Encryption- Computer & Information Security – Information …

There are instructions at encrypt.stanford.edu that will walk you through the steps necessary to fulfill University security requirements for each of your devices. Before you begin, however, being prepared ahead of time for the following steps may help you streamline the encryption process.

In case something goes wrong during the encryption process, you should back up your computer before running the SWDE installer.

The School of Medicine recommends using CrashPlan: it’s asecure, monitored, convenient backup system and it’s free for School of Medicine affiliates. Additionally, the SoM can assist you in restoring your information from CrashPlan, in the event of a hard drive crash or lost computer. While it is not currently required, it is strongly recommended.

For instructions and help with installation, visit the School of Medicine’sCrashPlan Guide.

For desktop and laptop computers, Stanford Whole Disk Encryption (SWDE) installer makes certain that your computer has all the necessary requirements, and then guides you through the activation of your computer’s native encryption software (FileVault for Mac, and BitLocker for Windows).

(For mobile device encryption instructions, select your operating system:Apple/iOSorAndroid.)

Each time you access your system (on startup, after sleep/hibernation, etc), you use a “key” (password) to unlock your data. IF YOU CANNOT REMEMBER YOUR KEY, YOU WILL NOT BE ABLE TO ACCESS YOUR ENCRYPTED DATA.

In case of a forgotten key, it is likely that someone at ITS will be able to help you recover your data. However, we still recommend the following:

Once you have selected your login password and backup method, you are ready to move on to theencryption process.

View post:
Encryption- Computer & Information Security – Information …

Enable BitLocker on USB Flash Drives to Protect Data

Encrypting USB flash drives protects the data stored on the volume. Any USB flash drive formatted with FAT, FAT32, or NTFS can be encrypted with BitLocker. The length of time it takes to encrypt a drive depends on the size of the drive, the processing power of the computer, and the level of activity on the computer.

Before you enable BitLocker, you should configure the appropriate Removable Data Drive policies and settings in Group Policy and then wait for Group Policy to be refreshed. If you dont do this and you enable BitLocker, you might need to turn BitLocker off and then turn BitLocker back on because certain state and management flags are set when you turn on BitLocker.

To be sure that you can recover an encrypted volume, you should allow data-recovery agents and store recovery information in Active Directory. If you use a flash drive with earlier versions of Windows, the Allow Access To BitLocker-Protected Removable Data Drives From Earlier Versions Of Windows policy can ensure that you have access to the USB flash drive on other operating systems and computers. Unlocked drives are read-only.

To enable BitLocker encryption on a USB flash drive, do the following: 1. Insert the USB flash drive, click Start, and then click Computer. 2. Right-click the USB flash drive, and then click Turn On BitLocker. BitLocker initializes the drive. 3. On the Choose How You Want To Unlock This Drive page, choose one or more for the following options, and then click Next:

4. On the How Do You Want To Store Your Recovery Key page, click Save The Recovery Key To A File. 5. In the Save BitLocker Recovery Key As dialog box, choose a save location, and then click Save. 6. You can now print the recovery key if you want to. When you have finished, click Next. 7. On the Are You Ready To Encrypt This Drive page, click Start Encrypting. Do not remove the USB flash drive until the encryption process is complete. How long the encryption process takes depends on the size of the drive and other factors.

The encryption process does the following: 1. Adds an Autorun.inf file, the BitLocker To Go reader, and a Read Me.txt file to the USB flash drive. 2. Creates a virtual volume with the full contents of the drive in the remaining drive space. 3. Encrypts the virtual volume to protect it.USB flash drive encryption takes approximately 6 to 10 minutes per gigabyte to complete. The encryption process can be paused and resumed provided that you dont remove the drive.

As a result, when AutoPlay is enabled and you insert the encrypted drive into a USB slot on a computer running Windows 7, Windows 7 runs the BitLocker To Go reader, which in turn displays a dialog box. When you are prompted, enter the password, smart card PIN, or both to unlock the drive. Optionally, select Automatically Unlock On This Computer From Now On to save the password in an encrypted file on the computers system volume. Finally, click Unlock to unlock the volume so that you can use it.

