Julian Assange and the Mindszenty Case – Antiwar.com Original

During World War II Cardinal Jozsef Mindszenty was a huge critic of fascism and wound up in prison. In Oct. 1945 he became head of the Church in Hungary and spoke out just as strongly against Communist oppression. He wound up back in prison for eight more years, including long periods of solitary confinement and endured other forms of torture. In 1949 he was sentenced to life in a show trial that generated worldwide condemnation.

Two weeks after the trial began in early 1949, Pope Pius XII (having failed to speak out forcefully against the Third Reich) did summon the courage to condemn what was happening to Mindszenty. Pius excommunicated everyone involved in the Mindszenty trial. Then, addressing a huge crowd on St. Peters Square, he asked, Do you want a Church that remains silent when she should speak a Church that does not condemn the suppression of conscience and does not stand up for the just liberty of the people a Church that locks herself up within the four walls of her temple in unseemly sycophancy ?

When the Hungarian revolution broke out in 1956, Mindszenty was freed, but only for four days. When Soviet tanks rolled back into Budapest, he fled to the U.S. embassy and was given immediate asylum by President Eisenhower.

There the Cardinal stayed cooped up for the next 15 years. Mindszentys mother was permitted to visit him four times a year, and the communist authorities stationed secret police outside the embassy ready to arrest him should he try to leave. Sound familiar?

Where is the voice of conscience to condemn what is happening to Julian Assange, whose only crime is publishing documents exposing the criminal activities and corruption of governments and other Establishment elites? Decades ago, the US and civilized world had nothing but high praise for the courageous Mindszenty. He became a candidate for sainthood.

And Assange? He has been confined in the Ecuadorian embassy in London for six years from June 19, 2012 the victim of a scurrilous slander campaign and British threats to arrest him, should he ever step outside. The US government has been putting extraordinary pressure on Ecuador to end his asylum and top US officials have made it clear that, as soon as they get their hands on him, they will manufacture a reason to put him on trial and put him in prison. All for spreading unwelcome truth around.

A Suppression of Conscience

One might ask, is unseemly sycophancy at work among the media? The silence of what used to be the noble profession of journalism is deafening. John Pilger one of the few journalists to speak out on Julian Assanges behalf, labels journalists who fail to stand in solidarity with Assange in exposing the behavior of the Establishment, Vichy journalists after the Vichy government that served ad enabled the German occupation of France.

Pilger adds:

No investigative journalism in my lifetime can equal the importance of what WikiLeaks has done in calling rapacious power to account. It is as if a one-way moral screen has been pushed back to expose the imperialism of liberal democracies: the commitment to endless warfare When Harold Pinter accepted the Nobel Prize for Literature in 2005, he referred to a vast tapestry of lies up on which we feed. He asked why the systematic brutality, the widespread atrocities, the ruthless suppression of independent thought of the Soviet Union were well known in the West while Americas imperial crimes never happened even while [they] were happening, they never happened.

WikiLeaks and 9/11: What if?

In an op-ed published several years ago by The Los Angeles Times, two members of Veteran Intelligence Professionals for Sanity, Coleen Rowley and Bogdan Dzakovic, pointed out that If WikiLeaks had been up and running before 9/11 frustrated FBI investigators might have chosen to leak information that their superiors bottled up, perhaps averting the terrorism attacks.

There were a lot of us in the run-up to Sept. 11 who had seen warning signs that something devastating might be in the planning stages. But we worked for ossified bureaucracies incapable of acting quickly and decisively. Lately, the two of us have been wondering how things might have been different if there had been a quick, confidential way to get information out.

Fourth Estate on Life Support

In 2010, while he was still a free man, the Sam Adams Associates for Integrity gave its annual award to Assange. The citation read:

It seems altogether fitting and proper that this years award be presented in London, where Edmund Burke coined the expression Fourth Estate. Comparing the function of the press to that of the three Houses then in Parliament, Burke said: but in the Reporters Gallery yonder, there sits a Fourth Estate more important far then they all.

The year was 1787 the year the US Constitution was adopted. The First Amendment, approved four years later, aimed at ensuring that the press would be free of government interference. That was then.

With the Fourth Estate now on life support, there is a high premium on the fledgling Fifth Estate, which uses the ether and is not susceptible of government or corporation control. Small wonder that governments with lots to hide feel very threatened.

