Edward Snowden describes Russian government as corrupt …

National Security Agency whistleblower Edward Snowden has delivered his most trenchant criticism yet of the Russian government, describing it unequivocally as corrupt.

His comments mean the proposed US-Russia summit in Helsinki on 16 July is potentially risky for him if Donald Trump was to request Vladimir Putin to hand him over.

Snowden is wanted in the US on three charges under the Espionage Act, carrying a minimum of 10 years each in jail. Putin could balance the propaganda value of having Snowden in Russia against providing Trump with an easy gift.

In an interview with the German daily Sddeutsche Zeitung Snowden, who has lived in Russia since 2013, said: The Russian government is corrupt in many ways, thats something the Russian people realise. Russian people are warm. They are clever. Its a beautiful country. Their government is the problem not the people.

Snowden faced criticism in the first couple of years after he arrived in Russia of not criticising the Putin government but he has gradually become more outspoken, including in his defence of journalists.

Russia is the only safe haven in the world for Snowden. China would not allow him access to the mainland when he was in Hong Kong in 2013. Neither Germany, where there is strong public support for Snowden, nor any other European country appears willing to fall out with the US by offering him sanctuary. If he made it to Latin America or anywhere else in the world, the US could apply economic pressure or send in a CIA team to kidnap him.

He said: Ive already accepted that I am going to spend my life dealing with enormous consequences for my decision to tell the public what I know. But if not for me, by all means, Germany should pass the necessary laws to allow future whistleblowers to find a safe harbour.

Snowden said if a Russian whistleblower was to turn up on chancellor Angela Merkels doorstep, she would protect them. But if an American whistleblower shows up on Merkels doorstep? That question has not been answered, Snowden said.

He expressed disappointment with Merkels public position on whistleblowers. Weve talked so much about Russia today and the disappointments and the challenges that the public is facing because of the problems of their government. What would it say to the world if the only place an American whistleblower can be safe is in Russia?

Asked about WikiLeaks publisher Julian Assange, with whom he is often compared, Snowden said: Im a reformist, hes a revolutionary. I dont want to burn the system down, if I believe it can still be saved.

Although Assange helped organise Snowdens escape from Hong Kong, the two hold many different views, including how much classified information should be published, with Snowden favouring a more selective approach.

Go here to see the original:
Edward Snowden describes Russian government as corrupt …

Chelsea Manning’s Senate campaign in Maryland falters …

Government leaker and transgender rights advocate Chelsea Manning entered the U.S. Senate race in Maryland to huge fanfare this year, but her campaign is poised to wind down quietly Tuesday when voters head to the polls on primary day.

Ms. Manning promised to shake up the race, using her high profile to push a platform that included creating a universal health care system, abolishing federal law enforcement agencies such as U.S. Immigration and Customs Enforcement, and combating what she called the American police state.

But the strain of being in the public eye after seven years in prison for leaking secrets took its toll, friends and advocates say, compounded by the attacks she has faced during the campaign.

That culminated in a strange episode late last month when she made several posts on social media suggesting that she was contemplating suicide, before a tweet from her account later said she was safe.

Campaign spokeswoman Kelly Wright told The Associated Press after the incident that the candidate needed space to heal but that she had not suspended her campaign to unseat Sen. Benjamin L. Cardin in the Democratic Party primary.

Still, she has been out of the public eye and took what she said was a long-overdue break from Twitter at a time when voters are making up their minds.

Glenn Greenwald, a friend of Ms. Manning and co-founder of The Intercept, said her entrance into the race compounded the difficult adjustment she has had after her time in prison.

That has created a lot of hatred and animosity toward her on the part of Democratic Party loyalists who directed a lot of bile and hatred at her, which to be honest is fair game once you announce that youre going to run as a major candidate, he said in an interview last month with Democracy Now.

But I think its clear that she wasnt really prepared for that. She wasnt really ready for that, he said.

Ms. Mannings campaign did not respond to phone messages and emails seeking comment.

