Page 4,269«..1020..4,2684,2694,2704,271..4,2804,290..»

Safety Plus Security: Solutions And Methodologies – SemiEngineering

By Ed Sperling & Brian Bailey

As more technology makes its way into safety-critical marketsand as more of those devices are connected to the Internetsecurity issues are beginning to merge with safety issues.

The number of attempted cyberattacks is up on every front, which has big implications for devices used in safety-related applications. There are more viruses, ransomware, and counterfeit chips and IP. And while the total number of breaches is flat, mostly due to increased attention to security, the impact of those breaches is larger. In effect, hackers are getting better at choosing their targets.

Fig. 1: Total cybersecurity breaches. Source: Symantec Internet Security Threat Report, April 2017.

Fig. 2: Ransomware demands. Source: Symantec Internet Security Threat Report, April 2017.

This is bad enough for IT systems. But as as medical devices, cars, and industrial control systems are connected to the Internet, cybercrime increasingly will have a direct effect on personal and public safety. Moreover, while most of this has involved software in the past, chips increasingly will be part of the attack infrastructure.

There is another facet to consider with these new applications, as well. Most hardware designs today have a life expectancy of two for consumer/mobility designs, to four years for server hardware. But in the case of industrial, medical and automotive applications, electronics are supposed to last a decade or more.

Security, meanwhile, is never 100% effective, and it becomes less effective over time. Connectivity and device complexity, which is compounded by regular software updates, are contributing factors to a rise in data leakage. In addition, security measures that are considered impervious to attacks today likely will be vulnerable within several years because hacker tools and know-how are constantly evolving.

As soon as you think you have a secure device, you find a hole, said Dipesh Patel, president of the IoT Services Group at ARM. So you are never done. And devices need to be upgraded, which is done with software. That makes it more vulnerable. If you look at the Mirai attack, devices were exposed because someone decided to use default passwords.

Patel said hardware-software co-design will be a baseline necessity for security. But that will not be enough. You can supply more secure devices, but you need to educate others about the need to do things properly. Secure devices need to be complemented with other things, such as tutorials, how-to guides, and in the case of enterprises, they need to be more aware. The best solutions are a combination of technology and best practices.

But how, exactly, does this work for an autonomous vehicle or a medical device such as a pacemaker? The answer is that nothing is perfect. Numerous steps need to be considered at every level, from design through manufacturing and out into the market, and they need to be revisited regularly.

Security is a big topic for EDA, and its a big topic for the semiconductor industry, said Wally Rhines, president and CEO of Mentor, a Siemens Business. While it hasnt become critical yet, we believe that ultimately youll need to have trustworthy silicon as part of the total solution because chips will be subject to Trojans and companies will get more and more concerned about what gets into their chips and how it gets protected. Over time, it will become one more big part of IC design and verification. Tools will be available to help you, but this is a dynamic. Unlike a physics problem that you solve and it stays solved, security is one where the people working to break the security are just as smart as the people working to improve the security.

Different approaches for different markets Standards compliance adds cost, complexity and time to safety-critical designs. A chip designed for any automotive application would likely have to adhere to the ISO 26262 standard, which is essentially a best-practices checklist. But if that chip is used in the control of an autonomous vehicle, it also would have comply with the most stringent restrictions defined by the SAE and ASIL standards, as well as ISO 26262.

In the medical electronics field, it would have to adhere to a different set of standards being developed by such groups as the U.S. Food & Drug Administration and the Medical Device Innovation, Safety and Security Consortium. And in mil/aero, it would have to follow the DO-254 standards as well as various country- and region-specific regulations for supply chain integrity.

This adds a whole different level of scrutiny, validation and verification. And that, in turn, will boost the cost of a design and the time it takes to get a chip certified and into production.

With safety, we are looking at single-fault effects, and for that we know what full coverage means, said Ashish Darbari, director of product management for OneSpin Solutions. We can analyze that every fault is detected using a number of mechanisms. But for security, attacks are not equivalent to single faults. How can we measure the effectiveness of the protections for security? If we could model and specify what the interactions need to be, what must happen, what must not happen, intentional versus unintentional, then you can come up with a good set of checks that could be specified. Security is more systematic analysis, but it will always be difficult to get a handle on completeness.

In many cases, markets define what security means. Security means different things to different people, said Darbari. To one person it is about illegal access to an unprivileged user to a CPU or part of memory. Firmware plays a big role here, as well, and a lot of bad firmware can cause these issues to manifest and allow access to the hardware. What is the security vulnerability model?

