Create an Account
username: password:
 
  MemeStreams Logo

the light we cannot see

search

noteworthy
Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
Arts
  Literature
   Fiction
   Non-Fiction
  Movies
   Documentary
   Drama
   Film Noir
   Sci-Fi/Fantasy Films
   War
  Music
  TV
   TV Documentary
Business
  Tech Industry
  Telecom Industry
  Management
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
   Asian Travel
Local Information
  Food
  SF Bay Area Events
Science
  History
  Math
  Nano Tech
  Physics
  Space
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Sports
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
the light we cannot see
Topic: Miscellaneous 10:11 pm EDT, Apr 28, 2015

Amy Hess:

The notion that electronic devices and communications could never be unlocked or unencrypted ... is troubling.

Barack Obama:

There's no scenario in which we don't want really strong encryption.

Nicholas Weaver:

Universal encryption is difficult and expensive, but unfortunately necessary.

Dan Goodin:

About 1,500 iPhone and iPad apps contain an HTTPS-crippling vulnerability that makes it easy for attackers to intercept encrypted passwords, bank-account numbers, and other highly sensitive information.

Rami Assaid:

The truth is, people will never achieve true privacy and anonymity online. Tracking is not only here to stay, it's getting more pervasive and sophisticated.

Steve Ranger:

In reality, it's incredibly hard to isolate individuals responsible for cyber attacks -- especially when it comes to industrial espionage, where attacks may take place over months and years, and even harder to prove that a company has benefited from such an attack.

Bruce Schneier:

This isn't something the market can solve on its own ...

Sören Preibusch:

The continued reporting on state surveillance by the media contrasts with the public's quickly faded interest.

John Oliver:

No one cares. [Americans] don't give a shit.

DoD:

The US requires strong intelligence, forensics, and indications and warning capabilities to reduce anonymity in cyberspace and increase confidence in attribution. Attribution is a fundamental part of an effective cyber deterrence strategy as anonymity enables malicious cyber activity by state and non-state groups.

Anthr@X:

Even people outside China are being weaponized to target things the Chinese government does not like ...

Ashton Carter:

Today dozens of militaries are developing cyber forces, and because stability depends on avoiding miscalculation that could lead to escalation, militaries must talk to each other and understand each other's abilities. DoD must do its part to shed more light on cyber capabilities that have previously been developed in the shadows.

Ta-Nehisi Coates:

When nonviolence begins halfway through the war with the aggressor calling time out, it exposes itself as a ruse.

Joan Didion:

Self-deception remains the most difficult deception.



 
 
Powered By Industrial Memetics
RSS2.0