See original here:
Enable BitLocker on USB Flash Drives to Protect Data

Julian Assange’s refuge ‘in jeopardy’ – CNN Video

‘);$vidEndSlate.removeClass(‘video__end-slate–inactive’).addClass(‘video__end-slate–active’);}};CNN.autoPlayVideoExist = (CNN.autoPlayVideoExist === true) ? true : false;var configObj = {thumb: ‘none’,video: ‘world/2018/05/24/assange-refuge-ecuadorian-embassy-pkg.cnn’,width: ‘100%’,height: ‘100%’,section: ‘domestic’,profile: ‘expansion’,network: ‘cnn’,markupId: ‘large-media_0’,adsection: ‘const-video-leaf’,frameWidth: ‘100%’,frameHeight: ‘100%’,posterImageOverride: {“mini”:{“width”:220,”type”:”jpg”,”uri”:”//cdn.cnn.com/cnnnext/dam/assets/180329192653-julian-assange-incomunicado-dentro-embajada-ecuador-lkl-claudia-rebaza-00001030-small-169.jpg”,”height”:124},”xsmall”:{“width”:307,”type”:”jpg”,”uri”:”//cdn.cnn.com/cnnnext/dam/assets/180329192653-julian-assange-incomunicado-dentro-embajada-ecuador-lkl-claudia-rebaza-00001030-medium-plus-169.jpg”,”height”:173},”small”:{“width”:460,”type”:”jpg”,”uri”:”//cdn.cnn.com/cnnnext/dam/assets/180329192653-julian-assange-incomunicado-dentro-embajada-ecuador-lkl-claudia-rebaza-00001030-large-169.jpg”,”height”:259},”medium”:{“width”:780,”type”:”jpg”,”uri”:”//cdn.cnn.com/cnnnext/dam/assets/180329192653-julian-assange-incomunicado-dentro-embajada-ecuador-lkl-claudia-rebaza-00001030-exlarge-169.jpg”,”height”:438},”large”:{“width”:1100,”type”:”jpg”,”uri”:”//cdn.cnn.com/cnnnext/dam/assets/180329192653-julian-assange-incomunicado-dentro-embajada-ecuador-lkl-claudia-rebaza-00001030-super-169.jpg”,”height”:619},”full16x9″:{“width”:1600,”type”:”jpg”,”uri”:”//cdn.cnn.com/cnnnext/dam/assets/180329192653-julian-assange-incomunicado-dentro-embajada-ecuador-lkl-claudia-rebaza-00001030-full-169.jpg”,”height”:900},”mini1x1″:{“width”:120,”type”:”jpg”,”uri”:”//cdn.cnn.com/cnnnext/dam/assets/180329192653-julian-assange-incomunicado-dentro-embajada-ecuador-lkl-claudia-rebaza-00001030-small-11.jpg”,”height”:120}}},autoStartVideo = false,isVideoReplayClicked = false,callbackObj,containerEl,currentVideoCollection = [{“descriptionPlainText”:”Julian Assange’s nearly six-year refuge at the Ecuadorian embassy in London is in danger, opening the WikiLeaks founder to arrest by British authorities and potential extradition to the US, multiple sources with knowledge tell CNN.”,”imageUrl”:”//cdn.cnn.com/cnnnext/dam/assets/180329192653-julian-assange-incomunicado-dentro-embajada-ecuador-lkl-claudia-rebaza-00001030-large-169.jpg”,”title”:”Julian Assange’s refuge ‘in jeopardy'”,”videoCMSUrl”:”/video/data/3.0/video/world/2018/05/24/assange-refuge-ecuadorian-embassy-pkg.cnn/index.xml”,”videoLeafUrl”:”/videos/world/2018/05/24/assange-refuge-ecuadorian-embassy-pkg.cnn”,”videoId”:”world/2018/05/24/assange-refuge-ecuadorian-embassy-pkg.cnn”,”videoUrl”:”/videos/world/2018/05/24/assange-refuge-ecuadorian-embassy-pkg.cnn/video/playlists/wikileaks-founder-julian-assange/”},{“descriptionPlainText”:”President Donald Trump was enthusiastic about WikiLeaks’ hacks during the 2016 campaign. After taking office, his administration has been less complimentary about leaks.”,”imageUrl”:”//cdn.cnn.com/cnnnext/dam/assets/171113222432-1113-trump-large-169.jpg”,”title”:”Trump was for leaks before he was President”,”videoCMSUrl”:”/video/data/3.0/video/politics/2017/11/14/trump-administration-on-wikileaks-llr-orig.cnn/index.xml”,”videoLeafUrl”:”/videos/politics/2017/11/14/trump-administration-on-wikileaks-llr-orig.cnn”,”videoId”:”politics/2017/11/14/trump-administration-on-wikileaks-llr-orig.cnn”,”videoUrl”:”/videos/politics/2017/11/14/trump-administration-on-wikileaks-llr-orig.cnn/video/playlists/wikileaks-founder-julian-assange/”},{“descriptionPlainText”:”Jared Kushner’s attorney says the Senate Judiciary Committee is playing “gotcha games” by accusing Kushner of not disclosing key documents — including information about WikiLeaks.”,”imageUrl”:”//cdn.cnn.com/cnnnext/dam/assets/171119145858-kushner-attorney-large-169.jpg”,”title”:”Kushner attorney: Senate panel playing ‘games'”,”videoCMSUrl”:”/video/data/3.0/video/politics/2017/11/19/attorney-defends-jared-kushner-over-failure-turn-over-documents-perez-intv-nr.cnn/index.xml”,”videoLeafUrl”:”/videos/politics/2017/11/19/attorney-defends-jared-kushner-over-failure-turn-over-documents-perez-intv-nr.cnn”,”videoId”:”politics/2017/11/19/attorney-defends-jared-kushner-over-failure-turn-over-documents-perez-intv-nr.cnn”,”videoUrl”:”/videos/politics/2017/11/19/attorney-defends-jared-kushner-over-failure-turn-over-documents-perez-intv-nr.cnn/video/playlists/wikileaks-founder-julian-assange/”},{“descriptionPlainText”:”President Trump once said he loves WikiLeaks. Now his administration is going after WikiLeaks founder Julian Assange. CNN’s Brian Todd reports.”,”imageUrl”:”//cdn.cnn.com/cnnnext/dam/assets/160916110125-julian-assange-generic-large-169.jpg”,”title”:”WikiLeaks founder lashes out at the CIA”,”videoCMSUrl”:”/video/data/3.0/video/politics/2017/04/28/wikileaks-assange.cnn/index.xml”,”videoLeafUrl”:”/videos/politics/2017/04/28/wikileaks-assange.cnn”,”videoId”:”politics/2017/04/28/wikileaks-assange.cnn”,”videoUrl”:”/videos/politics/2017/04/28/wikileaks-assange.cnn/video/playlists/wikileaks-founder-julian-assange/”},{“descriptionPlainText”:”White House senior adviser and President Donald Trump’s son-in-law Jared Kushner told congressional Russia investigators that he did not communicate with WikiLeaks and did not recall anyone on the Trump campaign who had, a source with knowledge of his testimony told CNN.”,”imageUrl”:”//cdn.cnn.com/cnnnext/dam/assets/171117172125-jared-kushner-large-169.jpg”,”title”:”Kushner testified he didn’t recall WikiLeaks contact”,”videoCMSUrl”:”/video/data/3.0/video/politics/2017/11/18/jared-kushner-july-testimony-did-not-recall-wikileaks-contact-perez-ac.cnn/index.xml”,”videoLeafUrl”:”/videos/politics/2017/11/18/jared-kushner-july-testimony-did-not-recall-wikileaks-contact-perez-ac.cnn”,”videoId”:”politics/2017/11/18/jared-kushner-july-testimony-did-not-recall-wikileaks-contact-perez-ac.cnn”,”videoUrl”:”/videos/politics/2017/11/18/jared-kushner-july-testimony-did-not-recall-wikileaks-contact-perez-ac.cnn/video/playlists/wikileaks-founder-julian-assange/”},{“descriptionPlainText”:”During the White House briefing, Press Secretary Sean Spicer told reporters President Trump believes systems at the CIA need to be updated and that the US position on WikiLeaks founder Julian Assange has not changed.”,”imageUrl”:”//cdn.cnn.com/cnnnext/dam/assets/170309133441-white-house-press-briefing-spicer-cia-systems-assange-wolf-00000724-large-169.jpg”,”title”:”Spicer: CIA technology