Peer2Politics
Follow
Find tag "security"
112.4K views | +21 today
Peer2Politics
on peer-to-peer dynamics in the field of politics, economics and institutions
Curated by jean lievens
Your new post is loading...
Scooped by jean lievens
Scoop.it!

‪[NIS Hacking Scandal] NIS Agent's Suicide Note, "My Excessive Desire to Do the Work Well..."

‪[NIS Hacking Scandal] NIS Agent's Suicide Note, "My Excessive Desire to Do the Work Well..." | Peer2Politics | Scoop.it

A senior agent in his forties who had overseen the cyber security field at the National Intelligence Service (NIS) for a long time took his own life. He left behind a suicide note mentioning the use of the controversial hacking program which the intelligence service had purchased.

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

What does the collaborative economy mean for information security? - CSO Online

What does the collaborative economy mean for information security? - CSO Online | Peer2Politics | Scoop.it
But what if the dynamic changed such that employees could use corporate and office items for their personal profit? Most firms have never thought about the concept and certainly have no processes in place to deal with it.
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Promoting Digital Security in Tunisia at the World Social Forum

Promoting Digital Security in Tunisia at the World Social Forum | Peer2Politics | Scoop.it
Fifty thousand activists from 5,000 NGOs around the world attended the World Social Forum in Tunis last week to press for change on a wide variety of issues.
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Cybersecurity And The Future Digital Economy - TechCrunch

Cybersecurity And The Future Digital Economy - TechCrunch | Peer2Politics | Scoop.it
Just a week ago, Director of National Intelligence James Clapper testified before Congress that his fundamental concern focuses on the “moderate, iterative..
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Internet Security and the Limits of Open Source and Peer Production - P2P Foundation

Internet Security and the Limits of Open Source and Peer Production - P2P Foundation | Peer2Politics | Scoop.it

"Open source and peer production have been praised as organisational models that could change the world for the better. It is commonly asserted that almost any societal activity could benefit from distributed, bottom-up collaboration — by making societal interaction more open, more social, and more democratic. However, we also need to be mindful of the limits of these models. How could they function in environments hostile to openness? Security is a societal domain more prone to secrecy than any other, except perhaps for romantic love. In light of the destructive capacity of contemporary cyber attacks, how has the Internet survived without a comprehensive security infrastructure? Secrecy vs. openness describes the realities of Internet security production through the lenses of open source and peer production theories. The study offers a glimpse into the fascinating communities of technical experts, who played a pivotal role when the chips were down for the Internet after large-scale attacks. After an initial flirtation with openness in the early years, operational Internet security communities have put in place institutional mechanisms that have resulted in less open forms of social production."

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Secrecy versus openness: Internet security and the limits of open source and pee :: TU Delft Institutional Repository

Open source and peer production have been praised as organisational models that could change the world for the better. It is commonly asserted that almost any societal activity could benefit from distributed, bottom-up collaboration — by making societal interaction more open, more social, and more democratic. However, we also need to be mindful of the limits of these models. How could they function in environments hostile to openness? Security is a societal domain more prone to secrecy than any other, except perhaps for romantic love. In light of the destructive capacity of contemporary cyber attacks, how has the Internet survived without a comprehensive security infrastructure? Secrecy vs. openness describes the realities of Internet security production through the lenses of open source and peer production theories. The study offers a glimpse into the fascinating communities of technical experts, who played a pivotal role when the chips were down for the Internet after large-scale attacks. After an initial flirtation with openness in the early years, operational Internet security communities have put in place institutional mechanisms that have resulted in less open forms of social production. 

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Opinion: Waging war on hackers actually hurts US cybersecurity efforts - Christian Science Monitor

Opinion: Waging war on hackers actually hurts US cybersecurity efforts - Christian Science Monitor | Peer2Politics | Scoop.it
While Obama wants tougher penalties for criminal hackers, the administration can't afford to alienate good hackers working to improve security.
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

The Nerd Scare: How the U.S. Government Is Overreacting to Hackers and ... - Slate Magazine

The Nerd Scare: How the U.S. Government Is Overreacting to Hackers and ... - Slate Magazine | Peer2Politics | Scoop.it
Among both American and British law-enforcement communities, the temptation runs strong to treat hackers and hacktivists in simplistic terms.
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Introduction by Golan Levin :: Deep Lab Lecture Series

Deep Lab is a collective of cyberfeminist researchers, organized by STUDIO Fellow Addie Wagenknecht to examine how privacy, security, surveillance, and anonymity are problematized in the arts and society. The Deep Lab participants, all women, are an international group of new-media artists, visualization designers, data scientists, software engineers, hackers, journalists and theoreticians, who are engaged in the critical assessment of contemporary digital culture. In the second week of December, these experts will work at the STUDIO on an accelerated pressure project, and deliver four evenings of public presentations: the Deep Lab Lecture Series.
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

ID3 Hopes You’ll Opt-In to Your Own Surveillance (Op-Ed)

ID3 Hopes You’ll Opt-In to Your Own Surveillance (Op-Ed) | Peer2Politics | Scoop.it
In a move not surprising from a partner organization of DATA (the organization that assisted New York state employees to write the “BitLicense”), ID3 has announced the release of new identity-tracking software that they hope cryptocurrency companies will make a pre-condition for customers wanting to do business.
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Morgan Lewis' Mark Krotoski - The Recorder

Morgan Lewis' Mark Krotoski - The Recorder | Peer2Politics | Scoop.it
A member of the Northern District's original cybersecurity squad in San Jose, Krotoski is rooting for passage of federal data breach and trade secret laws.
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Baojia Distributed Defense System in China - P2P Foundation

Baojia Distributed Defense System in China - P2P Foundation | Peer2Politics | Scoop.it
"One was the baojia system 保甲制度 of local militias which Chancellor Wang invented. This system radically devolved military affairs and law enforcement, and assigned greater responsibilities to the most local level and to the lowest ranks, and it met with resounding success where it was implemented. (When it was reintroduced during the Qing Dynasty, however, it met with far less.) Under the baojia system, ten families would be organised into a bao, and one family would be given a wooden placard designating them as the baozhang 保長 (the bao captain).
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Silicon Valley Is Creating 'The Camera Panoptic...

