Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

An Analysis of the Online Identity Battleground 7: Dissecting the Legislation

Completing his Shmoocon presentation, aestetix singles out specific country-based legislation regarding name policies, and takes questions from the audience. Our last myth from Adam here: we are currently fixing this through legislation. South Korea did this back in 2003 (see image below). So, South Korea,...

An Analysis of the Online Identity Battleground 6: Names Policies of Google and Facebook

This section outlines the way services like Google and Facebook currently go about handling user names and pseudonyms. There’ve been some updates and changes to this policy of Google. The new policy: “You can change your name, but it’s limited to 3 times every two years,” I’m not sure why....

An Analysis of the Online Identity Battleground 5: Can We Trust “Identity Providers”?

Subjects covered in this part of aestetix’s presentation include trust in terms of online names specificity, and “identity providers” like Facebook and Google. Myth #3: we cannot trust anyone who does not use their legal name online. Trust – that’s such a tricky word, isn’t it? Here’s...

An Analysis of the Online Identity Battleground 4: Legal Names and Cyberbullying

aestetix makes herein an emphasis on the correlation between the use of real names and pseudonyms online with people’s behavior on the Internet. Number two for the myths, thanks Adam: “We can stop cyberbullying by forcing people to use their legal names. People who do not use their legal names do...

An Analysis of the Online Identity Battleground 3: The Essence of Identity

What aestetix highlights in this part of the presentation is the different aspects of one’s identity and its relation to nyms, nicknames, hacker handles, etc. Moving on a little bit and getting into some psychology here, the question: “Is identity internal or external?” And if you’ve...

An Analysis of the Online Identity Battleground 2: Defining a “Nym”

aestetix dwells herein on the essence of name, nym, identity, and social network, and provides non-trivial examples thereof as well as their interrelations. So, myth #1, and there are 5 of these myths, just so you know. Only pedophiles, criminals and cyber-bullies do not want to use their legal names...

An Analysis of the Online Identity Battleground by aestetix

aestetix, a researcher of online identity issues and one of the enthusiasts that created the Nym Rights group, gave a great talk at Shmoocon 2013 event entitled “Beyond Nymwars” highlighting the various facets of online names use within the identity-related context. Before I start I just want to...

Life Inside a Skinner Box 6: Implementing an Automated System the Right Way

The scientists are highlighting ways to implement automated law enforcement without having to suffer the consequences of malfunction and possible abuse. Lisa Shay: So, what can we do about this? Obviously there are countermeasures that are available for all different kinds of problems. Greg and I gave a...

Life Inside a Skinner Box 5: The Mixed Blessing of Perfect Law Enforcement

The researchers provide here an insight into whether perfect law enforcement is a good thing, and dwell on related issues from an automation perspective. Woody Hartzog: Some of the big questions, and I think the one that goes to the heart of our talk today, is whether we want perfect enforcement of the law....

Life Inside a Skinner Box 4: Benefits and Downsides of Automation

Greg Conti and Woody Hartzog dwell on the possible advantages and disadvantages for the society given that law enforcement gets increasingly automated. Greg Conti: So, clearly, there’re advantages to this, but there’re certainly disadvantages as well, and it really depends on your perspective: are...