It has been said: You shall know the truth, and the truth shall set you free. WikiLeaks is helping make that possible by publishing documents that do not lie.

Last spring, when we chose WikiLeaks and Julian Assange for this award, Julian said he would accept only on behalf or our sources, without which WikiLeaks contributions are of no significance.

We do not know if Pvt. Bradley Manning gave WikiLeaks the gun-barrel video of July 12, 2007 called Collateral Murder. Whoever did provide that graphic footage, showing the brutality of the celebrated surge in Iraq, was certainly far more a patriot than the mainstream journalist embedded in that same Army unit. He suppressed what happened in Baghdad that day, dismissed it as simply one bad day in a surge that was filled with such days, and then had the temerity to lavish praise on the unit in a book he called The Good Soldiers.

Julian is right to emphasize that the world is deeply indebted to patriotic truth-tellers like the sources who provided the gun-barrel footage and the many documents on Afghanistan and Iraq to WikiLeaks. We hope to have a chance to honor them in person in the future.

Today we honor WikiLeaks, and one of its leaders, Julian Assange, for their ingenuity in creating a new highway by which important documentary evidence can make its way, quickly and confidentially, through the ether and into our in-boxes. Long live the Fifth Estate!

Eventually a compromise was found in 1971 when Pope Paul VI lifted the excommunications and Mindszenty was able to leave the US embassy. Can such a diplomatic solution be found to free Assange? It is looking more and more unlikely with each passing year.

Ray McGovern works with Tell the Word, a publishing arm of the ecumenical Church of the Saviour in inner-city Washington. His 27-year career as a CIA analyst includes serving as Chief of the Soviet Foreign Policy Branch and preparer/briefer of the Presidents Daily Brief. He is co-founder of Veteran Intelligence Professionals for Sanity (VIPS). Reprinted with permission from Consortium News.

Ray McGovern works with Tell the Word, the publishing arm of the ecumenical Church of the Saviour in inner-city Washington. In the Sixties he served as an infantry/intelligence officer and then became a CIA analyst for the next 27 years. He is on the Steering Group of Veteran Intelligence Professionals for Sanity (VIPS).View all posts by Ray McGovern

View original post here:
Julian Assange and the Mindszenty Case – Antiwar.com Original