needs updating”,”videoCMSUrl”:”/video/data/3.0/video/politics/2017/03/09/white-house-press-briefing-spicer-cia-systems-assange-wolf.cnn/index.xml”,”videoLeafUrl”:”/videos/politics/2017/03/09/white-house-press-briefing-spicer-cia-systems-assange-wolf.cnn”,”videoId”:”politics/2017/03/09/white-house-press-briefing-spicer-cia-systems-assange-wolf.cnn”,”videoUrl”:”/videos/politics/2017/03/09/white-house-press-briefing-spicer-cia-systems-assange-wolf.cnn/video/playlists/wikileaks-founder-julian-assange/”},{“descriptionPlainText”:”Details on probe of WikiLeaks’ publication of CIA spy tactics, including details alleging the agency can hack smart phones and smart TVs. CNN’s Barbara Starr reports.”,”imageUrl”:”//cdn.cnn.com/cnnnext/dam/assets/170308122002-04-cia-large-169.jpg”,”title”:”Fallout from WikiLeaks’ CIA disclosures”,”videoCMSUrl”:”/video/data/3.0/video/politics/2017/03/08/wikileaks-cia-tactics-starr-tsr-dnt.cnn/index.xml”,”videoLeafUrl”:”/videos/politics/2017/03/08/wikileaks-cia-tactics-starr-tsr-dnt.cnn”,”videoId”:”politics/2017/03/08/wikileaks-cia-tactics-starr-tsr-dnt.cnn”,”videoUrl”:”/videos/politics/2017/03/08/wikileaks-cia-tactics-starr-tsr-dnt.cnn/video/playlists/wikileaks-founder-julian-assange/”},{“descriptionPlainText”:”The FBI & CIA have launched an investigation to determine who leaked classified secrets about its spying programs to Wikileaks. CNN’s Barbara Starr reports.”,”imageUrl”:”//cdn.cnn.com/cnnnext/dam/assets/170308122002-04-cia-large-169.jpg”,”title”:”Federal probe launched to find leaker of CIA’s hacking secrets”,”videoCMSUrl”:”/video/data/3.0/video/tv/2017/03/08/investigation-launched-into-leak-of-cia-hacking-tools-wikileaks-starr-lead.cnn/index.xml”,”videoLeafUrl”:”/videos/tv/2017/03/08/investigation-launched-into-leak-of-cia-hacking-tools-wikileaks-starr-lead.cnn”,”videoId”:”tv/2017/03/08/investigation-launched-into-leak-of-cia-hacking-tools-wikileaks-starr-lead.cnn”,”videoUrl”:”/videos/tv/2017/03/08/investigation-launched-into-leak-of-cia-hacking-tools-wikileaks-starr-lead.cnn/video/playlists/wikileaks-founder-julian-assange/”},{“descriptionPlainText”:”Trump praised WikiLeaks during the 2016 campaign when it released emails from Hillary Clinton’s campaign chairman, but White House Press Secretary Sean Spicer today said there’s a “big difference” between those emails and leaking classified information.”,”imageUrl”:”//cdn.cnn.com/cnnnext/dam/assets/170308142145-spicer-0308-large-169.jpg”,”title”:”Spicer: Difference in types of leaked info”,”videoCMSUrl”:”/video/data/3.0/video/politics/2017/03/08/white-house-press-briefing-wikileaks-sean-spicer-sot.cnn/index.xml”,”videoLeafUrl”:”/videos/politics/2017/03/08/white-house-press-briefing-wikileaks-sean-spicer-sot.cnn”,”videoId”:”politics/2017/03/08/white-house-press-briefing-wikileaks-sean-spicer-sot.cnn”,”videoUrl”:”/videos/politics/2017/03/08/white-house-press-briefing-wikileaks-sean-spicer-sot.cnn/video/playlists/wikileaks-founder-julian-assange/”},{“descriptionPlainText”:”Former CIA counterterrorism official Phil Mudd says the leaking of official intelligence documents is devastating and calls for the agency to launch a manhunt to determine how the information was released.”,”imageUrl”:”//cdn.cnn.com/cnnnext/dam/assets/170308081705-phil-mudd-on-new-day-large-169.jpg”,”title”:”Analyst: WikiLeaks devastating for CIA”,”videoCMSUrl”:”/video/data/3.0/video/us/2017/03/08/analyst-wikileaks-devastating-for-cia-mudd-bts-newday.cnn/index.xml”,”videoLeafUrl”:”/videos/us/2017/03/08/analyst-wikileaks-devastating-for-cia-mudd-bts-newday.cnn”,”videoId”:”us/2017/03/08/analyst-wikileaks-devastating-for-cia-mudd-bts-newday.cnn”,”videoUrl”:”/videos/us/2017/03/08/analyst-wikileaks-devastating-for-cia-mudd-bts-newday.cnn/video/playlists/wikileaks-founder-julian-assange/”},{“descriptionPlainText”:”WikiLeaks claims that it has acquired documents on how the CIA uses cyberweapons to spy on people around the world, including the ability to hack into smart phones and smart TVs. CNN’s Brian Todd reports.”,”imageUrl”:”//cdn.cnn.com/cnnnext/dam/assets/170214113353-cnnee-cibercafe-samuel-burke-el-telefono-de-donadl-trump-espionaje-android-00004219-large-169.jpg”,”title”:”WikiLeaks: CIA hacks phones, TVs worldwide”,”videoCMSUrl”:”/video/data/3.0/video/politics/2017/03/07/wikileaks-cia-hacking-phones-tvs-worldwide-todd-pkg-tsr.cnn/index.xml”,”videoLeafUrl”:”/videos/politics/2017/03/07/wikileaks-cia-hacking-phones-tvs-worldwide-todd-pkg-tsr.cnn”,”videoId”:”politics/2017/03/07/wikileaks-cia-hacking-phones-tvs-worldwide-todd-pkg-tsr.cnn”,”videoUrl”:”/videos/politics/2017/03/07/wikileaks-cia-hacking-phones-tvs-worldwide-todd-pkg-tsr.cnn/video/playlists/wikileaks-founder-julian-assange/”},{“descriptionPlainText”:”Wikileaks says they have obtained documents showing how the CIA can hack smart phones and smart televisions even when they are powered off.”,”imageUrl”:”//cdn.cnn.com/cnnnext/dam/assets/170307165012-wikileaks-claims-to-reveal-how-cia-hacks-tvs-phones-mudd-lead-00004122-large-169.jpg”,”title”:”Wikileaks: CIA spying via TVs, phones”,”videoCMSUrl”:”/video/data/3.0/video/tv/2017/03/07/wikileaks-claims-to-reveal-how-cia-hacks-tvs-phones-mudd-lead.cnn/index.xml”,”videoLeafUrl”:”/videos/tv/2017/03/07/wikileaks-claims-to-reveal-how-cia-hacks-tvs-phones-mudd-lead.cnn”,”videoId”:”tv/2017/03/07/wikileaks-claims-to-reveal-how-cia-hacks-tvs-phones-mudd-lead.cnn”,”videoUrl”:”/videos/tv/2017/03/07/wikileaks-claims-to-reveal-how-cia-hacks-tvs-phones-mudd-lead.cnn/video/playlists/wikileaks-founder-julian-assange/”},{“descriptionPlainText”:”Computer programmer and Wikileaks founder Julian Assange has been living in the Ecuadorean embassy in London since 2012 as he tries to dodge an international arrest warrant.”,”imageUrl”:”//cdn.cnn.com/cnnnext/dam/assets/160916110125-julian-assange-generic-large-169.jpg”,”title”:”Who is Julian Assange?”,”videoCMSUrl”:”/video/data/3.0/video/world/2016/09/16/who-is-julian-assange-sdg-orig.cnn/index.xml”,”videoLeafUrl”:”/videos/world/2016/09/16/who-is-julian-assange-sdg-orig.cnn”,”videoId”:”world/2016/09/16/who-is-julian-assange-sdg-orig.cnn”,”videoUrl”:”/videos/world/2016/09/16/who-is-julian-assange-sdg-orig.cnn/video/playlists/wikileaks-founder-julian-assange/”},{“descriptionPlainText”:”President-elect Donald Trump is set to receive his intelligence briefing about the alleged Russian hack into the 2016 presidential election.”,”imageUrl”:”//cdn.cnn.com/cnnnext/dam/assets/170106064240-intel-agencies-large-169.jpg”,”title”:”Intel chiefs’ take on