Page 11«..10111213..2030..»

Cryptocurrency Alternatives to Bitcoin – due.com

When you think of cryptocurrency, chances are the first thing that comes to mind is Bitcoin.

By now, Bitcoin is something that most people are aware of even if they arent exactly sure what it is.

Accepting cryptocurrencies can make sense for your business, whether you sell physical goods or whether youre a freelancer. But using a cryptocurrency as a medium of exchange doesnt mean you have to go with Bitcoin.

In fact, there are a surprising number of cryptocurrency alternatives to Bitcoin.

One of the cryptocurrency alternatives to Bitcoin thats gaining a lot of ground right now is Dash. Thats because Dash is open source and very centered on privacy.

On top of that, there are low fees that come with Dash. To tell the truth, most cryptocurrencies are going to come with lower fees than what you pay with bank and credit card transactions. However, there are cases where its even free to send Dash.

Its also nice that Dash is an instant peer-to-peer cryptocurrency. You dont have to worry about it because payments are private, and instantly appear to the person on the other side of the transaction anywhere in the world.

Theres a reason Dash is one of the most popular Bitcoin alternatives out there.

One of the oldest cryptocurrency alternatives to Bitcoin is Litecoin. This cryptocurrency has been around for several years. Interestingly enough, even though it is capable of handling a higher transaction volume than Bitcoin, it still isnt as well-known.

Litecoin makes use of open source software and the decentralized network makes use of mathematics for security. Litecoin also comes with some cool features:

Due to its availability and other features, its no surprise Litecoin is on the rise.

Peercoin is one of the most potentially inflationary cryptocurrency alternatives to Bitcoin. Theres a lot that goes into rewarding miners and there is no upward limit to how many will be mined. Minting uses Proof of Stake for security in the network, which means that Peercoin security is not impacted the same way that Bitcoin mining is when it comes to Selfish Mining.

Its also worth noting that Peercoin is derived from Bitcoin. So if you have hardware that works with the Bitcoin network, it will also work with Peercoin.

This is great for mining, but it can also allow you to accept payment for more than one cryptocurrency without the need to use different networks.

The peer-to-peer technology used for feathercoin is designed to create borderless payments. One of the cool things is that feathercoin is somewhat unique among cryptocurrency alternatives in that it has a number of features to really bypass banking.

In fact, feathercoin is working on open source projects for ATMs and Point of Sale equipment. Right now, it can be cumbersome to use cryptocurrencies. In many cases, its hard to use cryptocurrencies in real world transactions that take place offline.

That might change if feathercoins projects come to fruition. Physical, laser-etched coins and access to the cryptocurrency easily at Point of Sale terminals and ATMs really set this digital currency apart.

When it comes to mining, Quarkcoin offers the opportunity to just about anyone with a CPU. It doesnt give the advantage to special equipment or server farms. So, if you are looking for a way to mine a little bit more, the Quarkcoin can help.

Like Bitcoin and cryptocurrency alternatives to Bitcoin, Quarkcoin is peer-to-peer. You can make payments directly to the person you want to, almost instantly. Plus, there is a high level of security with Quarkcoin. Were talking nine rounds of hashing, as opposed to one hash used by most cryptocurrencies.

One of the interesting things about Digitalcoin is that it is accepted by a number of businesses. Sometimes, it can be difficult to find someone willing to accept your cryptocurrency payment if it isnt Bitcoin or Dash. Digitalcoin offers stability as well, with a block rewards produced at a lower rate than many other digital currencies.

Digitalcoin, like other cryptocurrencies, is decentralized and secure. You can send and receive the currency anywhere in the world, and its free to use.

This is another of the highly private cryptocurrency alternatives to Bitcoin. Stablecoin is distinguished by the fact that the transactions are not only encrypted, but also untraceable. While this currency isnt quite as well-used as many others, it is working hard to move forward, especially in China. If this catches in China, which is a huge economy, it could grow elsewhere.

