БЛОГ

Archive for the ‘encryption’ category: Page 59

Nov 20, 2014

Bitcoin, Cryptocurrency, and Blockchain Technology — Voting Systems

Posted by in categories: automation, big data, bitcoin, business, complex systems, computing, disruptive technology, economics, encryption, engineering, ethics, geopolitics, government, hacking, hardware, information science, innovation, law, materials, open access, open source, philosophy, policy, polls, privacy, science, security, software, supercomputing, transparency, treaties

Quoted: “Bitcoin technology offers a fundamentally different approach to vote collection with its decentralized and automated secure protocol. It solves the problems of both paper ballot and electronic voting machines, enabling a cost effective, efficient, open system that is easily audited by both individual voters and the entire community. Bitcoin technology can enable a system where every voter can verify that their vote was counted, see votes for different candidates/issues cast in real time, and be sure that there is no fraud or manipulation by election workers.”


Read the article here » http://www.entrepreneur.com/article/239809?hootPostID=ba473f…aacc8412c7

Nov 20, 2014

Has the flawed password system finally had its day?

Posted by in categories: computing, cybercrime/malcode, encryption, privacy

— BBC

woman thinking in from of password graphic

Passwords are a pain. We choose simple words that are easy to remember, but equally easy for hackers to guess.

Yet we still forget them. And they also get stolen with alarming frequency.

Continue reading “Has the flawed password system finally had its day?” »

Nov 19, 2014

BitCoin, Cryptocurrency, and Blockchain Technology — FACTOM

Posted by in categories: automation, big data, biotech/medical, bitcoin, business, complex systems, computing, disruptive technology, economics, education, encryption, engineering, environmental, ethics, finance, futurism, geopolitics, hacking, information science, law, materials, open access, policy, science, security, software, supercomputing, transparency

Quoted: “The Factom team suggested that its proposal could be leveraged to execute some of the crypto 2.0 functionalities that are beginning to take shape on the market today. These include creating trustless audit chains, property title chains, record keeping for sensitive personal, medical and corporate materials, and public accountability mechanisms.

During the AMA, the Factom president was asked how the technology could be leveraged to shape the average person’s daily life.”

Kirby responded:

“Factom creates permanent records that can’t be changed later. In a Factom world, there’s no more robo-signing scandals. In a Factom world, there are no more missing voting records. In a Factom world, you know where every dollar of government money was spent. Basically, the whole world is made up of record keeping and, as a consumer, you’re at the mercy of the fragmented systems that run these records.”

Continue reading “BitCoin, Cryptocurrency, and Blockchain Technology — FACTOM” »

Nov 17, 2014

A New Economic Layer — BitCoin, Cryptorcurrency, and Blockchain Technology

Posted by in categories: big data, bitcoin, business, complex systems, computing, disruptive technology, economics, electronics, encryption, engineering, ethics, finance, futurism, geopolitics, hacking, human trajectories, information science, innovation, internet, law, materials, media & arts, military, open access, open source, policy, privacy, science, scientific freedom, security, software, supercomputing

Preamble: Bitcoin 1.0 is currency — the deployment of cryptocurrencies in applications related to cash such as currency transfer, remittance, and digital payment systems. Bitcoin 2.0 is contracts — the whole slate of economic, market, and financial applications using the blockchain that are more extensive than simple cash transactions like stocks, bonds, futures, loans, mortgages, titles, smart property, and smart contracts

Bitcoin 3.0 is blockchain applications beyond currency, finance, and markets, particularly in the areas of government, health, science, literacy, culture, and art.

Read the article here » http://ieet.org/index.php/IEET/more/swan20141110

Sep 26, 2014

Review: When Google Met WikiLeaks (2014) by Julian Assange

Posted by in categories: big data, bitcoin, computing, encryption, ethics, events, futurism, geopolitics, government, hacking, internet, journalism, law, law enforcement, media & arts, military, transhumanism, transparency
Julian Assange’s 2014 book When Google Met WikiLeaks consists of essays authored by Assange and, more significantly, the transcript of a discussion between Assange and Google’s Eric Schmidt and Jared Cohen.

Continue reading “Review: When Google Met WikiLeaks (2014) by Julian Assange” »

Jul 5, 2014

The Ultra-Simple App That Lets Anyone Encrypt Anything

Posted by in category: encryption

By — Wired
Original illustration: Getty
Encryption is hard. When NSA leaker Edward Snowden wanted to communicate with journalist Glenn Greenwald via encrypted email, Greenwald couldn’t figure out the venerable crypto program PGP even after Snowden made a 12-minute tutorial video.

Nadim Kobeissi wants to bulldoze that steep learning curve. At the HOPE hacker conference in New York later this month he’ll release a beta version of an all-purpose file encryption program called miniLock, a free and open-source browser plugin designed to let even Luddites encrypt and decrypt files with practically uncrackable cryptographic protection in seconds.

“The tagline is that this is file encryption that does more with less,” says Kobeissi, a 23-year old coder, activist and security consultant. “It’s super simple, approachable, and it’s almost impossible to be confused using it.”

Read more

Page 59 of 59First5253545556575859