Trump”,”videoCMSUrl”:”/video/data/3.0/video/politics/2017/01/06/donald-trump-intel-report-newday-dnt-carroll.cnn/index.xml”,”videoLeafUrl”:”/videos/politics/2017/01/06/donald-trump-intel-report-newday-dnt-carroll.cnn”,”videoId”:”politics/2017/01/06/donald-trump-intel-report-newday-dnt-carroll.cnn”,”videoUrl”:”/videos/politics/2017/01/06/donald-trump-intel-report-newday-dnt-carroll.cnn/video/playlists/wikileaks-founder-julian-assange/”},{“descriptionPlainText”:”Donald Trump Jr. has released exchanges he had with the WikiLeaks Twitter account via direct message during the 2016 presidential campaign, The Atlantic reports.”,”imageUrl”:”//cdn.cnn.com/cnnnext/dam/assets/171114072509-01-donald-trump-jr-file-large-169.jpg”,”title”:”Atlantic: Trump Jr. messaged with WikiLeaks”,”videoCMSUrl”:”/video/data/3.0/video/politics/2017/11/14/wikileaks-trump-jr-camerota-ioffe-newday.cnn/index.xml”,”videoLeafUrl”:”/videos/politics/2017/11/14/wikileaks-trump-jr-camerota-ioffe-newday.cnn”,”videoId”:”politics/2017/11/14/wikileaks-trump-jr-camerota-ioffe-newday.cnn”,”videoUrl”:”/videos/politics/2017/11/14/wikileaks-trump-jr-camerota-ioffe-newday.cnn/video/playlists/wikileaks-founder-julian-assange/”}],currentVideoCollectionId = ”,isLivePlayer = false,mediaMetadataCallbacks,moveToNextTimeout,mutePlayerEnabled = false,nextVideoId = ”,nextVideoUrl = ”,turnOnFlashMessaging = false,videoPinner,videoEndSlateImpl;if (CNN.autoPlayVideoExist === false) {autoStartVideo = true;if (autoStartVideo === true) {if (turnOnFlashMessaging === true) {autoStartVideo = false;containerEl = jQuery(document.getElementById(configObj.markupId));CNN.VideoPlayer.showFlashSlate(containerEl);} else {CNN.autoPlayVideoExist = true;}}}configObj.autostart = autoStartVideo;CNN.VideoPlayer.setPlayerProperties(configObj.markupId, autoStartVideo, isLivePlayer, isVideoReplayClicked, mutePlayerEnabled);CNN.VideoPlayer.setFirstVideoInCollection(currentVideoCollection, configObj.markupId);var embedLinkHandler = {},videoPinner,embedCodeCopy;function onVideoCarouselItemClicked(evt) {‘use strict’;var videoId,articleElem,videoPlayer,thumbImageElem,thumbImageLargeSource,overrides = {autostart: false,muteOverlayClicked: true,videoCollection: this.videoCollection},shouldStartVideo = false,playerInstance;try {articleElem = jQuery(evt.currentTarget).find(‘article’);thumbImageElem = jQuery(articleElem).find(‘.media__image’);videoId = articleElem.data().videoId;if (CNN.VideoPlayer.getLibraryName(configObj.markupId) === ‘fave’) {playerInstance = FAVE.player.getInstance(configObj.markupId);if (CNN.Utils.existsObject(playerInstance) &&typeof playerInstance.getVideoData === ‘function’ &&playerInstance.getVideoData().id !== videoId) {jQuery(articleElem).closest(‘.cn-carousel-medium-strip’).parent().find(‘script[name=”metaScript”]’).remove();playerInstance.play(videoId, overrides);}} else {videoPlayer = CNNVIDEOAPI.CNNVideoManager.getInstance().getPlayerByContainer(configObj.markupId);if (videoPlayer && videoPlayer.videoInstance) {if (!videoPlayer.videoInstance.cvp) {if (typeof thumbImageElem !== ‘undefined’ && thumbImageElem !== null) {thumbImageLargeSource = thumbImageElem.data() && thumbImageElem.data().srcLarge ? thumbImageElem.data().srcLarge : ‘none’;}overrides.thumb = thumbImageLargeSource ? thumbImageLargeSource : ‘none’;shouldStartVideo = true;}if (videoPlayer.videoInstance.config) {if (videoPlayer.videoInstance.config.video !== videoId) {jQuery(articleElem).closest(‘.cn-carousel-medium-strip’).parent().find(‘script[name=”metaScript”]’).remove();CNNVIDEOAPI.CNNVideoManager.getInstance().playVideo(configObj.markupId, videoId, overrides);}}}}} catch (error) {console.log(“error in initializing video player” + error);}}function setInitialVideoEmbed() {}function initialize(){var carousel = jQuery(document.getElementById(‘cn-current_video_collection’)).find(‘.js-owl-carousel’),owl;if (carousel) {carousel.find(‘.cn__column.carousel__content__item’).find(‘a’).removeAttr(‘href’);jQuery(carousel).on(‘click’, ‘.cn__column.carousel__content__item’, onVideoCarouselItemClicked);}}if (CNN.VideoPlayer.getLibraryName(configObj.markupId) === ‘videoLoader’) {window.CNNVideoAPILoadCompleteHandlers = window.CNNVideoAPILoadCompleteHandlers ? window.CNNVideoAPILoadCompleteHandlers : [];window.CNNVideoAPILoadCompleteHandlers.push(initialize);window.CNNVideoAPILoadCompleteHandlers.push(setInitialVideoEmbed);} else {initialize();}CNN.INJECTOR.executeFeature(‘videx’).done(function () {var initMeta = {id:”world/2018/05/24/assange-refuge-ecuadorian-embassy-pkg.cnn”, isEmbeddable: “yes”};CNN.Videx.EmbedButton.updateCode(initMeta);}).fail(function () {throw ‘Unable to fetch the videx bundle.’;});function updateCurrentlyPlaying(videoId) {var videoCollectionId = ‘current_video_collection’,videocardContents = getCurrentVideoCardContents(videoId),carousel = jQuery(document.getElementById(‘cn-current_video_collection’)).find(‘.js-owl-carousel’),domain = CNN.Host.domain || (document.location.protocol + ‘//’ + document.location.hostname),owl,$owlFirstItem,$owlPrevItem,showDetailsSpanContent = ”,gigyaShareElement,showIndex,whatsappShareElement,$carouselContentItems = jQuery(‘.carousel__content__item’, document.getElementById(‘cn-current_video_collection’));gigyaShareElement = jQuery(‘div.js-gigya-sharebar’);if (typeof gigyaShareElement !== ‘undefined’ && CNN.Utils.existsObject(videocardContents)) {jQuery(gigyaShareElement).attr(‘data-title’, videocardContents.headlinePlainText || ”);jQuery(gigyaShareElement).attr(‘data-description’, videocardContents.descriptionPlainText || ”);jQuery(gigyaShareElement).attr(‘data-link’, domain + videocardContents.url || ”);jQuery(gigyaShareElement).attr(‘data-image-src’, (videocardContents.media && videocardContents.media.elementContents && videocardContents.media.elementContents.imageUrl) || ”);}whatsappShareElement = jQuery(‘div.share-bar-whatsapp-container’);if (typeof whatsappShareElement !== ‘undefined’) {jQuery(whatsappShareElement).attr(‘data-title’, videocardContents.headlinePlainText || ”);jQuery(whatsappShareElement).attr(‘data-storyurl’, domain + videocardContents.url || ”);}if (carousel && currentVideoCollectionContainsId(videoId)) {owl = carousel.data(‘owl.carousel’) || {};showIndex = getCurrentVideoIndex(videoId);if (typeof owl.to === ‘function’) {owl.to(showIndex);}$owlPrevItem = CNN.Utils.exists(owl.$element) ? owl.$element.find(‘.cd.cd–active’) : $carouselContentItems.find(‘.cd.cd–active’);$owlPrevItem.removeClass(‘cd–active’);$owlPrevItem.find(‘.media__over-text’).remove();$owlPrevItem.find(‘.media__icon’).show();$owlFirstItem = CNN.Utils.exists(owl._items) ? jQuery(owl._items[showIndex]) : $carouselContentItems.eq(showIndex);$owlFirstItem.find(‘.cd’).addClass(‘cd–active’);$owlFirstItem.find(‘.media a:first-child’).append(‘