The essential question is whether or not you should buy cryptocurrencies with the idea of capital appreciation in mind. Do you buy (or mine) these cryptocurrencies in the hope that you can sell them on an exchange and make a profit?

There are those who look at the widely-accepted Litecoin and refer to it as silver to Bitcoins gold. But does that really make sense in the long term?

While it can be tempting to think of cryptocurrencies as investments, the reality is that they might not be solid. Sure, mine cryptocurrencies. But they might be most useful as mediums of exchange. They are inexpensive, and blockchain technology allows for almost instant transfer so its possible to set up a low-cost global payment system.

The real value might be in the way Bitcoin and the way cryptocurrency alternatives to Bitcoin are changing the way we think about money and do business.

Some of the more interesting blockchain developments are Ethereum and Namecoin.

Ethereum is interesting because it is at once a digital currency and an application layer. If you are hoping to get involved with smart contracts, one of the best choices is Ethereum.

The decentralized, open source Ethereum allows developers to create their own applications. This includes smart contracts, as well as token systems. The systems can be used as part of the smart contract process. Its possible to layer on the applications using Ethereum, which means that this blockchain development could change the face of business.

Namecoin is another interesting blockchain development. Namecoin technology isnt about currencies and money. Its all about decentralizing the Internet itself. Namecoin is about increasing privacy, resisting censorship, and improving the security of the infrastructure of the Internet. This is an interesting open source project that could change the way the Internet itself works.

Innovation in the way we see money and the way we do business are the main results of blockchain technologies. Bitcoin really brought the blockchain and cryptocurrencies into the mainstream consciousness. However, what comes next in terms of the way we conduct business on a global scale could be even more exciting.

See original here:
Cryptocurrency Alternatives to Bitcoin – due.com

Read More..

Learn BitCoin and master the world of cryptocurrency

It’s about time you learned how Bitcoin works.

Image: pixabay

By Team CommerceMashable Shopping2017-10-04 16:47:54 UTC

You may think youre too late to invest in cryptocurrency like Bitcoin and wear suits made of money but youre actually just in time.

Cryptocurrency has been growing in popularity, but only a tiny percentage (.01 percent) of people have gotten wind of how to make money from it. And thats not because that goal is out of reach. Those who know their way around cryptocurrency know that the high-risk investment has a huge potential for getting you up to your elbows in hundred-dollar bills. Not to mention, you dont have to worry about high bank fees or fluctuations based on government regulations.

Interested in being one of the .01 percent? The #1 cryptocurrency investment course can help you get there. Youll learn different buying strategies for making gains in the short, medium, and long terms and strategies for protecting the money you make. And since its not just about Bitcoin anymore, youll also learn which cryptocurrencies are worth investing in.

The course also gives you access to a private community of like-minded investors, so you can learn from others, get your questions answered, and get live updates on the market. Get the #1 cryptocurrency investment course for $15 here.

Go here to read the rest:
Learn BitCoin and master the world of cryptocurrency

Read More..

Cryptocurrency Flash Crash Is Said to Draw Scrutiny From CFTC …

A popular digital-coin exchange isdrawing scrutiny from U.S. regulators over a June flash crash that erased most of the value in thesecond-largest cryptocurrency before traders had time to blink their eyes.

The Commodity Futures Trading Commission has requested information from Coinbase Inc. about a June 21 incident on its GDAX platform in which the ether digital token suffered a precipitous drop, falling to 10 cents from $317.81 in milliseconds before quickly recovering, said two people familiar with the matter.

Among the issues the agency is focused on is what role leverage might have played in the plunge, as Coinbase allowed traders to use borrowed money to make bigger wagers than would have otherwise been possible, said the people, who asked not to be named because the review isnt public.

The CFTC inquiry is the latest sign that federal authorities aregrowing worried about a market with scattershot oversight that has attracted big money. Coinbase, which says it has served 10.6 million customers and facilitated $20 billion in digital currency transactions, is regulated by various states through a patchwork system.

