Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

Hackers in Government 5: Addressing the Economic and Climate Change Problems

The issues Nick Farr is dissecting here have to do with economics and environmental protection in the context of how hackers would most likely address them. Economics: Current Problems and Possible Solutions Now we’re getting to another point – economics. The greatest period of economic growth in...

Hackers in Government 4: Discretionary Spending That Produces No Value

Herein Nick Farr makes an insight into key traits of the current defense spending in the US, putting accent on what could be changed to raise its expediency. I guess politicians are the most brown-nosing, trying to find a way to not kiss a certain part of the anatomy, but that’s fundamentally what...

Hackers in Government 3: Viewing Government as a Network

Continuing to differentiate between politicians and hackers, Nick Farr emphasizes the gap in terms of the discrepancy of network infrastructure perception. Common Features of Computer Networks and Government Structure Another quick thing to sort of think about hackers and government: look at government as...

Hackers in Government 2: Principal Differences Between Hackers and Politicians

This entry reflects Nick Farr’s comparison of deceptively polite and mercantile politicians on the one hand, and straightforward hackers who are scrupulous about all the little details of a system on the other. To sort of illustrate the general idea of politics, I think politicians’ driving core...

Hackers in Government

Nick Farr, a well-known inspirer of the Hackerspaces idea in the United States and the author of the Hackers on a Plane project, delivers a great talk ‘Yes We Could: Hackers in Government’ at the SIGINT event held by the Germany-based Chaos Computer Club to express his viewpoints on how...

Hacking in the Far East 8: Summarizing the Most Striking Security Flaws

Proceeding to the summary, Paul S. Ziegler lists the top three security-related problems he has encountered during the years spent in the Eastern Asia. After I’ve shown you all of this cool stuff that we can do and all these weird vectors, we’re going to sum them up a little, and we’re going to look at...

Hacking in the Far East 7: Too-Near Field Communication

In this part, Paul Ziegler gets critical about the way near field communication technology is implemented in Japan, from a security person’s perspective. Next thing we’re going to look at is what I like to call the Too-Near Field Communication, which is kind of an international topic, because if you...

Hacking in the Far East 6: Wireless Insecurity and the SEED Encryption Algorithm

Security of wireless communication in Eastern Asia and details of the crypto algorithm used in South Korea are the issues Paul S. Ziegler looks into here. Let’s jump to wireless for a second. So, if any of you have been wardriving recently in a European city or in an American city, and you’ve seen all...

Hacking in the Far East 5: Effects of Lifetime Employment and Bonus System on Corporate Security

Paul S. Ziegler points out the issues of corporate security in Eastern Asia, namely the peculiarities of an employee’s perspective upon taking responsibility. We’re going to move on to probably one of the most fun parts of this, at least if you like stories that make your hair stand up. We’re going...

Hacking in the Far East 4: Locked but Unsafe

This part of Paul Ziegler’s presentation is dedicated to an insight into the security measures for mailboxes and electronic PIN code locks in Japan and Korea. Mailboxes in Japan No matter if you live in an apartment or in a mansion, one of the other central parts you will run into is this thing: it’s a...