Download Sophos Free Encryption 2.40.1.11 – softpedia.com

IMPORTANT NOTICE

Sophos Free Encryption is an intuitive application that you can use to protect your sensitive data from unauthorized viewing. It can be handled by all types of users.

The interface of the program is based on a standard window with an intuitive layout, where you can add files into the secured environment using either the file browser, folder view or “drag and drop” method. You can add as many items as you want.

In order to encrypt data, you have to specify a target for the archive with the Sophos Free Encryption format (UTI), and assign a password to it. Alternatively, you can apply a key file as a dependency.

A few options are available for the encryption process. Therefore, you can create self-extracting executable files, securely delete the original items after encryption, compress data and save passwords in a history list.

Furthermore, you can use the default email client to send the encrypted archives via email after the process is done, as well as change the default file path to the passwords history list.

Sophos Free Encryption carries out a task rapidly and without errors, while using a low-to-moderate quantity of CPU and system memory, thus it does not affect the computer’s overall performance. We haven’t come across any difficulties in our tests, since the tool did not hang or crash.

Although it has not been updated for a pretty long time, Sophos Free Encryption offers users a simple alternative to secure their files, by turning them into encrypted archives.

File Encryption File Encrypter Encrypt Folder Encryption Encrypt Encrypter Decrypt

Read more here:
Download Sophos Free Encryption 2.40.1.11 – softpedia.com

StoreName Enumeration (System.Security.Cryptography …

This documentation is archived and is not being maintained.

.NET Framework (current version)

The .NET API Reference documentation has a new home. Visit the .NET API Browser on docs.microsoft.com to see the new experience.

Specifies the name of the X.509 certificate store to open.

System (in System.dll)

The X.509 certificate store for other users.

The X.509 certificate store for third-party certificate authorities (CAs).

The X.509 certificate store for intermediate certificate authorities (CAs).

The X.509 certificate store for revoked certificates.

The X.509 certificate store for personal certificates.

The X.509 certificate store for trusted root certificate authorities (CAs).

The X.509 certificate store for directly trusted people and resources.

The X.509 certificate store for directly trusted publishers.

This enumeration specifies the X.509 store name, which also includes the type of certificates included. For example, My includes personal certificates, whereas Disallowed includes only revoked certificates.

The following code example opens an X.509 certificate store, adds and deletes certificates, and then closes the store. It assumes you have three certificates to add to and remove from a local store.

.NET Framework Available since 2.0

See more here:
StoreName Enumeration (System.Security.Cryptography …

Apollo All-in-One Cryptocurrency

About Apollo

Utilizing a community of world-class developers, managers, marketers and researchers, the Apollo community, backed by the Apollo Foundation, has set out to accomplish the goal of making Apollo the most technologically advanced, feature-rich currency on the market. The Apollo Foundation understands the demands of a top tier cryptocurrency and they believe they can create a coin that will integrate everything necessary to replace the current currency options. Having started from NXT, a proven cryptocurrency, the Apollo Foundation will continue development with the goal of being first all-in-one cryptocurrency, innovating and incorporating every ability that could be beneficial in a digital currency, all in a single decentralized platform. The first major update, Olympus Protocol, puts mass adoption-proof privacy at Apollo’s core. This is because the Apollo Foundation knows the ability for a user to buy, sell, trade and send in absolute secrecy is vital in an industry that could be moments away from intense regulation. The Apollo team is here because they believe the only person or entity that should be in control of your funds is you.

FEATURES

Olympus Protocol

Olympus protocol will integrate functions allowing for the simple choice of whether to send publicly on the blockchain or privately using the blockchain. As part of this protocol we will be integrating an IP masking feature that will hide the users IP address.

We are also working to secure a technology that would keep nodes from being blocked by entities. Olympus Protocol will help make Apollo the safest, most feature-rich privacy coin in existence.

Decentralized Exchange

The decentralized exchange is an important feature in the Apollo platform as it allows for the fast and private purchasing, selling and trading of all assets, tokens and currencies created within Apollo. We are in the process of also adding Bitcoin, Ethereum and many other well-known cryptocurrencies to this exchange. This will allow users the ability to buy and sell Apollo privately from any nation on Earth.

Next-Generation Blockchain

Having utilized NXT technology as our base, we are developing Hermes to be it’s replacement. Hermes will allow the Apollo blockchain to grow faster and healthier the larger the Apollo user base grows, rather than slower as with most cryptocurrencies on the market. Where as our current speed may be 20 to 30 seconds on average (transaction times will differ) Hermes will allow for transaction speeds of 2-3 seconds. Our goal in integrating Hermes is to become the safest, fastest and most private cryptocurrency on the market.

