Ever longer, complex passwords (knowledge), augmented by MFA (possession), with all passwords encrypted in transit and at rest, further enhanced by biometrics (what we are). And we're all using it, aren't we?
Published on February 24, 2023
The most common technical attack method is hacking credentials and authentication mechanisms. Techniques adversaries use to capture credentials include finding or guessing credentials, and passing or relaying password hashes.
A redesign of the Internet to make it an open, transparent, and yet secure internet for all to enjoy is possible.
Then why we are not building such a defendable internet?
Published on February 2, 2023
And when you least expect it, there is a Larch. Authorities in Europe are responding to GDPR violations ... most importantly, the Transparency & Consent Framework (TCF)
Published on February 15, 2022
The UN Shared Rohingya Data Without Informed Consent putting the lives of people at risk. The UN
comments on that with a Statement and what follows is an explosion of articles and statements
on the internet.
Published on June 24, 2021
The creation of legal grey areas, per three examples, using the example of sexual consent for clarity
and because that is where the consent concept originated and is expanding from every day life for digital consent.
Published on May 07, 2021
Gotta feel kind of bad for nation-state hackers who spend years implanting and cultivating some hardware
exploit, only to discover the entire target database is already exposed to anyone with a web browser.
Published on April 22, 2021
Social theorist Jeremy Bentham's original projection for a panoptic prison, made it so a prisoner never
knew if he was being watched. A circular prison with a single guard tower in the middle was the original
blueprint for the structure.
The GDPR and ICCPR are not enough, and that is not only because of the tremendous struggle to implement
their rules. The GDPR for example, actually legitimises the entire information industry by making it a grey area.
Published on April 21, 2021
Scenario logic: Plots, likely effects, measurables and observables for five
scenarios: Surveillance society, Interventions by governments, Hacker groups rule, Self-organising
(protection) societies, and Obliviousness and congruence.
Published on April 06, 2021
Legitimate power is based on a structural relationship (economic stratification or other forms of
hierarchy) between influencing agents and targets. Implicitly,
or explicitly, the agent says, “I have a right to ask you to do this, and you have an
obligation to comply”.
Published on October 13, 2020
This old-fashioned horror anthology isn't terrifying or scream-inducing; instead, it is closer in spirit
to the moody, clammy, atmospheric English movies of decades past, and parodies thereof. A
ghostly proposal from GCHQ. We are reminded of Dr. Strangelove.
Published on February 17, 2020
Chances are that every document you create, every digital photograph you take, every music file you
download, and so on, all have little bits of metadata which can leak vital information about your
identity, and surveillance and censorship go hand in hand ...
Published on November 02, 2019
States are attacking other states, their own people for maintaining dominance, corporations do to get
you to buy their stuff, political groups are attacking other political groups for believing in
something else, and individuals take out their frustration on others.
Published on September 27, 2019
The UDHR consists of 30 articles affirming an individual's rights which,
although not legally binding in themselves, have been elaborated in international treaties,
economic transfers, regional human rights instruments, national constitutions, and other laws.
Published on September 08, 2019
There was of course no way of knowing whether you were being watched at any given moment. How often, or
on what system, the Thought Police plugged in on any individual wire was guesswork. It was even conceivable that they watched everybody all the time.
Published on May 17, 2019
The UKUSA agreement was signed in March 1946 for cooperation in signals intelligence between the UK
and the USA. It included more and more countries, and was a secret agreement until the Australian
Defence Signals Directorate disclosed it.
Updated on August 28, 2018
No one shall be subjected to arbitrary or unlawful interference with his privacy, family, home or correspondence, nor to unlawful attacks on his honour and reputation.
Published on May 15, 2018
The OECD provides a platform to identify good practices and coordinate domestic and international policies of its members. The United States, while endorsing the recommendations, is not implementing them.
The basic standard laid down by the CJEU is not even adhered to by most EU member states, despite their
legal obligation to comply with the Court’s jurisprudence.
Published on April 15, 2018
The old Data Protection Directive of 1995 was outdated. It failed to cover social
networking sites, cloud computing, location-based services, smart cards and biometric data.