-liberty issues.

Find First Amendment research articles by topic or keyword.

More

Download or order publications on First Amendment issues.

More

Original post:
First Amendment Center news, commentary, analysis on ...

Posted in First Amendment | Comments Off on First Amendment Center news, commentary, analysis on …

Guy-Uriel Charles comments: Firing of Charlotte city employee over Facebook post highlights First Amendment debate

Posted: at 2:48 pm

A City of Charlotte fire investigator is out of a job because of a Facebook post in the aftermath of the Ferguson, Missouri riots. Its the first time a Charlotte city employee has been fired over a posting on social media. An attorney for the investigator says the city overreached.

So what are the First Amendment rights of public employees?

City Manager Ron Carlee says its essential the public is confident that city employees will treat all people with dignity and respect.

He believes Crystal Eschert violated that confidence shortly after police officer Darren Wilson shot and killed Michael Brown in Ferguson, Missouri.

Eschert is white. She referenced reports of another police shooting near Ferguson that said a white person was the victim. She wrote on her personal Facebook page:

Where is Obama? Where is Holder? Where is Al Sharpton? Where are Trayvon Martin's parents? Where are all the white guy supporters? So WHY is everyone MAKING it a racial issue?!? So tired of hearing its a racial thing. If you are a thug and worthless to society, its not race Youre just a waste no matter what religion, race or sex you are!

Eschert did not identify herself as a Charlotte Fire Department employee, but she was fired in September after someone emailed the post to city officials. Carlee says it was discriminatory and inflammatory.

Guy Charles has a different phrase for it. He co-directs Duke Universitys Center on Law, Race and Politics.

She said something that at best was racially insensitive, but on a public issue on a private page, says Charles. Between the hand that shes holding and the hand that the citys holding, I think Id prefer to have her hand.

If Eschert worked for a private employer, she wouldnt have a free speech case here since the First Amendment only applies to the government. But even though she has that protection, its not absolute.

Continue reading here:
Guy-Uriel Charles comments: Firing of Charlotte city employee over Facebook post highlights First Amendment debate

Posted in First Amendment | Comments Off on Guy-Uriel Charles comments: Firing of Charlotte city employee over Facebook post highlights First Amendment debate

Tor Browser Download – Softpedia

Posted: at 2:47 pm

6 Screenshots

The application's main attempt is to put a web browser at your disposal with the help of which you can both enjoy a friendly interface and keep your system safe. All available features come in the form of a custom-made version of Mozilla Firefox, which is not necessarily bad because it lets you quickly accommodate.

One of the key features in keeping your data safe the integrated HTTPS Everywhere addon, which basically encrypts communication between your computer and various web pages you access. This can easily be configured to allow or restrict access to specific content.

Before being able to fully enjoy a safe browsing experience, the application requires you to select connection type. You can opt for a standard connection, which works in most cases, or configure settings in if you computer uses a proxy or goes through a firewall in order to reach the information superhighway.

Most available options are similar to the one you find in Firefox, with a few additions. The Torbutton puts several settings at your disposal, such as the possibility to fully configure connection settings, handle cookie protection, or even choose a new identity for enhanced security.

Taking everything into consideration, we can say that Tor Browser Bundle comes equipped with all necessary tools you need in order to stay safe while online. It can be used by beginners and experts alike, due to the various advanced settings that are not mandatory in order for the application to properly offer its services.

Read more from the original source:
Tor Browser Download - Softpedia

Posted in Tor Browser | Comments Off on Tor Browser Download – Softpedia

tor browser | The Tor Blog

Posted: at 2:47 pm

In May, the Open Technology Fund commissioned iSEC Partners to study current and future hardening options for the Tor Browser. The Open Technology Fund is the primary funder of Tor Browser development, and it commissions security analysis and review for all of the projects that it funds as a standard practice. We worked with iSEC to define the scope of the engagement to focus on the following six main areas:

The complete report is available in the iSEC publications github repo. All tickets related to the report can be found using the tbb-isec-report keyword. General Tor Browser security tickets can be found using the tbb-security keyword.

