What we’re trying to do is to see over the horizons, looking at essentially a five‐year time frame, and identify what will be the cybersecurity landscape in that context.
Archive (Page 1 of 2)
I am profoundly envious of people who get to write about settled domains or sort of settled states of affairs in human events. For me, I was dealing with a set of technologies which are either recently emerged or still in the process of emerging. And so it was a continual Red Queen’s race to keep up with these things as they announce themselves to us and try and wrap my head around them, understand what it was that they were proposing, understand what their effects were when deployed in the world.
This is a moment to ask as we make the planet digital, as we totally envelop ourselves in the computing environment that we’ve been building for the last hundred years, what kind of digital planet do we want? Because we are at a point where there is no turning back, and getting to ethical decisions, values decisions, decisions about democracy, is not something we have talked about enough nor in a way that has had impact.
So, thirty years ago if you wanted to get a new computer and use it you had to surrender your freedom by installing a user‐subjugating proprietary operating system. So I decided to fix that by developing another operating system and make it free, and it’s called GNU, but most the time you’ll hear people erroneously calling it Linux.
Sure, cyberspace is about people and data. But it is also about applications. And devices. And the indirect and non‐obvious relationships between all of this. It creates a very complicated and exciting ecosystem. One that is capable of dramatic innovation, and dramatic exploitation.
We’re living in this amazing time. The speed of innovation has created technologies that have literally reimagined industry after industry. Technology has improved almost every tool that we use on a daily basis, and it’s time to start bringing this technology to use for good.
We all see the benefits of active safety systems in cars. But that same safety technology, if attacked, can actually allow you to immobilize a vehicle or even disable breaks while driving.
Imagine your privacy assistant is a computer program that’s running on your smartphone or your smartwatch. Your privacy assistant listens for privacy policies that are being broadcast over a digital stream. We are building standard formats for these privacy policies so that all sensors will speak the same language that your personal privacy assistant will be able to understand.