Alias System

The alias system in Apollo can be used to create unique aliases that act as a representation for a specific set of text. This will encrypt the chosen text into the alias. This text could be your account number, a website, email address, etc. A specific alias can be claimed only once (like a domain name), therefore it can be sold privately or publicly and transferred to any other account. The most obvious use for an alias is in sending funds to an account number that is tied to that alias. Instead of typing out the entire account number you would simply write out the alias.

Multi-Sig/Phased Transactions

Voting System

Apollo supports multi-signature accounts allowing more than one user to control an account. It also supports phased transactions which are transactions set up to occur after a certain condition is met. This could be after another transaction is sent or received, after a passage of time or after a certain block number is hit.

The Apollo voting system allows users to create public or private polls for many purposes. Polls can be used to direct and manage funds from an account, elect officials or simply to gauge public opinion. This opens up near endless possibilities for collecting absolute, verified responses from designated sources.

Possible use cases: Contracts, Voting, Signatures, Account Management, Arbitration, etc.

Encrypted Messaging

Encrypted messaging on the Apollo blockchain will allow any user to send and receive , untraceable messages and data files from one account to another. Utilizing the Olympus protocol, the users IP address and the transaction carrying the message will be invisible.

Possible use cases: Untraceable Communication, Untraceable File Transfer, etc.

Monetary System

The monetary system within Apollo allows users to instantly create currencies that can be traded privately on Apollos decentralized exchange as well as freely on external exchanges. These currencies can be easily backed by Apollo giving them an instant, tangible value.

Possible use Cases: Finance, Charity, Voter IDs, Escrows, Coupons, Currencies, etc.

Decentralized Marketplace

The Apollo decentralized marketplace will allow users to buy, sell and trade physical and digital goods using the Apollo currency. Users can list goods to be sold locally or even worldwide. Trading will be decentralized and untraceable allowing the free trade of any item. Future updates will include a review and reputation system aiding sellers in building a positive reputation based on experiences.

Cloud Storage

The Apollo data cloud allows any user to upload data to the blockchain for storage, retrieval and publishing of information. This gives a user the ability to upload a file to the blockchain, therefore receiving an irrefutable timestamp for that data. This timestamp could be helpful in establishing an absolute date for legal documents such as contracts and intellectual ownership.

Possible use cases: Voting, Permits, Evidence, Court Records, Transparency, Death/Birth Certificates, Contracts, Wills, Trusts, Escrows, Maps, GPS Data, Signatures, Medical Records, Arbitration, Delivery Records, Certifications, etc.

Advanced Account Control

Accounts can be created in a way that allows group control. Utilizing the Apollo voting system a group can be granted the ability (via initial ownership or ownership of a specified token or asset) to vote on the transactions that are spent on the account.

Possible use cases: Private Investment Fund, Private Insurance Fund, Charity Fund, Decentralized Autonomous Organizations (DAO)

Asset System

Using the Apollo asset system, a user can issue, buy, sell and trade asset tokens intended to represent anything from public and private equity to real world commodities. Unlike other markets and cryptocurrencies, users will be able to trade these assets with 100% privacy.

Possible use cases: Assets, Commodities, Derivatives, etc.

Coin Shuffling

Plugins

Coin shuffling is an additional privacy feature allowing your Apollo, as well as other assets or currencies held in the account, to be simply and randomly shuffled between user accounts. This allows an account holder to anonymize their funds and transactions nearly instantly.

The Apollo system allows for integration of 3rd party software into the core wallet. This will allow unimaginable growth via community developed features.

Authentication System

The Apollo authentication system allows a user to authenticate an account using the blockchain. This could be used to prove that a user is genuinely in control of a specific account.

Read the rest here:
Apollo All-in-One Cryptocurrency

ATB Coin – The fastest and most secure payment system

General at all

Business

Developments

Marketing

Client

ATBCoin alpha is ready for an ICO

Crowdsale process

Daily trade value hits $1000000

Becoming a popular global cryptocurrency

Official law office opening in USA (ask our support for an address)

Payment gateway for our partners

Additional offices in other countries on demand

Building own investment portfolio

ATB Coin public test launch

ATB Coin White Paper

ATBCoin first block mined & mining launch

Protocol updates

Press-conference at the biggest world-class financial center in New York city

ATB/USD is listed at USA, Canada, Europe & Asia exchanges

Exchanges start to trade with ATB Coin pairs

PR & marketing campaign

Exploding our targets on market and its geography

Charity events

Eliminate any kind of transaction fees using ATB Coin

iOS & Android apps release

More exchanges lists ATB pairs

Lightning Network

Block confirmation lasts 2,5 min

More:
ATB Coin – The fastest and most secure payment system

Device encryption settings not available (Windows 10 home …

Hi all, I recently upgraded from Windows 8.1 to Windows 10 Home, and read about device encryption. Apparently this was already available in Windows 8.1 but now that I discovered it, I would like to enable it. So I switched to logging in with a Microsoft account, and hoped that the setting would become available.