Now Playing

Follow this link:
Julian Assange’s refuge ‘in jeopardy’ – CNN Video

Ecuador to remove Julian Assange’s extra security from …

The president of Ecuador, Lenin Moreno, has ordered the withdrawal of additional security assigned to the Ecuadorian embassy in London, where WikiLeaks founder Julian Assange has remained for almost six years.

The move was announced a day after an investigation by the Guardian and Focus Ecuador revealed the country had bankrolled a multimillion-dollar spy operation to protect and support Assange, employing an international security company and undercover agents to monitor his visitors, embassy staff and even the British police.

Over more than five years, Ecuador put at least $5m (3.7m) into a secret intelligence budget that protected him while he had visits from Nigel Farage, members of European nationalist groups and individuals linked to the Kremlin.

Rafael Correa, the then Ecuadorian president who approved of the operation, later defended the security measures as routine and modest.

However, his successor, Moreno, appears to differ in his view. His government said in a statement: The president of the republic, Lenin Moreno, has ordered that any additional security at the Ecuadorian embassy in London be withdrawn immediately.

From now on, it will maintain normal security similar to that of other Ecuadorian embassies.

Moreno has previously described Assanges situation as a stone in his shoe.

Ecuador suspended Assanges communication systems in March after his pointed political comments on Twitter. Assange had tweeted messages challenging Britains accusation that Russia was responsible for the poisoning of a Russian former double agent and his daughter in Salisbury.

Reuters contributed to this report

Original post:
Ecuador to remove Julian Assange’s extra security from …

Chelsea Manning says rise of authoritarianism inspired U …

NORTH BETHESDA, Md. Chelsea Manning is no longer living as a transgender woman in a male military prison, serving the lengthiest sentence ever for revealing U.S. government secrets. Shes free to grow out her hair, travel the world, and spend time with whomever she likes.

But a year since former President Barack Obama commuted Mannings 35-year sentence, Americas most famous convicted leaker isnt taking an extended vacation. Far from it: The Oklahoma native has decided to make an unlikely bid for the U.S. Senate in her adopted state of Maryland.

Manning, 30, filed to run in January and has been registered to vote in Maryland since August. She lives in North Bethesda, not far from where she stayed with an aunt while awaiting trial. Her aim is to unseat Sen. Ben Cardin, a 74-year-old Maryland Democrat who is seeking his third Senate term and previously served 10 terms in the U.S. House.

Manning, who also has become an internationally recognized transgender activist, said shes motivated by a desire to fight what she sees as a shadowy surveillance state and a rising tide of nightmarish repression.

The rise of authoritarianism is encroaching in every aspect of life, whether its government or corporate or technological, Manning told The Associated Press during an interview at her home in an upscale apartment tower. On the walls of her barely furnished living room hang Obamas commutation order, and photos of U.S. anarchist Emma Goldman and British playwright Oscar Wilde.

Mannings longshot campaign for the June 26 primary would appear to be one of the more unorthodox U.S. Senate bids in recent memory, and the candidate is operating well outside the partys playbook. She says she doesnt, in fact, even consider herself a Democrat, but is motivated by a desire to shake up establishment Democrats who are caving in to President Donald Trumps administration. She vows she wont run as an independent if her primary bid fails.

Shes certainly got an eye-catching platform: Close prisons and free inmates; eliminate national borders; restructure the criminal justice system; provide universal health care and basic income. The top of her agenda? Abolish the U.S. Immigration and Customs Enforcement, a federal agency created in 2003 that Manning asserts is preparing for an ethnic cleansing.

Manning ticks off life experiences she believes would make her an effective senator: a stint being homeless in Chicago, her wartime experiences as a U.S. Army intelligence analyst in Iraq even her seven years in prison. She asserts shes got a bigger vision than establishment politicians.

But political analysts suspect the convicted felon is not running to win.

Manning is running as a protest candidate, which has a long lineage in American history, to shine light on American empire, said Daniel Schlozman, a political science professor at Johns Hopkins University. Thats a very different goal, with a very different campaign, than if she wanted to beat Ben Cardin.

Mannings insurgent candidacy thus far has been a decidedly stripped-down affair, with few appearances and a campaign website that just went up. In recent days, she approached an anti-fracking rally in Baltimore almost furtively, keeping to herself for much of the demonstration. But when it was her turn to address the small group, her celebrity status was evident. People who never met her called her by her first name and eagerly took photos.

Manning has acknowledged leaking more than 700,000 military and State Department documents to anti-secrecy site WikiLeaks in 2010. She said her motivation was a desire to spark debate about U.S. foreign policy, and she has been portrayed as both a hero and a traitor.

Known as Bradley Manning at the time of her arrest, she came out as transgender after her 2013 court-martial. She was barred from growing her hair long in prison, and was approved for hormone therapy only after litigation. She spent long stints in solitary confinement, and twice tried to kill herself.

The Pentagon, which has repeatedly declined to discuss Mannings treatment in military prison, is also staying mum about her political ambitions. Democratic Party officials say they have no comment, citing a policy not to weigh in on primaries. Republican operatives are quiet.

In Maryland, a blue state thats home to tens of thousands of federal employees and defense contractors, it appears Mannings main supporters are independents or anti-politics, making them unlikely to coalesce politically. She recently reported contributions of $72,000 on this years first quarterly finance statement, compared with Cardins $336,000.

The candidate has barely made an effort at tapping sources of grassroots enthusiasm outside of activism circles. And its easy to find progressive Democrats who feel her candidacy is just a vehicle to boost her profile.

It feels to me almost like its part of a book tour that this is her moment after being released from prison, said Dana Beyer, a transgender woman who leads the Gender Rights Maryland nonprofit and is a Democratic candidate for state senate. I dont think this is a serious effort.

Manning is indeed working on a book about her dramatic life. For now, she says she supports herself with income from speaking engagements. Shes spoken at various U.S. colleges and is due to take the stage at a Montreal conference later this month.