But even in the best of environments for an insurgent-style campaign, any candidate would have a tough time unseating Mr. Cardin, a two-term Democrat who has 50 years of experience as a federal and state lawmaker in Maryland.

Mr. Cardin said he is confident heading into the Tuesday primary and that top concerns he has been hearing from residents include health care, prescription drug costs, jobs, the environment and health of the Chesapeake Bay, and the effect President Trump is having on Americas values.

A Goucher College poll released in February, soon after Ms. Manning announced her candidacy, showed Mr. Cardin with a 61 percent to 17 percent lead over her.

A Zogby poll conducted in March on behalf of Jerome Segal, another Democratic challenger, showed Mr. Cardin with about 50 percent support; 38 percent were undecided, and Ms. Manning was the closest challenger at 3 percent.

Mr. Cardin acknowledged Ms. Mannings national name recognition but deferred comment to her campaign on why she hasnt managed to gain more traction.

I have not seen her on the campaign trail at all. Ive never met her, and Im out every day, he said.

She also has struggled to find financial backers, raising just $81,361 for her campaign through June 6. Mr. Cardin raised nearly $4 million this year.

Known as Pfc. Bradley Manning when arrested in 2010, she was convicted in 2013 on espionage and theft charges for leaking government secrets to WikiLeaks.

She came out as a transgender woman in 2013 while serving in an all-male federal prison in Kansas. She tried to kill herself at least twice while behind bars, her attorney said.

Her fight for better conditions as a woman in a male prison became a major cause for the gay rights community.

She was released from prison in May 2017 after President Barack Obama commuted her 35-year sentence to time served.

Yet many in the military and national intelligence communities still consider her a traitor for leaking thousands of documents about the wars in Iraq and Afghanistan as a military analyst.

Harvard University announced in September that she would be a visiting fellow for the academic year only to quickly reverse course after a swift backlash, including criticism from then-CIA Director Mike Pompeo.

Ms. Manning has staked out a fiercely liberal platform, demanding an overhaul of the federal prison system, abolishing the immigration enforcement agencies and instituting a universal basic income.

She also called for the Foreign Intelligence Surveillance Court to be abolished, saying it acts merely as a rubber stamp for the government in an attempt to provide an illusion of oversight and checks and balances behind a wall of secrecy.

Maryland is a deeply Democratic state, but analysts said that doesnt mean it is ready to embrace calls for open borders or disbanding entire police departments.

Maryland is Democratic Maryland has not historically been progressive, said Todd Eberly, a political science professor at St. Marys College of Maryland.

Ms. Manning also doesnt seem to have done the retail politicking that is needed to gain traction in a statewide campaign, said Mileah Kromer, a political science professor at Goucher College in Baltimore.

The issue with her candidacy and other candidacies is its difficult to run a statewide race, period, Ms. Kromer said.

Ms. Manning, along with Mr. Segal and Rikki Vaughn, another Democratic challenger to Mr. Cardin, co-authored a June 7 piece in The Washington Post saying the incumbent should debate his Democratic opponents.

Not one progressive organization in the state has endorsed any candidate in the primary, they wrote. And while multiple debates were scheduled for the gubernatorial race, not one civic organization, or media organization and not the Democratic Party itself proposed a debate between us and Cardin.

Though he is indeed the prohibitive favorite, Mr. Cardin has been running radio ads in the Baltimore and Washington media markets. He will likely face one of about a dozen Republicans vying for their partys nomination Tuesday.

I am asking the voters of Maryland to allow me to continue to use my experience, seniority and willingness to work beyond party lines to help promote their interests and their goals in the U.S. Senate, Mr. Cardin said.

See the rest here:
Chelsea Manning’s Senate campaign in Maryland falters …

AT&T collaborates on NSA spying through a web of secretive …

A new report from The Intercept sheds light on the NSAs close relationship with communications provider AT&T.

The Intercept identified eight facilities across the U.S. that function as hubs for AT&Ts efforts to collaborate with the intelligence agency. The site first identified one potential hub of this kind in 2017 in lower Manhattan.