When I search for “device encryption” in the Start menu, it finds two options:

– Device Encryption (Control panel)

– Change device encryption settings (Settings)

But if I click them, I get: Search results:

– No results for device encryption

Does this mean something about my system is not compatible with, or configured correctly for device encryption? If I’m not mistaking, my system, a Mac Mini, is the 2013 model, and reading about it, it seems to have TPM. I am using BootCamp (using Mac OS X only as fallback and for playing).

Am I looking for this setting in the wrong places?

To show precisely what I am seeing, below are the screenshots:

Original post:
Device encryption settings not available (Windows 10 home …

Office 365 Message Encryption FAQ – Office Support

Have a question about how the new message protection capabilities in Office 365 work? Check for an answer here. Also, take a look at Frequently asked questions about data protection in Azure Information Protection for answers to questions about the data protection service, Azure Rights Management, in Azure Information Protection.

OME combines email encryption and rights management capabilities. Rights management capabilities are powered by Azure Information Protection.

You can use the new capabilities for OME under the following conditions:

If you have never set up OME or IRM for Exchange Online in Office 365.

If you have set up OME and IRM, you can use these steps if you are using the Azure Rights Management service from Azure Information Protection.

If you are using Exchange Online with Active Directory Rights Management service (AD RMS), you can’t enable these new capabilities right away. Instead, you need to migrate AD RMS to Azure Information Protection first. When you’ve finished the migration, you can successfully set up OME.

If you choose to continue to use on-premises AD RMS with Exchange Online instead of migrating to Azure Information Protection, you will not be able to use these new capabilities.

To use the new OME capabilities, you need one of the following plans:

Office365 Message Encryption is offered as part of Office 365 E3 and E5, Microsoft E3 and E5, Office 365 A1, A3, and A5, and Office 365 G3 and G5. Customers do not need additional licenses to receive the new protection capabilities powered by Azure Information Protection.

You can also add Azure Information Protection Plan1tothe followingplans to receive the new Office 365 Message Encryption capabilities: Exchange Online Plan 1, Exchange Online Plan 2, Office 365 F1,Office 365 Business Essentials, Office 365 Business Premium, or Office 365 Enterprise E1.

Each user benefiting from Office 365 Message Encryption needs to be licensed to be covered by thefeature.

For the full list see the Exchange Online service descriptions for Office 365 Message Encryption.

Yes! Microsoft recommends that you complete the steps to set up BYOK before you set up OME.

For more information about BYOK, see Planning and implementing your Azure Information Protection tenant key.

No. OME and the option to provide and control your own encryption keys, called BYOK, from Azure Information Protection were not designed to respond to law enforcement subpoenas. OME, with BYOK for Azure Information Protection, was designed for compliance-focused customers. Microsoft takes third-party requests for customer data very seriously. As a cloud service provider, we always advocate for the privacy of customer data. In the event we get a subpoena, we always attempt to redirect the third party to the customer to obtain the information. (Please read Brad Smiths blog: Protecting customer data from government snooping). We periodically publish detailed information of the request we receive. For more information regarding third-party data requests, see Responding to government and law enforcement requests to access customer data on the Microsoft Trust Center. Also, see Disclosure of Customer Data in the Online Services Terms (OST).

The new capabilities for Office 365 Message Encryption are an evolution of the existing IRM and legacy OME solutions. The following table provides more details.

Capability

Previous versions of OME

IRM

New OME capabilities

Sending an encrypted email

Only through Exchange mail flow rules

End-user initiated from Outlook for PC, Outlook for Mac, or Outlook on the web; or through Exchange mail flow rules

End-user initiated from Outlook for PC, Outlook for Mac, or Outlook on the web; or through mail flow rules

Rights management

Do Not Forward option and custom templates

Do Not Forward option, encrypt-only option, default and custom templates

Supported recipient type

External recipients only

Internal recipients only

Internal and external recipients

Experience for recipient

External recipients received an HTML message which they downloaded and opened in browser or downloaded mobile app.