Its not registered with the CFTC, the main U.S. watchdog of currency futures. Coinbase doesnt allow traders to buy and sell derivatives, and firms dont typically fall under the regulators direct jurisdiction unless they allow swaps trading. Coinbase does hold licenses with financial agencies in dozens of states, as well as Puerto Rico, according to its website.

The CFTC sent San Francisco-based Coinbase a letter with a list of questions, including queries about margin trading, one of the people said. Coinbase began offering margin accounts in March, as it sought to attract institutional investors by providing them loans to amplify their bets. The company disabled the service after the June crash.

As a regulated financial institution, Coinbase complies with regulations and fully cooperates with regulators, the company said in an emailed statement. After the GDAX market event in June 2017, we proactively reached out to a number of regulators, including the CFTC. We also decided to credit all customers who were impacted by this event. We are unaware of a formal investigation.

CFTC spokeswoman Erica Elliott Richardson declined to comment.

Coinbases ether plunge was caused by a single $12.5 million trade — one of the biggest ever — that prompted selling by other investors. The decline triggered automatic sell orders from traders whod requested to bail on the currency if prices dropped to certain levels, and led GDAX to liquidate some margin trades.

While the drop was dramatic, it was also temporary. Computer algorithms quickly started issuing buy orders that drove prices back up to $300 within 10 seconds.

Bitcoin and other cryptocurrencies have surged this year. But regulators and financial executives are concerned that investors are inflating a bubble thats destined to pop. South Korea banned margin trading in bitcoin and ether Sept. 29 after China earlier cracked down on digital currencies. Last month, JPMorgan Chase & Co. Chief Executive Officer Jamie Dimon likened cryptocurrencies to the infamous Dutch tulip bulb mania of the 17th Century.

The Securities and Exchange Commission has been grappling with how to police digital currencies. SEC Chair Jay Clayton warned lawmakers last week that initial coin offerings are probably full of fraud. The next day, the agency sued a company for misrepresentations tied to a bitcoin offering purportedly backed by diamonds and real estate.

One risk of allowing margin trades is that in a sharp market reversal, trading platforms could run into problems if investors cant repay the money theyve borrowed.

Thats what happened in January 2015 when the currency brokerage FXCM Inc. almost toppled after Switzerland shocked markets by letting its currency appreciate. When the franc jumped, FXCM customers lost more money than they had in their accounts, forcing the company to seek a $300 million bailout from Leucadia National Corp.

Coinbases GDAX had a margin funding limit of $10,000.To qualify, investors had to meet at least one of several qualifications laid out under federal law.

For instance, individuals can only trade with borrowed money if they have more than $5 million invested in various financial markets and are using their margin accounts purely to hedge risks. Individuals are exempt from the hedging requirement if they have more than $10 million invested. The rules are looser for institutional investors, such as hedge funds and corporations.

Last year, the CFTC sanctioned a different digital token market, Bitfinex, for allowing investors who didnt meet the $10 million threshold to make margin trades. Bitfinex also broke the law because it didnt deliver some bitcoins that investors had bought using leverage within a required timeframe, the CFTC said. Instead, it held the tokens in accounts that it owned and controlled, according to the regulator. Bitfinex agreed to pay $75,000 to settle the case, without admitting or denying the allegations.

Coinbase has suffered outages and other performance problems as its struggled to handle the surge in volume thats accompanied skyrocketing cryptocurrency prices. It has also faced a sharp increase in customer complaints. Almost 500 consumer grievances have been flagged about the company this year on a database maintained by the Consumer Financial Protection Bureau, compared with just six for all of 2016.

Coinbase and investors who use it to trade have piqued regulators interest in the past. In 2016,the Internal Revenue Service asked a court for permission to serve a summons against Coinbase, seeking records about taxpayers who have traded digital currencies.

It also has attracted prominent investors including Marc Andreessens venture capital firm and the New York Stock Exchange. In August, Coinbase received $100 million from a group led by Institutional Venture Partners, a Menlo Park, California-based venture capital firm.