Last week, she appeared at a tech conference in Germanys capital of Berlin, arriving to cheers from the audience of several thousand people. She told attendees shes still struggling to adjust to life after prison and hasnt gotten used to her celebrity status yet.

Theres been a kind of cult of personality that is really intimidating and that is overwhelming for me, she said in Berlin.

At her Maryland apartment, Manning told the AP she occasionally wakes up panicked that shes back in the cage in Kuwait where she was first jailed, or incarcerated at the Marine base at Quantico, Virginia, where a U.N. official concluded shed been subjected to cruel, inhuman and degrading treatment. She works hard to overcome anxiety, centering herself with yoga, breathing exercises, and reading.

Ive been out for almost a year now and its becoming increasingly clear to me just how deep the wounds are, she said in her Spartan living room.

Asked how she would define success, Manning responded with passionate intensity: Success for me is survival.


View original post here:
Chelsea Manning says rise of authoritarianism inspired U …

5 Common Encryption Algorithms and the Unbreakables of the …

Mchten Sie diesen Beitrag in Deutsch zu lesen? Lesen Sie die Deutsch-Version hier.

While security is an afterthought for many PC users, its a major priority for businesses of any size. It has to be when the Ponemon Institute tells us that security breaches are costing companies millions every year.

Even if you dont have millions to lose, protecting what you do have should be a high priority.

There are several forms of security technology available, but encryption is one that everyday computer users should know about.

Encryption is an interesting piece of technology that works by scrambling data so it is unreadable by unintended parties. Lets take a look at how it works with the email-friendly software PGP (or GPG for you open source people).

Say I want to send you a private message, so I encrypt it using either one of these programs. Heres the message:


Once encrypted, the message literally becomes a jumbled mess of random characters. But, equipped with the secret passcode I text you, you can decrypt it and find the original message.

Come on over for hot dogs and soda!

Whether its in transit like our hot dog party email or resting on your hard drive, encryption works to keep prying eyes out of your business even if they happen to somehow gain access to your network or system.If you want to learn more about how encryption helps protect business data,you can read our article on how encryption aids cloud security.

The technology comes in many forms, with key size and strength generally being the biggest differences in one variety from the next.

Triple DES was designed to replace the original Data Encryption Standard (DES) algorithm, which hackers eventually learned to defeat with relative ease. At one time, Triple DES was the recommended standard and the most widely used symmetric algorithm in the industry.

Triple DES uses three individual keys with 56 bits each. The total key length adds up to 168 bits, but experts would argue that 112-bits in key strength is more like it.

Despite slowly being phased out, Triple DES still manages to make a dependable hardware encryption solution for financial services and other industries.

RSA is a public-key encryption algorithm and the standard for encrypting data sent over the internet. It also happens to be one of the methods used in our PGP and GPG programs.

Unlike Triple DES, RSA is considered an asymmetric algorithm due to its use of a pair of keys. Youve got your public key, which is what we use to encrypt our message, and a private key to decrypt it. The result of RSA encryption is a huge batch of mumbo jumbo that takes attackers quite a bit of time and processing power to break.

Blowfish is yet another algorithm designed to replace DES. This symmetric cipher splits messages into blocks of 64 bits and encrypts them individually.

Blowfish is known for both its tremendous speed and overall effectiveness as many claim that it has never been defeated. Meanwhile, vendors have taken full advantage of its free availability in the public domain.

Blowfish can be found in software categories ranging from e-commerce platforms for securing payments to password management tools, where it used to protect passwords. Its definitely one of the more flexible encryption methods available.

Computer security expert Bruce Schneier is the mastermind behind Blowfish and its successor Twofish. Keys used in this algorithm may be up to 256 bits in length and as a symmetric technique, only one key is needed.

Twofish is regarded as one of the fastest of its kind, and ideal for use in both hardware and software environments. Like Blowfish, Twofish is freely available to anyone who wants to use it. As a result, youll find it bundled in encryption programs such as PhotoEncrypt, GPG, and the popular open source software TrueCrypt.

The Advanced Encryption Standard (AES) is the algorithm trusted as the standard by the U.S. Government and numerous organizations.

Although it is extremely efficient in 128-bit form, AES also uses keys of 192 and 256 bits for heavy duty encryption purposes.

AES is largely considered impervious to all attacks, with the exception of brute force, which attempts to decipher messages using all possible combinations in the 128, 192, or 256-bit cipher. Still, security experts believe that AES will eventually be hailed the de facto standard for encrypting data in the private sector.

Cyber attacks are constantly evolving, so security specialists must stay busy in the lab concocting new schemes to keep them at bay. Expert observers are hopeful that a new method called Honey Encryption will deter hackers by serving up fake data for every incorrect guess of the key code. This unique approach not only slows attackers down, but potentially buries the correct key in a haystack of false hopes. Then there are emerging methods like quantum key distribution, which shares keys embedded in photons over fiber optic, that might have viability now and many years into the future as well.

Whether its protecting your email communications or stored data, some type of encryption should be included in your lineup of security tools. Successful attacks on victims like Target show that its not 100 percent bulletproof, but without it, youre offering up convenient access to your data. Find some tools that give you a piece of mind and stick with em!

Follow this link:
5 Common Encryption Algorithms and the Unbreakables of the …

Cryptocurrency Communities Just Cant Get Along

If theres one thing that rival cryptocurrency factions can agree on, its their mutual dislike of one other. Everything else is up for debate, and not calm, reasonable debate, but the sort of fevered in-fighting that makes the crypto community resemble an unruly rabble. This internecine squabbling has arguably done more to hinder cryptocurrency adoption than any external threat.

Also read:Washington Utility Increases Security Amid Crypto Mining Moratorium

Ripple supporters squabbling with Dogecoin diehards; Bitcoin Core and Cash maximalists constantly sniping; Vergelets lashing out against everyone; IOTA being IOTA. Its easy to forget, amidst all the hullabaloo and name-calling, that were all on the same side. Crypto communities have more that unites them than divides them, and yet you wouldnt think so at times.

Humans have been falling out with fellow humans ever since the Garden of Eden (replace the serpent with Segwit and the forbidden fruit with Lightning to complete the analogy). Religious factions (or forks) have been attacking one another for centuries over slight ideological differences, and on crypto Twitter its much the same.

Last week, Jackson Palmer expressed his frustration at constant attacks from Ripple supporters over XRP data on his Arewedecentralizedyet site. Such attacks are by no means isolated, and Ripple is certainly not the only community to face such charges. Crypto would be boring if everyone always got on, and differences of opinion were settled by courteous fedora tipping. One of the reasons why altcoin communities bicker is because their members are so passionate about crypto, but this zealotry risks alienating newcomers.

In Divided We Fail: The Irrational Insanity of Crypto Tribalism Kent Barton writes: Were all part of the same technological revolution. Yet here we are, wasting precious time and energy attacking ourselvestribal thinking will do nothing to make the world a better and freer place. Its only beneficiaries are the centralized entities we seek to disintermediate. Thats not to say that detractors cant call Ripple a centralized security or Tron shitcoin vaporware if they want to: the beauty of crypto is that nobody can tell you what do do.