Software updates add security risks, too. While updates are necessary to keep devices current and help close security holes as they are spotted, the update process itself provides another attack vector.

If you look at the market for cars, which is still evolving, over-the-air updates open up a whole new level of exposure, said Bernd Stamme, vice president of product marketing at Kilopass . At least with the CAN (controller area network) bus, to hack the system you physically have to open it up. But with over-the-air updates, physical connections are no longer required.

There is plenty of experience with securing over-the-air updates to software, particularly with set-top boxes and information technology downloads. But Stamme noted that carmakers will require sophisticated ways of distributing security keys over the network, which most have never done before. Companies need the most secure on-chip medium for this. Otherwise, if you get a hold of the chip you can reverse engineer it. The algorithms being used are well understood. If you have enough compute power, its easier to decide how to prevent this. But not all of these devices will have that.

Security solutions There are several recurring aspects to security. One is the protection of data. The addition of cryptographic capabilities to support secure communication and data storage requires software with hardware support for secure storage of keys and, in many case, acceleration is added for performance, said Tim Mace, senior manager business development in the MIPS Business Unit of Imagination Technologies. However, every additional capability added to a chip adds to the power and cost.

Security isnt free in any respect. It can affect overall chip performance, particularly if the security is active rather than passive. Active is considered more effective, but its also more expensive on every level. In some cases, it may require a separate chip or IP accelerator on the same chip.

Security is one aspect of the workload, said Anush Mohandass, vice president of marketing and business development at NetSpeed Systems. You need different chips for different workloads. And if youre using heterogeneous IP within a single chip, to get the maximum out of that chip you need to understand the workload.

It also may require such techniques as virtualization to keep the data from one function separate from another, which also affects the initial design. If you have 10 operating systems running, they should not have knowledge of each other, Mohandass said. That way there is no contamination of data.

Memories are another area that needs shoring up. The next level of protection is that they may encrypt regions of memory, said Drew Wingard, CTO at Sonics. In a more secure chip you may want to ensure that if someone was able to gain access to the entire content of the memory, they would still not be able to understand anything. That has a latency impact because you have to map the data between memory and processing.

Another common form of protection is the establishment of a secure enclave. You can run security functions isolated from other aspects of the chip, said Mike Borza, member of the technical staff for Synopsys Security IP. There are different ways to get that secure enclave. There are embedded hardware security modules that run inside the chip and are a companion to the main CPU. It is designed to provide a real, hard target for the security processing to take place. That tends to be a larger solution and adds cost in terms of IP licensing and area. For something in the class of a small router or IoT hub, the costs that may be acceptable are in the order of a few cents per chip for a chip that sells in the low single digit dollar range.

Another way to do this is to create virtual environments. Separation of the data and applications can be best implemented using an approach based on virtualization, added Mace. This is often supported by hardware memory management for performance.

Virtualization depends on the system having a memory management unit, which is not always the case with heterogeneous system. We introduced a firewall into the NoC that lives in front of the transaction destinations, Wingard explained. This builds a memory protection capability and allows the chip designer, or software people at runtime, to configure the chip to allow one region of memory to be accessible to this processor while in this mode, or these three units and the DMA engine to be able to access another part when in another mode. We can build multiple mutually secure nodes. This is easy and simple to understand and has very little software overhead if you dont have to reprogram it. There is no performance impact.

This type of system can also hunt for suspicious activity. We are starting to see things that look at traffic flows between interfaces or between ports on a bus and identify patterns that are unusual or shouldnt be happening at all, said Borza. If a network interface is talking directly to an encryption controller that is not what should be happening and may be flagged as an unusual pattern that you may want to detect. We are starting to see people build this into the fabric of the chip.

Making progress? While the fundamentals of security are understood well enough, metrics about what makes one device or IP block more secure than another are less than clear.

Security is very difficult to measure, said Asaf Ashkenazi, senior director of product management in Rambus Security Division. There is a lot of misinformation out there, and you can claim whatever you want. You can claim that security is built in, but there is not a way to measure it that has consequence. There are no guidelines or best practices.

This may be an annoyance with a consumer or business system, but it can be life-threatening in a safety-critical device. If a computer is hacked, you lose data, Ashkenazi said. But if you hack a car, industrial machine or a traffic light, you can cause reasl damage.

Until there is some formalization of the malicious fault problem, it is difficult to think about adequate analysis or automation tools. There is some research devoted to building a more objective measure for how secure something is, said Borza. An example of that is a DARPA project that is trying to build those metrics and provide a quantitative assessment of security.

