Posts

Showing posts from April, 2021

Practical applicability of ideals in the modern world

After reading the different guidelines for hackers I’ve come to the conclusion that at best they can only be used as rough guidelines, after all nothing in this world is absolute. Passion – While I do believe that hackers have to love, or at the very least enjoy what they do, I also do believe that even if they do not enjoy it, they can still achieve something in the field, sure they won't be at the top, but in the ever growing field of IT, as long as they work on improving them selves then even people that just see hacking as just a job will be able to achive something. Freedom – I believe that this is one of the most important characteristics, after all a caged bird will never learn to fly, sure some people say that the most ingenious idea were created when a person was put under pressure and had limitations imposed upon them, but then can you image what they would have created without those limitations, how much better the result would have been if they were

Online censorship and privacy

Online censorship is currently might be one of the most important issues currently, if this was an actual conversation someone might have brought up climate change, a war in some place, and any number of any problems that currently plague the world, but if we took the time we would almost certainly be able to trace at least a portion of the momentum against- or pro- movement to misinformation, which may or may not have been spread intentionally by someone.  And a discussion about that almost always leads to a discussion about online censorship, how it may help with the issue or maybe how it could work against it, basically everyone has their own opinion about it, and to prove that one is opinion is more correct then another is almost impossible, unless those polices actually get implemented and tested in the real world.  Now this leads me to the recent developments that happened before and around the pandemic that it easily overshadowed, and with good reason at that, but this issue is

Technology, training and policy lead to security

Kevin Mitnick in one of his books that security comes from technology, training and policy leads to security, and I believe that that is the truth, as a good example I can point to is Estonia’s ID card technologies. Unlike most countries Estonia took the plunge into virtualization their governments services, something that is widely debated in many other countries who hesitate to transition due to the security concerns, and due to that Estonia had to pioneer many different technologies and techniques to keep their and their citizens info safe. The prime example as I had mentioned is the Estonia’s ID card technology, each citizen has one and it is unique to them, on the surface it may seem like something that would be ripe for exploitation, just steal someones ID card and you can basically impersonate them online, and that might even be the case if they were also somehow able to obtain the passwords and pins associated with that ID card. But that is where the “technology, training and p