With assistance by Nick Baker, and Matthew Leising

See original here:
Cryptocurrency Flash Crash Is Said to Draw Scrutiny From CFTC …

Read More..

Here’s what quantum computing is and why it matters

Researchers for IBM, Google, Intel, and others are in a fantastic scientific arms race to build a commercially viable quantum computer. They already exist in laboratories, and were only a few years away from the beginning of what may turn out to be an entire shift in how we think about computing.

A typical computer, like the one inside the phone or laptop youre reading this on, is a binary system, basically a yes/no device. The most amazing thing about computer programmers is how they can take something as basic and simple as a computer chip and spit out something like Microsoft Office by creating a series of if this, then that scenarios. This showcases how useful the computer is as a tool for humans to accomplish tasks.

The quantum computer, however, is an entirely difference concept the reason its quantum is that it doesnt use binary logic. By its nature a quantum computer is a yes/no/both device. When a developer makes a logic choice they arent limited by if this then that, they can also ask if this, then that or both and that makes all the difference in the world.

There are several instances where a binary computer cant feasibly solve a problem the way wed like to. When asked to solve a problem where every answer is equally likely, a binary computer has to take the time to individually assess each possibility. Quantum computers can assess more than one probability at a time, through something called quantum entanglement.

When two particles become entangled a phenomenon occurs where anything that happens to one of these particles happens to the other. Einstein called this spooky action at a distance, and he was spot-on. A lions share of the research thats been done in quantum computing since the 1980s has been focused on figuring out how to use quantum entanglement to our advantage.

The quantum internet of the future is also being built right now, with Chinese researchers making amazing strides in quantum communications.

A quantum internet would be unhackable as theres no transmission of data. Of course storage vulnerabilities will still exist, but by then our security will be handled by AI anyway. The weird and wonderful phenomena of entanglement means you can stick data in one side and it pops out the other like teleportation. Theres nothing swirling through the ether; whatever happens to one entangled particle instantly happens to another.

The technology is here already, but there are numerous challenges to overcome on the way to full-scale implementation. First, the quantum computing were capable of is still a bit behind the binary computing weve mastered. We also need to overcome physical concerns such as the fact that, in the IBM labfor example, the processors need to be kept at perfect-zero temperatures within hundredths of a degree.

Despite several incredible problems the outlook is very bright. Recent breakthroughs include the first ever space-based video call secured by quantum encryption.

The video call connected a Chinese scientist in Beijing with an Austrian scientist in Vienna. The distance between the two was over 4,000 miles. The communication was sent to a satellite in space then beamed back down to earth. Scientists have chosen to investigate the quantum network this way due to issues of signal loss through traditional methods of sending photons like fiber-optic cables.

These quantum encrypted communications would be impossible to hack using a binary computer. On the flip-side the successful completion of a commercially viable quantum computer may signal the end of binary-based encryption systems. Theoretically, a quantum computer could crack 128-bit encryption almost instantly given the same resources for computing power as any binary system, for example.

Perhaps the best way to look at the change that quantum computing represents is to compare it to binary computing in the exact same way you would compare the iPhone Xs capabilities with those of a Timex calculator watch from the 1980s.

Read next: 7 tips for using Snapchat like a millennial

View post:
Here’s what quantum computing is and why it matters

Read More..

What Is Bitcoin, and How Does It Work? – The New York Times

The record of all Bitcoin transactions that these computers are constantly updating is known as the blockchain.

Criminals have taken to Bitcoin because anyone can open a Bitcoin address and start sending and receiving Bitcoins without giving a name or identity. There is no central authority that could collect this information.

Bitcoin first took off in 2011 after drug dealers began taking payments in Bitcoin on the black-market website known as the Silk Road. Although the Silk Road was shut down in 2013, similar sites have popped up to replace it.

More recently, Bitcoin has become a method for making ransom payments for example, when your computer is taken over by so-called ransomware.

The records of the Bitcoin network, including all balances and transactions, are stored on every computer helping to maintain the network about 9,500 computers in late 2017.