Internal recipients only received encrypted email in Outlook for PC, Outlook for mac, and Outlook on the web.

Internal and external recipients receive email in Outlook for PC, Outlook for Mac, Outlook on the web, Outlook for Android, and Outlook for iOS, or through a web portal regardless of whether or not they are in the same Office 365 organization or any Office 365 organization. The OME portal requires no separate download.

Bring Your Own Key support

Not available

Not available

BYOK supported

See Set up new Office 365 Message Encryption capabilities.

You can still use the previous version of OME, it will not be deprecated at this time. However, we highly encourage organizations to use the new and improved OME solution. Customers that have not already deployed OME cannot set up a new deployment of the previous version of OME.

No. If you are using Exchange Online with Active Directory Rights Management service (AD RMS), you can’t enable these new capabilities right away. Instead,you need to migrate AD RMS to Azure Information Protection first.

Today, the sender needs to be in Exchange Online. We plan to support other topologies in the coming months.

You can create protected messages from Outlook 2016, and Outlook 2013 for PC and Mac, and from Outlook on the web.

You can read and respond from Outlook for PC and Mac (2013 and 2016), Outlook on the web, and Outlook mobile (Android and iOS) if you are an Office 365 user. You can also use the iOS native mail client if your organization allows it. If you are a non-Office 365 user, you can read and reply to encrypted messages on the web through your web browser.

You can attach any file type to a protected mail, however protection policies are applied only on the file formats mentioned here.

If a file format is supported, such as a Word, Excel, or PowerPoint file, the file is always protected, even after the attachment has been downloaded by the recipient. For example, if an attachment is protected by Do Not Forward, and the original recipient downloads and forwards the attachment to a new recipient, the new recipient will not be able to open the protected file.

If you attach a PDF file to a protected message, the message itself will be protected, but no additional protection will be applied to the PDF file after the recipient has received it. This means that the recipient can Save As, Forward, Copy, and Print the PDF file.

Not yet. OneDrive for Business attachments are not supported and end-users can’t encrypt a mail that contains a cloud OneDrive for Business attachment.

Yes. Use mail flow rules in Exchange Online to automatically encrypt a message based on certain conditions. For example, you can create policies that are based on recipient ID, recipient domain, or on the content in the body or subject of the message. See Define mail flow rules to encrypt email messages in Office 365.

Currently you can only set up mail flow rules in Exchange Online. Encryption is currently not supported in DLP through the Security & Compliance Center.

Yes! For information on customizing email messages and the OME portal, see Add your organization’s brand to your encrypted messages. See Add your organization’s brand to your encrypted messages.

Not at this time but coming soon.

Yes. All encrypted email messages are discoverable by Office 365 compliance features.

Read more:
Office 365 Message Encryption FAQ – Office Support

Julian Assange, WikiLeaks publisher, receives rare embassy …

Julian Assange met with diplomats from his native Australia on Thursday as the WikiLeaks publisher approaches his sixth year in self-exile at the Ecuadorian Embassy in London.

Mr. Assange was visited at the embassy by two officials from Australias High Commission, the nations diplomatic mission in the U.K., marking what is believed to be the first time Australian officials have met with the WikiLeaks chief since he sought asylum there in June 2012, the U.K.s Press Association first reported Thursday.

Jennifer Robinson, a member of Mr. Assanges legal team, confirmed the meeting to The Washington Times.

Julian Assange is in a very serious situation, Ms. Robinson said in a statement. He remains in the embassy because of the risk of extradition to the U.S. That risk is undeniable after numerous statements by Trump administration officials including the director of the CIA and the U.S. attorney-general.

Given the delicate diplomatic situation we cannot comment further at this time, she said.

The Australian High Commission referred The Washington Times to the nations Department of Foreign Affairs and Trade when reached for comment.

The Department of Foreign Affairs and Trade is providing consular assistance to Mr. Assange through the Australian High Commission in London, a department spokesperson told The Times. Owing to our privacy obligations we will not provide further comment.

Mr. Assange, 46, was born in Townsville, Queensland in 1971, and he wound up abroad during the course of his work with WikiLeaks, the antisecrecy group he helped launch in 2006.

He became the subject of a rape investigation following a trip to Stockholm in 2010, and he subsequently sought asylum from Ecuador in lieu of surrendering to Swedish authorities, citing the likelihood hed be extradited to the U.S. and punished for releasing classified diplomatic and military documents through the WikiLeaks website.