The report reveals that eight AT&T data facilities in the U.S. are regarded as high-value sites to the NSA for giving the agency direct backbone access to raw data that passes through, including emails, web browsing, social media and any other form of unencrypted online activity. The NSA uses the web of eight AT&T hubs for a surveillance operation code-named FAIRVIEW, a program previously reported by The New York Times. The program, first established in 1985, involves tapping into international telecommunications cables, routers, and switches and only coordinates directly with AT&T and not the other major U.S. mobile carriers.

AT&Ts deep involvement with the NSA monitoring program operated under the code name SAGUARO. Messaging, email and other web traffic accessed through the program was made searchable through XKEYSCORE, one of the NSAs more infamous search-powered surveillance tools.

The Intercept explains how those sites give the NSA access to data beyond just AT&T subscribers:

The data exchange between AT&T and other networks initially takes place outside AT&Ts control, sources said, at third-party data centers that are owned and operated by companies such as Californias Equinix. But the data is then routed in whole or in part through the eight AT&T buildings, where the NSA taps into it. By monitoring what it calls the peering circuits at the eight sites, the spy agency can collect not only AT&Ts data, they get all the data thats interchanged between AT&Ts network and other companies, according to Mark Klein, a former AT&T technician who worked with the company for 22 years.

The NSA describes these locations as peering link router complex sites while AT&T calls them Service Node Routing Complexes (SNRCs). The eight complexes are spread across the nations major cities, with locations in Chicago, Dallas, Atlanta, Los Angeles, New York City, San Francisco, Seattle and Washington, D.C. The Intercept report identifies these facilities:

Among the pinpointed buildings, there is a nuclear blast-resistant, windowless facility in New York Citys Hells Kitchen neighborhood; in Washington, D.C., a fortress-like, concrete structure less than half a mile south of the U.S. Capitol; in Chicago, an earthquake-resistant skyscraper in the West Loop Gate area; in Atlanta, a 429-foot art deco structure in the heart of the citys downtown district; and in Dallas, a cube-like building with narrow windows and large vents on its exterior, located in the Old East district.

in downtown Los Angeles, a striking concrete tower near the Walt Disney Concert Hall and the Staples Center, two blocks from the most important internet exchange in the region; in Seattle, a 15-story building with blacked-out windows and reinforced concrete foundations, near the citys waterfront; and in San Franciscos South of Market neighborhood, a building where it was previously claimed that the NSA was monitoring internet traffic from a secure room on the sixth floor.

While these facilities could allow for the monitoring of domestic U.S. traffic, they also process vast quantities of international traffic as it moves across the globe a fact that likely explains why the NSA would view these AT&T nodes as such high-value sites. The original documents, part of the leaked files provided by Edward Snowden, are available in the original report.

Update: A representative from AT&T provided TechCrunch with the following comment.

Like all companies, we are required by law to provide information to government and law enforcement entities by complying with court orders, subpoenas, lawful discovery requests and other legal requirements. And, we provide voluntary assistance to law enforcement when a persons life is in danger and in other immediate, emergency situations. In all cases, we ensure that requests for assistance are valid and that we act in compliance with the law.

Read this article:
AT&T collaborates on NSA spying through a web of secretive …

Potential NSA spying hub revealed in D.C. AT&T building …

The NSA could be using an AT&T building in the District to spy on peoples digital communications, reported The Intercept earlier today.

The Intercept identified 8 AT&T buildings across the country which collect and sifts throughcommunications for the NSA, based on information the news site gleaned from interviews with former AT&T workers, public records, and classified agency documents.

One building is a concrete multi-story that sits at 30 E Street in Southwest, across the street from the Fairchild Building which houses an office for the Capitol Police.

The Southwest building acts as a peering hub for the NSAs code-named surveillance program FAIRVIEW which processes calls, texts, emails, and other internet communications by tapping into AT&Ts cables, routers, and switches, according to the Intercept.

Internet traffic is often routed through the United States, where it is handled by companies like AT&T. The NSA ran a program code-named SAGUARO to surveil the data passing through AT&T main nodes, such as the building in Southwest. The company helped the agency flag important data and transmit it to a processing facility in New Jersey, all according to The Intercept.

