World War Two
Published on 20 Apr 2019The German Invasion of Norway is still very much in full swing. The German Wehrmacht is moving north from Oslo, where a Norwegian force is trying to halt them in anticipation of Allied reinforcements. The British do land in Norway, but don’t necessarily rush to relief the Norwegian army. Meanwhile, Norwegian “traitor” and “failure” Vidkun Quisling rises to be the new leader of Norway – only to get rejected by Hitler again. Numerous powers are now trying to grab, restore or consolidate military or political power in Norway. It’s a mess.
Join us on Patreon: https://www.patreon.com/TimeGhostHistory
Or join The TimeGhost Army directly at: https://timeghost.tvFollow WW2 day by day on Instagram @World_war_two_realtime https://www.instagram.com/world_war_t…
Join our Discord Server: https://discord.gg/D6D2aYN.
Between 2 Wars: https://www.youtube.com/playlist?list…
Source list: http://bit.ly/WW2sourcesWritten and Hosted by: Indy Neidell
Produced and Directed by: Spartacus Olsson and Astrid Deinhard
Executive Producers: Bodo Rittenauer, Astrid Deinhard, Indy Neidell, Spartacus Olsson
Creative Producer: Joram Appel
Research by: Indy Neidell
Edited by: Iryna Dulka
Map animations: EastoryColorisations by Norman Stewart and JuliusJaa (https://www.flickr.com/photos/juliusjaa/)
Eastory’s channel: https://www.youtube.com/channel/UCEly…
Archive by Screenocean/Reuters https://www.screenocean.comSources:
© IWM (N 159)
© IWM (HU 104676)
© IWM (HU 104684)A TimeGhost chronological documentary produced by OnLion Entertainment GmbH.
April 21, 2019
The Scramble For Norway – WW2 – 034 – April 20 1940
January 27, 2019
The Enigma of Germany’s Wartime Economy – WW2 – 022 – January 26 1940
World War Two
Published on 26 Jan 2019This week shows the Allies first attempts to break the German Enigma code. Meanwhile, the German war economy shows some flaws and the Soviets are massing artillery in an effort to break the Finnish defences.
As the Winter War rolls on the only help the Finns are getting are from volunteers. The Western Allies still have their thoughts on Norway, little do they know that the Phoney War almost ends this week…
Follow WW2 day by day on Instagram @World_war_two_realtime https://www.instagram.com/world_war_t…
Join us on Patreon: https://www.patreon.com/TimeGhostHistory
Or join The TimeGhost Army directly at: https://timeghost.tvBetween 2 Wars: https://www.youtube.com/playlist?list…
Written and Hosted by: Indy Neidell
Produced and Directed by: Spartacus Olsson and Astrid Deinhard
Executive Producers: Bodo Rittenauer, Astrid Deinhard, Indy Neidell, Spartacus Olsson
Creative Producer: Joram Appel
Research by: Indy Neidell
Edited by: Iryna Dulka
Map animations: EastoryColorizations by Norman Stewart.
Photos of the Winter War are mostly from the Finnish Wartime Photograph Archive (SA-Kuva).
Eastory’s channel: https://www.youtube.com/channel/UCEly…
Archive by Screenocean/Reuters https://www.screenocean.comA TimeGhost chronological documentary produced by OnLion Entertainment GmbH.
December 7, 2018
July 22, 2018
Austro-Hungarian Artillery – Choctaw Code Talkers I OUT OF THE TRENCHES
The Great War
Published on 21 Jul 2018
July 20, 2018
Fiat currency and the impact of cryptocurrencies
At Catallaxy Files, Sinclair Davidson explains some of the advantages and disadvantages of both fiat (government-issued) and private currency:
As George Selgin, Larry White and others have shown, many historical societies had systems of private money — free banking — where the institution of money was provided by the market.
But for the most part, private monies have been displaced by fiat currencies, and live on as a historical curiosity.
We can explain this with an ‘institutional possibility frontier’; a framework developed first by Harvard economist Andrei Shleifer and his various co-authors. Shleifer and colleagues array social institutions according to how they trade-off the risks of disorder (that is, private fraud and theft) against the risk of dictatorship (that is, government expropriation, oppression, etc.) along the frontier.
As the graph shows, for money these risks are counterfeiting (disorder) and unexpected inflation (dictatorship). The free banking era taught us that private currencies are vulnerable to counterfeiting, but due to competitive market pressure, minimise the risk of inflation.
By contrast, fiat currencies are less susceptible to counterfeiting. Governments are a trusted third party that aggressively prosecutes currency fraud. The tradeoff though is that governments get the power of inflating the currency.
The fact that fiat currencies seem to be widely preferred in the world isn’t only because of fiat currency laws. It’s that citizens seem to be relatively happy with this tradeoff. They would prefer to take the risk of inflation over the risk of counterfeiting.
One reason why this might be the case is because they can both diversify and hedge against the likelihood of inflation by holding assets such as gold, or foreign currency.
The dictatorship costs of fiat currency are apparently not as high as ‘hard money’ theorists imagine.