This may require a simplification of the problem. One approach is based on root of trust modules that are starting to become more common, Borza explained. This recognizes that providing a small isolated environment, which uses relatively simple software, can be assessed and analyzed for vulnerabilities and immunity to certain types of attacks. The approach is to contain complexity in the security functions in order to provide a reasonable guarantee of how secure that part of the chip is. Then you can use that to bootstrap the rest of the system securely.

Perhaps the most important change that a team has to make is rooted in their mindset. Both safety and security are not solved by simply adding some special IP, or software, as an afterthought, said Mace. They need to be addressed throughout the design and manufacturing process as in both cases the overall level of safety and security of a product is limited by the weakest element.

There is no disagreement on that point. The teams that are putting out successful semiconductors have baked this in from day one, said Rob Knoth, product management director for the DSG group at Cadence. The architecture of the system and the verification plan, the physical floorplan everything has the concepts baked into it. Otherwise it becomes a horribly non-convergent process and you end up missing stuff and having to do a respin.

The industry is taking the problem seriously. Security is lagging safety by about five years, said Darbari. We will see compliance standards for security being established within five years. But if you are not even doing your functional verification properly in the first place, and relying on directed test then you dont have a hope.

Safety and security need to be baked into the methodology. Only then will they permeate through the chip as needed for both efficiency and effectiveness, concludes Mace. It is important that each stage in the development process is reviewed closely to consider the design implications. It is only when these techniques are embedded into the development tools and the design and verification processes, that new chips will be created with safety and security at their core.

Related Stories Safety Plus Security: A New Challenge (Part 1) There is a price to pay for adding safety and security into a product, but how do you assess that and control it? The implications are far reaching, and not all techniques provide the same returns. Security: Losses Outpace Gains Complexity, new and highly connected technology, and more valuable data are making it harder to keep out hackers. IoT Security Risks Grow Experts at the table, part 2: Mirai, Shodan, and where the holes are in security; establishing a chain of trust from a solid root; how to future-proof security.

See the original post here:
Safety Plus Security: Solutions And Methodologies - SemiEngineering

Read More..

Virgin Media customers urged to change wifi and router passwords due to internet security flaw – Cornwall Live

Comments(0)

More than 800,000 broadband customers are being urged to change their passwords immediately over security concerns.

Virgin Media said the risk to customers with a Super Hub 2 router was small", but advised them to change both their network and router passwords if they were still set as the default shown on the attached sticker.

The advice followed a Which? snapshot investigation which found that hackers could access to home networks and connected appliances in as little as four days.

Ethical security researchers SureCloud gained access to the Super Hub 2, although Virgin Media said the issue existed with other routers of the same age, not just their model.

Read next: Eleven weeks without internet despite 24 engineer visits

A Virgin Media spokesman said: "The security of our network and of our customers is of paramount importance to us.

"We continually upgrade our systems and equipment to ensure that we meet all current industry standards.

To the extent that technology allows this to be done, we regularly support our customers through advice and updates and offer them the chance to upgrade to a Hub 3.0 which contains additional security provisions."

The Which? study tested whether popular smart gadgets and appliances, including wireless cameras, a smart padlock and a children's Bluetooth toy, could stand up to a possible hack.

Read next: New fast food delivery service will bring McDonald's to your door

Some of the devices proved harder than others to infiltrate, such as the Amazon Echo, but eight out of 15 appliances were found to have at least one security flaw.

The test found that the Fredi Megapix home CCTV camera system operated over the internet using a default administrator account without a password, and Which? found thousands of similar cameras available for anyone to watch the live feed over the internet.

The watchdog said that worse still" a hacker could even pan and tilt the cameras to monitor activity in the house.

SureCloud hacked the CloudPets stuffed toy, which allows family and friends to send messages to a child via Bluetooth and made it play its own voice messages.

Which? said it contacted the manufacturers of eight affected products to alert them to flaws as part of the investigation, with the majority updating their software and security.

It did not receive a response from the manufacturers of either Fredi Megapix or CloudPets.

The consumer group said the industry needed to take the security of internet-enabled and smart products seriously by addressing the basics such as ensuring devices required a unique password before use, using two-factor authentication, and issuing regular security updates for software.

Read next: Fidget spinner released in virtual form by Google and here's how to find it online

Alex Neill, Which? managing director of home products and services, said: There is no denying the huge benefits that smart-home gadgets and devices bring to our daily lives.

However, as our investigation clearly shows, consumers should be aware that some of these appliances are vulnerable and offer little or no security.