Verizon owns the majority of the D.C. building, with AT&T occupying the fourth, fifth, and sixth floors, according to public records. Representatives from the company and the NSA did not confirm or deny the use of the building for surveillance to The Intercept and stressed their compliance with existing laws.

The Intercept first revealed AT&T buildings may be used for surveillance last year with an investigation into a windowless skyscraper in New York City. Other buildings since identified are located in Washington state, California, Texas, Illinois, and Georgia.

The NSA has legally been allowed to snoop on foreign communications that pass through the U.S. since 1981. In 2008 Congress authorized the NSA to also collect domestic communications if they were being exchanged with a foreigner under agency surveillance.

However, in 2011 the Foreign Intelligence Surveillance Court found the NSA had swept up tens of thousands of wholly domestic communications and ruled a portion of the collection program unlawful. At the time the NSA tried to adapt the program sanctioned by Congress to provide additional measures of privacy, but in 2017 the agency admitted ongoing compliance issues, and scrapped the program.

Information about NSAs mass surveillance programs originally became public knowledge after former government contractor Edward Snowden leaked classified documents to The Guardian in 2013.

View post:
Potential NSA spying hub revealed in D.C. AT&T building …

Encrypt email messages – Outlook

When you need to protect the privacy of an email message, encrypt it. Encrypting an email message in Outlook means it’s converted from readable plain text into scrambled cipher text. Only the recipient who has the private key that matches the public key used to encrypt the message can decipher the message for reading. Any recipient without the corresponding private key, however, sees indecipherable text.

This article is specifically about encrypting and digitally signing a message with S/MIME. To understand the full list of email encryption options go to the article on Email Encryption in Office 365.

What happens if the recipient doesn’t have the corresponding private key? The recipient will see this message:

“This item cannot be displayed in the Reading Pane. Open the item to read its contents.”

And if the recipient tries to open the item, a dialog box opens with this message:

“Sorry, we’re having trouble opening this item. This could be temporary, but if you see it again you might want to restart Outlook. Your Digital ID name cannot be found by the underlying security system.”

Sending and viewing encrypted email messages requires both sender and recipient to share their digital ID, or public key certificate. This means that you and the recipient each must send the other a digitally signed message, which enables you to add the other person’s certificate to your Contacts. You cant encrypt email messages without a digital ID.

If you send an encrypted message to a recipient whose email setup doesnt support encryption, you’re offered the option of sending the message in an unencrypted format.

Any attachments sent with encrypted messages also are encrypted.

In message that you are composing, click File > Properties.

Click Security Settings, and then select the Encrypt message contents and attachments check box.

Compose your message, and then click Send.

When you choose to encrypt all outgoing messages by default, you can write and send messages the same as with any other messages, but all potential recipients must have your digital ID to decode or view your messages.

On the File tab. choose Options >Trust Center > Trust Center Settings.

On the Email Security tab, under Encrypted email, select the Encrypt contents and attachments for outgoing messages check box.

To change additional settings, such as choosing a specific certificate to use, click Settings.

In the message that you’re composing, on the Options tab, in the More Options group, click the dialog box launcher in the lower-right corner.

Click Security Settings, and then select the Encrypt message contents and attachments check box.

Compose your message, and then click Send.

When you choose to encrypt all outgoing messages by default, you can write and send messages the same as you do with any other messages. All potential recipients, however, must have your digital ID to decode or view those messages.

On the File tab, click Options > Trust Center > Trust Center Settings.

On the E-mail Security tab, under Encrypted e-mail, select the Encrypt contents and attachments for outgoing messages check box.

To change additional settings, such as choosing a specific certificate to use, click Settings.

In the message, on the Message tab, in the Options group on the ribbon, click the Encrypt Message Contents and Attachments button .

Note:If you don’t see this button, click the Options Dialog Box Launcher in the lower-right corner of the group to open the Message Options dialog box. Click the Security Settings button, and in the Security Properties dialog box, select Encrypt message contents and attachments. Click OK, and then close the Message Options dialog box.