Introducing cryptocurrencies
Cryptocurrencies significantly change this dynamic.
Cryptocurrencies are a form of private money that substantially, if not entirely, eliminate the risk of counterfeiting. Blockchains underpin cryptocurrency tokens as a secure, decentralised digital asset.
They’re not just an asset to diversify away from inflationary fiat currency, or a hedge to protect against unwanted dictatorship. Cryptocurrencies are a (near — and increasing) substitute for fiat currency.
This means that the disorder costs of private money drop dramatically.
In fact, the counterfeiting risk for mature cryptocurrencies like Bitcoin is currently less than fiat currency. Fiat currency can still be counterfeited. A stable and secure blockchain eliminates the risk of counterfeiting entirely.
July 12, 2018
Great Blunders of WWII: Japan’s Mistakes at Midway
Anthony Coleman
Published on 3 Nov 2016From the History Channel DVD series “Great Blunders of WWII”
October 14, 2017
BAHFest East 2017 – Jerry Wang: BLANKIE: Baby LAb for iNfant-Kindled innovatIon and Exploration
BAHFest
Published on Sep 24, 2017Watch Jerry propose an ambitious research program to “make big science with tiny people.” By leveraging the unique morphological and neurological capabilities of babies, he aims to advance the frontiers of science and engineering with giant baby steps.
BAHFest is the Festival of Bad Ad Hoc Hypotheses, a celebration of well-researched, logically explained, and clearly wrong evolutionary theory. Additional information is available at http://bahfest.com/
August 12, 2017
Why The Government Shouldn’t Break WhatsApp
Published on 3 Jul 2017
Encryption backdoors – breaking WhatsApp and iMessage’s security to let the government stop Bad Things – sounds like a reasonable idea. Here’s why it isn’t.
A transcript of this video’s available here: https://www.facebook.com/notes/tom-scott/why-the-government-shouldnt-break-whatsapp/1378434365572557/
July 1, 2017
Hunting the Bismarck – III: A Chance to Strike – Extra History
Published on May 25, 2017
Sponsored by Wargaming! New players: Download World of Warships and use the code EXTRA1 for free goodies! http://cpm.wargaming.net/i3v7c6uu/?pu…
The order went out: Sink the Bismarck. Ships converged from all over the Atlantic to hunt down the pride of the German navy, and Swordfish planes launched from the aircraft carrier Ark Royal raced to harry the great warship.
June 7, 2017
“Hey, Joey, ‘splain me public key cryptography!”
Joey deVilla explains public key cryptography for non-geeks:
Have you ever tried to explain public-key cryptography (a.k.a. asymmetric cryptography) or the concept of public and private keys and what they’re for to non-techies? It’s tough, and I’ve spent the last little while trying to come up with an analogy that’s layperson-friendly and memorable.
It turns out that it already exists, and Panayotis Vryonis […], came up with it. Go over to his blog and check out the article titled Public-key cryptography for non-geeks. Whenever I have to explain what private keys and public keys are for to someone who’s new to cryptography, I use Vryonis’ “box with special lock and special keys” analogy. Not only does the explanation work, but it’s so good that the people I’ve used it on have used it themselves to explain public-key crypto to others.
I’ve recently used Vryonis’ analogy in a couple of presentations and thought I’d share images from my slides. Enjoy!
May 16, 2017
The Virtual Lorenz machine
At The Register, Gareth Corfield discusses the new virtual coding device simulating the WW2 German Lorenz cipher machine:
The National Museum of Computing has put an emulation of an “unbreakable” Second World War German cipher machine online for world+dog to admire.
The Virtual Lorenz machine has been launched in honour of WW2 codebreaker Bill Tutte, the man who broke the crypto used in the twelve-rotor cipher machine.
As The National Museum of Computing (TNMOC) puts it, Tutte’s work “shortened the conflict” – even though he had never even seen the cipher machine or its crypto scheme, the breaking of which the museum added was “the greatest intellectual feat of the war”.
TNMOC unveiled the Virtual Lorenz today to celebrate Tutte’s 100th birthday. Built by computing chap Martin Gillow, the simulation accurately reproduces the whirring of the cipher wheels (you might want to turn it down as the “background whirr” is a little too realistic).
The BBC profiled the “gifted mathematician” a few years ago, highlighting how the Lorenz machine whose secrets Tutte cracked was “several degrees more advanced than Enigma”, the cipher famously cracked by Tutte’s colleague Alan Turing. Tutte cracked the Lorenz in about six months, reverse-engineering its workings by reading intercepted Lorenz messages. When the Allies wanted to fool Hitler into believing the D-Day landings would take place in a false location, our ability to read Lorenz was critical for confirming that the ruse had worked – saving thousands of soldiers, sailors and airmen’s lives.
[…]
The Virtual Lorenz can be found here. Word to the wise – it’s not on an HTTPS site, so if you’re hoping to use it to thwart GCHQ, you might want to think again.