If the government made it illegal for Americans to participate in this network, the computers and people keeping the records in other countries would still be able to continue. The decentralized nature of Bitcoin is also one of the qualities that have made it popular with people who are suspicious of government authorities.

Anyone helping to maintain the database of all Bitcoin transactions the blockchain could change his or her own copy of the records to add more money. But if someone did that, the other computers maintaining the records would see the discrepancy, and the changes would be ignored.

Only a small percentage of all transactions on the Bitcoin network are explicitly illegal. Most transactions are people buying and selling Bitcoins on exchanges, speculating on future prices. A whole world of high-frequency traders has sprung up around Bitcoin.

People in countries with high inflation, like Argentina and Venezuela, have bought Bitcoin with their local currency to avoid losing their savings to inflation.

One of the most popular business plans is to use Bitcoin to move money over international borders. Large international money transfers can take weeks when they go through banks, while millions of dollars of Bitcoin can be moved in minutes. So far, though, these practical applications of Bitcoin have been slow to take off.

There are companies in most countries that will sell you Bitcoins in exchange for the local currency. In the United States, a company called Coinbase will link to your bank account or credit card and then sell you the coins for dollars. Opening an account with Coinbase is similar to opening a traditional bank or stock brokerage account, with lots of identity verification to satisfy the authorities.

For people who do not want to reveal their identities, services like LocalBitcoins will connect people who want to meet in person to buy and sell Bitcoins for cash, generally without any verification of identity required.

The price of Bitcoin fluctuates constantly and is determined by open-market bidding on Bitcoin exchanges, similar to the way that stock and gold prices are determined by bidding on exchanges.

Bitcoin mining refers to the process through which new Bitcoins are created and given to computers helping to maintain the network. The computers involved in Bitcoin mining are in a sort of computational race to process new transactions coming onto the network. The winner generally the person with the fastest computers gets a chunk of new Bitcoins, 12.5 of them right now. (The reward is halved every four years.)

There is generally a new winner about every 10 minutes, and there will be until there are 21 million Bitcoins in the world. At that point, no new Bitcoins will be created. This cap is expected to be reached in 2140. So far, about 16 million Bitcoin have been distributed.

Every Bitcoin in existence was created through this method and initially given to a computer helping to maintain the records. Anyone can set his or her computer to mine Bitcoin, but these days only people with specialized hardware manage to win the race.

Plenty. But these other virtual currencies do not have as many followers as Bitcoin, so they are not worth as much. As in the real world, a currency is worth only as much as the number of people willing to accept it for goods and services.

Bitcoin was introduced in 2008 by an unknown creator going by the name of Satoshi Nakamoto, who communicated only by email and social messaging. While several people have been identified as likely candidates to be Satoshi, as the creator is known in the world of Bitcoin, no one has been confirmed as the real Satoshi, and the search has gone on.

Satoshi created the original rules of the Bitcoin network and then released the software to the world in 2009. Satoshi largely disappeared from view two years later. Anyone can download and use the software, and Satoshi now has no more control over the network than anyone else using the software.

Continued here:
What Is Bitcoin, and How Does It Work? – The New York Times

Read More..

Altcoin Watchlist | Meet & Learn Cryptocurrencies

Beside Bitcoin, there are more than 3000 cryptocurrencies existing currently. To give you an easy overview, we got our Altcoin Watchlist (Alternative Cryptocurrencies so all but Bitcoin). We monitor and support the currencies listed. So in our view these currencies have to biggest longterm potencial of them all but as there are so many of them, theres no garantuee this list is complete. Please note that we are NOT an investment information source if you are loocking for a safe or insanly fast investment opportunity, theirs lots of other sources. We focus on the economic and social value of a currency, not its ROI for investors.

The criterias for currencies beeing on our Watchlist are (subject to change) :* Sourcecode for Node must be Opensource* No unreasonable Premine or concentration of Coins from the beginning / for founders (richlist)* CPU/GPU friendly algos that are ASIC-resistant as good as possible and force decentralization.* Innovative Technology that differs it from bitcoin* Does not have to be a currency, but has to have a defined purpose (e.G ETH or DCR)

Read more:
Altcoin Watchlist | Meet & Learn Cryptocurrencies

Read More..