Compose your message and send it.

Choosing to encrypt all outgoing messages means, in effect, your e-mail is encrypted by default. You can write and send messages the same as with any other e-mail messages, but all potential recipients must have your digital ID to decode your messages.

On the Tools menu, click Trust Center, and then click E-mail Security.

Under Encrypted e-mail, select the Encrypt contents and attachments for outgoing messages check box.

To change additional settings, such as choosing a specific certificate to use, click Settings.

Click OK twice.

View post:
Encrypt email messages – Outlook

Top 5 best encryption software tools of 2018 | TechRadar

If you’re looking for the best encryption software for your needs in 2018, then you’ve come to the right place, as we’ve listed the top software that will keep your important files and documents safe from malicious users.

The sad fact is that as hackers are become ever more adept at stealing private information, we must be ever more vigilant when it comes to protecting our files, regardless of if we are a business or home user, and this is where our list of the best encryption software of 2018 comes in.

Encryption tools encode data so that it can only be unlocked with a certain key, making it harder for third-parties to gain access. This means that only people who have access to that key can also access the data, making encryption software an essential tool for keeping data safe.

These encryption tools can be used to protect data such as email addresses, customer transactions and passwords, and other crucial information which you really cant afford to potentially expose. Many companies are also using encryption software to ensure internal online conversations and emails are kept private.

So which are the best encryption tools? Read on for our pick of the very best tools for keeping your data safe.

Free encryption for everyone

Platforms: Windows, macOS, Linux | Resources covered: Encryption and brute-force attack protection | Cloud-based: No | Integrations: No | Free trial: N/A

Basic version is completely free

Provides effective encryption

Selective approach

Initial download is a bit confusing

VeraCrypt is one of the most popular security tools, providing you with enterprise-grade encryption for important data.

The system is quite easy to use, and all it really does is add encrypted passwords to your data and partitions. All you have to do is give the tool a few details about your data, such as volume size, location and specified hashing algorithms and then the program does its thing.

Whats also nifty about VeraCrypt is that its immune to brute-force attacks, so you never have to worry about hackers decrypting your passwords and other sensitive data. The basic version of the software is completely free, as well.

Encryption for small teams and individuals

Platforms: Windows, macOS | Resources covered: Encryption, password protection, mobile apps | Cloud-based: Yes | Integrations: Google Docs, Dropbox | Free trial: 30 days (fully free version also available)

Strong encryption for personal use

Free version available

Mainly mobile-oriented

While free software can be convenient for some, its not always as powerful as premium offerings, and AxCrypt is a good bet if you want something reliable. The software has been designed specifically for individuals and small teams within businesses.

It provides strong security, with files protected by either 128-bit or 256-bit AES encryption, which should thwart any intruders. There are also cloud storage capabilities thrown into the mix the software will automatically protect files saved on services such as Google Drive and Dropbox.

AxCrypt is fully multilingual, and it can work with languages such as Dutch, French, German, Italian, Korean, Spanish, Swedish, Russian and Portuguese with more support planned for the future. As well as this, theres passport management, and you can access your encrypted files through a smartphone app.

The Premium package is $27 per year (roughly 20, AU$34), while there is a free version which has much fewer options.

Effective encryption for individuals

Platforms: Windows, Android, iOS | Resources covered: Encryption, password protection, brute-force attack prevention | Cloud-based: Yes | Integrations: No | Free trial: N/A

Free to download basic version

Effective personal encryption

Mainly mobile oriented

Although its important to protect assets on company computers, its also crucial to add protection to any device that stores critical data. For instance, most employees have access to their company emails and other accounts on their smartphones, and they need to be protected.

Folder Lock is a good option when it comes to adding encryption to your mobile devices. The app can protect your personal files, photos, videos, contacts, wallet cards, notes and audio recordings stored in your handset.

There are some other hidden security features, too. Not only is there encryption, but you can also set a decoy password, hacker deterrents, log unauthorised login attempts, back up all your passwords and get notified on potential brute-force attacks. The basic app is free to download, with a pro version available if you want more.