Ecuador granted asylum to Mr. Assange in 2012, and Swedish prosecutors dropped their rape probe in 2017. British police have said they will arrest him if he exits the embassy, however, relegating him to its confines rather than risking apprehension and possible extradition.

The Department of Justice began investigating Mr. Assange during the Obama administration after WikiLeaks began publishing classified State and Defense Department documents. Federal prosecutors have failed so far to unseal any charges against Mr. Assange, but members of President Trumps administration including Mike Pompeo, the former CIA director-turned-secretary of state, and Jeff Sessions, Mr. Trumps attorney general, have advocated prosecuting the WikiLeaks publisher.

Ecuador has since granted citizenship to Mr. Assange, Foreign Minister Maria Fernanda Espinosa revealed in January, calling the status one more ring of protection.

Go here to read the rest:
Julian Assange, WikiLeaks publisher, receives rare embassy …

Pamela Anderson Defends Russia and Julian Assange: Ive …

Pamela Anderson offered a vigorous defense of Julian Assange and Russia Tuesday evening, telling Fox News host Tucker Carlson that she often jokes about U.S-Russia tensions at the Kremlin where she apparently speaks often.

Everyone likes to blame Russia when anything goes wrong in America and Ive spoken at the Kremlin many times and the last time I was there, there was something happening and the first thing they say to me is oh what have we done wrong this time, said Anderson.

America likes to blame them for everything, said the actress, who also called the accusations that Assange and Putin had collaborated to throw the 2016 U.S. presidential election to Trump crazy.

Also Read: 2nd Woman Begs Trump to Pardon Her Husband on Fox News

Anderson explained that she traveled to Russia frequently as part of her work with animal rights and that Putin was very concerned about the issue.

As for the WikiLeaks chief now under house arrest in the Ecuadorian Embassy in London? Anderson said Assange was just a misunderstood soul.

Assange is just an incredible person. If you read anything that his mother says about him thats kind of an interesting source to go to hes always been like this. Since a child, hes been worried about doing the right thing. And I think hes very brave.

Also Read: Christmas Mystery: Did Julian Assange Delete His Own Twitter Account?

Assange Sweden six years ago following rape accusations and has avoided deportation to that country or potentially the United States by hiding out with the Ecuadorian Embassy in London.

Once lauded by liberals as a free speech advocate exposing government secrets, Assange became a lightning rod for his role in releasing emails hacked from the Democratic National Committee and Clinton campaign chairman John Podesta.

It is known that the RNC was also hacked during the same period, but the files were never released.

You can watch the full Fox News interview here.

Megyn Kelly calls Trump out on womenTrump famously feuded former anchor Kelly after she asked him a tough question at a Republican primary debate about derogatory statements he’s made about women. Trump took it personally, judging by his response on Twitter and in interviews. He later famously said Kelly must have had “blood coming out of her wherever” regarding the question. Watch the debate question here.

Kelly to Trump: “Facts matter”Trump kept hammering at Kelly on Twitter and elsewhere. When he called her out for not using the IBT poll when he was leading the Republican primary field, Kelly rebuked him with a tweet showing she did use the poll. “Facts matter,” she wrote.

Fox mocksTrumpwith statement on debate skippingpollAfter polled his Twitter followers to see ifhe should drop out of a Fox-hosted Republican primary debate,Fox responded artfully with a sarcastic statement that it had learnedfrom “secret” sources Trump might be treated unfairly as president by foreign leaders.

Bill O’Reilly calls out Trump’s tweet with totally wrong stats”The O’Reilly Factor” grilled Trump in a Nov. 2015 interview about his tweet that erroneously said black people killed whites at a rate of 81 percent, while whites kill blacks at a rate of 15 percent.O’Reilly told Trump, “You shouldn’t tweet.” Trump did not take that advice.

Chris Wallace bucks Trump calling media “enemy of the public”After his press conference in January 2017, Trump continued his attack on media he doesn’t like on Twitter. Anchor ChrisWallace wasn’t having it on “Fox & Friends.” Wallace said Trump’s comments “crossed an important line” and said they were dangerous.

Wallace says the media is too easy on TrumpIn an interview with TheWrap, Wallace said he thinks Sunday political shows in particular should be tougher on Trump.”I think if anything, the media has treated him too well.By that I mean theyve allowed him to play by different rules.” Read the full interview.