Internet Security Software | Trend Micro

Internet Security Software | Trend Micro

Advanced online protection

windows

Keep scams out of your inbox

Defend against ransomware and other online dangers

Block dangerous websites that can steal personal data

Fix common problems and get everything running at top speed

Allow children to explore the web safely, with both time and content limits

Safeguard your personal information and digital assets. Trend Micro can block phishing scams lurking in your email and devious new ransomware threats.

Give your system a makeover. Enjoy a minimal performance impact and fixes for common problems to start moving at top speed.

Share what you want with just the right people on your favorite social media sites. Trend Micro can optimise your privacy settings on Facebook, Google+, Twitter, LinkedIn, and more, so unwelcome strangers stay out of your way.

Want to learn more?

Compare our products

$

AUD 149.95

149.95

en_AU-AUD

tmapac

Premium Security

Whats included

windowsmacandroidios

Number of devices protected

6

Machine learning technology

yes

Safeguards against email scams

yes

Keeps children safe online

yes

Secures privacy on social media

yes

Fixes and optimises systems

yes

Protects and manages passwords

yes

Includes premium 24×7 support

yes

Maximum Security

Whats included

windowsmacandroidios

Number of devices protected

6

Machine learning technology

yes

Safeguards against email scams

yes

Keeps children safe online

yes

Secures privacy on social media

yes

Fixes and optimises systems

yes

Protects and manages passwords

yes

Includes premium 24×7 support

Internet Security

Whats included

windows

Number of devices protected

2

Machine learning technology

yes

Safeguards against email scams

yes

Keeps children safe online

yes

Secures privacy on social media

yes

Fixes and optimises systems

yes

Protects and manages passwords

Includes premium 24×7 support

yes

yes

yes

Machine learning technology

yes

yes

yes

Safeguards against email scams

yes

yes

yes

Keeps children safe online

yes

yes

yes

Secures privacy on social media

yes

yes

yes

Fixes and optimises systems

yes

yes

yes

Protects and manages passwords

yes

More here:
Internet Security Software | Trend Micro

Read More..

How to encrypt (almost) anything | PCWorld

It’s all too easy to neglect data security, especially for a small business. While bigger organizations have IT departments, service contracts, and enterprise hardware, smaller companies frequently rely on consumer software, which lacks the same sort of always-on security functionality.

But that doesnt mean that your data is unimportant, or that it has to be at risk.

Encryption is a great way to keep valuable data safewhether youre transmitting it over the Internet, backing it up on a server, or just carrying it through airport security on your laptop. Encrypting your data makes it completely unreadable to anyone but you or its intended recipient. Best of all, much of the software used in offices and on personal computers already has encryption functionality built in. You just need to know where to find it. In this article, Ill show you where and how.

Any discussion about encryption needs to start with a different topic: password strength. Most forms of encryption require you to set a password, which allows you to encrypt the file and to decrypt it later on when you want to view it again. If you use a weak password, a hacker can break the encryption and access the filedefeating the purpose of encryption.

A strong password should be at least 10 characters, though 12 is better. It should include a mix of uppercase and lowercase letters, as well as numbers and symbols. If you find letters-only easier to remember, such a password can still be secure if its significantly longer; think 20 characters or more.

If youre unsure aboutwhether your password is good enough, run it through Microsofts free password checker. Never use a password rated less than Strong.

You probably already have a login password for Windows on your PC, but that wont actually protect your data if somebody steals your computer or hard drivethe thief can simply plug your drive into another PC and access the data directly. If you have lots of sensitive information on your computer, you want to employ full-disk encryption, which protects all your data even if your hardware falls into the wrong hands.

