Information Security practitioners aren’t used to getting political; so there was apparently a small but vocal stream of nationalists complaining to the conference organizers by the time I was done.
Information Security practitioners aren’t used to getting political; so there was apparently a small but vocal stream of nationalists complaining to the conference organizers by the time I was done.
Warning: I get a bit ranty.
A surrealist is walking down the street, and sees a banana peel in his path; he says, “Mon Dieu! I am going to fall down again!” and keeps walking.
Recent “be afraid of Russia” propaganda includes scary stories about Russian submarines prowling around submerged cables.
Congratulations to our own Shiv, whose reporting on the J20 case is in VICE. [vice]
Writing something that is timely and fact-filled, in this day of “fake news” is a huge amount of work and takes tremendous dedication. Usually I don’t have much to say about her pieces, because I’m reading them to educate myself about the oppression transpeople experience, and I’m just in absorb mode. For someone like me, who’s coming at that world from “cishet, ignorant” perspective, she’s an invaluable read.
The actions of the police state are a concern Shiv and I share, for different reasons. The stuff she’s writing about is what’s happening on the cutting end of the retro-scope and the intelligence state. All the stuff I post about surveillance is theoretical(-ish) and she’s talking about the fear that real people have to deal with, confronting the abuse of power by the state. It’s only going to get worse.
I just stumbled across this one; perhaps it’s what was going on with my browser the other day. I’ve been thinking about how to enumerate all the stuff that’s going on in a system – building a “petri dish” surrounded with sniffers, then watching and memory-scraping my browser to see what it was doing. It sounds like the answer would be “too much.”
The currency of computer security is Trust – the degree to which you can believe that your system is doing what you expect it to. There are a lot of properties that comprise trust, including integrity, reliability, etc., each of which is made up of smaller properties like non-repudiation, auditability, resistance to replay attacks, ad infinitum. We talk about trust loosely; it’s like Liberty or Good Cinematography – it’s a useful concept for describing the relationship between ourselves and the systems we use – whether they work right for any given notion of “right.”
In computer security transitive trust is when system A trusts B, and system B trusts C – in that case system A trusts C but doesn’t usually realize it.
This is another story in the “things I am tracking but I am not sure what they mean, yet” file. Unfortunately, we won’t (probably) know for a year or two; there are still a lot of shoes to drop.
[Edit: I wrote this monday afternoon. Since then there have been new developments, which I will comment on at the bottom. The bit about hypothetical Mossad spies inside Kaspersky Labs was kidding, when I wrote it, I swear.]
Warning: Sexual practices, bodily fluids
There’s an old USENET dictum: “never underestimate the bandwidth of a station wagon full of magnetic tapes.” (corollary: yeah, but the latency’s killer)
There’s a small bit of kerfuffle around the new iPhone facial recognition feature.