There are a number of steps people can take to better protect their home, but hackers are growing increasingly more sophisticated.

Manufacturers need to ensure that any smart product sold is secure by design."

Read next: Heatwave melts iPhone as temperatures continue to soar across Cornwall

See original here:
Virgin Media customers urged to change wifi and router passwords due to internet security flaw - Cornwall Live

Read More..

Perils of Back Door Encryption Mandates – Human Rights Watch

(Washington, DC) The governments that constitute the intelligence partnership known as The Five Eyes, will meet on June 26-27, 2017, in Ottawa to discuss how to bypass encryption. The governments may pursue a dangerous strategy that will subvert the rights and cybersecurity of all internet users.

People sit at computersinside GCHQ, Britain's intelligence agency,in Cheltenham, UK, November 17, 2015.

Encryption protects billions of ordinary people worldwide from criminals and authoritarian regimes, said Cynthia Wong, senior internet researcher at Human Rights Watch. Agencies charged with protecting national security shouldnt be trying to undermine a cornerstone of security in the digital age.

The Five Eyes is an intelligence sharing partnership between Australia, Canada, New Zealand, the United Kingdom, and the United States. Law enforcement and intelligence agency representatives from each state will gather in Ottawa to discuss shared national security concerns. The meeting is expected to address the increasing use of end-to-end encrypted communications as a challenge to surveillance and seek a coordinated approach.

In recent years, law enforcement officials in some Five Eyes countries have contended that they are losing some of their ability to investigate crime or prevent terrorism because advances in consumer encryption have led some channels of information that were previously accessible to go dark. Companies like Apple and WhatsApp have begun to integrate end-to-end encryption into their products by default, which makes it impossible for even the companies to retrieve unscrambled user data at the request of the government because the firms do not hold the decryption keys. Some officials have gone further and sought legislation to ensure that their governments can access all encrypted data, even if this would force companies to build back doors or other vulnerabilities into phones and applications to bypass encryption.

Australian Attorney General George Brandis plans to raise the need for new restrictions on the encryption built into popular messaging applications with Five Eyes counterparts, stating that existing laws dont go far enough.

In March, in the immediate aftermath of the Westminster attack, UK Home Secretary Amber Rudd called end-to-end encryption on apps such as WhatsApp completely unacceptable and stated that there should be no place for terrorists to hide. On June 13, UK Prime Minister Theresa May and French President Emmanuel Macron announced a counter-terrorism joint action plan that calls for greater access to encrypted communications.

The UKs Investigatory Powers Act allows authorities to compel companies to take undefined reasonable and practicable measures to facilitate interception, including of unencrypted data. Authorities are still determining the exact scope of what companies will be required to do under the law with respect to encryption.

Law enforcement officials in the US have also repeatedly called for companies to build back doors into encryption. In 2016, media reports released draft legislation that would have required technology companies to provide access to encrypted information in an intelligible format upon court order. The bill did not specify how companies would have to unscramble encrypted information, but it would have effectively forced companies to bypass encryption and other security features. The bill faced widespread criticism from security experts and privacy groups as unworkable and harmful to cybersecurity and was never formally introduced.

In February 2016, US authorities also sought a court order to force Apple to build a back door into an iPhone that was used by one of the attackers in the 2015 San Bernardino attack. Apple challenged the order, and authorities eventually withdrew it because they were able to access the phones data without Apples help.

In 2016, Canada held a consultation on its national security framework, which expressed concern over security agencies diminished ability to investigate crimes due to the use of encryption. It also stated that Canada had no legal procedure to require decryption.

Many officials from Five Eyes countries claim they do not seek back doors. But they dont explain how companies that dont hold encryption keys could provide exceptional access for law enforcement to unencrypted data without a back door. To implement such a requirement, companies would be forced to redesign their products without security features like end-to-end encryption.

Back doors create weaknesses that can be exploited by malicious hackers or other abusive government agencies. Billions of people worldwide rely on encryption to protect them from threats to critical infrastructure like the electrical grid and from cybercriminals who steal data for financial gain or espionage. The vast majority of users who rely on encryption have no connection to wrongdoing.

Encryption built into phones and messaging apps can also help safeguard human rights defenders and journalists from abusive surveillance and reprisals, including threats of physical violence. In 2015, the UN special rapporteur on freedom of expression, David Kaye, recognized that encryption enables the exercise of freedom of expression, privacy, and a range of other rights in the digital age.

