The new EricMartindale.com is an experiment in data aggregation, and might have a few bugs. Feel free to explore, and then provide feedback directly to @martindale.

search results for china

好了,这就足够了。 @China – 你是脱节的请回复 – 而不是像...

好了,这就足够了。 @China – 你是脱节的请回复 – 而不是像 一 个浮躁的孩。普通话是相当紧凑,但你都没有反应!孙子兵法会感到羞耻。这么多的话可以给你,但你不在乎解释。这种令人难以置信的尴尬你的国家。你应该停止在阴影中工作,并寻求诚信的光芒。把未来的国家和你的人依赖于它。

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

好了,这就足够了。 @China – 你是脱节的请回复 – 而不是像...

好了,这就足够了。 @China – 你是脱节的请回复 – 而不是像 一 个浮躁的孩。普通话是相当紧凑,但你都没有反应!孙子兵法会感到羞耻。这么多的话可以给你,但你不在乎解释。这种令人难以置信的尴尬你的国家。你应该停止在阴影中工作,并寻求诚信的光芒。把未来的国家和你的人依赖于它。

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Okay, that's enough. @China – you...

Okay, that's enough. @China – you are out of line. Please respond to criticism like a nation, instead of responding like an impetuous child.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Okay, that's enough. @China – you...

Okay, that's enough. @China – you are out of line. Please respond to criticism like a nation, instead of responding like an impetuous child.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: 好了,这就足够了。 @China – 你是脱节的请回复...

RT @martindale: 好了,这就足够了。 @China – 你是脱节的请回复 – 而不是像 一 个浮躁的孩。普通话是相当紧凑,但你都没有反应!孙子兵法会感到羞耻。这么多的话可以给你,但你不在乎解释。这种令人难以置信的尴尬你的国家。你应该停止在阴影中工作,并寻求诚信的光…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: Okay, that's enough. @China...

RT @martindale: Okay, that's enough. @China – you are out of line. Please respond to criticism like a nation, instead of responding like an…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Some Feathery Updates and Condolences

It's been a crazy past couple weeks for me. I've been training up for my next fight (AFL 1, May 17, 2008 Elizabeth City, NC) and staying pretty busy at work. In other news, The Grand Tournament 2008 invitations were sent out, and RolePlayGateway will be hosting the event. I had a blast at the SEO - What You Need To Know Meetup in Raleigh, and met some great people (hi Ashley!), and got connected with the upcoming Advanced SEO Meetup (which I'm really looking forward to, Brian - sorry I missed the first one!).

Two of my friends passed away this past week, Brittany Custer and Chelsea Johnson, in two separate events. It's so sad - both of these girls had an entire life ahead of them.

A few of my friends have also had recent losses, all very devastating in their own way. I don't think you can possible hope to truly offer solace during times like these, but that is no reason to attempt to provide support and care for their loss.

It's a very polarizing view compared to what we often feel - especially looking at the age at which people pass away. With Cyclone Nargis and the China Earthquakes, there's a lot of pain in the world right now. It really makes you wake up out of whatever jaded state you're in and realize that hey, you're human. You're in this with the rest of us, regardless of how much hate you think you have.

I'm not participating in the elections this year. Full stop.

It's not that I don't feel like I can make a difference - it's that I refuse to be involved in what's going to happen next. I'll make my mark in my own way, this year. And hey, on a semi-related note, let me introduce you to an independent documentary (which means do your research to verify any of this) that I thoroughly recommend you sit down for 2 hours and watch. Two hours, give it your full attention.

All of that aside, let's all remember that we're in this together, like I said before. We need to be loving and supporting each other, through all of our trying times. Grow roots so that you might be able to nourish and feed others in their times of need, as we must do this in favor of our own health. (See The Golden Rule, figure 1.1)

For everyone who has lost someone, remember that everything has a cause and effect. You are still here and play a part in the effect of your loss - it is up to you to determine how you learn from and use the experiences you shared with this person. Be joyous and put these experiences to positive use, sharing and growing in their spirit.

Take refuge amongst your own family and friends - just as you have been there for them, they will be there for you.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Ongoing Attacks between China, U.S., Russia,...