The report had the following high-level findings and recommendations.

Due to our use of cross-compilation and non-standard toolchains in our reproducible build system, several hardening features have ended up disabled. We have known about the Windows issues prior to this report, and should have a fix for them soon. However, the MacOS issues are news to us, and appear to require that we build 64 bit versions of the Tor Browser for full support. The parent ticket for all basic hardening issues in Tor Browser is bug #10065.

iSEC recommended that we find a sponsor to fund a Pwn2Own reward for bugs specific to Tor Browser in a semi-hardened configuration. We are very interested in this idea and would love to talk with anyone willing to sponsor us in this competition, but we're not yet certain that our hardening options will have stabilized with enough lead time for the 2015 contest next March.

The Microsoft Enhanced Mitigation Experience Toolkit is an optional toolkit that Windows users can run to further harden Tor Browser against exploitation. We've created bug #12820 for this analysis.

PartitionAlloc is a memory allocator designed by Google specifically to mitigate common heap-based vulnerabilities by hardening free lists, creating partitioned allocation regions, and using guard pages to protect metadata and partitions. Its basic hardening features can be picked up by using it as a simple malloc replacement library (as ctmalloc). Bug #10281 tracks this work.

The iSEC vulnerability review found that the overwhelming majority of vulnerabilities to date in Firefox were use-after-free, followed closely by general heap corruption. In order to mitigate these vulnerabilities, we would need to make use of the heap partitioning features of PartitionAlloc to actually ensure that allocations are partitioned (for example, by using the existing tags from Firefox's about:memory). We will also investigate enabling assertions in limited areas of the codebase, such as the refcounting system, the JIT and the Javascript engine.

A large portion of the report was also focused on analyzing historical Firefox vulnerability data and other sources of large vulnerability surface for a planned "Security Slider" UI in Tor Browser.

The Security Slider was first suggested by Roger Dingledine as a way to make it easy for users to trade off between functionality and security, gradually disabling features ranked by both vulnerability count and web prevalence/usability impact.

Read this article:
tor browser | The Tor Blog

Posted in Tor Browser | Comments Off on tor browser | The Tor Blog

Tor Browser – Download Tor Browser 4.0 in english on …

Posted: at 2:47 pm

Tor Browser Bundle is a free and simple software that enables users to protect their online identity and maintain it anonymously from online attacks and traffic. Tor software prevents other users watching your Internet connection from learning what sites you visit. Besides, it doesnt let the sites you visit learn your physical location. One of the distinctive advantages of Tor Browser Bundle is that it allows you to access earlier blocked sites. Tor Browser Bundle can be installed on Windows, Mac OS X, or Linux without any additional software. As a matter of fact, it can run off a USB flash drive and is very self-sufficient.

Features and Capabilities:

Tor Browser Bundle works with a number of application including web browsers, instant messaging systems, remote access clients and other apps that use TCP protocol. Thousands of people from all the corners of the world use Tor Browser Bundle for various reasons: journalists and bloggers, law enforcement officials, military people, corporations, citizens of the countries with a repressive regime and just regular people.

Why is Tor Browser Bundle so popular on the web? Its been produced to make your life simpler. Now you dont need to worry about your digital track that you leave every time whilst surfing the Internet.

Take over control over the data you produce and download Tor Browser Bundle absolutely free of charge!

http://tor-browser.joydownload.com/ - Tor Browser is a product developed by The Tor Project. This site is not directly affiliated with The Tor Project. All trademarks, registered trademarks, product names and company names or logos mentioned herein are the property of their respective owners. Our download manager distributes the original unmodified software, obtained directly from The Tor Project website, and does not modify it in any way.

View original post here:
Tor Browser - Download Tor Browser 4.0 in english on ...