Governments have an obligation to investigate and prosecute crime and protect the public from threats of violence. But proposals to weaken encryption in popular products will not prevent determined criminals or terrorists from using strong encryption to shield their communications. A recent survey shows that determined, malicious actors would still be able to access such tools made by companies outside the Five Eyes countries, which would not be subject to their laws.

Ordinary users will be more vulnerable to harm, online and offline, if technology firms are forced to weaken the security of their products, Human Rights Watch said. Instead of weakening encryption, governments should better train law enforcement officials to use investigative tools already at their disposal, including access to the vast pool of metadata from digital communications or location data that is not encrypted, consistent with human rights requirements.

If the Five Eyes countries force tech companies to build encryption back doors, it would set a troubling global precedent that will be followed by authoritarian regimes seeking the same, Wong said. These governments should promote strong encryption instead of trying to punch holes in it, which would lead to a race to the bottom for global cybersecurity and privacy.

Here is the original post:
Perils of Back Door Encryption Mandates - Human Rights Watch

Read More..

Encryption-dodging hacking powers expanded for German law enforcement – SC Magazine UK

The Bundestag (pictured) voted to grant the police the powers last Thursday

German law enforcement has been be granted vast new hacking powers. The Bundestag - the German legislature - voted on June 22 to grant law enforcement the powers it needs to hack into, and spy on, smartphones and computers.

The ruling coalition government, made up of the conservative Christian Democrats and the centre-left Social Democrats, pushed hard for the law, arguing that the police will need to get around encryption if they are to do their job.

Existing law allows law enforcement to tap a phone, but not actually hack an electronic device in any other case than one where lives are directly threatened. With the expansion of of their powers, law officers will now be able use malware - state trojans', or Bundestrojaner - to watch the real time communications of suspects and view a device's saved files and data. The new law expands the cases in which such measures can be used to include nearly 40 offences, such as murder, drug trafficking, money-laundering and illegal pornography.

With the passage of the law, Germany enters further into the group of western states who use hacking technology in police work. While this is not an attempt to break encryption' as per the desire of so many states, it does allow law enforcement to circumvent it and read the encrypted communications of those it chooses to surveil.

Germany has traditionally held a liberal stance on policing powers, mindful of a return to the authoritarian governments that ruled the country for much of the twentieth century.

When the state trojan', R2D2, was first discovered by the Berlin-based Chaos Computer Club (CCC), it prompted a public outcry. At the time the CCC offered an analysis which may be considered prescient: "this refutes the claim that an effective separation of just wiretapping internet telephony and a full-blown trojan is possible in practice - or even desired. Our analysis revealed once again that law enforcement agencies will overstep their authority if not watched carefully.

Germany has some of the strongest data protection laws in the world and has often eschewed the kinds of mass surveillance regimes that have emerged in the UK and the US, going so far as to publicly condemn them.

When it was discovered that German Chancellor Angela Merkel's phone was being monitored by the US National Security Agency, Germany vowed to ban tech companies that worked with the NSA from being granted Federal contracts. In 2016, German courts ruled heavily against mass surveillance programmes, declaring many of its allies' projects as well its own, unlawful.

That legacy of liberalism now clashes with resurgent terrorist campaigns across Europe and the transformation of crime in cyber-space. In 2016 alone, the German public were subject to three separate terrorist attacks culminating in a truck attack on a Christmas market in December, which left 12 dead. In direct response to the atrocity, the German government proposed the expansion of CCTV monitoring to a variety of new public spaces.

Originally posted here:
Encryption-dodging hacking powers expanded for German law enforcement - SC Magazine UK

Read More..

Encryption: Turnbull tilts at windmills again – iTWire

In a statement that brings to mind the valour of Don Quixote, Australian Prime Minister Malcolm Turnbull has flagged "a crackdown on ungoverned spaces online".

According to another report from The Age similar to some of the others that one has quoted in the past Australia plans to pressure "social media companies pressure social media companies to do more to co-operate with governments to combat would-be terrorists who are organising online".

If this were not fanciful enough, Turnbull wants the rule of law to apply online as it does in what The Age calls the "analogue, offline world".

Remember, this comes from a man who claims to be digitally aware, one who has used the words "innovation" and "agile" more times in the last year than any other politician, and one who has repeatedly let slip little hints like his use of an encrypted app for messaging to give the impression that he knows his ones and zeroes.

As usual, there are no specifics. Last time I looked, Facebook, Twitter, and their ilk were all based in the US, a country which is highly unlikely to do anything to disturb them. So what Turnbull has in mind is mystifying.