Ongoing Attacks between China, U.S., Russia, Israel, and more:

Attachments

Ongoing Attacks between China, U.S., Russia, Israel,…

The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2]. Countries around the world are openly engaging in offensive ...

3 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: Ongoing Attacks between China,...

RT @martindale: Ongoing Attacks between China, U.S., Russia, Israel, and more:

Attachments

plus.google.com/11235321040410…

plus.google.com/11235321040410…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: Ongoing Attacks between China,...

RT @martindale: Ongoing Attacks between China, U.S., Russia, Israel, and more:

Attachments

plus.google.com/11235321040410…

plus.google.com/11235321040410…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: Ongoing Attacks between China,...

RT @martindale: Ongoing Attacks between China, U.S., Russia, Israel, and more:

Attachments

plus.google.com/11235321040410…

plus.google.com/11235321040410…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: Ongoing Attacks between China,...

RT @martindale: Ongoing Attacks between China, U.S., Russia, Israel, and more:

Attachments

plus.google.com/11235321040410…

plus.google.com/11235321040410…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: Ongoing Attacks between China,...

RT @martindale: Ongoing Attacks between China, U.S., Russia, Israel, and more:

Attachments

plus.google.com/11235321040410…

plus.google.com/11235321040410…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: Ongoing Attacks between China,...

RT @martindale: Ongoing Attacks between China, U.S., Russia, Israel, and more:

Attachments

plus.google.com/11235321040410…

plus.google.com/11235321040410…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Apparently, China and their Defense Ministry... in reply to

Apparently, China and their Defense Ministry are denying the allegations: http://www.google.com/hostednews/ap/article/ALeqM5gqGzo86yXzI9q8-HN1zYXx7QVgog

Thanks, +Carl Levinson.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I bet blackhats in Russia and... in reply to

I bet blackhats in Russia and China are pissed off that someone else revealed a useful exploit and security is about to be tightened.

More details would be nice. Like what OS are we talking about and why are they "wiping it off the system" and it keeps coming back? Are they not fixing the code that allows it in in the first place? Are they using some OS where one has to be careful what one clicks on lest one get infected with something? If so, how is something that insecure used in the war-fighting infrastructure? Did the NSA get overruled by some powerful senator that needed to repay a campaign favor?

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

8 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

8 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Onward, and Ever Upward

2013 was an amazing year; between founding +Coursefork, building soundtrack.io and para.io, working with several amazing startups [1], and being allowed to call myself a peer to some of the smartest people I know all throughout, it has been a year of both great achievement and personal growth.  This sets an incredibly compelling stage for 2014 and everything to come therein.

Today, I'm excited to announce that I'll be joining the likes of Jeff Garzik [2], Patrick Nagurny, and Ian Patton under the leadership of CTO Stephen Pair at +Bitpay, which allows anyone to quickly and seamlessly accept Bitcoin as payment, settling immediately in any currency, including USD.

Bitcoin has become one of the biggest stories of 2013, having grown over 9000% in value [3] and even surpassing Western Union in transaction volume [4].  As potentially the most counterfeit-proof form of payment in history, Bitcoin is poised to become one of the most disruptive technologies since the invention of the Internet as society moves increasingly into decentralized systems in an era of waning trust and increasing technological awareness by growing economies like China, India, and Brazil [5].

Taking advantage of this trend of decentralization, BitPay is perfectly positioned to serve as the mechanism for BitCoin's mass-adoption as massive merchants such as +Overstock.com move to accept this new form of payment.  It's exciting to be involved with a company in this position at such an early stage, and expand the breadth of my experience to include another decentralized system, and especially to be holding the responsibility of expanding the company's open-source initiatives and engaging the developer community in a meaningful way.

After parting ways with Coursefork late last year, I've taken a seat on the Board of Advisors, allowing the amazing team we built to realize the vision of open-sourcing the world of education [6] under the leadership of CTO +Brian Marks.  Brian was previously the CTO of successful education startup WebAssign [7], and will be an excellent steward of Coursefork's team and technology as they move towards the much-needed decentralization and open-sourcing of the education industry.  My best wishes to the team as they endeavor to do so!