Microsofts BitLocker software makes setting up full-disk encryption in Windows incredibly easyas long as your computer meets the following two criteria:

1. You have the Ultimate or Enterprise version of Windows 7 or Vista, or the Pro or Enterprise version of Windows 8.

2. Your computer has a TPM (Trusted Platform Module) chip.

The easiest way to see if your computer has a TPM chip is simply to attempt to enable BitLocker. Windows will let you know if you dont have one.

To enable BitLocker, go to Control Panel > System and Security > BitLocker Drive Encryption, or do a search for BitLocker in Windows 8. In the BitLocker menu, click Turn on BitLocker next to the drive(s) you wish to encrypt. Its as easy as that.

If your PC doesnt meet the requirements for BitLocker, you can still useTrueCrypt or DiskCryptor for free full-disk encryption.

For full-disk encryption of thumb drives and USB hard drives, you can use BitLocker To Go, which is designed for removable media. You still need a professional or enterprise version of Windows, but you dont need a TPM to use BitLocker To Go.

All you have to do is plug in the device you want to encrypt, and then once again go to the BitLocker menu. At the bottom of the menu, youll see the BitLocker To Go section, where you can click Turn on BitLockernext to the device.

Sometimes you want to encrypt your outgoing and incoming Internet traffic. If youre on an unsecured Wi-Fi network (at an airport, for instance), a hacker can intercept the data traveling to and from your laptop, which might contain sensitive information. To make that data useless to eavesdroppers, you can encrypt it, using a VPN.

A virtual private network creates a secure tunnel to a trusted third-party server. Data sent through this tunnel (either to or from your computer) is encrypted, so its safe even if intercepted. You can find Web-based VPNs that charge a small monthly fee but provide very easy access, or you can set up your own personal or business VPN.

The process of selecting or setting up a VPN is a little too long to describe here, so see ourarticle on VPN for beginners and experts alike.

If you or other people in your organization use Dropbox or SugarSync, youll be glad to know that those popular cloud storage services already encrypt your data, protecting it in transit and while it sits on their servers. Unfortunately, those same services also hold the decryption keys, which means that they can decrypt your files if, for instance, law enforcement directs them to do so.

If you have any really sensitive files in your cloud storage, use a second layer of encryption to keep them safe from prying eyes. The most straightforward way to do this is to use TrueCrypt to create an encrypted volume inside of your Dropbox. (For a complete guide to encrypting anything with TrueCrypt, see the end of this article.)

If you want to be able to access the data from other computers, consider putting a portable version of TrueCrypt in your Dropbox, as well. To do so, run the TrueCrypt installer; during the installation, choose the Extract option, and choose to put the extracted files in your Dropbox or other cloud storage.

Next page: Encrypt your email and nearly anything else…

Read the original here:
How to encrypt (almost) anything | PCWorld

Read More..

How To Enable BitLocker Drive Encryption In Windows 10?

User Ratings:

This tutorialdetails how to enable BitLocker drive encryption in Windows 10. One of Windows most important security features, BitLocker drive encryption protects your important data by encrypting the entire disk volumes it is stored on. It uses a specialized Encrypting File System to achieve this. As the latest and greatest version of Microsofts line of operating systems, Windows 10 features an improved version of BitLocker, with enhanced data encryption abilities. You can easily enable BitLocker drive encryption for some (or all) of your disk drive partitions, using Windows 10. The encrypted partitions (and the data stored on them) is secured against all kinds of data loss and threats. Lets dig in deeper, and see how you can enable BitLocker drive encryption in Windows 10.

The detailed explanation of what BitLocker is pretty complicated and as such, the way it works to do what it does too, is verbose enough to warrant another article. However, at a basic level, BitLocker can be explained as a built in encryption feature of Windows that secures your data against all kinds of threats by encrypting the entire disk volumes it is stored on. It uses AES-256 encryption algorithm in Cipher Block Chaining (CBC) mode to do this. This, combined with an Encrypting File System (EFS) and a dedicated Trusted Platform Module (TPM) chip provide your valuable digital data some really high quality protection.