That Turnbull continues to make such statements, putting himself very much on part with some of the pronouncements that have emanated from Attorney-General George Brandis, is surprising, considering that he has an educated adviser in the shape of Alistair MacGibbon to brief him on the basics of encryption.

But if all that Turnbull is seeking is to pass the time of day by making pronouncements as nonsensical as those uttered by his British counterpart, Theresa May, then he is going about things the right way.

Encryption has taken centrestage ever since the world became aware in 2013 that the NSA was conducting surveillance of man+dog. Since then, companies have been trying to guarantee clients that their data will be safe in order to attract more sales.

Microsoft has even gone to the extent of offering its American clients cloud storage in Germany, a country where data security is taken a little more seriously given its past.

The genie is well and truly out of the bottle and politicians who promise security measures which do not take reality into account are doing just one thing: telling porkies to score political points.

The only point at which this mess will be resolved is when politicians are willing to admit that terrorism is a political problem and requires a political solution. It is not a law and order issue.

Read more:
Encryption: Turnbull tilts at windmills again - iTWire

Read More..

Arrowtown musician Holly Arrowsmith crowd funding new album – The Southland Times

SUE FEA

Last updated18:19, June 26 2017

Theresa Fryer

Arrowtown singer-songwriter Holly Arrowsmith is crowd funding her latest album.

House concerts and wedding gigs are all up for grabs as Queenstown's own TUI Award-winning queen of folk Holly Arrowsmith turns to crowdfunding for her second album due out later this year.

Arrowsmith, who was back home in Queenstown early this week to star in Auckland folk band Tiny Ruins' Sherwood show, launched a Kickstarter campaign on June 15.

She has until July 6 -22 days - to raise the $21,000 to fund her second album, which is almost complete.

Donations can range from as little as $10 or $20, for a free digital album or CD, through to $1000 for which Arrowsmith will sing at your wedding.

"I'll sing you down the isle and do a one-hour canape set for guests. For $1500 I'll do that in Australia as well, travel included," she said.

So far she's been pledged two $500 house concerts in Queenstown and Te Awamutu.

"We set up in your living room, or backyard, and create a beautiful ambience."

She's offering a host of other rewards, and if she doesn't reach her target by July 6, people don't pay on their pledges.

"I'm nervous, but hopeful," Arrowsmith said.

She's already got a generous pledge from an American family, who drove 321 kms (200 miles) from Minnesota to Wyoming to hear her show in the United States.

"People are basically pre-ordering now, buying my album to support its creation."

The money will cover production, mastering, pressing vinyls, CDs and marketing.

Arrowsmith describes this as her "most honest work yet" themes of home-sickness, loss, painful growth and hope in dim places. Cities emerge "like dark forests" for the first time, but as always there's a

strong reflection of nature.

Slow Train Creekwas written in a log cabin in the Rocky Mountains of Colorado during her American tour last year.

Most of the nine new songs were recorded in a 'pop-up studio' created in a Colac Bay bach where Arrowsmith and her Arrowtown producers, Tom Lynch and Steve Roberts, were holed up making music for several

weeks late last year.

"I think recording in that bach at Colac Bay has had a massive influence on the album," she said.

"It feels like you're sitting there next to the fire with me. The intimacy is cool."

She's trying to build on that in the final stages being recorded at renowned Lyttelton music studio, The Sitting Room,where she's working with producer Ben Edwards, who's recorded with Marlon Williams, Julia Jacklin and The Eastern.

Arrowsmith may have been born in Sante Fe, New Mexico, but it's the mountains of her beloved Wakatipu where she grew up, that have inspired the album.

"I'd just moved to Auckland 18 months ago when I started writing the album. I literally wrote the first song, Farewell,as we were driving out of the Kawarau Gorge, saying 'goodbye' to my home and all those nostalgic memories," she said.

"When I returned to Auckland from my South Island tour last year, and drove into that southern motorway, I felt really disappointed."

Soon after she and husband, Mike, moved to Christchurch.

"Auckland isn't a bad place, but I'm just a South Island girl at heart. I miss the people, the mountains, family and friends."

To donate search 'Holly Arrowsmith' on http://www.kickstarter.com

-Stuff

Read the original:
Arrowtown musician Holly Arrowsmith crowd funding new album - The Southland Times

Read More..

Monday Massacre: Bitcoin, Ethereum Lead the Way as Cryptocurrencies Retreat into the Red – CryptoCoinsNews

Cryptocurrency traders woke up to a sea of red this morning, as 92 of the top 100 cryptocurrencies by market cap experienced a marked price decline. The bitcoin price led the retreat, falling over 6% toward $2,400. Bitcoin has declined almost $600 since it pierced the $3,000 barrier two weeks ago.