Exciting times all around, and I'm truly lucky to be a part of it in so many ways.  Now let's go make the world a better place.

[1]: One of which, DigaForce, was just acquired: http://www.bizjournals.com/triangle/news/2014/01/02/apex-tech-firm-strategic-link-partners.html?page=all — congratulations to +Anthony Pompliano and +Matthew Cotter!
[2]: Jeff is one of the core developers of Bitcoin and a former +Red Hat team member from Raleigh.  How's that for the Triangle Company Family tree, +Derrick Minor?!
[3]: http://www.theblaze.com/stories/2013/11/29/which-currency-is-up-over-9000-this-year-and-sells-for-almost-as-much-as-an-ounce-of-gold/
[4]: http://www.businessinsider.com/bitcoin-can-be-the-new-western-union-2013-12
[5]: You might recall that in March of 2013, the Cypriot government restricted withdrawals and then utilized citizens' bank accounts directly to bail out their banking system, resulting in a surge in Bitcoin prices as individuals fled the fiat currency: http://money.cnn.com/2013/03/28/investing/bitcoin-cyprus/
[6]: Here's an interview I did while CTO of Coursefork with +Jason Hibbets from +Opensource.com that explains the vision: http://opensource.com/education/13/9/coursefork-education-tool
[7]: As a cofounder and CTO at WebAssign for 13 years, Brian took the education company from zero to over $30M in yearly revenue before becoming my co-founder at Coursefork.

Attachments

Stephen Pair: BitCoin Economy

Stephen Pair, Cofounder and CTO, BitPay on doing business in the BitCoin economy.

17 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Onward, and Ever Upward 2013 was an amazing year; between founding +Coursefork, building soundtrack.io...

Onward, and Ever Upward
2013 was an amazing year; between founding +Coursefork, building soundtrack.io and para.io, working with several amazing startups [1], and being allowed to call myself a peer to some of the smartest people I know all throughout, it has been a year of both great achievement and personal growth.  This sets an incredibly compelling stage for 2014 and everything to come therein.

Today, I'm excited to announce that I'll be joining the likes of Jeff Garzik [2], Patrick Nagurny, and Ian Patton under the leadership of CTO Stephen Pair at +Bitpay, which allows anyone to quickly and seamlessly accept Bitcoin as payment, settling immediately in any currency, including USD.

Bitcoin has become one of the biggest stories of 2013, having grown over 9000% in value [3] and even surpassing Western Union in transaction volume [4].  As potentially the most counterfeit-proof form of payment in history, Bitcoin is poised to become one of the most disruptive technologies since the invention of the Internet as society moves increasingly into decentralized systems in an era of waning trust and increasing technological awareness by growing economies like China, India, and Brazil [5].

Taking advantage of this trend of decentralization, BitPay is perfectly positioned to serve as the mechanism for BitCoin's mass-adoption as massive merchants such as +Overstock.com move to accept this new form of payment.  It's exciting to be involved with a company in this position at such an early stage, and expand the breadth of my experience to include another decentralized system, and especially to be holding the responsibility of expanding the company's open-source initiatives and engaging the developer community in a meaningful way.

After parting ways with Coursefork late last year, I've taken a seat on the Board of Advisors, allowing the amazing team we built to realize the vision of open-sourcing the world of education [6] under the leadership of CTO +Brian Marks.  Brian was previously the CTO of successful education startup WebAssign [7], and will be an excellent steward of Coursefork's team and technology as they move towards the much-needed decentralization and open-sourcing of the education industry.  My best wishes to the team as they endeavor to do so!

Exciting times all around, and I'm truly lucky to be a part of it in so many ways.  Now let's go make the world a better place.