Cryptocurrency Rankings | CryptoSlate

Cryptocurrency Rankings | CryptoSlate Biggest Gainers 24h Min. $50k Volume

GLOBAL MARKET CAP $291.63B

24H VOLUME $12.05B

COINBASE INDEX 3225.25

BTC DOMINANCE 39.87%

TOTAL CRYPTOS 1600

TOTAL TOKENS 797

TOTAL PoW COINS 549

TOTAL PoS COINS 378

Ordered by Market Capitalization

Displaying 1-100 of 1600 total cryptos

A worldwide cryptocurrency and digital payment system

Decentralized platform that runs smart contracts

Enterprise blockchain solution for global payments

Peer-to-peer electronic cash

Infrastructure for decentralized applications

Peer-to-peer Internet currency

Connecting banks, payments systems and people

Platform for complex programmable transfers of value

Cross-protocol for digital entertainment

Open-source distributed ledger protocol

Fiat currencies on the Bitcoin blockchain

Distributed smart economy network

Digital cash

A secure, private, and untraceable cryptocurrency

Digital asset exchange

Product ID Management

Decentralized platform that runs smart contracts

Blockchain built for enterprise

High-Performance Public Multi-Chain Project

Business-ready blockchain

Ethereum-based financial technology

Cryptocurrency with groundbreaking privacy

Interconnecting blockchain network

Private untraceable cryptocurrency

Blockchain application platform for Javascript developers

Scalable blockchain platform with througput of thousands of TX/s

Open and progressive cryptocurrency

Scalable blockchain platform

Bitcoin fork using Equihash algorithm

Interactive protocol of multiple byte assets

Powering decentralized exchange

Decentralized private cloud

Secure and anonymous cryptocurrency

Decentralized exchange

Blockchain based social media platform

Decentralized prediction market

Low-latency payment platform

Blockchain-powered customizable tokens platform

Scalable blockchain applications

Decentralized autonomous organization on the Ethereum blockchain

Peer-to-peer digital currency

Private cross-chain smart contracts

Worldwide supercomputer

Private, decentralized, fast, open source, community-driven coin

Enterprise blockchain development platform

Invoice and trade finance platform

Decentralized global blockchain

Infrastructure for online service providers

Traceable business ecosystem

Ethereum mobile client

Blockchain-powered loyalty point system

Open-source cross platform cryptocurrency

International blockchain assets exchange

Tokenized gold on Ethereum

Multi-tier blockchain system

Decentralized exchange and open protocol

Open source blockchain technology suite

World’s first decentralized data marketplace

Decentralized tip platform

Token for creating smart tokens

Token on the Nxt blockchain

Global blockchain acquiring

Decentralized Cloud Computing Blockchain Network

The world’s first autonomous data network

A Revolutionary Blockchain Architecture

All-in-one blockchain solutions

First Japanese cryptocurrency

Future of Decentralized Internet

Empowering the decentralization of online marketplaces

AI-enhanced encrypted digital asset exchange platform

Ethereum-based token for dental Industry

A privacy-focused cryptocurrency

Peer-to-peer investment banking service

Social media tokens that reward all content creators

Token required to run NEO smart contracts

Instant exchange of digital assets

Decentralized gaming platform

Cryptofinance protocol for the Internet of Values

People-powered cryptocurrency platform

Business on the blockchain platform

Providing liquidity to the crypto economy

Decentralized AI autonomous system

Blockchain-based quantitative data providing and exchanging platform for storage

Cryptocurrency and Blockchain service platform

Advanced blockchain platform

Blockchain platform for large-scale online games and social apps

Decentralized ecosystem for the Kik platform

Autonomous trading investment platform

A blockchain-based virtual reality world

Read more:
Cryptocurrency Rankings | CryptoSlate

What is cryptocurrency? – Definition from WhatIs.com

A cryptocurrency is a digital medium of exchange that uses encryption to secure the processes involved in generating units and conducting transactions.

Cryptocurrencies are a subset of digital currencies and, as such, have no physical representation. They may beused for online orin-person transactions with any vendors who accept them.In-person transactions using cryptocurrencies aretypically conductedthrough mobile paymentfrom a digital wallet.

There are hundreds of cryptocurrencies around the world. Among them, Bitcoin is the most prominent example — in fact, other cryptocurrencies are sometimes referred to as altcoins, as in alternatives to Bitcoin. The Bitcoinprotocol enables peer-to-peer (P2P) exchange in a decentralized system that, unlike conventional currencies,is not associated with any financial institution or government.

Bitcoin-to-Bitcoin transactions are conducted through anonymous, heavily encryptedhashcodes across a peer-to-peer network.Each users digital wallet maintains their Bitcoins. The wallet also stores all addresses the user sends and receives Bitcoins from, along with aprivate keyknown only to the user. The P2P network monitors and verifies Bitcoin transfers.

Other cryptocurrencies include Litecoin, primecoin, Namecoin and Feathercoin.

Paul Vigna provides a crash course on cryptocurrencies:

Read the original:
What is cryptocurrency? – Definition from WhatIs.com

365 Markets Trading CFDs

Our PLatform

Trading CFDs in 365Markets has never been so easier thanks to the use of todays incredible technological developments.

365Markets has taken the reliability of the traditional trading industry and made it available to anyone with an internet connection and a credit card.

A secure personal account can be created in minutes giving you access to todays top trading assets through an award-winning trading platform that features cutting-edge technology.

On the left side of your screen you will see all the Crypto assets available to be traded on.

You can access to over 280 of the most promising Cryptocurrency brands of today.

Just use the menu bar to bring up the market that you are interested in.

You can select the style of the chart like a bar chart or a candlestick chart.

Choose how many CFDs you want to trade. 1 CFD is the equivalent of 1 physical share in equity trades.

A stop loss is an order to close your position out at a certain price if it moves too far against you.

How much you hope to earn on this trade, the system will automatically close your position when this level is achieved.

Click Buy if you think the price will increase in value or Sell if you think the market will fall in value.

Once you approved your trade, you will see your profit/loss update in real time at the bottom of the screen. You can exit your trade by clicking the close trade button.

Continued here:
365 Markets Trading CFDs

What is Mining Cryptocurrency? What you need to know…

Mining cryptocurrency can be a lucrative endeavor with enough computing power

Mining cryptocurrency is in the news a lot lately. People are finding their computers have been compromised by malware and are mining, or in some cases entire botnets are mining. But what does that mean?

This isnt mining in the traditional sense. There are no pick axes or canaries involved. Instead. its more about trying to win a blockchain lottery to earn the reward at the end.