You get to control your keys, your crypto, and the conversations you have with your fellow coiners. You can be insightful, funny, a jerk or a combination of all three. But if youre constantly bashing other cryptocurrencies, or attacking anyone who criticizes your own, maybe its time to step away from the keyboard for a moment and remind yourself of why you got into cryptocurrency in the first place. Its not crypto vs crypto: its crypto vs the rest of the world. Win the battle for mass adoption and therell be plenty of time afterwards for squabbling over scalability.

Do you think crypto communities are too divisive, and does in-fighting deter onlookers?Let us know in the comments section below.

Images courtesy of Shutterstock, and Twitter.

This is an Op-ed article. The opinions expressed in this article are the authors own. Bitcoin.com does not endorse nor support views, opinions or conclusions drawn in this post. Bitcoin.com is not responsible for or liable for any content, accuracy or quality within the Op-ed article. Readers should do their own due diligence before taking any actions related to the content. Bitcoin.com is not responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any information in this Op-ed article.

See more here:
Cryptocurrency Communities Just Cant Get Along

CoinLib – Cryptocurrency prices now


Mkt Cap$167.75BVolume$4.98B

Mkt Cap$80.87BVolume$1.64B

Mkt Cap$35.80BVolume$595.50M

Mkt Cap$28.91BVolume$1.25B

Mkt Cap$15.01BVolume$1.44B

Mkt Cap$10.16BVolume$692.96M

Mkt Cap$9.48BVolume$120.66M

Mkt Cap$8.04BVolume$38.86M

Mkt Cap$6.47BVolume$106.43M

Mkt Cap$5.69BVolume$515.08M

Mkt Cap$5.50BVolume$123.54M

Mkt Cap$4.13BVolume$97.75M

Mkt Cap$3.87BVolume$71.52M

Mkt Cap$3.85BVolume$19.22M

Mkt Cap$2.73BVolume$61.69M

Mkt Cap$2.32BVolume$252.18M

Mkt Cap$2.26BVolume$1.55M

Mkt Cap$2.00BVolume$182.57M

Mkt Cap$1.79BVolume$44.53M

Mkt Cap$1.68BVolume$55.38M

Mkt Cap$1.64BVolume$50.81M

Mkt Cap$1.42BVolume$25.94M

Mkt Cap$1.35BVolume$53.10M

Mkt Cap$1.31BVolume$7.31M

Mkt Cap$1.20BVolume$41.48M

Mkt Cap$1.19BVolume$59.71M

Mkt Cap$1.19BVolume$54.47M

Mkt Cap$1.08BVolume$25.29M

Mkt Cap$1.07BVolume$100.66M

Mkt Cap$1.04BVolume$42.31M

Mkt Cap$968.15MVolume$17.18M

Mkt Cap$935.44MVolume$19.10M

Mkt Cap$926.10MVolume$16.39M

Mkt Cap$915.33MVolume$25.02M

Mkt Cap$885.30MVolume$44.49M

Mkt Cap$841.00MVolume$8.56M

Mkt Cap$826.14MVolume$33.26M

Mkt Cap$835.89MVolume$9.75M

Mkt Cap$835.90MVolume$59.15M

Mkt Cap$734.12MVolume$35.19M

Mkt Cap$730.17MVolume$691K

Mkt Cap$710.83MVolume$1.28M

Mkt Cap$718.31MVolume$414K

Mkt Cap$649.76MVolume$37.93M

Mkt Cap$637.22MVolume$7.45M

Mkt Cap$606.96MVolume$43.37M

Mkt Cap$591.56MVolume$22.89M

Mkt Cap$580.45MVolume$76.04M

Mkt Cap$562.35MVolume$40.82M

Mkt Cap$536.38MVolume$17.89M

Read the original here:
CoinLib – Cryptocurrency prices now

Bitcoin millionaire Erik Finman on new cryptocurrency …

Erik Finman dropped out of school at age 15 to pursue a career as an entrepreneur. Now, he’s a bitcoin multimillionaire. Finman

19-year-old Erik Finman made headlines last year when the value of his bitcoin holdings hit the $1 million mark meaning he won a bet with his parents and didn’t have to go to college.

Now, thanks to the recent surge in the cryptocurrency markets, Finman’s personal bitcoin hoard is worth about $4 million, even after the slump of the last few weeks. And he’s diversified into other cryptocurrencies, as well as more traditional investment vehicles he’s even started a 401(k) retirement account.

And yet, Finman is disappointed with the state of cryptocurrency, he tells Business Insider. The cryptocurrency boom has brought with it an upswing in scams and dirty dealings. And the bitcoin community, in particular, is too caught up in its own self-interests to modernize the underlying technology so that it can deal with the increasing crush of users, he says.

He refers to the larger cryptocurrency market as “corrupt,” and says that it’s led to most cryptocurrencies serving more as an asset, like gold, rather than a politics-free replacement for money, which was the original idea. He suggests that the first wave of digital tokens might be about to buckle under its own weight paving the way for something new.

“You’re seeing the first generation [of cryptocurrency] live and probably die,” says Finman.

Finman’s next project is bringing on that next generation. He tells us that he’s been flying around the world, recruiting a “consortium” of fellow bitcoin millionaires around the world (he says that they call themselves ‘”bitcoin whales”), from Dubai to San Francisco. And within the next few months, Finman says, they’re going to debut their master plan for a new cryptocurrency.

The technical details will be revealed down the line, says Finman. The big idea, though, is that Finman says this new cryptocurrency will be everything bitcoin currently is not:

These solutions are easier said than done, according to cryptocurrency experts. These problems are well-recognized in the cryptocurrency world, but many view them as inherent limitations of blockchain, the technology underpinning bitcoin and other cryptocurrencies.

The problems are solvable, but require middlemen like banks to centralize pieces of the underlying infrastructure, streamlining the process. That, in turn, undercuts what Finman sees as the “beauty of cryptocurrency”: It’s decentralized, not under the control of banks or governments, theoretically freeing it from political interference.

There have been efforts to thread that needle. Notably, bitcoin cash, a cryptocurrency that split from the main bitcoin community late last year, has hyped itself as offering low-cost, high-speed transactions. But Finman is skeptical of their approach, fearing that the currency is too beholden to the past (and past grudges) to make a real difference.

“I just don’t know they’re the people to do it,” says Finman.

BI Intelligence

And yet, Finman says, “cryptocurrency is here to stay.” Which is why Finman’s consortium of whales wants to step back and rethink the whole thing.

They were early adopters to bitcoin Finman met many of them on message boards after buying his first bitcoin at age 12, when it was $12 a coin and they were very much alone in their faith in cryptocurrency. Finman says that those other investors prefer to maintain their privacy; his high profile in the press made him the natural face of the project, he says.

That long experience gives the consortium both an acute sense of the shortcomings of bitcoin, as well as lots of ideas for how it can improve, Finman says. Similarly, Finman says that he has a certain degree of credibility as an early believer in cryptocurrency.