[1]: One of which, DigaForce, was just acquired: http://www.bizjournals.com/triangle/news/2014/01/02/apex-tech-firm-strategic-link-partners.html?page=all — congratulations to +Anthony Pompliano and +Matthew Cotter!
[2]: Jeff is one of the core developers of Bitcoin and a former +Red Hat team member from Raleigh.  How's that for the Triangle Company Family tree, +Derrick Minor?!
[3]: http://www.theblaze.com/stories/2013/11/29/which-currency-is-up-over-9000-this-year-and-sells-for-almost-as-much-as-an-ounce-of-gold/
[4]: http://www.businessinsider.com/bitcoin-can-be-the-new-western-union-2013-12
[5]: You might recall that in March of 2013, the Cypriot government restricted withdrawals and then utilized citizens' bank accounts directly to bail out their banking system, resulting in a surge in Bitcoin prices as individuals fled the fiat currency: http://money.cnn.com/2013/03/28/investing/bitcoin-cyprus/
[6]: Here's an interview I did while CTO of Coursefork with +Jason Hibbets from +Opensource.com that explains the vision: http://opensource.com/education/13/9/coursefork-education-tool
[7]: As a cofounder and CTO at WebAssign for 13 years, Brian took the education company from zero to over $30M in yearly revenue before becoming my co-founder at Coursefork.

Attachments

Stephen Pair: BitCoin Economy

Stephen Pair, Cofounder and CTO, BitPay on doing business in the BitCoin economy.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Onward, and Ever Upward 2013 was an amazing year; between founding +Coursefork, building soundtrack.io...

Onward, and Ever Upward
2013 was an amazing year; between founding +Coursefork, building soundtrack.io and para.io, working with several amazing startups [1], and being allowed to call myself a peer to some of the smartest people I know all throughout, it has been a year of both great achievement and personal growth.  This sets an incredibly compelling stage for 2014 and everything to come therein.

Today, I'm excited to announce that I'll be joining the likes of Jeff Garzik [2], Patrick Nagurny, and Ian Patton under the leadership of CTO Stephen Pair at +Bitpay, which allows anyone to quickly and seamlessly accept Bitcoin as payment, settling immediately in any currency, including USD.

Bitcoin has become one of the biggest stories of 2013, having grown over 9000% in value [3] and even surpassing Western Union in transaction volume [4].  As potentially the most counterfeit-proof form of payment in history, Bitcoin is poised to become one of the most disruptive technologies since the invention of the Internet as society moves increasingly into decentralized systems in an era of waning trust and increasing technological awareness by growing economies like China, India, and Brazil [5].

Taking advantage of this trend of decentralization, BitPay is perfectly positioned to serve as the mechanism for BitCoin's mass-adoption as massive merchants such as +Overstock.com move to accept this new form of payment.  It's exciting to be involved with a company in this position at such an early stage, and expand the breadth of my experience to include another decentralized system, and especially to be holding the responsibility of expanding the company's open-source initiatives and engaging the developer community in a meaningful way.

After parting ways with Coursefork late last year, I've taken a seat on the Board of Advisors, allowing the amazing team we built to realize the vision of open-sourcing the world of education [6] under the leadership of CTO +Brian Marks.  Brian was previously the CTO of successful education startup WebAssign [7], and will be an excellent steward of Coursefork's team and technology as they move towards the much-needed decentralization and open-sourcing of the education industry.  My best wishes to the team as they endeavor to do so!

Exciting times all around, and I'm truly lucky to be a part of it in so many ways.  Now let's go make the world a better place.

[1]: One of which, DigaForce, was just acquired: http://www.bizjournals.com/triangle/news/2014/01/02/apex-tech-firm-strategic-link-partners.html?page=all — congratulations to +Anthony Pompliano and +Matthew Cotter!
[2]: Jeff is one of the core developers of Bitcoin and a former +Red Hat team member from Raleigh.  How's that for the Triangle Company Family tree, +Derrick Minor?!
[3]: http://www.theblaze.com/stories/2013/11/29/which-currency-is-up-over-9000-this-year-and-sells-for-almost-as-much-as-an-ounce-of-gold/
[4]: http://www.businessinsider.com/bitcoin-can-be-the-new-western-union-2013-12
[5]: You might recall that in March of 2013, the Cypriot government restricted withdrawals and then utilized citizens' bank accounts directly to bail out their banking system, resulting in a surge in Bitcoin prices as individuals fled the fiat currency: http://money.cnn.com/2013/03/28/investing/bitcoin-cyprus/
[6]: Here's an interview I did while CTO of Coursefork with +Jason Hibbets from +Opensource.com that explains the vision: http://opensource.com/education/13/9/coursefork-education-tool
[7]: As a cofounder and CTO at WebAssign for 13 years, Brian took the education company from zero to over $30M in yearly revenue before becoming my co-founder at Coursefork.