What does that all mean? Lets hash it out.

To begin a discussion of mining cryptocurrency we need to start with what cryptocurrency is. Cryptocurrency is a digital form of currency with a cryptographic underpinning that is used as a secure medium of exchange. There are literally hundreds of different cryptocurrencies with varying real-world values. Many believe its the future of currency.

The most popular cryptocurrency is bitcoin, you may have heard of others like Etherium, too. While cryptocurrencies may differ in terms of the algorithms and encryption they use, they all share one similiarity: blockchain. And thats what we need to talk about next.

Blockchain is a digital ledger of transactions that is impossible to alter. It uses hashing and a concept similar to salting to continuously complete blocks of information that chain to form an immutable ledger.

Hashing is the act of mapping data of any length to a fixed-length output. When cryptography is involved its a one-way function. The most popular hashing algorithm is SHA-256, which outputs at a length of 256 bits. Every hash value is unique. Even the tiniest alteration to the data being hashed caused the entire value to change.

Hashing is considered one-way because of the amount of computing power it would take to reverse-hash it. For a 256-bit output, calculate 2 to the power of 256 (2 X 2 X 2 256 times). Your odds of finding the correct value are 1 in the product of that equation. Those are astronomical odds. It would take a supercomputer thousands of years to compute that.

Now lets fit it all together. With a cryptocurrency blockchain, as transactions occur they are broadcast and added to various private ledgers. Each one of these transactions is digitally signed for the sake of authenticity. On the other end, there are people or groups collecting these transactions and building ledgers. They are also computing to find a value that when hashed along with the ledger, produces a set number of 0s at the beginning of the hash value. Thats the portion thats similar to salting.

So lets say that for our example cryptocurrency, weve set the total to 10 0s. That means the first 10 spots of the 256-character hash value should all be 0s.

When the correct value is found, the block is closed, its broadcast officially and added to everyones blockchain, then the hash of the old block is put atop the new ledger and the process begins again. This is how blocks are created in the chain.

The act of computing the correct value to satisfy the hash function in blockchain is called mining. When it comes to cryptocurrency, a reward is provided to whoever solves for the correct value. That makes it lucrative to compute the correct value, though it takes quite a bit of power to accomplish that.

Oftentimes people pool their computing power together and split the reward if they solve for the correct value. In other cases, hackers have been known to co-opt others computers and use some of their computing power behind the scenes to mine cryptocurrency. There are entire botnets doing nothing but mining.

Really, solving for the correct value is like winning the lotto. There are countless people and botnets attempting to find the value and whoever finds it first gets the reward.

Of course, if you can accumulate enough computing power you could solve for the value enough of the time that you could accrue a substantial amount of cryptocurrency.

When someone says mining cryptocurrency what theyre referring to is the act of trying to compute a specific hash value by producing a set value that, when hashed along with the block ledger, produces a specific result. This requires considerable computing power, but considering the rewards its well worth it.

Heres what we covered in todays discussion:

Read this article:
What is Mining Cryptocurrency? What you need to know…

CryptoCurrency Expo

Crypto Currency ExpoCrypto Currency Expo (CCExpo) consists of the dynamic collaboration of professionals, bankers, investors, educators, miners, thought leaders, and enthusiasts in the cryptocurrency industry worldwide. The main thrust of this global expo is to provide real perspectives, timely insights, and first-hand information on the state of cryptocurrency in today’s trends, along with the current business opportunities and innovations in the future. The previous expos were organized by Global Crypto Hub (GCH), which was founded by Mr. ShahinNoble Pilli and Mr. Jagdish Pandya.CCExpo is all about captivating a wide audience regarding the world of blockchains, cryptos, and ICOs, along with the millions of people worldwide.

Humble beginningsWith the success of the first three major expos held in Bangkok, Dubai, and Kuala Lumpur, this led to the 4th Crypto Currency Expo held in Mahatma Mandir, Gandhinagar, Gujarat, India on Jan. 24-25, 2018. This fourth expo was a big hit in India, attended by prominent global experts and speakers worldwide. This has validated that blockchains, cryptos, and ICOs have achieved immense popularity in India with the rest of the world.

What to expect in the CCExpoCrypto Currency Expo is filled with panel discussions, presentations by ICO/blockchain companies, insights from experts, one-to- one meetings, networking and special exclusive VIP awards and gala dinners. This provides a huge opportunity for the participants to gather information, acquire knowledge, and network with high net-worth individuals (HNIs). Through the years, it has been recognized as one of the best places to connect, collaborate, and create the future in cryptocurrency ecosystem.