Powerful protection indeed

Platforms: Windows | Resources covered: Encryption, password protection, brute-force attack prevention | Cloud-based: No | Integrations: No | Free trial: 30 days

Uses multiple encryption methods

Powerful encryption

It may be too complicated for some


CryptoExpert is Windows desktop software which offers secure data vaults for all your data, ensuring its always protected from potential breaches.

It provides more powerful encryption than some of the other tools and apps listed in this article, boasting fast on-the-fly operation. The system can back up a range of different files, including certificates, Word, Excel and PowerPoint files, multimedia files and email databases.

The best thing about CryptoExpert 8 is that it can secure vaults of unlimited size, and it uses Blowfish, Cast, 3DES and AES-256 encryption algorithms. The latter are highly effective and industry-acclaimed. Itll work with 32-bit and 64-bit versions of Windows 7, 8 and 10.

A quality cloud-based solution

Platforms: Desktop | Resources covered: Encryption, password protection, brute-force attack prevention, secure file storage | Cloud-based: Yes | Integrations: No | Free trial: 30 days

Completely cloud-based

Affordable monthly plan

Not everyone wants cloud-based security

CertainSafe is highly effective cloud-based encryption software which attempts to mitigate all aspects of risk and is compliant with industry regulations.

With the platform, you can store and share documents, private messages, photos, videos and other files without exposing them to third-party sources. You can even collaborate and communicate with colleagues through the system, with all correspondence encrypted.

CertainSafe also adds automated security for business databases and applications, meaning you dont always have to do things manually. You can subscribe for a monthly plan, but before making any decisions, theres the option to get a free trial and try things out that way.

Here is the original post:
Top 5 best encryption software tools of 2018 | TechRadar

The best open source software 2018 | TechRadar

The term open source refers to software whose source code is freely available to download, edit, use and share. There are different open source licenses, which give users different degrees of freedom, but the main aim of open source is to encourage collaboration.

Open source software has lots of advantages over other free options youll come across even if youre not a developer yourself. Its usually maintained by a community and updated frequently to patch vulnerabilities or squish bugs as soon as theyre identified; there are no restrictions on commercial use, so you can happily use it for your home business; and the ability to edit the source means theres often a wealth of user-created plugins available to download.

With that in mind, here’s our pick of the very best open source software.

There’s no need to pay for Office with this open source alternative

LibreOffice is a full suite of office software, including excellent apps for text documents, spreadsheets, presentations, and databases. These are all fully compatible with the latest Microsoft file formats, so youll have no trouble sharing files work users of Word, Excel, PowerPoint, and Access.

Documents look just as sharp and professional as those created using paid-for software, and there are hundreds of templates available to download, use and edit.

LibreOffices huge community of contributors have compiled a brilliant collection of support materials, including a forum and even live chat if you need a hand.

Review and where to download: LibreOffice

Our favorite open source photo editor, packed with powerful tools

Powerful and flexible, open source image editor GIMP is as close to Adobe Photoshop as you can get without opening your wallet. It supports layers, and is packed with advanced tools for enhancing your pictures or creating new ones from scratch.

You can adjust every aspect of your pictures appearance manually, or use the dozens of customizable filters and effects to achieve amazing results with just a few clicks. GIMP comes with a huge array of user-created plugins pre-installed, and adding more is a piece of cake.

If you dont need the power of GIMP and prefer a simpler interface, check out Paint.NET another superb open source photo editor thats a little lighter on features, but easier to master.

Review and where to download: GIMP

An open source media player than can handle virtually any file format

VLC Media Player is one of the worlds most popular free media players, and for good reason it can handle just about any audio file, video file, or media stream you can throw at it, without the need to mess around installing additional codecs. VLC Media Player gives you an amazing degree of control over playback, letting you optimize video and audio for your specific hardware configuration.

VLC Media Player is ideal for streaming podcasts, as well as internet radio stations like Last.fm and TuneIn Radio. Theres also a superb archive of extensions and skins, and the WYSIWYG Skin Editor lets you create your own custom designs.