Although the way BitLocker works is pretty complicated, enabling it to secure your data in Windows 10 is a walk in the park. The whole process is really simple, easy and takes a few clicks. Heres how to enable BitLocker drive encryption in Windows 10:

Step 1: Open up Control Panel, and select BitLocker Drive Encryption. You should see the following drive selection screen

As illustrated by the above screenshot, you can select the drive partition whose contents you want to encrypt with BitLocker Drive Encryption. Click the Turn on BitLocker option against the desired drive partition to proceed to the next step.

Step 2: Once the selected drive is initialized, you are required to specify a password for locking/unlocking the drive. As is always recommended for passwords, choose a password having a combination of upper and lower case alphabets, numbers, and special symbols. Once done, hit Next.

Step 3: The encryption wizard will now automatically create a digital recovery key that can be used to restore access to the encrypted drive, should you forget the password. The wizard also presents you with multiple options for saving the recovery key. You can save it to your Microsoft account, a file, a USB drive, or even take a printout of it.

Step 4: As a last step, the encryption wizard will ask you to choose the encryption method. You can either choose to encrypt the used disk space (faster), or the entire drive (slower, but better). After selecting the appropriate option, hit Next to start the encryption process

Thats it! Windows will now encrypt the contents of the selected disk partition using BitLocker drive encryption. Based on the disk space selected for encryption and the volume of data it holds, this process might take a while. Easy, right?

Also See:How To Dual Boot Windows 10 With Windows 7?

BitLocker drive encryption is a pretty advanced and useful feature of Windows and with the latest Windows 10, its better than ever. The fact that you can encrypt the contents of entire volumes makes it highly usable, especially for those who have to carry large volumes of sensitive digital information from one system to another. And with the easy encryption wizard, enabling BitLocker drive encryption in Windows 10 is as easy as it can be. This is one feature you should definitely check out in Windows 10, youll love it!

Visit link:
How To Enable BitLocker Drive Encryption In Windows 10?

Read More..

Encryption Substitutes | Privacy | Encryption

NationalSecurity,Technology,andLaw

A HOOVER INSTITUTION ESSAY

ENCRYPTION SUBSTITUTES

ANDREW KEANE WOODS

Aegis Paper Series No. 1705

Introduction

Policy experts have suggested that the rise of encrypted data is not the end of intelligence collection because law enforcement can look to substitutes

other sources of intelligence, such as metadata

that prove to be just as valuable or more valuable than decrypting encrypted data.

1

This paper focuses on the other side of that insight: on the substitutes available for privacy-seekers beyond encryption, such as placing ones data in a jurisdiction that is beyond the reach of law enforcement. This framework puts encryption in context: there are many ways to keep ones data private, just as there are many ways that the government might get access to that data. While encryption is typically treated as a stand-alone computer security issue, it is a piece of a larger debate about government access to personal data.

2

Law enforcement ofcials are, in general, agnostic about the method through which they obtain evidence

what matters is obtaining it. Privacy-seekers are similarly agnostic about how they secure their privacy

what matters is having it. This means that policymakers have a wide set of options

not only about

whether

to allow law enforcement to access personal data, but also

how

to do so. This wide set of options is not reected in the debate over encryption, which is typically framed in all-or-nothing terms. Some privacy advocates take a stance that seems to allow no room for compromise (an argument that can be boiled down to its math!

3

) and some government actors do the same (essentially arguing, its terrorism!

4

). Widening the scope of the policy discussion to include related issues

what I will call encryption substitutes

may increase the chances of compromise and may generate better policy.In this short essay, I make a few simple assumptions that bear mentioning at the outset. First, I assume that governments have good and legitimate reasons for getting access to personal data. These include things like controlling crime, ghting terrorism, and regulating territorial borders. Second, I assume that people have a right to expect privacy in their personal data. Therefore, policymakers should seek to satisfy both law enforcement and privacy concerns without unduly burdening one or the other. Of course, much of the debate over government access to data is about how to respect

See the original post here:
Encryption Substitutes | Privacy | Encryption

Read More..