See the article here:
CryptoCurrency Expo

Bring Julian Assange Home – counterpunch.org

The persecution of Julian Assange must end. Or it will end in tragedy.

The Australian government and prime minister Malcolm Turnbull have an historic opportunity to decide which it will be.

They can remain silent, for which history will be unforgiving. Or they can act in the interests of justice and humanity and bring this remarkable Australian citizen home.

Assange does not ask for special treatment. The government has clear diplomatic and moral obligations to protect Australian citizens abroad from gross injustice: in Julians case, from a gross miscarriage of justice and the extreme danger that await him should he walk out of the Ecuadorean embassy in London unprotected.

We know from the Chelsea Manning case what he can expect if a US extradition warrant is successful a United Nations Special Rapporteur called it torture.

I know Julian Assange well; I regard him as a close friend, a person of extraordinary resilience and courage. I have watched a tsunami of lies and smear engulf him, endlessly, vindictively, perfidiously; and I know why they smear him.

In 2008, a plan to destroy both WikiLeaks and Assange was laid out in a top secret document dated 8 March, 2008. The authors were the Cyber Counter-intelligence Assessments Branch of the US Defence Department. They described in detail how important it was to destroy the feeling of trust that is WikiLeaks centre of gravity.

This would be achieved, they wrote, with threats of exposure [and] criminal prosecution and a unrelenting assault on reputation. The aim was to silence and criminalise WikiLeaks and its editor and publisher. It was as if they planned a war on a single human being and on the very principle of freedom of speech.

Their main weapon would be personal smear. Their shock troops would be enlisted in the media those who are meant to keep the record straight and tell us the truth.

The irony is that no one told these journalists what to do. I call them Vichy journalists after the Vichy government that served and enabled the German occupation of wartime France.

Last October, the Australian Broadcasting Corporation journalist Sarah Ferguson interviewed Hillary Clinton, over whom she fawned as the icon for your generation.

This was the same Clinton who threatened to obliterate totally Iran and, who, as US secretary of State in 2011, was one of the instigators of the invasion and destruction of Libya as a modern state, with the loss of 40,000 lives. Like the invasion of Iraq, it was based on lies.

When the Libyan President was murdered publicly and gruesomely with a knife, Clinton was filmed whooping and cheering. Thanks largely to her, Libya became a breeding ground for ISIS and other jihadists.Thanks largely to her, tens of thousands of refugees fled in peril across the Mediterranean, and many drowned.

Leaked emails published by WikiLeaks revealed that Hillary Clintons foundation which she shares with her husband received millions of dollars from Saudi Arabia and Qatar, the main backers of ISIS and terrorism across the Middle East.

As Secretary of State, Clinton approved the biggest arms sale ever worth $80 billion to Saudi Arabia, one of her foundations principal benefactors. Today, Saudi Arabia is using these weapons to crush starving and stricken people in a genocidal assault onYemen.

Sarah Ferguson, a highly paid reporter, raised not a word of this with Hillary Clinton sitting in front of her.

Instead, she invited Clinton to describe the damage Julian Assange did personally to you. In response, Clinton defamed Assange, an Australian citizen, as very clearly a tool of Russian intelligence and a nihilistic opportunist who does the bidding of a dictator.

She offered no evidence nor was asked for any to back her grave allegations.

At no time was Assange offered the right of reply to this shocking interview, which Australias publicly-funded state broadcaster had a duty to give him.

As if that wasnt enough, Fergusons executive producer, Sally Neighour, followed the interview with a vicious re-tweet: Assange is Putins bitch. We all know it!

There are many other examples of Vichy journalism. TheGuardian, reputedly once a great liberal newspaper, conducted a vendetta against Julian Assange. Like a spurned lover, theGuardianaimed its personal, petty, inhuman and craven attacks at a man whose work it once published and profited from.

The former editor of theGuardian,Alan Rusbridger, called the WikiLeaks disclosures, which his newspaper published in 2010, one of the greatest journalistic scoops of the last 30 years. Awards were lavished and celebrated as if Julian Assange did not exist.

WikiLeaks revelations became part of theGuardiansmarketing plan to raise the papers cover price. They made money, often big money, while WikiLeaks and Assange struggled to survive.

