Atlantis: Online Drug Black Market Shuts Its Doors

"One of the sites that was more or less a copy of The Silk Road and the second largest online black market, The Atlantis Market, was forced to shut their doors for good due to 'security' reasons. Atlantis offered black market, anonymous items, in exchange for Bitcoin and Litecoin. Users will have one week to withdraw any of their funds before the market shuts down permanently. Below is a statement from the Atlantis team." Continue reading

Continue ReadingAtlantis: Online Drug Black Market Shuts Its Doors

Gliph Raises $200,000 To Expand Secure Messaging And Bitcoin Features

"Gliph began in early 2012 as an encrypted messaging app, focused on securing communications across iPhone, Android and web users, protecting all messages with SSL and/or AES-256 encryption. The service also offers the ability to reveal only as much personal information as desired with communication partners, using symbols – or ‘artifacts’, as the company calls them – as the primary personal identifiers. More recently, Gliph has added a number of bitcoin functions to seamlessly transact in the digital currency. Users can link existing wallets from a number of popular options including BIPS, Blockchain.info, or Coinbase." Continue reading

Continue ReadingGliph Raises $200,000 To Expand Secure Messaging And Bitcoin Features

What Do the Latest NSA Leaks Mean for Bitcoin?

"Could the intelligence community have a secret exploit for Bitcoin? It's rather obvious that Bitcoin presents a very strong financial incentive to break its cryptography, since such a vulnerability could allow an attacker to claim large amounts of virtual currency for themselves. But given the decentralized nature of the currency, it may also be a target for intelligence officials looking for ways to track its use. Clearly, Bitcoin is on the government's radar. Knowing how much effort the NSA, amongst others, has placed on cracking encryption, has it tackled Bitcoin too? First, we need to look at how Bitcoin works." Continue reading

Continue ReadingWhat Do the Latest NSA Leaks Mean for Bitcoin?

How the US government inadvertently created Wikileaks

"So here you have a non-US citizen at a foreign university doing graduate work studies, and the United States government came barreling in and not only snuffed out the funding and killed his studies, it also barred him from knowing what it was he had been funded to research. It was at that moment, Julian told me, that he decided he would devote himself to exposing organizations that attempted to keep secrets and withhold information in an effort keep the masses ignorant and disadvantaged. So you see, depending on who you ask, the US government actually helped create of Wikileaks. And the rest, as they say, is history." Continue reading

Continue ReadingHow the US government inadvertently created Wikileaks

The feds pay for 60 percent of Tor’s development. Can users trust it?

"The NSA’s sustained attempt to get around encryption calls into question many of the technologies people have come to rely on to avoid surveillance. One indispensable tool is Tor, the anonymizing service that takes a user’s Internet traffic and spits it out from some other place on the Web so that its origin is obscured. So far there’s no hard evidence that the government has compromised the anonymity of Tor traffic. But some on a Tor-related e-mail list recently pointed out that a substantial chunk of the Tor Project’s 2012 operating budget came from the Department of Defense, which houses the NSA." Continue reading

Continue ReadingThe feds pay for 60 percent of Tor’s development. Can users trust it?

Toshiba’s quantum cryptography network that even the NSA can’t hack

"A quantum network uses specially polarized photons to encode an encryption key—a very long series of numbers and letters that can unlock a digital file. The photons are then sent down a fiber optic cable until they reach their destination, a photon detector, which counts them, and delivers the key to the intended recipient. If the photons are interfered with, the individual packets of information are forever altered and the recipient can see the telltale signs of tampering. The next step toward mainstreaming quantum crypto is increasing the distance that photons can travel before they degrade—currently the record is 200 km (124 miles) using a dedicated fiber optic cable." Continue reading

Continue ReadingToshiba’s quantum cryptography network that even the NSA can’t hack

What Exactly Are the NSA’s ‘Groundbreaking Cryptanalytic Capabilities’?

"Whatever the NSA has up its top-secret sleeves, the mathematics of cryptography will still be the most secure part of any encryption system. I worry a lot more about poorly designed cryptographic products, software bugs, bad passwords, companies that collaborate with the NSA to leak all or part of the keys, and insecure computers and networks. Those are where the real vulnerabilities are, and where the NSA spends the bulk of its efforts. While the NSA certainly has symmetric cryptanalysis capabilities that we in the academic world do not, converting that into practical attacks on the sorts of data it is likely to encounter seems so impossible as to be fanciful." Continue reading

Continue ReadingWhat Exactly Are the NSA’s ‘Groundbreaking Cryptanalytic Capabilities’?

Sudden spike of Tor users likely caused by one “massive” botnet

"Researchers have found a new theory to explain the sudden spike in computers using the Tor anonymity network: a massive botnet that was recently updated to use Tor to communicate with its mothership. Making a C&C server a Tor hidden service makes sense from an attacker's perspective. Tor makes it much harder for white hats and law enforcement officers to identify the malware operators and to shut down the server. Instead of connecting to a registered IP address, an infected machine connects to a pseudo address such as vtipk3.onion that is hard—if not impossible—to trace. Researchers have been predicting that botnets would adopt Tor protocols since at least 2010." Continue reading

Continue ReadingSudden spike of Tor users likely caused by one “massive” botnet

Bitcoin’s dilemma: go mainstream, or stay radical?

"Bitcoin enthusiasts and libertarians the world over are in a state of confusion about the slowness with which the outside world is catching on to their new way of exchanging money. But regulators and lawmakers are now, very gradually, realising they need to do something about this growing beast, even if they don't quite know what that something is. If the 'teenage band' gets signed on a 'mainstream label' then it will inevitably stray into more commercially minded territory. However, if the managers of the labels are not listening closely or do not like what they hear, perhaps this period of underground innovation will continue." Continue reading

Continue ReadingBitcoin’s dilemma: go mainstream, or stay radical?

Mapping the Bitcoin Economy Could Reveal Users’ Identities

"The new research comes at a time when investment in the bitcoin economy is booming (see “Bitcoin Hits the Big Time”), and as it is being scrutinized by U.S. authorities. In 2013, the U.S. Department of Homeland Security has seized a total of $5 million from Mt Gox, the largest exchange where people go to convert between bitcoins and conventional currencies. Last month, New York’s financial regulator subpoenaed 22 companies to gather information about their dealings with Bitcoin. 'The Bitcoin protocol still has huge potential for anonymity,' says Sarah Meiklejohn, who led the research project, 'but the way that people are using it is not achieving anonymity at all.'" Continue reading

Continue ReadingMapping the Bitcoin Economy Could Reveal Users’ Identities