The latest addition to VLC is 360-degree playback, which lets you enjoy immersive videos with a VR headset, and more exciting developments are on the horizon to keep pace with new video technology.

Review and where to download: VLC Media Player

Great for new users, and an excellent substitute for Windows Movie Maker

If youre looking for a great open source video editor, give Shotcut a whirl. It might look a little stark at first, but add some of the optional toolbars and youll soon have its most powerful and useful features your your fingertips.

Some of its best tools include quick filters for audio and video (which are non-destructive and can be layered to achieve different effects), advanced white balancing, wipes and other transitions, color grading, click-and-drag import, and straightforward trimming and compositing of clips.

Review and where to download: Shotcut

The perfect open source tool for recording and editing podcasts and music

Even if you have the ready cash for an audio editor, you might choose to stick with open source alternative Audacity. It has almost all the tools you need for recording and refining sound files, and any features it lacks can be plugged with its extensive catalog of extensions.

Audacity is the tool of choice for many podcasters, musicians and audiobook narrators thanks to its professional quality results. You can use it to combine clips, copy and paste sections of audio, remove noise and other unwanted noises, strip vocals from songs, alter frequencies, and apply effects like echo and reverb.

An powerful, fully customizable browser with a plugin for every purpose

The browser wars show no sign of ending, but Firefox’s open source heritage makes it incredibly flexible. Its main appeal is its collection of extensions. With thousands of plug-ins available at the click of a mouse, its easy to transform Firefox into your perfect browser.

Firefox is updated every five to eight weeks, and you can get an early taste of the latest features by installing the beta or taking part in Firefox Test Pilot a way to sample experimental tools that might be incorporated into future releases.

Firefoxs source code forms the basis of many specialist projects, including the security-focused Tor Browser and speed-centric Waterfox, which is designed with power users in mind.

A free client that’s an ideal replacement for the defunct Windows Live Mail

If you have multiple email accounts even if theyre with the same provider open source email client Mozilla Thunderbird will save you time and hassle flicking between browser tabs and logins. Like Firefox, Thunderbird is an open source project published by the Mozilla Foundation, and is almost infinitely adaptable.

Thunderbird’s standard features include an RSS reader and the ability to link to files too large to send as attachments, and its optional extras include weather forecasts and Google app tabs.

Generate strong passwords for accounts and store them in a secure vault

Theres no shortage of free password managers, but KeePass Password Safe is our favorite open source option. Its not flashy, but its packed with all the tools and features you could want, including AES encryption of your entire database of login details (not just the passwords themselves), two-factor authentication via both a master password and key file, and secure random password generation.

KeePass is tiny, and because its a portable program you can carry it on a USB stick, and thanks to an extensive library of plug-ins, its easy to integrate with your preferred browser and cloud storage provider.

Read the original:
The best open source software 2018 | TechRadar

Chelsea Manning loses longshot bid in Maryland Democratic …

Chelsea Manning was defeated Tuesday in her run against longtime Sen. Ben Cardin in the Maryland Democratic primary. (Getty Images, File)

Convicted leaker Chelsea Manning was soundly defeated Tuesday in her run against longtime Sen. Ben Cardin in the Maryland Democratic primary, ending a longshot bid that attracted widespread media attention when it began in January.

Cardin, 74, triumphed over Manning and six other Democrats, although none was as high-profile as Manning, the former Army intelligence analyst whom President Trump has described as an “ungrateful traitor.”

A two-term incumbent and ranking Democrat on the Senate Foreign Relations Committee, Cardin is expected to prevail in the solidly blue state in November. His Republican opponent is yet to be determined.

For Manning, who was arrested in 2010 and convicted in 2013 of leaking a trove of sensitive documents to WikiLeaks, a run for the Senate would have been all but unthinkable years ago.

But Chelsea Manning, formerly known as Bradley Manning, served only seven years of a 35-year sentence, after former President Barack Obama commuted her sentence just before he left office.