With not a penny going to WikiLeaks, a hypedGuardianbook led to a lucrative Hollywood movie deal. The books authors, Luke Harding and David Leigh, gratuitously abused Assange as a damaged personality and callous.

They also revealed the secret password Julian had given theGuardianin confidence and which was designed to protect a digital file containing the US embassy cables.

With Assange now trapped in the Ecuadorean embassy, Harding, who had enriched himself on the backs of both Julian Assange and Edward Snowden, stood among the police outside the embassy and gloated on his blog that Scotland Yard may get the last laugh.

The question iswhy.

Julian Assange has committed no crime. He has never been charged with a crime. The Swedish episode was bogus and farcical and he has been vindicated.

Katrin Axelsson and Lisa Longstaff of Women Against Rape summed it up when they wrote, The allegations against [Assange] are a smokescreen behind which a number of governments are trying to clamp down on WikiLeaks for having audaciously revealed to the public their secret planning of wars and occupations with their attendant rape, murder and destruction The authorities care so little about violence against women that they manipulate rape allegations at will.

This truth was lost or buried in a media witch-hunt that disgracefully associated Assange with rape and misogyny. The witch-hunt included voices who described themselves as on the left and as feminist. They willfully ignored the evidence of extreme danger should Assange be extradited to the United States.

According to a document released by Edward Snowden, Assange is on a Manhunt target list. One leaked official memo says: Assange is going to make a nice bride in prison. Screw the terrorist. Hell be eating cat food forever.

In Alexandra, Virginia the suburban home of Americas war-making elite a secret grand jury, a throwback to the middle ages has spent seven years trying to concoct a crime for which Assange can be prosecuted.

This is not easy; the US Constitution protects publishers, journalists and whistleblowers. Assanges crime is to have broken a silence.

No investigative journalism in my lifetime can equal the importance of what WikiLeaks has done in calling rapacious power to account. It is as if a one-way moral screen has been pushed back to expose the imperialism of liberal democracies: the commitment to endless warfare and the division and degradation of unworthy lives: from Grenfell Tower to Gaza.

WhenHarold Pinter accepted the Nobel Prize for Literature in 2005, he referred to a vast tapestry of lies up on which we feed. He asked why the systematic brutality, the widespread atrocities, the ruthless suppression of independent thought of the Soviet Union were well known in the West while Americas imperial crimes never happened even while [they] were happening, they never happened..

In its revelations of fraudulent wars (Afghanistan, Iraq) and the bald-faced lies of governments (the Chagos Islands), WikiLeaks has allowed us to glimpse how the imperial game is played in the 21st century.Thatis why Assange is in mortal danger.

Seven years ago, in Sydney, I arranged to meet a prominent Liberal Member of the Federal Parliament, Malcolm Turnbull.

I wanted to ask him to deliver a letter from Gareth Peirce, Assanges lawyer, to the government. We talked about his famous victory in the 1980s when, as a young barrister, he had fought the British Governments attempts to suppress free speech and prevent the publication of the bookSpycatcher in its way, a WikiLeaks of the time, for it revealed the crimes of state power.

The prime minister of Australia was then Julia Gillard, a Labor Party politician who had declared WikiLeaks illegal and wanted to cancel Assanges passport until she was told she could not do this: that Assange had committed no crime: that WikiLeaks was a publisher, whose work was protected under Article 19 of the Universal Declaration of Human Rights, to which Australia was one of the original signatories.

In abandoning Assange, an Australian citizen, and colluding in his persecution, Prime Minister Gillards outrageous behaviour forced the issue of his recognition, under international law, as a political refugee whose life was at risk. Ecuador invoked the 1951 Convention and granted Assange refuge in its embassy in London.

Gillard has recently been appearing in a gig with Hillary Clinton; they are billed as pioneering feminists.

If there is anything to remember Gillard by, it a warmongering, sycophantic, embarrassing speech she made to the US Congress soon after she demanded the illegal cancellation of Julians passport.

Malcolm Turnbull is now the Prime Minister of Australia. Julian Assanges father has written to Turnbull. It is a moving letter, in which he has appealed to the prime minister to bring his son home. He refers to the real possibility of a tragedy.

I have watched Assanges health deteriorate in his years of confinement without sunlight. He has had a relentless cough, but is not even allowed safe passage to and from a hospital for an X-ray .