Posted in Tor Browser | Comments Off on Tor Browser – Download Tor Browser 4.0 in english on …

CryptoCurrency for Passive Income – Video

Posted: at 2:47 pm


CryptoCurrency for Passive Income

By: Global Technologies LLC

Originally posted here:
CryptoCurrency for Passive Income - Video

Posted in Cryptocurrency | Comments Off on CryptoCurrency for Passive Income – Video

Clustering bitcoin accounts using heuristics

Posted: at 2:47 pm

Editors note: well explore present and future applications of cryptocurrency and blockchain technologies at our upcoming Radar Summit: Bitcoin & the Blockchain on Jan. 27, 2015, in San Francisco.

A few data scientists are starting to play around with cryptocurrency data, and as bitcoin and related technologies start gaining traction, I expect more to wade in. As the space matures, there will be many interesting applications based on analytics over the transaction data produced by these technologies. The blockchain the distributed ledger that contains all bitcoin transactions is publicly available, and the underlying data set is of modest size. Data scientists can work with this data once its loaded into familiar data structures, but producing insights requires some domain knowledge and expertise.

I recently spoke with Sarah Meiklejohn, a lecturer at UCL, and an expert on computer security and cryptocurrencies. She was part of an academic research team that studied pseudo-anonymity (pseudonymity) in bitcoin. In particular, they used transaction data to compare potential anonymity to the actual anonymity achieved by users. A bitcoin user can use many different public keys, but careful research led to a few heuristics that allowed them to cluster addresses belonging to the same user:

In theory, a user can go by many different pseudonyms. If that user is careful and keeps the activity of those different pseudonyms separate, completely distinct from one another, then they can really maintain a level of, maybe not anonymity, but again, cryptographically its called pseudo-anonymity. So, if they are a legitimate businessman on the one hand, they can use a certain set of pseudonyms for that activity, and then if they are dealing drugs on Silk Road, they might use a completely different set of pseudonyms for that, and you wouldnt be able to tell that thats the same user.

It turns out in reality, though, the way most users and services are using bitcoin, was really not following any of the guidelines that you would need to follow in order to achieve this notion of pseudo-anonymity. So, basically, what we were able to do is develop certain heuristics for clustering together different public keys, or different pseudonyms. Im happy to get into the technical details, but Im not sure how relevant they are. The point is that, if you think these are good heuristics, then basically they provided evidence that a certain set of pseudonyms were called into the same owner. In that owner could be a single individual or it could be an entire service, like bit scams or another exchange.

In the course of their research, Sarah and her collaborators realized that addresses used to collect excess bitcoins (change addresses) provided a good clustering mechanism:

If you think about making change with physical cash, if I walk into a physical store and I hand the clerk a $20 bill, and my thing only costs $5, then Im going to get $15 back in change, right? And in bitcoin, that process of making change is actually completely transparent, so you can observe the change public key in the blockchain.

What we tried to do is distinguish change addresses, as we called them, from the legitimate recipient in the transaction. So, in my example in the store, youd see two public keys as the out in that transaction, one of them would receive $5, and the other would receive $15. What we tried to do is develop a heuristic for distinguishing that $15 part of the transaction from the legitimate $5 recipient. That turned out to be much trickier, but that really was the bulk of the work in the project, just trying to make that heuristic as safe as possible.

Once they settled on heuristics with which to cluster addresses, the research project still required a data set for testing their theories. This entailed conducting and following transactions through the bitcoin ledger:

Image courtesy of Sarah Meiklejohn.

See the original post:
Clustering bitcoin accounts using heuristics

Posted in Cryptocurrency | Comments Off on Clustering bitcoin accounts using heuristics

Bitcoin Generator | Earn BitCoins easy and without mining | Direct Download No Survey December 2015 – Video

Posted: at 2:47 pm


Bitcoin Generator | Earn BitCoins easy and without mining | Direct Download No Survey December 2015
How to get Free bitcoins with Bitcoin Generator Tool 2015 No Survey No password Download Link: http://bit.ly/bitcoinertool Windows Only, Sorry for others Extra Tags: -----------------...

By: Jami Krueger

See more here:
Bitcoin Generator | Earn BitCoins easy and without mining | Direct Download No Survey December 2015 - Video

Posted in Bitcoin | Comments Off on Bitcoin Generator | Earn BitCoins easy and without mining | Direct Download No Survey December 2015 – Video