O’Reilly tells Trump Putin is “a killer”In a February interview, O’Reilly brought up Trump’s apparent refusal to criticize Vladimir Putin, calling the Russian president “a killer.” Trump famously responded by saying, “What, you think our country is so innocent?” Watch it here.

Smith wails on Trump’s refusal to talk about Russia hacksNobody on Fox hits Trump harder than Shep Smith. “We have a right to know You call us fake news and put us down like children for asking questions on behalf of the American people.” Watch it here.

Neil Cavuto tells Trump he’s problem, not mainstream mediaResponding to Trump’s tweet claiming the mainstream media wants him off social media, Cavuto called out Trump for losing track of his own agenda. “Mr. President, it is not the fake news media that’s your problem, it’s you,” Cavuto said. Watch it here.

Smith blasts Trump administration on Russia: “Lie after lie after lie”Shep Smith was at it again following the news breaking about Donald Trump Jr.’s meeting with a Kremlin-linked lawyer. He took the Trump administration to task for its many lies about meetings with Russia, including Jared Kushner failing to report the meeting on his security clearance forms. “My grandmother used to say, ‘What a tangled web we weave when first we try to deceive,'” Smith declared on air, leaving fellow anchor Chris Wallace speechless. Watch it here.

Trumps favorite network has pushed back a few times

Read more:
Pamela Anderson Defends Russia and Julian Assange: Ive …

Free Julian Assange rallies called in Sri Lanka and India …

7 June 2018

As a part of the ongoing international campaign to free Julian Assange, Trotskyists in Sri Lanka and India will hold protests in Colombo and near Chennai, in Tamil Nadu, on June 19.

The International Committee of the Fourth International (ICFI) and the World Socialist Web Site are mobilising workers and youth internationally to demand freedom for the WikiLeaks editor. While Ecuador provided Assange asylum at its London embassy six years ago, it is capitulating to political pressure from the US to silence the Australian journalist.

If Assange is forced out of the embassy, he faces the danger of falling into US hands and being tried on espionage charges that carry the death sentence. His only crime has been to expose illegal wars and military intrigues of American imperialism and its allies.

The Socialist Equality Party (SEP) will hold its rally outside the main Fort Railway Station in Colombo, the Sri Lankan capital.

On the same day, Indian supporters of the ICFI will protest at the central bus terminal in Sriperumbudur, a global auto and electronic manufacturing hub about 40 kilometres from Chennai, the capital of the south Indian state of Tamil Nadu.

Both campaigns support the demonstration and rally to be held on June 17 in Sydney, organised by the Socialist Equality Party in Australia.

The major powers and their subordinate governments are attempting to block the free and democratic flow of information through Internet and social media. In line with the US-led assault on Assange, Google and Facebook are censoring the World Socialist Web Site and other left-wing and anti-war web sites. The Sri Lankan and Indian governments are also stepping up their efforts to curb access to the Internet and social media.

The defense of Julian Assange is part of the fight to defend freedom of speech and expression and all democratic rights.

We urge workers, students, young people and the oppressed masses to support this campaign and join the demonstrations in Sri Lanka and India.

Sri Lanka protest

Fort Railway Station in central ColomboTuesday June 19, 4.00 p.m.

India protest

Sriperumbudur bus terminalTamil NaduTuesday June 19, 5.00 p.m.

Google is blocking the World Socialist Web Site from search results.

To fight this blacklisting:

Read the rest here:
Free Julian Assange rallies called in Sri Lanka and India …

Pamela Anderson Says Trump Should Pardon Julian Assange

6/6/2018 10:03 AM PDT

Pamela Anderson says she might pull a Kim Kardashian and askPresident Trumpto pardon WikiLeaks founder Julian Assange.

We got Pam Wednesday in NYC as reports surfaced that the Prez was prepping to grant clemency to several prisoners. So, with Pam being a huge advocate for her friend Assange, we asked if she’d go to Trump to clear Assange’s name in the U.S. — even though he hasn’t been charged with a crime here, yet.

Pam says it would be “the smartest move” — not sure if she meant her visiting Trump, or Trump pardoning Assange.

Of course, this comes on the heels of Kim Kardashian successfully lobbying POTUS to release Alice Marie Johnson … so, makes sense Pam could be feeling empowered.

After all, Pam’s beengoing to batfor Assange, saying he’s a misunderstood soul … not a criminal hacker. We suspect the President would be more likely to show mercy on a grandmother who got a life sentence for a first time, nonviolent offense.

Still, we’re guessing Kim would tell Pam … never hurts to ask.

Continue reading here:
Pamela Anderson Says Trump Should Pardon Julian Assange