January 16, 2017
100 years ago today
From the Facebook page of The Great War:
On this day 100 years ago, a coded telegram was sent by German foreign secretary Arthur Zimmermann to German Ambassador to Mexico, Heinrich von Eckardt. In this telegram, Zimmermann instructed von Eckardt to offer Mexico a military alliance and financial support against the United States should they not remain neutral. This was a possibility since Germany was about to unleash unrestricted submarine warfare by February 1, 1917.
To understand this telegram, it is important to understand that talks about military cooperation and even a military alliance between Mexico and the German Empire had been going on since 1915 already.
The telegram was sent via the American undersea cable since the German cable was interrupted by the British when the war broke out. US President Woodrow Wilson had offered the Germans to use their cable for diplomatic correspondence. What neither Wilson nor the Germans knew: The cable was monitored by the British intelligence at a relay station in England. Furthermore, the British codebreakers of Room 40 had already cracked the German encryption.
The biggest challenge for the British now was to reveal the content of this telegram without admitting that they were monitoring the cable while ensuring it had the desired impact.
March 20, 2016
Apple software engineers threaten to quit rather than crack encryption for the government
It’s only a rumour rather than a definite stand, but it is a hopeful one for civil liberties:
The spirit of anarchy and anti-establishment still runs strong at Apple. Rather than comply with the government’s requests to develop a so-called “GovtOS” to unlock the iPhone 5c of San Bernardino shooter Syed Rizwan Farook, The New York Times‘ half-dozen sources say that some software engineers may quit instead. “It’s an independent culture and a rebellious one,” former Apple engineering manager Jean-Louis Gassée tells NYT. “If the government tries to compel testimony or action from these engineers, good luck with that.”
Former senior product manager for Apple’s security and privacy division Window Snyder agrees. “If someone attempts to force them to work on something that’s outside their personal values, they can expect to find a position that’s a better fit somewhere else.”
In another instance of Apple’s company culture clashing with what the federal government demands, the development teams are apparently relatively siloed off from one another. It isn’t until a product gets closer to release that disparate teams like hardware and software engineers come together for finalizing a given gizmo. NYT notes that the team of six to 10 engineers needed to develop the back door doesn’t currently exist and that forcing any sort of collaboration would be incredibly difficult, again, due to how Apple works internally.
January 31, 2016
“To be honest, the spooks love PGP”
If nothing else, it’s a needle in their acres of data haystacks. Use of any kind of encryption doesn’t necessarily let CSIS and their foreign friends read your communications, but it alerts them that you think you’ve got something to say that they shouldn’t read:
Although the cops and Feds wont stop banging on and on about encryption – the spies have a different take on the use of crypto.
To be brutally blunt, they love it. Why? Because using detectable encryption technology like PGP, Tor, VPNs and so on, lights you up on the intelligence agencies’ dashboards. Agents and analysts don’t even have to see the contents of the communications – the metadata is enough for g-men to start making your life difficult.
“To be honest, the spooks love PGP,” Nicholas Weaver, a researcher at the International Computer Science Institute, told the Usenix Enigma conference in San Francisco on Wednesdy. “It’s really chatty and it gives them a lot of metadata and communication records. PGP is the NSA’s friend.”
Weaver, who has spent much of the last decade investigating NSA techniques, said that all PGP traffic, including who sent it and to whom, is automatically stored and backed up onto tape. This can then be searched as needed when matched with other surveillance data.
Given that the NSA has taps on almost all of the internet’s major trunk routes, the PGP records can be incredibly useful. It’s a simple matter to build a script that can identify one PGP user and then track all their contacts to build a journal of their activities.
Even better is the Mujahedeen Secrets encryption system, which was released by the Global Islamic Media Front to allow Al Qaeda supporters to communicate in private. Weaver said that not only was it even harder to use than PGP, but it was a boon for metadata – since almost anyone using it identified themselves as a potential terrorist.
“It’s brilliant!” enthused Weaver. “Whoever it was at the NSA or GCHQ who invented it give them a big Christmas bonus.”
October 29, 2015
Free HTTPS certificates coming soon
At Ars Technica, Dan Goodin discussed the imminent availability of free HTTPS certificates to all registered domain owners:
A nonprofit effort aimed at encrypting the entire Web has reached an important milestone: its HTTPS certificates are now trusted by all major browsers.
The service, which is backed by the Electronic Frontier Foundation, Mozilla, Cisco Systems, and Akamai, is known as Let’s Encrypt. As Ars reported last year, the group will offer free HTTPS certificates to anyone who owns a domain name. Let’s Encrypt promises to provide open source tools that automate processes for both applying for and receiving the credential and configuring a website to use it securely.
HTTPS uses the transport layer security or secure sockets layer protocols to secure websites in two important ways. First, it encrypts communications passing between visitors and the Web server so they can’t be read or modified by anyone who may be monitoring the connection. Second, in the case of bare bones certificates, it cryptographically proves that a server belongs to the same organization or person with control over the domain, rather than an imposter posing as that organization. (Extended validation certificates go a step beyond by authenticating the identity of the organization or individual.)