The sell-off prompted this gif to surface on /r/bitcoin.

View post on imgur.com

Dont be surprised if you see the same gif rotated 180 degrees once the bitcoin price recovers.

Bitcoin price declines always increase discussions about the Flippening, the potential future event when another cryptocurrency (presumably Ethereum) will supplant bitcoin as the largest cryptocurrency by market cap. However, Ethereum has been dealing with its own problems. On June 22, it experienced a flash crash on GDAX, although it quickly recovered. More worrisome is the fact that Ethereum is experiencing network congestion and has yet to implement a long-term solution.

Consequently, the ethereum price has fared even worse than bitcoin. In the past 24 hours, the ethereum price fell 13% to $285.23. Ethereum too has been experiencing an elongated price decline, having fallen nearly $130 since it hit $410 on June 12. Significantly, ethereums ~$26.5 billion market cap is now only 63% of bitcoins ~$41.8 billion market cap.

The Monday Massacre did not stop with bitcoin and ethereum; altcoins are down across the board. Not even litecoin, which has experienced a price resurgence over the past several months, could swim against the current. The litecoin price fell 9.87% to $41.29. It has fallen nearly 20% since it topped out at $50 leading up to its listing on BitStamp.

Chart from CoinMarketCap

As this CoinMarketCap chart demonstrates, every top-10 altcoin declined at least 6%. Of these, the downturn hit Iota the hardest, as the token plummeted 20% to $.4172.

But the massacre did not stop there Only eight of the top 100 cryptocurrencies managed to avoid the bloodbath. Thirtieth-ranked Byteball was the largest cryptocurrency to experience a price increase, just barely moving the needle 1.84% to $781.20. Tether, MCAP, LEOCoin, OBITS, and Mooncoin each managed to tread water or increase slightly.

Lest one attribute the altcoin price decline to the fact that most altcoins rely on bitcoin as their major trading pair, the price charts look nearly as bad when you switch from USD to BTC. Nearly every altcoin declined against bitcoin.

The lone standout in the top 100 was 54th-ranked CloakCoin, whose price rose 41% to $10.09 (.0037 BTC). This is a new all-time high for CloakCoin, who previously rose to a high of .0033 BTC in late July 2014 before crashing in August and September.

Mainstream economists and news outlets rush to pronounce bitcoins impending doom every time it experiences a price decline, so dont be surprised if you see some trigger-happy Is This the End for Bitcoin? headlines pop up in your newsfeed if the downward trend continues. Nevertheless, it is far more likely this market downturn is just a bump in the road for cryptocurrency prices.

That said, both Bitcoin and Ethereum are facing scaling difficulties and will need to implement long-term solutions. Bitcoins test will come with the upcoming Segwit2x activation. All signs indicate Bitcoin will avoid a network fork on August 1, but any unexpected developments could lead to price volatility.

Leatherface image from Shutterstock.

Continued here:
Monday Massacre: Bitcoin, Ethereum Lead the Way as Cryptocurrencies Retreat into the Red - CryptoCoinsNews

Read More..

Barclays spoke to regulators about bringing bitcoin ‘into play’ – CNBC

Barclays has been in discussions with regulators and financial technology or fintech firms about bringing cryptocurrencies like bitcoin "into play", the bank's U.K. chief executive told CNBC on Monday.

Ashok Vaswani revealed that the banking giant has met with Britain's Financial Conduct Authority (FCA) watchdog to talk about how to make bitcoin safe in response to a question about whether Barclays could support bitcoin.

"We have been talking to a couple of fintechs and have actually gone with the fintechs to the FCA to talk about how we could bring, the equivalent of bitcoin, not necessarily bitcoin, but cryptocurrencies into play," Vaswani told CNBC at the Money 20/20 fintech conference in Copenhagen, Denmark.

"Obviously (it's) a new area, obviously an area we've got to be careful with. We are working our way through it."

Vaswani did not expand on to what extent Barclays could be involved with bitcoin. Barclays has recently been involved in the digital currency space. Last year the bank partnered with social payments app Circle. The start-up, which received a license from the FCA last year, allows users to send money to each other in messages, and supports bitcoin. Barclays provided Circle with an account to store sterling, as well as the payments network to transfer money.

Banks have typically been very cautious of being associated with any companies involved with bitcoin due to the cryptocurrencies bad reputation as being used to buy illegal items on the so-called "dark web".