Finman is maintaining his considerable investments in existing cryptocurrency, out of his belief in the concept, if not the execution. But he predicts that amid all the drama, there will be a better cryptocurrency out there, built either by his consortium or someone else. And he says that the benefits of that new cryptocurrency will be so obvious, it won’t even require consideration.

“As soon as there’s something better, I’ll move over,” says Finman.

Go here to see the original:
Bitcoin millionaire Erik Finman on new cryptocurrency …

The ballad of Pammy and Julian Assange – her poor …

What a priceless image adorns the current edition of the Hollywood Reporter, featuring former Baywatch star Pamela Anderson vamping it up to the max. Meeting the cameras gaze slightly uncertainly, his arms wrapped awkwardly around her waist, is WikiLeaks emperor Julian Assange. It is a comic masterpiece, which can only be captioned: When ur girlfriends boyfriend plays centre back for Marseille.

The pair, you may recall, are closefriends, and this week Pamela grants the magazine an interview in her home town of Marseille (she lives with French footballer Adil Rami.) The chat is accompanied byashot taken by David LaChapelle in the Ecuadorian embassy in London, in which Julian has voluntarily secluded himself for thepast six years.

First impressions? Well, I suppose its one way to torpedo your no sunlight defence. Hats off to LaChapelle for making it look as though the embassy contains a synthetic sun slightly more powerful than the real one. It was only earlier this year, you might recall, that three doctors penned an article for this newspaper bemoaning Assanges lack of access to proper medical care. Although it is possible for clinicians to visit him in the embassy, this ran, most doctors are reluctant to do so. Perhaps its because hes on the run from the law? Still, the idea he cant find a bent doctor in Knightsbridge is arguably the biggest joke of all. Theres barely anything else, apart from petrochemical mistresses and half the Candy brothers.

Anyway, looking at our two principals, there is a real TV guide feel to this image. Julian and Pamela resemble lead actors in a $10m-an-episode TV show about a Promethean tech boss. Actually, Im not even sure we need to bother developing a new format here. Lets just call it Westworld: Series 7. I love how this show continues to raise unsettling questions.

On the nature of her relationship with Assange, Pamela declines to be fully drawn. Ditto the rumours that she is dating occasional WikiLeaks source Vladimir Putin. What she will say of Assange is that he talks to her about everything. Its not just about politics, she says, even though I do take a lot of notes and its so overwhelming, the information he gives me. Pammy goes on to say that one of the things he talks to her about is the Bible.

I bet he does. Picture the full John Lithgow in Footloose, only if the character never had a learning curve. Ariel needs to stop dancing with this no-good out-of-towner, and Pamela needs to bin Adil. Its all there in thebig book, if only you have the source codes. (Incredible, really, that Julians yet to start his own religion except I suppose hehas in a way, with the Assange bros, who I always look forward to hearing from. Some of the remote threats of violence those guys dish out make you weep for the missed recruiting opportunities. They would be incredible US drone pilots.)

Anyway, back to the Pamela interview. Without wishing to lose you with technical publishing industry argot, it is a study in the absolute wank people will write in magazines. Somehow, punts the writer, while nobody was looking, Pamela Anderson found herself at the centre of the geopolitical universe. I dont think you should even dignify that one with an eyeroll emoji. Even less successful are the attempts to conjure up what we might call la magique of la France. In the morning, we learn of Pamelas tres ordinaire routine, she might make a trip to le petit marche with her vegan grocery list in hand, then perhaps take a boat ride from Cassis to Calanques. Perhaps.

Both interviewer and Pamela are at pains to stress how far she has come. Back in the day, Pamela reveals, she was once paid $500 to attend a party for Donald Trump. And now, well she was invited to hand Putin flowers at his most recent inauguration or I speak at Vladivostok at the economic conference about green energy and a green economy. Plus a change, you might say unless you were the interviewer, who misses the sole justifiable opportunity to wheel out a French cliche.

Given that she is in an uncategorised form of liaison with Assange, a man who has twice been accused of sexual offences, Pamelas thoughts on the #MeToo movement are naturally sought. In summary, it seems to have been the womens fault for not having a Spidey sense about what was about to happen to them in the various rooms. Dont go in that room or if you go in the room, get that role.

The chief point of the chat with the Hollywood Reporter, however, seems to be to raise awareness of Assanges current plight. In March, the Ecuadorians cut Assanges internet, in a thinly disguised bid to get him to do one. He and Pamela havent spoken since.

Over to the interview: Hes cut off from everybody, Pamela says, afrantic note creeping into her voice. The air and light quality [at the embassy] is terrible because he cant keep his windows open and he cant get any sunlight. Even prisoners can go outside, but he cant. Im always bringing him vegan food, but he eats very simply. I talked to him on the phone the day [his internet] was shut off. He sent me an urgent call. And now, nothing. (Remember, kids: he can walk out at any time.)

Incidentally, I often wonder if Pamela and Julian is a case of life imitating high art. As fellow doctoral completists will know, there is an episode of Baywatch set at Seaworld that deals with many similar issues. Pamelas character the legendary CJ Parker finds a sea lion who has been injured by hunters. She forms an intense bond with the creature, nurses and cares for him in seclusion at Seaworld until the moment he must be released from captivity. CJ is very sad about this but she says she knows that the sea lion would be happy, because the bad fishermen who hunted him were now in jail. As he departs, he honks back at her, as if to say, yes, that was precisely the logical place Id got to on the matter, as opposed to: I was only interested in you for the fish.

If only justice could be similarly served on the bad men who made Julian skip bail to avoid answering sexual assault claims (since dropped by the Swedish prosecutor because his evasions meant the investigation could go no further). Hes been wrongly accused of so many things, is Pamelas take. But this is a way of keeping him down and keeping him ineffective. Hes just ruffling the feathers of people that are powerful. I always try to humanise him because people think hes a robot or hes a computer screen or hes not this human being.

But the crowning glory of this characterisation the tinsel on the incel, if you will is the idea that Assange is being denied some kind of movie stardom, because well, because Hillary. Hes so misunderstood, she continues, especially in Hollywood, and really hated, because of the Clinton monopoly on the media.

In one sense, you have to salute Pamela and Julians ability to keep things as sweet as they have. These kinds of relationships are difficult. I read only this week that Charles Bronsons marriage to a former soap actress 30-odd years his junior was on the rocks.

I wonder what went wrong? Is the problem that Bronson is Britains most violent inmate, currently serving a serially extended stretch at HMP Frankland, who recently endangered his parole chances by stripping off, smearing himself in butter, and challenging guards to a fight? Or is it something less specific, like she loves him but shes not IN love with him, or some people grow together but she feels as if theyre growing apart?

Who knows. Lets hope Julian and Pamelas bond is not similarly sundered. Occasionally, our misunderstood sea lion appears on the embassy balcony to honk mournfully about this or that he misgendered Chelsea Manning last year, for instance, on her day of release from actual prison for giving WikiLeaks information. But with Pamelas help, perhaps real freedom is a possibility, and our slippery mammal can one day flap out into the welcoming waters of Knightsbridge for good.

View original post here:
The ballad of Pammy and Julian Assange – her poor …