tsuomela + security   199

Common-Knowledge Attacks on Democracy by Henry Farrell, Bruce Schneier :: SSRN
"Existing approaches to cybersecurity emphasize either international state-to-state logics (such as deterrence theory) or the integrity of individual information systems. Neither provides a good understanding of new “soft cyber” attacks that involve the manipulation of expectations and common understandings. We argue that scaling up computer security arguments to the level of the state, so that the entire polity is treated as an information system with associated attack surfaces and threat models, provides the best immediate way to understand these attacks and how to mitigate them. We demonstrate systematic differences between how autocracies and democracies work as information systems, because they rely on different mixes of common and contested political knowledge. Stable autocracies will have common knowledge over who is in charge and their associated ideological or policy goals, but will generate contested knowledge over who the various political actors in society are, and how they might form coalitions and gain public support, so as to make it more difficult for coalitions to displace the regime. Stable democracies will have contested knowledge over who is in charge, but common knowledge over who the political actors are, and how they may form coalitions and gain public support. These differences are associated with notably different attack surfaces and threat models. Specifically, democracies are vulnerable to measures that “flood” public debate and disrupt shared decentralized understandings of actors and coalitions, in ways that autocracies are not. "
democracy  political-science  technology  information-science  security 
november 2018 by tsuomela
Tails - Privacy for anyone anywhere
"Tails is a live operating system that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to: use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. "
privacy  security  operating-system 
april 2017 by tsuomela
« earlier      
per page:    204080120160

related tags

9-11  21c  academic  academic-lab  action  activism  advertising  advice  airport  algorithms  alternative  america  analysis  anonymity  antispam  apple  apps  archaeology  audience  authority  awareness  behavior  bias  big-data  blockchain  book  borders  browser  business  business-model  campaign  captcha  career  cellphone  censorship  chat  children  china  class  classification  cloud-computing  cognition  collaboration  communication  communications  community  complexity  computer  computer-science  computers  computing  conference  consent  constitution  contracts  conversation  corporate  country(Mexico)  country(Russia)  courts  covert  credit  credit-cards  crime  criticism  crowdsourcing  cryptography  culture  cyberspace  cyberwar  cypherpunk  dark-web  data  data-curation  database  decentralized-web  defense  democracy  depression  design  devices  digital  digital-humanities  diplomacy  disarmament  disaster  distributed  documentation  documents  doxxing  dunbar-number  economics  education  election  electricity  email  embedded  emotion  encryption  energy  enlightenment  ephemeral  espionage  ethics  ethics-of-care  evolution  excerpt  expertise  facebook  failure  fairness  fear  feudalism  forecasting  foreign-affairs  foreign-policy  forgery  framing  freedom  fun  future  games  geek  gender  geopolitics  git  globalization  google  government  grid  groups  guide  guidelines  gun-control  guns  hackers  hacking  hint  history  hoax  human  humor  ideology  illusion  im  images  immigration  incentive-centered-design  income  industry  information  information-science  infrastructure  institutes  intellectual-property  intelligence  international  internet  internet-of-things  intuition  iphone  irb  ivy-league  journal  journalism  journals  language  laptop  law  legend  linux  literacy  liveblogging  location  macintosh  magazine  malware  management  manual  mapping  markets  mathematics  media  media-reform  medicine  middle-class  militarism  military  military-indusrial-complex  military-industrial-complex  mobile  mobile-phone  money  monitor  moral-panic  myth  nation-state  national-security  neoliberalism  network  networking  networks  news  novice  nsa  nuclear  obama  online  open-source  operating-system  opportunity  opsec  optimism  p2p  paranoia  parent  password  peace  people-bruceschneier  perception  persistence  personal  pessimism  police  policy  political-science  politics  poll  positive  poster  power  precedent  preparation  president  privacy  professional-association  programming  progressive  proliferation  propaganda  protocol  proxy  psychology  psychopathology  punishment  quick-and-dirty  ratfucking  recommendations  records  reference  regulation  reputation-management  research  review  risk  safety  school  school(UToronto)  science  screencapture  search  secrecy  security  self-enforcing  sensitive-data  service  sf  shopping  si  silicon-valley  smartgrid  social-justice  social-media  software  solutionism  space  spam  speech  spying  ssh  standards  statistics  storage  strangers  strategy  students  surveillance  symbols  sysadmin  systems  technology  technology-critique  technology-effects  teenager  terror  terrorism  theater  threats  tip  tips  tolerance  tool  tools  tracking  training  transparency  travel  trust  umich  unintended-consequences  usability  user  video  vpn  vulnerability  wall-street  war  warnings  weapons  web  web-archive  web-development  web-services  weblog-group  weblog-tools  wikileaks  windows  wireless  wordpress 

Copy this bookmark: