The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Daily Archives: January 15, 2015
NSA official: Support of backdoored Dual_EC_DRBG was regrettable
Posted: January 15, 2015 at 7:48 am
It was a mistake for the National Security Agency to support a critical cryptographic function after researchers presented evidence that it contained a fatal flaw that could be exploited by US intelligence agents, the agency's research director said.
The comments by NSA Director of Research Michael Wertheimer were included in an article headlined The Mathematics Community and the NSA published this week in a publication called Notices. The article responds to blistering criticism from some mathematicians, civil liberties advocates, and security professionals following documents provided by former NSA subcontractor Edward Snowden showing that the agency deliberately tried to subvert widely used crypto standards. One of those standards, according to The New York Times, was a random number generator known as Dual EC_DRBG, which was later revealed to be the default method for generating crucial random numbers in the BSAFE crypto toolkit developed by EMC-owned security firm RSA.
"With hindsight, NSA should have ceased supporting the dual _EC_DRBG algorithm immediately after security researchers discovered the potential for a trapdoor," Wertheimer wrote. "In truth, I can think of no better way to describe our failure to drop support for the Dual_EC_DRBG algorithm as anything other than regrettable."
He went on to defend the NSA and deny accusations that it tried to subvert crypto standards. Dual EC_DRBG was one of four random number generators included in the larger standard known as SP 800-90A,he pointed out, and the NSA-generated points were necessary for accreditation and had to be implemented only for actual use in certain Defense Department applications.
Wertheimer wrote:
The costs to the Defense Department to deploy a new algorithm were not an adequate reason to sustain our support for a questionable algorithm. Indeed, we support NISTs April 2014 decision to remove the algorithm. Furthermore, we realize that our advocacy for the DUAL_EC_DRBG casts suspicion on the broader body of work NSA has done to promote secure standards. Indeed, some colleagues have extrapolated this single action to allege that NSA has a broader agenda to "undermine Internet encryption." A fair reading of our track record speaks otherwise. Nevertheless, we understand that NSA must be much more transparent in its standards work and act according to that transparency. That effort can begin with the AMS [American Mathematical Society] now.
In the future, Wertheimer promised, NSA officials will be more transparent in the way they support fledgling technologies being considered as widely used standards. All NSA comments will be in writing and published for review. Additionally, the NSA will publish algorithms before they're considered so that the public has more time to scrutinize them.
"With these measures in place, even those not disposed to trust NSA's motives can determine for themselves the appropriateness of our submissions, and we will continue to advocate for better security in open-source software, such as Security Enhancements for Linux and Security Enhancements for Android (selinuxproject.org)," he wrote.
Update: Critics are already characterizing Wertheimer's letter as a non-apology apology that only deepens the divide. In the blog A Few Thoughts on Cryptographic Engineering, for instance Matt Green, a Johns Hopkins university professor specializing in cryptography, wrote:
The trouble is that on closer examination, the letter doesn't express regret for the inclusion of Dual EC DRBG in national standards. The transgression Dr. Wertheimer identifies is simply the fact that NSA continued to support the algorithm after major questions were raised. That's bizarre.
The rest is here:
NSA official: Support of backdoored Dual_EC_DRBG was regrettable
Posted in NSA
Comments Off on NSA official: Support of backdoored Dual_EC_DRBG was regrettable
No, the NSA Isnt Like the StasiAnd Comparing Them Is Treacherous
Posted: at 7:48 am
Jasper Rietman
Ever since Edward Snowden handed thousands of National Security Agency documents over to filmmaker Laura Poitras and writer Glenn Greenwald in a Hong Kong hotel room, the NSAs mass surveillance of domestic phone calls and Internet traffic has been widely compared to the abuses of East Germanys secret police, the Stasi.
The communist republic may have imploded in 1989, but it has nonetheless become synonymous with a smothering, all-knowing spy apparatus.
A year ago, President Obama himself cited East Germany as a cautionary tale of what could happen when vast, unchecked surveillance turned citizens into informers and persecuted people for what they said in the privacy of their own homes. He was responding to accusations that just such a vast, unchecked effort to collect data has metastasized on his watch.
It was no coincidence that Poitras chose Leipzig, a city in the heart of the former East Germany, for the recent German debut of her documentary Citizenfour, about Snowden and the NSA. If the government is doing that kind of surveillance, it has a corrosive effect on democracy and society, Poitras said after the premiere. People who lived through it can tell you what it was like.
Indeed. When it was revealed that the NSA had been listening to her cell phone calls, German chancellor Angela Merkelwho came of age in communist East Germany, under the Stasis watchful eyetold President Obama, This is just like the Stasi. In an interview last year, NSA whistle-blower and Poitras source William Binney likened the agency to the Stasi on supersteroids.
Theyre wrong. In crucial ways, the two agencies are very different. In its effort to control East Germany, the Stasi made its presence felt in every sphere of life. Its power rested not only in the information its surveillance yielded but in the fear and distrust that collection instilled. The NSA, on the other hand, operates best in the dark, its targets unaware of its existence, let alone its dragnet data-gathering. Even Poitras, when asked, acknowledged a line between the two. The NSAs broad, mass collection is fundamentally different than what the Stasi did, she said in Leipzig.
Calling the Stasi secret police is misleading. The name is an abbreviation of STAatsSIcherheit, or State Security. Founded in 1950 as the East German Communist Partys sword and shield, it never hid the fact that it was spying. By the late 1980s, more than 260,000 East Germans1.6 percent of all adults in the countryworked for the organization, either as agents or as informants. (If the NSA employed as many analysts to spy on 320 million Americans, it would have 5 million people on the payroll.) It wanted you to constantly wonder which of your friends was an informant and, ideally, tempt or pressure you into the role of snitch too.
At times, the scrutiny reached absurd proportions. Every apartment building and workplace had a designated informer. Spies used specially built equipment to steam open mail; a Division of Garbage Analysis was on the lookout for suspect trash. Stasi agents let the air out of targets bicycle tires and rearranged the pictures in their apartments in an effort to drive class enemies crazy.
Cooperation was often a prerequisite for career advancement, academic success, even a new apartment. The Stasi had the power to take your children away or keep you from getting into a university. Its visibility and ubiquity forced East Germans to make moral choices every day: Collaborate with an unjust, undemocratic system or suffer the consequences.
View post:
No, the NSA Isnt Like the StasiAnd Comparing Them Is Treacherous
Posted in NSA
Comments Off on No, the NSA Isnt Like the StasiAnd Comparing Them Is Treacherous
NSA: SO SORRY we backed that borked crypto even after you spotted the backdoor
Posted: at 7:48 am
The NSA's director of research Michael Wertheimer says it's "regrettable" that his agency continued to support Dual EC DRBG even after it was widely known to be hopelessly flawed.
Writing in Notices, a publication run by the American Mathematical Society, Wertheimer outlined the history of the Dual Elliptic Curve Deterministic Random Bit Generator (Dual EC DRBG), and said that an examination of the facts made it clear no malice was involved.
Dual EC DRBG is a random number generator championed by the NSA in the 2000s. Number generators are an essential component of encryption systems; a weak generator will leave encrypted data vulnerable to decoding by an attacker.
This random number generator was eventually approved as a trustworthy algo by the US National Institute of Standards and Technology (NIST), despite concerns that it could be faulty, and RSA made it the default encryption systems in its BSAFE toolkits. A subsequent report suggested the NSA paid RSA $10m to include the flawed algorithm a claim RSA denies.
In 2007 two Microsoft security researchers, Dan Shumow and Niels Ferguson, pointed out that there were serious flaws with Dual EC DRBG, and that using it with elliptic curve points generated by the NSA could create a "trap door" that would allow encryption to be easily broken.
"With hindsight, NSA should have ceased supporting the Dual EC DRBG algorithm immediately after security researchers discovered the potential for a trapdoor. In truth, I can think of no better way to describe our failure to drop support for the Dual EC DRBG algorithm as anything other than regrettable," Wertheimer wrote [PDF].
"The costs to the Defense Department to deploy a new algorithm were not an adequate reason to sustain our support for a questionable algorithm. Indeed, we support NIST's April 2014 decision to remove the algorithm. Furthermore, we realize that our advocacy for the Dual EC DRBG casts suspicion on the broader body of work NSA has done to promote secure standards."
The case doesn't prove the NSA is actively trying to subvert crypto standards, Wertheimer argued, merely that a mistake had been made and then rectified. He pointed out that the NSA was keen to fund more mathematical research and post September 11 this work was vitally needed.
But Wertheimer's version of events isn't sitting well with some experts in the field. Assistant research professor Matthew Green of Johns Hopkins University Information Security Institute in Maryland has written a rebuttal to Wertheimer, pointing out several holes in his story.
For a start, Prof Green said problems with Dual EC DRBG systems that used the NSA's elliptic curve points were first noticed way back in 2004 by members of an ANSI standards committee, when NIST was still considering backing the algorithm. Someone on the panel even went as far as to file a patent on breaking encryption using the system.
Read the original post:
NSA: SO SORRY we backed that borked crypto even after you spotted the backdoor
Posted in NSA
Comments Off on NSA: SO SORRY we backed that borked crypto even after you spotted the backdoor
DRONE Skeet Shooting – Video
Posted: at 7:47 am
DRONE Skeet Shooting
We exercise our Second Amendment rights and blast away some mini-drones- in slow-mo! The DRONEs we are shooting at are the Parrot Rolling Spider Minidrone ...
By: Node
Excerpt from:
DRONE Skeet Shooting - Video
Posted in Second Amendment
Comments Off on DRONE Skeet Shooting – Video
Connie 720p – Video
Posted: at 7:47 am
Posted in Second Amendment
Comments Off on Connie 720p – Video
CryptoWall ransomware is back with new version after two months of silence
Posted: at 7:47 am
Attackers have started distributing a new and improved version of the CryptoWall file-encrypting ransomware program over the past few days, security researchers warn.
The new version, dubbed CryptoWall 3.0, uses localization and passes traffic to a site where users can pay for their decryption keys through two anonymity networksTor and I2P (the Invisible Internet Project).
CryptoWall is a sophisticated ransomware program that encrypts the victims files with a strong cryptographic algorithm. Users are asked to pay the equivalent of $500 in bitcoin virtual currency in order to receive the decryption key that allows them to recover their files.
The ransomware program provides users with links to several sites that act as Tor gateways. These proxy servers are supposed to automatically connect the users browser to the CryptoWall decryptor service hosted on the Tor network. However, it seems that with CryptoWall 3.0, the users traffic is also passed through another anonymity network called I2P.
A malware researcher who uses the online alias Kafeine discovered this change after infecting his test system with a CryptoWall 3.0 sample. When he tried to visit one of the Tor gateway links as instructed by the malware he received an error in Russian that roughly translates to: I2P website is unavailable. Perhaps it is disabled, the network is congested or your router is not well integrated with other nodes. You can repeat the operation.
This suggests that the site where users can pay the ransom and get their decryption keys from is no longer hosted on Tor, but on I2P. The Tor gateway likely passes the users traffic to a Tor hidden service first, which then connects to the I2P network to retrieve the real website. The ransom note also instructs users to download the Tor browser and access a Tor hidden service directly if the Tor gateway URLs no longer work.
CryptoWall is not the first malware program to use I2P. In November 2013, security researchers reported that an online banking Trojan called i2Ninja was being advertised on cybercriminal forums. The program communicated with a command-and-control server hosted on the I2P network, instead of Tor.
Like Tor, the I2P network allows users to run hidden services such as websites that are only accessible from within the network itself. With Tor such websites use the .onion pseudo-top-level domain, while with I2P they use .i2p.
A new version of Silk Road, an online marketplace for illegal goods and services, was recently launched on I2P. The site was previously hosted on Tor and was shut down two times by the FBI.
Cybercriminals started distributing CryptoWall 3.0 Monday, after around two months of inactivity that made researchers wonder whether the threat was gone.
View original post here:
CryptoWall ransomware is back with new version after two months of silence
Posted in Tor Browser
Comments Off on CryptoWall ransomware is back with new version after two months of silence
Bitcoin price plunge sparks new crash fears
Posted: at 7:46 am
Bitcoin had a stand at the CES exhibition in Las Vegas last week. Photograph: Ethan Miller/Getty Images
The price of one bitcoin has plunged by more than a quarter in just two days, prompting fears that the currency is in the midst of its fourth major crash.
On Tuesday morning, the currency was being traded at $267 a coin on Bitstamp, the largest individual exchange. However, by late Wednesday afternoon that had collapsed to just $195 - a fall of 27%.
The slide means that the currency has fallen by more than 80% from its record high of $1,150 reached in November 2013.
Unlike that crash, and the two before it in the summer of 2011 and spring of 2013, this time the cryptocurrency has not been the victim of a speculative bubble that then popped. Rather, the price of bitcoin has been declining fairly consistently since June 2014, when it started falling after months of temporary stability at about $600 a coin.
