Archive (Page 1 of 2)

Projecting the Future of Cyberspace

What we’re try­ing to do is to see over the hori­zons, look­ing at essen­tial­ly a five‐year time frame, and iden­ti­fy what will be the cyber­se­cu­ri­ty land­scape in that con­text.

Hacking the Internet of Dongs
Hacking Sex Toys for Fun and Absolutely No Profit

A large num­ber of IoT research firms…yeah, they don’t want to look at this. Because there are stig­mas around sex. We have a very weird thing in North America about sex. We’ll watch all the vio­lence we want on tele­vi­sion but you can’t see two peo­ple have sex.

Virtual Futures Salon: Radical Technologies, with Adam Greenfield

I am pro­found­ly envi­ous of peo­ple who get to write about set­tled domains or sort of set­tled states of affairs in human events. For me, I was deal­ing with a set of tech­nolo­gies which are either recent­ly emerged or still in the process of emerg­ing. And so it was a con­tin­u­al Red Queen’s race to keep up with these things as they announce them­selves to us and try and wrap my head around them, under­stand what it was that they were propos­ing, under­stand what their effects were when deployed in the world.

Are We Living Inside an Ethical (and Kind) Machine?

This is a moment to ask as we make the plan­et dig­i­tal, as we total­ly envel­op our­selves in the com­put­ing envi­ron­ment that we’ve been build­ing for the last hun­dred years, what kind of dig­i­tal plan­et do we want? Because we are at a point where there is no turn­ing back, and get­ting to eth­i­cal deci­sions, val­ues deci­sions, deci­sions about democ­ra­cy, is not some­thing we have talked about enough nor in a way that has had impact.

Richard Stallman’s Internet Hall of Fame 2013 Induction Speech

So, thir­ty years ago if you want­ed to get a new com­put­er and use it you had to sur­ren­der your free­dom by installing a user‐subjugating pro­pri­etary oper­at­ing sys­tem. So I decid­ed to fix that by devel­op­ing anoth­er oper­at­ing sys­tem and make it free, and it’s called GNU, but most the time you’ll hear peo­ple erro­neous­ly call­ing it Linux.

What Will Cybersecurity Look Like in the Next Decade?

Sure, cyber­space is about peo­ple and data. But it is also about appli­ca­tions. And devices. And the indi­rect and non‐obvious rela­tion­ships between all of this. It cre­ates a very com­pli­cat­ed and excit­ing ecosys­tem. One that is capa­ble of dra­mat­ic inno­va­tion, and dra­mat­ic exploita­tion.

Making Conservation Proactive

We’re liv­ing in this amaz­ing time. The speed of inno­va­tion has cre­at­ed tech­nolo­gies that have lit­er­al­ly reimag­ined indus­try after indus­try. Technology has improved almost every tool that we use on a dai­ly basis, and it’s time to start bring­ing this tech­nol­o­gy to use for good.

Cybersecurity in the Age of Always‐Connected Sensors

We all see the ben­e­fits of active safe­ty sys­tems in cars. But that same safe­ty tech­nol­o­gy, if attacked, can actu­al­ly allow you to immo­bi­lize a vehi­cle or even dis­able breaks while dri­ving.

Personal Privacy Assistants in the Age of the Internet of Things

Imagine your pri­va­cy assis­tant is a com­put­er pro­gram that’s run­ning on your smart­phone or your smart­watch. Your pri­va­cy assis­tant lis­tens for pri­va­cy poli­cies that are being broad­cast over a dig­i­tal stream. We are build­ing stan­dard for­mats for these pri­va­cy poli­cies so that all sen­sors will speak the same lan­guage that your per­son­al pri­va­cy assis­tant will be able to under­stand.

Page 1 of 2