Malcolm Turnbull can remain silent. Or he can seize this opportunity and use his governments diplomatic influence to defend the life of an Australian citizen, whose courageous public service is recognised by countless people across the world. He can bring Julian Assange home.

This is an abridged version of an address by John Pilger to a rally in Sydney, Australia, to mark Julian Assanges six years confinement in the Ecuadorean embassy in London.

Link:
Bring Julian Assange Home – counterpunch.org

Download Sophos Free Encryption 2.40.1.11 – softpedia.com

IMPORTANT NOTICE

Sophos Free Encryption is an intuitive application that you can use to protect your sensitive data from unauthorized viewing. It can be handled by all types of users.

The interface of the program is based on a standard window with an intuitive layout, where you can add files into the secured environment using either the file browser, folder view or “drag and drop” method. You can add as many items as you want.

In order to encrypt data, you have to specify a target for the archive with the Sophos Free Encryption format (UTI), and assign a password to it. Alternatively, you can apply a key file as a dependency.

A few options are available for the encryption process. Therefore, you can create self-extracting executable files, securely delete the original items after encryption, compress data and save passwords in a history list.

Furthermore, you can use the default email client to send the encrypted archives via email after the process is done, as well as change the default file path to the passwords history list.

Sophos Free Encryption carries out a task rapidly and without errors, while using a low-to-moderate quantity of CPU and system memory, thus it does not affect the computer’s overall performance. We haven’t come across any difficulties in our tests, since the tool did not hang or crash.

Although it has not been updated for a pretty long time, Sophos Free Encryption offers users a simple alternative to secure their files, by turning them into encrypted archives.

File Encryption File Encrypter Encrypt Folder Encryption Encrypt Encrypter Decrypt

Read more here:
Download Sophos Free Encryption 2.40.1.11 – softpedia.com

StoreName Enumeration (System.Security.Cryptography …

This documentation is archived and is not being maintained.

.NET Framework (current version)

The .NET API Reference documentation has a new home. Visit the .NET API Browser on docs.microsoft.com to see the new experience.

Specifies the name of the X.509 certificate store to open.

System (in System.dll)

The X.509 certificate store for other users.

The X.509 certificate store for third-party certificate authorities (CAs).

The X.509 certificate store for intermediate certificate authorities (CAs).

The X.509 certificate store for revoked certificates.

The X.509 certificate store for personal certificates.

The X.509 certificate store for trusted root certificate authorities (CAs).

The X.509 certificate store for directly trusted people and resources.

The X.509 certificate store for directly trusted publishers.

This enumeration specifies the X.509 store name, which also includes the type of certificates included. For example, My includes personal certificates, whereas Disallowed includes only revoked certificates.

The following code example opens an X.509 certificate store, adds and deletes certificates, and then closes the store. It assumes you have three certificates to add to and remove from a local store.

.NET Framework Available since 2.0

See more here:
StoreName Enumeration (System.Security.Cryptography …

Apollo All-in-One Cryptocurrency

About Apollo

Utilizing a community of world-class developers, managers, marketers and researchers, the Apollo community, backed by the Apollo Foundation, has set out to accomplish the goal of making Apollo the most technologically advanced, feature-rich currency on the market. The Apollo Foundation understands the demands of a top tier cryptocurrency and they believe they can create a coin that will integrate everything necessary to replace the current currency options. Having started from NXT, a proven cryptocurrency, the Apollo Foundation will continue development with the goal of being first all-in-one cryptocurrency, innovating and incorporating every ability that could be beneficial in a digital currency, all in a single decentralized platform. The first major update, Olympus Protocol, puts mass adoption-proof privacy at Apollo’s core. This is because the Apollo Foundation knows the ability for a user to buy, sell, trade and send in absolute secrecy is vital in an industry that could be moments away from intense regulation. The Apollo team is here because they believe the only person or entity that should be in control of your funds is you.

FEATURES

Olympus Protocol

Olympus protocol will integrate functions allowing for the simple choice of whether to send publicly on the blockchain or privately using the blockchain. As part of this protocol we will be integrating an IP masking feature that will hide the users IP address.

We are also working to secure a technology that would keep nodes from being blocked by entities. Olympus Protocol will help make Apollo the safest, most feature-rich privacy coin in existence.

Decentralized Exchange

The decentralized exchange is an important feature in the Apollo platform as it allows for the fast and private purchasing, selling and trading of all assets, tokens and currencies created within Apollo. We are in the process of also adding Bitcoin, Ethereum and many other well-known cryptocurrencies to this exchange. This will allow users the ability to buy and sell Apollo privately from any nation on Earth.