After the results were announced Tuesday night, Manning claimed a kind of victory, saying her “campaign platform has advanced an anti-authoritarian agenda.”

“Win or lose, our campaign is part of a growing political insurrection,” Manning said in the statement. “Our power is real. Our movement is larger than any election, and the political establishment ignores our voices at their own peril.”

Manning’s rhetoric was incendiary throughout the campaign. In January, she called Immigration and Customs Enforcement “literally the new gestapo.” She has called for abolishing both ICE and the presidency itself.


In recent weeks, though, Manning seemed resigned to defeat, tweeting: “we cant expect any change thru the upcoming elections – the primaries are rigged.” Her campaign was trailing significantly in the polls, and had raised relatively little money.

In May, a photo on Manning’s Twitter account apparently showed the 30-year-old standing on the edge of an upper-story window ledge. The photo was posted to Manning’s Twitter account late Sunday with the words: “I’m sorry.”

It was sent shortly after a separate tweet that said: “im not really cut out for this world i tried adapting to this world out here but i failed you i couldn’t do this anymore,” among other things.The epsiode caused widespread alarm. A friend later said Manning was OK and needed “some space.”

State officials hadwarned that a computer glitchmight cause some problems for voters on Tuesday in Maryland — although they reassured the public that all votes would eventually be counted.

Voters cast ballots in seven states on Tuesday, including South Carolina, New York, Utah, Colorado, Oklahoma and Mississippi as well as Maryland. With the November general election a little more than four months away, more than half the states will have selected their candidates after the day’s final votes are counted.

Fox News’ Alex Pappas and The Associated Press contributed to this report.

Gregg Re is an editor for Fox News. Follow him on Twitter @gregg_re.

Continued here:
Chelsea Manning loses longshot bid in Maryland Democratic …

Chelsea Manning Loses Longshot Maryland Primary Challenge …

Chelsea Manning lost her bid for a U.S. Senate seat from Maryland on Tuesday, as incumbent Ben Cardin defeated her and six other challengers in the states Democratic primary.

Manning drew national attention when she filedin Januaryto run against the 74-year-old Cardin.

The 30-year-old government whistleblower and former intelligence analyst began her race with some momentum, but her campaign stalled in recent weeks as appearances and fundraising declined, The Washington Post reported.

Manning conceded with an online statementTuesday addressing her pullback in campaigning efforts to focus on her physical and mental health in recent months. She thanked her staff and volunteers for their work while telling her supporters to realize the power we have as individuals.

We started this campaign knowing it was a long-shot, Manning wrote in her concession. But, after spending hours and hours knocking on doors and making phone calls, Im convinced that the change people truly need goes beyond what our corrupt two-party system is willing to offer.

Last month, Manning posted a thread on Twitter claiming that Maryland residents were uninterested in voting and thatprimaries are rigged.

In one of her tweets, Manning said that we need something radically different and we cant just ask for it or expect it to happen somehow.

Cardin, long a fixture on the Maryland political scene, is a heavy favorite to win a third Senate term in Novembers general election in the strongly Democratic state.

Manning, in her campaign, called for abolishing the U.S. Immigration and Customs Enforcement agency months before it was put in the spotlight by President Donald Trumps since-rescinded policy of cracking down on undocumented immigrants by separating parents from their children at the U.S.-Mexico border.

We dont need ICE, she said in an interview with Democracy Now! in March. We dont need a lot of these gigantic… police agencies that are singularly focused on deporting people.

Manning,a former Army private,pleaded guilty in 2013 to leakingmore than 700,000 government files to WikiLeaks. Manning was sentenced to 35 years in prison, but was released in May 2017 after former President Barack Obama commutedher sentence in January of that year, just as he was leaving office.

She became a symbol of transgender rights while in jail when she went on a hunger strike to protest officials who denied her request forgender confirmation treatment.Manning, who was assigned male at birth and transitioned during her imprisonment, ended her strike after the Army complied with her request.

This story has been updated with a concession statement from Manning.

Original post:
Chelsea Manning Loses Longshot Maryland Primary Challenge …