Attachments

Stephen Pair: BitCoin Economy

Stephen Pair, Cofounder and CTO, BitPay on doing business in the BitCoin economy.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Onward, and Ever Upward 2013 was an amazing year; between founding +Coursefork, building soundtrack.io...

Onward, and Ever Upward
2013 was an amazing year; between founding +Coursefork, building soundtrack.io and para.io, working with several amazing startups [1], and being allowed to call myself a peer to some of the smartest people I know all throughout, it has been a year of both great achievement and personal growth.  This sets an incredibly compelling stage for 2014 and everything to come therein.

Today, I'm excited to announce that I'll be joining the likes of Jeff Garzik [2], Patrick Nagurny, and Ian Patton under the leadership of CTO Stephen Pair at +Bitpay, which allows anyone to quickly and seamlessly accept Bitcoin as payment, settling immediately in any currency, including USD.

Bitcoin has become one of the biggest stories of 2013, having grown over 9000% in value [3] and even surpassing Western Union in transaction volume [4].  As potentially the most counterfeit-proof form of payment in history, Bitcoin is poised to become one of the most disruptive technologies since the invention of the Internet as society moves increasingly into decentralized systems in an era of waning trust and increasing technological awareness by growing economies like China, India, and Brazil [5].

Taking advantage of this trend of decentralization, BitPay is perfectly positioned to serve as the mechanism for BitCoin's mass-adoption as massive merchants such as +Overstock.com move to accept this new form of payment.  It's exciting to be involved with a company in this position at such an early stage, and expand the breadth of my experience to include another decentralized system, and especially to be holding the responsibility of expanding the company's open-source initiatives and engaging the developer community in a meaningful way.

After parting ways with Coursefork late last year, I've taken a seat on the Board of Advisors, allowing the amazing team we built to realize the vision of open-sourcing the world of education [6] under the leadership of CTO +Brian Marks.  Brian was previously the CTO of successful education startup WebAssign [7], and will be an excellent steward of Coursefork's team and technology as they move towards the much-needed decentralization and open-sourcing of the education industry.  My best wishes to the team as they endeavor to do so!

Exciting times all around, and I'm truly lucky to be a part of it in so many ways.  Now let's go make the world a better place.

[1]: One of which, DigaForce, was just acquired: http://www.bizjournals.com/triangle/news/2014/01/02/apex-tech-firm-strategic-link-partners.html?page=all — congratulations to +Anthony Pompliano and +Matthew Cotter!
[2]: Jeff is one of the core developers of Bitcoin and a former +Red Hat team member from Raleigh.  How's that for the Triangle Company Family tree, +Derrick Minor?!
[3]: http://www.theblaze.com/stories/2013/11/29/which-currency-is-up-over-9000-this-year-and-sells-for-almost-as-much-as-an-ounce-of-gold/
[4]: http://www.businessinsider.com/bitcoin-can-be-the-new-western-union-2013-12
[5]: You might recall that in March of 2013, the Cypriot government restricted withdrawals and then utilized citizens' bank accounts directly to bail out their banking system, resulting in a surge in Bitcoin prices as individuals fled the fiat currency: http://money.cnn.com/2013/03/28/investing/bitcoin-cyprus/
[6]: Here's an interview I did while CTO of Coursefork with +Jason Hibbets from +Opensource.com that explains the vision: http://opensource.com/education/13/9/coursefork-education-tool
[7]: As a cofounder and CTO at WebAssign for 13 years, Brian took the education company from zero to over $30M in yearly revenue before becoming my co-founder at Coursefork.

Attachments

Stephen Pair: BitCoin Economy

Stephen Pair, Cofounder and CTO, BitPay on doing business in the BitCoin economy.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.