Edward Snowden Likes Zcash

From safety in Moscow,  Edward Snowden has recently said he has no concerns with his security and safety in Russia, where he has resided for over five years after leaking classified National Security Agency documents.

He is unafraid of Russian president Vladimir Putin turning him over to the US as a favor to President-elect Donald Trump.

But he added: “If I was worried about safety, if the security and the future of myself was all that I cared about, I would still be in Hawaii.” Yet he continues to express interest and information about a number of subjects some where he runs against the common ground.

Unlike many fans of cryptocurrency, Edward Snowden has expressed he has no problem with the Zcash founders’ reward which reserves 10% of the new cryptocurrency for its  founders, investors, employees, and advisors. The former CIA employee-turned whistle-blower Tweeted his support for the anonymity-focused digital asset recently in January.

For Snowden, the founders’ reward incentivises and funds the team behind the privacy coin to address issues with the project, such as that identified and patched by them recently.

However, other crypto-currency community members pointed out that teams working on coins that lack the controversial founders’ reward were just as adept at patching issues in their own code bases. The former CIA employee does not even mind the much-debated founders’ reward included in every Zcash block mined. For many in the digital currency community, this founders’ reward is contrary to the spirit of cryptocurrency and decentralisation generally.

Snowden claims that such a reward is important to attract the best minds to work on the Zcash project. For him, such a consistent payment of the developers allows them to discover issues and patch them before they can be exploited by opportunistic parties.

One such vulnerability was discovered 11 months ago by Zcash developers. In a report posted to the Zcash blog , the flaw in the code is described along with the method used to patch it.

The counterfeiting vulnerability, as the team refer to it as, was first discovered on March 1, 2018. The decision was made to keep the discovery secret to avoid the risk of attackers exploiting the flaw in the code. It has since been rectified without Zcash users needing to do anything to protect their funds.

According to the Blog Post:

“The flaw allows an attacker to create counterfeit shielded value in any system that depends on parameters which are generated as described by the paper.”

Zcash developers are confident that no such attacks were made on the network owing to the sophistication of the knowledge required to identify the flaw in the first place, along with the lack of a “footprint” highlighting that the vulnerability had been exploited.

For Snowden, the Zcash founders’ reward, which is 20% of each block reward earned by the network’s miners, financed the addressing of the vulnerability:
In the above Tweet, Snowden compares Zcash to different cryptocurrency projects that do not offer such a founders’ reward. He states that other coins have only discovered bugs in the code after they were exploited, costing the projects’ users money.

However, as members of the crypto community highlighted, other projects have been just as adept at identifying vulnerabilities in the code without such a founders’ reward.

Both Monero and Bitcoin were mentioned as examples of coins that do not rely on a centralised group of developers being paid out of a single purse for their work but were still driven to patch flaws in code as quickly as humanly possible. In fact, a recent Bitcoin flaw took just days to rectify following its discovery (admittedly by a Bitcoin Cash developer).

Interestingly, the post on the Zcash blog highlights how the vulnerability has existed in the code for years now.

And back to spying and Snowden has vigorously denied collaborating in any manner with any foreign intelligence agency, even unwittingly. The Obama administration nevertheless charged him under the Espionage Act, which would restrict him from making a full case for his leaking to a jury.

Snowden recently has focused on advocating for encryption and other cybersecurity measures to become foundational to the architecture of the Internet and to connected devices, as well as urging sustained political activism around privacy measures. He has also recently alluded to “very concerning statements made by our new president-elect”, but expressed optimism that the US will survive it.

“This is a dark moment in our nation’s history, but it is not the end of history. And if we work together we can build something better, and we can enjoy a more-free and a more liberal society that benefits everyone,” Snowden said.

“As long as we do our best to live in accordance with our values, we don’t have to worry about what happens tomorrow, because today is enough.”

NewsBTC:         Guardian:

You Might Also Read: 

So Much Hot Air About Virtual Currencies:

 

 

 

« The US Military Has A Free Rein For Offensive Hacking
IoT Is In The Dark When It Comes To ePrivacy »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ADF Solutions

ADF Solutions

ADF Solutions is a leading provider of digital forensic and media storage exploitation tools.

SISSDEN

SISSDEN

SISSDEN will improve cybersecurity through the development of increased awareness and the effective sharing of actionable threat information.

Galois

Galois

Galois specializes in the research and development of new technologies that solve the most difficult problems in computer science.

Avatier

Avatier

Avatier identity management software products automate identity access management, user provisioning and IT governance to ensure information security and compliance.

HYPR

HYPR

HYPR Decentralized Authentication minimizes the risk of enterprise data breaches while providing an enhanced user experience for your customers and employees.

Gilbert + Tobin

Gilbert + Tobin

Gilbert + Tobin is an Australian corporate law firm serving clients throughout Australia, and around the world, on a broad range of legal issues including cyber security.

SystemExperts

SystemExperts

SystemExperts is a premier provider of IT compliance and cyber security consulting services.

MTI

MTI

MTI is a solutions and service provider, specialising in data & cyber security, datacentre modernisation, modern workplace, IT managed services and IT transformation services.

Picnic

Picnic

Picnic is a gritty, pioneering team of intelligence and cybersecurity specialists focused on solving the security challenge of our time - social engineering.

DruvStar

DruvStar

DruvStar provides B2B cybersecurity around threat management to strengthen businesses across attack vectors.

FluidOne

FluidOne

FluidOne are an award-winning Connected Cloud Solutions provider. We design tailored solutions to help customers and partners digitally transform their IT and communications.

ZILLIONe

ZILLIONe

ZILLIONe is one of Sri Lanka´s top enterprise technology solutions providers.

Brunswick Group

Brunswick Group

Brunswick is a critical issues firm. We advise the world’s leading companies on how to navigate the critical issues they face and engage with their critical stakeholders.

Oak9

Oak9

Oak9's Security as Code platform dynamically secures Infrastructure as Code (IaC) and deployed cloud workloads, automatically.

Hubble

Hubble

Hubble grew from the idea that legacy solutions were failing to provide organizations with the asset visibility they needed to effectively secure and operate their businesses.

Veracity Trust Network

Veracity Trust Network

Veracity Trust Network safeguards organisations from the threat of bot attacks on their public facing platforms.