Categories
Quotations

2013.1.29

The actors that represent the majority of users today, stakeholders from the South, the developing world, and the non-English segments of the net, will do more to shape the future of cyberspace than any discussions at the Pentagon or in policy circles in North America and Europe. To understand how and in what ways cyberspace will be characterized in years to come we need to think beyond the beltway, beyond Silicon Valley, and into the streets of Shanghai, Nairobi, and Tehran. The contests occurring in those spaces deserve our attention today, if for no other reason than that they provide a glimpse of the types of global issues that will drive cyberspace governance in the future.

Ronald Deibert and Rafal Rohozinski, “Contesting Cyberspace and the Coming Crisis of Authority”
Categories
Quotations

2013.1.25

Facts are not a trustworthy source of knowledge. Cryptome is not an authoritative source. It’s a source of imaginary material. Don’t trust Cryptome, we lie to you helplessly. Don’t believe anything you see there.

John Young, from Andy Greenberg’s This Machine Kills Secrets
Categories
Quotations

2013.1.24

Social utopians like Haque, Tapscott and Jarvis are, of course, wrong. The age of networked intelligence isn’t very intelligent. The tragic truth is that getting naked, being yourself in the full public gaze of today’s digital network, doesn’t always result in the breaking down of ancient taboos. There is little evidence that networks like Facebook, Skype and Twitter are making us any more forgiving or tolerant. Indeed, if anything, these viral tools of mass exposure seem to be making society not only more prurient and voyeuristic, but also fuelling a mob culture of intolerance, schadenfreude and revengefulness.

Andrew Keen, #digitalvertigo: how today’s online social revolution is dividing, diminishing, and disorienting us
Categories
Quotations

2013.1.23

… it is worth continuing to ask whether the problem is solely, or even mostly, spectrum. The large wireless carriers could also increase the information-carrying capacity of their networks by building more towers and connecting them to fiber rather than copper wires. Today, even though 97.8 percent of the U.S. population has 3G coverage, more than 80 percent of cell sites are still connected to copper wires. But since the goal of any private company seeking Wall Street investment is to achieve the same levels of revenue (or more) while laying out less money, spending on “backhaul” (connections between towers and Internet access points) has not been a high priority. The problem in wireless transmission, therefore, is probably the wires and the towers, not spectrum. Executive compensation and quarterly results trump higher-quality service every time.

Susan Crawford, Captive Audience: The Telecom Industry and Monopoly Power in the New Gilded Age
Categories
Quotations

2013.1.22

One of my concerns at the time was network reliability. So, I brought Ken Kocienda, the first Safari engineer, with me to troubleshoot since he wrote so much of our networking code. If necessary, Ken could also diagnose and duct tape any other part of Safari too. He coined one of our team aphorisms, “If it doesn’t fit, you’re not shoving hard enough.”

Don Melton, “Safari is released to the world
Categories
Quotations

2013.1.19

It’s not good to be on Power’s bad side, however. When you are on that side, Power piles on charges rather than shrugging off felonies as simple mistakes. Especially if what you do falls into the gray area of enforcing the letter as opposed to the principles of the law.

You can file all the petitions you like with the powers that be. You can try to make Power –whether in the form of wiretapping without warrants or violating international conventions against torture — follow its own laws. But Power is, as you might suspect, on the side of Power. Which is to say, Power never pleads guilty.

Ryan Singel, “Aaron Swartz and the Two Faces of Power
Categories
Quotations

2013.1.17

The same vulnerabilities that enable crime in the first place also give law enforcement a way to wiretap — when they have a narrowly targeted warrant and can’t get what they’re after some other way. The very reasons why we have Patch Tuesday followed by Exploit Wednesday, why opening e-mail attachments feels like Russian roulette, and why anti-virus software and firewalls aren’t enough to keep us safe online provide the very backdoors the FBI wants.

Matt Blaze and Susan Landau, “The FBI Needs Hackers, Not Backdoors
Categories
Quotations

2013.1.16

Defenders of the prosecution seem to think that anyone charged with a felony must somehow deserve punishment. That idea can only be sustained without actual exposure to the legal system. Yes, most of the time prosecutors do chase actual wrongdoers, but today our criminal laws are so expansive that most people of any vigor and spirit can be found to violate them in some way. Basically, under American law, anyone interesting is a felon. The prosecutors, not the law, decide who deserves punishment.

Tim Wu, “How The Legal System Failed Aaron Swartz – And Us
Categories
Quotations

2013.1.15

Placing sensitive data in insecure locations is never a good idea, and the loss of physical security has long been considered tantamount to a breach. Yet some early elements of the IoT incorporate this very flaw into their designs. It’s often an attempt to compensate for a lack of technological maturity where always-on network connectivity is unavailable or too expensive, or the central infrastructure does not scale to accommodate the vast number of input devices.

As the IoT crawls through its early stages, we can expect to see more such compromises; developers have to accommodate technical constraints — by either limiting functionality or compromising security. In a highly competitive tech marketplace, I think we all know which of these will be the first casualty.

And it’s not just security: it’s privacy, too. As the objects within the IoT collect seemingly inconsequential fragments of data to fulfill their service, think about what happens when that information is collated, correlated, and reviewed.

Andrew Rose, “The Internet of Things Has Arrived — And So Have Massive Security Issues
Categories
Quotations

2013.1.12

I don’t believe the public would intend for the government to be rummaging through your cupboards while your wife is lying in the next room being prepared to be taken to her final resting place. That’s an extraordinary violation of privacy.

Andrew Fackrell, in Dennis Romboy’s “Police drug search intrudes on husband’s final moments with deceased wife