Db on the utility of multiple personas, the practical mapping of personas to services (in my mind because those services do not provide multiple personas as a core feature - based on advertisement models they want to have a single bio person identity to aggregate against as that is the buying agent) - further commentary on the social norms baked into technology and the value of forgetful systems
Mike is a 2013 blogging resident visiting us from his home blog Omniorthogonal. This series of posts has explored a variety of ways in which agency – the ability of something to initiate action – can be rethought, redistributed, and refactored.
Recent reports have revealed that several companies are currently pushing “intelligent street lights” that are capable of being loaded with various kinds of sensors including, as Reuters reported late last month, sensors for moisture, ambient...
Researchers at Lancaster University, UK have taken a hint from the way the human lungs and heart constantly communicate with each other, to devise an innovative, highly flexible encryption algorithm that they claim can't be broken using the traditional methods of cyberattack.
Information can be encrypted with an array of different algorithms, but the question of which method is the most secure is far from trivial. Such algorithms need a "key" to encrypt and decrypt information; the algorithms typically generate their keys using a well-known set of rules that can only admit a very large, but nonetheless finite number of possible keys. This means that in principle, given enough time and computing power, prying eyes can always break the code eventually.
The researchers, led by Dr. Tomislav Stankovski, created an encryption mechanism that can generate a truly unlimited number of keys, which they say vastly increases the security of the communication. To do so, they took inspiration from the anatomy of the human body.
NSA and GCHQ developing capabilities to piggyback on commercial data from apps including Angry Birds for their own purposes
Kurt Laitner's insight:
I have been consistently annoyed with the privileges that mobile apps ask for, this needs to be reigned in such that I can choose which permissions to give the app, and see for myself whether the app still functions adequately without them. Also, there is an app that monitors other apps for leakage, I think I posted here..
You've probably heard politicians or pundits say that “metadata doesn't matter.” They argue that police and intelligence agencies shouldn't need probable cause warrants to collect information about our communications.
Plus: Stock exchanges under cyberattack; India’s cybercops
Kurt Laitner's insight:
"It destroys having multiple identities, and I find that quite a scary concept.
Less than two weeks ago, Seattle’s 5 Point Cafe became the first known establishment in the United States (and possibly the world) to publicly ban Google Glass, the highly anticipated augmented reality device set to be released later this year.
The “No Glass” logo that the café published on its website was developed and released (under a Creative Commons license) by a new London-based group called “Stop the Cyborgs.” The group is composed of three young Londoners who decided to make a public case against Google Glass and other similar devices.
“If it's just a few geeks wearing it, it's a niche tool [and] I don't think it's a problem,” said Adam, 27, who prefers only to be identified by his first name. He communicated with Ars via Skype and an encrypted Hushmail e-mail account.
“But if suddenly everyone is wearing it and this becomes as prevalent as smartphones—you can see it becomes very intrusive very quickly. It's not about the tech, it's about the social culture around it. If you think about what Google's business model is, it started as a search engine, and then Google Analytics. [Now, Google is] almost characterizing its [territory as being] the rest of the world. It's a loss of space that isn't online. [Google Glass] destroys having multiple identities, and I find that quite a scary concept.”
Adam admitted he has never actually used or interacted with Google Glass in person, but he said he has extensive experience with augmented reality and currently is a post-doctoral student specializing in "machine learning" at a London university that he declined to name. He added that he and two friends are behind Stop the Cyborgs.
Google has yet to release much detailed information about Google Glass, only allowing small trials involving its own employees and select journalists and developers.
One use that’s confirmed, however, is the manipulation of social media through the use of fake online “personas” managed by the military. Recently the US Air Force had solicited private sector vendors for something called “persona management software.” Such a technology would allow single individuals to command virtual armies of fake, digital “people” across numerous social media portals.
The world’s largest search engine is now experimenting with jewelry that would eliminate the need to remember dozens of passwords.
Kurt Laitner's insight:
we looked at this as a way to manage digital rights for a media server we developed in 2000, but this is taking it even further and making it 'wearable' encourages always nearby behavior - some concerns here