Greg Schvey, a partner at cryptocurrency data firm TradeBlock, told the New York Times that the new precipitous decline showed signs of a squeeze on bitcoin. People have these very real fiat-based liabilities that they have to pony up for, and to do that, theyre going to have to sell Bitcoins, he said.
The bitcoin network runs on the processing power of miners - computers put to work solving algorithmic puzzles in exchange for rewards in the currency. Companies that have invested millions of dollars into building specialised server farms have come to dominate the mining process, and received their share of the rewards.
But Schvey suggests that the real money those companies borrowed to start operating were beginning to be called in, forcing them to sell some of their proceeds that they may otherwise have held on to in the hope of a recovery in the price of bitcoin.
Further, the cryptocurrency has been shaken by yet another attack on the infrastructure that enables it to function as a working economy. Bitstamp reported a successful hacking attack in early January, which forced it to close its doors temporarily after $5.6m of bitcoin were stolen. While the attack was nowhere near as severe as that which took down the once-leading exchange, MtGox, last year, it still alarmed many.
In the face of the slump, many bitcoin proponents are turning their attention to a more fundamental technology called the blockchain. Sitting at the core of the bitcoin currency, the blockchain is the concept that allows money to be traded on a truly decentralised basis, but some argue that its capability goes far beyond that. The comparison most often drawn is that if bitcoin is an application, such as email, the blockchain is more like the whole internet.
Posted in Cryptocurrency
Comments Off on Bitcoin price plunge sparks new crash fears
Bitcoin in freefall as virtual currency plunges below $US250
Posted: at 7:46 am
Confidence in the virtual economy appears to be waning. Photo: Getty
The price of Bitcoin has plunged below $US250 and appears to be in freefall, as sell orders dominate global exchanges and investors flee the cryptocurrency.
Bitcoin's entrance into 2015 has been appalling, in the last 10 days alone the price has lost 26 per cent in value. Its rapid decline in recent weeks suggests confidence in the virtual currency is evaporating.
On Wednesday, CoinDesk recorded the price dropping to about $224 from $267, below where it began in April 2013. Large sell orders were triggered as Bitcoin sank through the $US250 mark, which traders have flagged as an imporant psychological barrier.
Bitcoin price plummets. Photo: CoinDesk
"We are seeing some huge orders sitting waiting at the $US200 mark and a lot of volume," an IG analyst told Fairfax Media. "That could be the next resistance point but we don't really know where Bitcoin is heading at the moment.
Advertisement
"I think it might hover around where it is for a while."
Some analysts pointed to the $US5 million hack of major exchange Bitstamp at the beginning of January as a potential spook for traders. The exchange suspended activity after the theft of 19,000 Bitcoins, however trading began again at the end of last week.
While some traders may be scurrying to pile on the short swaps or top-up their margin accounts, the plummeting price of Bitcoin has been felt throughout the cryptocurrency economy. Miners have found the sharp drop in price has directly affected their ability to stay in business.
Read more:
Bitcoin in freefall as virtual currency plunges below $US250
Posted in Cryptocurrency
Comments Off on Bitcoin in freefall as virtual currency plunges below $US250
How Bitcoin ATM’s Work and Getting a Bitcoin Wallet – Video
Posted: at 7:46 am
How Bitcoin ATM #39;s Work and Getting a Bitcoin Wallet
Michael Stephens #39; Bending Reality TV - http://BendingRealityTV.com How Bitcoin ATM #39;s work and getting a Bitcoin wallet. About Bending Reality TV Is it possible to shift your reality by...
By: BendingRealityTV
See the article here:
How Bitcoin ATM's Work and Getting a Bitcoin Wallet - Video
Posted in Bitcoin
Comments Off on How Bitcoin ATM’s Work and Getting a Bitcoin Wallet – Video
Bitcoin Generator Hack 2015 Generate free Bitcoins!.mp4 – Video
Posted: at 7:46 am
Bitcoin Generator Hack 2015 Generate free Bitcoins!.mp4
Bitcoins Hack BitCoin Generator 2015 Download here : http://bit.ly/Hack-BitCoin-Generator ========================================================= how to generate bitcoin, BitcoinGe.
By: Johny Ipc
See more here:
Bitcoin Generator Hack 2015 Generate free Bitcoins!.mp4 - Video
Posted in Bitcoin
Comments Off on Bitcoin Generator Hack 2015 Generate free Bitcoins!.mp4 – Video