But the world's largest cryptocurrency by market cap has seen rising retail investor interest, as well as a major rally since the start of the year that has seen its price hit record highs. Even though the price has pulled back in recent days and there is still volatility, regulators are becoming interested in bitcoin, which is lending legitimacy to the digital currency.

Read the original:
Barclays spoke to regulators about bringing bitcoin 'into play' - CNBC

Read More..

Where’s the Missing Mt. Gox Bitcoin, Now Worth $2 Billion? – Investopedia

Mt. Gox was one of the earliest and most public downfalls of the Bitcoin era. In early 2014, Mt. Gox stood atop the field of Bitcoin exchanges as the largest, until it declared bankruptcy following a devastating theft or disappearance. The exchange lost 850,000 Bitcoins with a value of about $450 million in February of 2014, alongside an additional $27 million in cash. 200,000 of those Bitcoins were eventually found, but that leaves 650,000 Bitcoins which have mysteriously disappeared. In the time since, many analysts, former Mt. Gox investors, and others have speculated as to where the missing currency is. This is particularly important as Bitcoin's price has soared in recent months: the missing Bitcoins could be worth as much as $2 billion at this point.

According to reporting by Cyberscoop, the investigator working on behalf of Mt. Gox's creditors, Chainalysis, "definitely" knows the location of the missing coins. This comes via congressional testimony made by the company's co-founder. This information emerged in the midst of a June 8 hearing by the House Financial Services Subcommittee on Terrorism and Illicit finance. The hearing centered on the national security implications involved in cryptocurrencies. Witnesses in the hearing were drawn from Chainalysis and Elliptic, both firms that have run investigations into cryptocurrency security. When Rep. Warren Davidson, R-Ohio, inquired about the reason the missing Bitcoins couldn't be traced considering that the transactions were tied to the Blockchain. "I was particularly struck by your opening remarks that we can detect the activity," he said. "It seems that if we have this ability...then we should be able to find the missing Mt. Gox coins. Why can't we?"

According to Jonathan Levin, co-founder of Chainalysis, "we actually did find those...the destination of those coins is definitely known." Davidson did not follow up on the location of the coins and Levin did not share that or other information about where the coins currently are, who has them, and how that will impact the ongoing cases involving Mt. Gox.

According to Jerry Brito, the executive director of Coin Center, "just because you know where they are may not mean you can get them back." Mark Karpeles, the CEO of Mt. Gox who was briefly jailed in 2015, has stated that "many popular rumors about Mt. Gox about the stolen Bitcoins not actually existing or being stolen by me are absolutely false."

It's possible that the hearing involved a miscommunication. Investigators have long known many of the specific transactions in which the coins were stolen. That does not necessarily mean that the location of the coins is currently available or that they are recoverable, however.

More here:
Where's the Missing Mt. Gox Bitcoin, Now Worth $2 Billion? - Investopedia

Read More..

Newsflash: Bitcoin Price Hits a 10-Day Low – CryptoCoinsNews

A gloomy Monday ushers Bitcoin in with a downward start to the week as prices fell 4.8% to hit a low of global average low of $2,459.72.

In a downturn that began late Sunday evening, bitcoin prices fell below $2,500 for the first time in over a week. On Bitstamp, bitcoin price hit a low of $2,432, reminding investors of the ongoing volatility with cryptocurrencies less than a fortnight of hitting an all-time high of $3,000.

At press time, figures from CoinmarketCap shows bitcoin price trading at just under $2,550, losing 4.69% on the day. Data shows a significant withdrawal from investors in US markets, followed by Asian and European trading markets.

The United States leads the global trading markets with over a third of the trading volume over a 24-hour period, followed by China, Japan and Korea. The three Asian markets are all seeing trading premiums, with the Korean market currently fielding a significant 15% premium in its spread over US-based markets. Bitcoin is currently valued above $2,900 in a country whose authorities are unable to agree on a uniform path toward regulating its local bitcoin industry despite a pro-FinTech and digital currency-friendly agenda set by the Korean government.

Meanwhile, bitcoin isnt the only currency to see a fall among the wider crypto-market at the start of the final week of June. Ethereum has seen bigger losses leading into Monday, trading under $300 per Ether as gloomy Monday awaits an upbeat turn to hit the green.

For a real-time bitcoin price chart, click here.

Featured image from Shutterstock.

See the original post here:
Newsflash: Bitcoin Price Hits a 10-Day Low - CryptoCoinsNews

Read More..