Next-Generation Blockchain

Having utilized NXT technology as our base, we are developing Hermes to be it’s replacement. Hermes will allow the Apollo blockchain to grow faster and healthier the larger the Apollo user base grows, rather than slower as with most cryptocurrencies on the market. Where as our current speed may be 20 to 30 seconds on average (transaction times will differ) Hermes will allow for transaction speeds of 2-3 seconds. Our goal in integrating Hermes is to become the safest, fastest and most private cryptocurrency on the market.

Alias System

The alias system in Apollo can be used to create unique aliases that act as a representation for a specific set of text. This will encrypt the chosen text into the alias. This text could be your account number, a website, email address, etc. A specific alias can be claimed only once (like a domain name), therefore it can be sold privately or publicly and transferred to any other account. The most obvious use for an alias is in sending funds to an account number that is tied to that alias. Instead of typing out the entire account number you would simply write out the alias.

Multi-Sig/Phased Transactions

Voting System

Apollo supports multi-signature accounts allowing more than one user to control an account. It also supports phased transactions which are transactions set up to occur after a certain condition is met. This could be after another transaction is sent or received, after a passage of time or after a certain block number is hit.

The Apollo voting system allows users to create public or private polls for many purposes. Polls can be used to direct and manage funds from an account, elect officials or simply to gauge public opinion. This opens up near endless possibilities for collecting absolute, verified responses from designated sources.

Possible use cases: Contracts, Voting, Signatures, Account Management, Arbitration, etc.

Encrypted Messaging

Encrypted messaging on the Apollo blockchain will allow any user to send and receive , untraceable messages and data files from one account to another. Utilizing the Olympus protocol, the users IP address and the transaction carrying the message will be invisible.

Possible use cases: Untraceable Communication, Untraceable File Transfer, etc.

Monetary System

The monetary system within Apollo allows users to instantly create currencies that can be traded privately on Apollos decentralized exchange as well as freely on external exchanges. These currencies can be easily backed by Apollo giving them an instant, tangible value.

Possible use Cases: Finance, Charity, Voter IDs, Escrows, Coupons, Currencies, etc.

Decentralized Marketplace

The Apollo decentralized marketplace will allow users to buy, sell and trade physical and digital goods using the Apollo currency. Users can list goods to be sold locally or even worldwide. Trading will be decentralized and untraceable allowing the free trade of any item. Future updates will include a review and reputation system aiding sellers in building a positive reputation based on experiences.

Cloud Storage

The Apollo data cloud allows any user to upload data to the blockchain for storage, retrieval and publishing of information. This gives a user the ability to upload a file to the blockchain, therefore receiving an irrefutable timestamp for that data. This timestamp could be helpful in establishing an absolute date for legal documents such as contracts and intellectual ownership.

Possible use cases: Voting, Permits, Evidence, Court Records, Transparency, Death/Birth Certificates, Contracts, Wills, Trusts, Escrows, Maps, GPS Data, Signatures, Medical Records, Arbitration, Delivery Records, Certifications, etc.

Advanced Account Control

Accounts can be created in a way that allows group control. Utilizing the Apollo voting system a group can be granted the ability (via initial ownership or ownership of a specified token or asset) to vote on the transactions that are spent on the account.

Possible use cases: Private Investment Fund, Private Insurance Fund, Charity Fund, Decentralized Autonomous Organizations (DAO)

Asset System

Using the Apollo asset system, a user can issue, buy, sell and trade asset tokens intended to represent anything from public and private equity to real world commodities. Unlike other markets and cryptocurrencies, users will be able to trade these assets with 100% privacy.

Possible use cases: Assets, Commodities, Derivatives, etc.

Coin Shuffling

Plugins

Coin shuffling is an additional privacy feature allowing your Apollo, as well as other assets or currencies held in the account, to be simply and randomly shuffled between user accounts. This allows an account holder to anonymize their funds and transactions nearly instantly.

The Apollo system allows for integration of 3rd party software into the core wallet. This will allow unimaginable growth via community developed features.

Authentication System

The Apollo authentication system allows a user to authenticate an account using the blockchain. This could be used to prove that a user is genuinely in control of a specific account.

Read the rest here:
Apollo All-in-One Cryptocurrency