Silicon Valley Is Creating 'The Camera Panoptic... | Peer2Politics | Scoop.it
In this powerful and indignant article, Aral Balkan – verging on ‘mad as hell and I’m not going to take this any more‘ mode, exposes the nascent total surveillance state, what he calls ‘Spyware 2.0′ and their fraudulent ‘free’ services.
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Uber Gets Serious About Security With Latest Hire - Refinery29

Uber Gets Serious About Security With Latest Hire - Refinery29 | Peer2Politics | Scoop.it
The popular ride-hailing company hired Facebook's Chief Security Officer Joe Sullivan to head up its own security department, the New York Times reports today.
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

The Collective Intelligence: As Early as 2016, Robot Cops Will Be Patrolling Your Streets

The Collective Intelligence: As Early as 2016, Robot Cops Will Be Patrolling Your Streets | Peer2Politics | Scoop.it
As Early as 2016, Robot Cops Will Be Patrolling Your Streets
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Data Security Is Becoming the Sparkle in Bitcoin

Data Security Is Becoming the Sparkle in Bitcoin | Peer2Politics | Scoop.it
With the price of Bitcoin plummeting, the technology that stores the currency’s transactions is gaining value as a safe and open way to keep other kinds of records.
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Internet Security and the Limits of Open Source and Peer Production - P2P Foundation

Internet Security and the Limits of Open Source and Peer Production - P2P Foundation | Peer2Politics | Scoop.it

"Open source and peer production have been praised as organisational models that could change the world for the better. It is commonly asserted that almost any societal activity could benefit from distributed, bottom-up collaboration — by making societal interaction more open, more social, and more democratic. However, we also need to be mindful of the limits of these models. How could they function in environments hostile to openness? Security is a societal domain more prone to secrecy than any other, except perhaps for romantic love. In light of the destructive capacity of contemporary cyber attacks, how has the Internet survived without a comprehensive security infrastructure? Secrecy vs. openness describes the realities of Internet security production through the lenses of open source and peer production theories. The study offers a glimpse into the fascinating communities of technical experts, who played a pivotal role when the chips were down for the Internet after large-scale attacks. After an initial flirtation with openness in the early years, operational Internet security communities have put in place institutional mechanisms that have resulted in less open forms of social production."

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Cyber security will shape the Internet of Things - ITProPortal

Cyber security will shape the Internet of Things - ITProPortal | Peer2Politics | Scoop.it
The premise of the Internet of Things carries with it a corollary statement; everything that can be connected to the Internet can be hacked.
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Crowdsourcing America's cybersecurity is an idea so crazy it might just work - Washington Post (blog)

Crowdsourcing America's cybersecurity is an idea so crazy it might just work - Washington Post (blog) | Peer2Politics | Scoop.it
Given the size and complexity of the problem, we need more people to help.
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

CSE's Levitation Project: Does Mass Surveillance Prevent Terrorist Attacks? - Huffington Post Canada

CSE's Levitation Project: Does Mass Surveillance Prevent Terrorist Attacks? - Huffington Post Canada | Peer2Politics | Scoop.it
Mass trolling of internet data — as done by Canada's electronic spy agency in a project dubbed Levitation — can impede cyber spies in the hunt for extremists more than it helps, some security experts argue.
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

In Obama's war on hackers, everyone loses - Al Jazeera America

In Obama's war on hackers, everyone loses - Al Jazeera America | Peer2Politics | Scoop.it
Persecution of Barrett Brown offers chilling preview of cybersecurity proposals
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Trackography - P2P Foundation

Trackography - P2P Foundation | Peer2Politics | Scoop.it
"project illustrates which companies track us when we read the news online, where our data travels to and how our data is handled everytime we access a media website"
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

SnoopSnitch - Android-apps op Google Play

SnoopSnitch - Android-apps op Google Play | Peer2Politics | Scoop.it

"SnoopSnitch collects and analyzes mobile radio data to make you aware of your mobile network security and to warn you about threats like fake base stations (IMSI catchers), user tracking, and SS7 attacks.
To use SnoopSnitch, a rooted device with a Qualcomm chipset running stock Android 4.1 or higher is required. Unfortunately, custom ROMs are often unsupported at the moment as they can lack necessary proprietary drivers. (Some successful CyanogenMod installs have been reported.)
This application uses data contributed by other users. By choosing to upload your measurement results or security events, you can help improve this data base and support future research.
SnoopSnitch will ask for confirmation whenever any of your information is uploaded to our servers. All uploads are encrypted. Note that uploaded radio traces may contain private information as a side-effect."

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Gated communities fuel Blade Runner dystopia and 'profound unhappiness'

Gated communities fuel Blade Runner dystopia and 'profound unhappiness' | Peer2Politics | Scoop.it
The rapid growth of gated communities around the world is contrary to the democratic and open city and belongs instead to a dystopian future of mass surveillance and profound unhappiness, the UN's housing chief has warned.
more...
No comment yet.