How China’s Hacking Entered a Reckless New Phase
China has increasingly relied on contractors for its hacking, which opens the door to all kinds of criminal behavior.
How China’s Hacking Entered a Reckless New Phase Read MoreArticles from sources such as magazines, newspapers & blogs.
China has increasingly relied on contractors for its hacking, which opens the door to all kinds of criminal behavior.
How China’s Hacking Entered a Reckless New Phase Read MoreAlthough this seems like a very tedious prolonged process, we know that it takes less than seconds for a web page to render after we hit enter on our keyboard. All of these steps happen within milliseconds before we could even notice.
What happens when you type a URL in the browser and press enter? Read MoreMaybe you’re in the camp of people who worry that these companies have too much access to our purchases, our movements, our social networks—and perhaps even our thoughts. Maybe you’re disturbed by the concentration of so much economic power in a handful of companies built on the West Coast’s fault lines. Or maybe you want them to have less insight into your life so they have less sway over our society. But how? How do you reduce their power? Is it even possible?
The common retort to these concerns is that you should “just stop using their services.” So I decided to try.
Over the course of five weeks, I blocked Amazon, Facebook, Google, Microsoft, and Apple one at a time, to find out how to live in the modern age without each one. To end my experiment, I’m going to see if I can survive blocking all five at once.
I Cut the ‘Big Five’ Tech Giants From My Life. It Was Hell Read MoreAs consumers, we are afforded only a few avenues of acceptable dissent—the most reasonable of which is that, if you don’t like what a company is doing, you can move your money and data elsewhere. But increasingly this option is unavailable to us.
Want to Really Block the Tech Giants? Here’s How Read MoreAs the Signal protocol becomes the industry standard, it’s worth understanding what sets it apart from other forms of end-to-end encrypted messaging.
Hacker Lexicon: What Is the Signal Encryption Protocol? Read More“After two decades of Internet development under the Communist Party’s firm leadership, [China’s Internet czar, Lu Wei] said, his country had struck the correct balance between ‘freedom and order’ and between ‘openness and autonomy.’” – BEHIND THE FIREWALL: How China tamed the Internet | This is part 1 of 6 of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.
China’s scary lesson to the world: Censoring the Internet works Read More“I hope one day I’ll live in a country where I have the freedom to write any code I like without fearing.” – BEHIND THE FIREWALL: How China tamed the Internet | This is part 2 of 6 of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.
Internet activists are finding ways around China’s Great Firewall Read More“I just want freedom of speech without fear.” – BEHIND THE FIREWALL: How China tamed the Internet | This is part 3 of 6 of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.
The Internet was supposed to foster democracy. China has different ideas. Read More“The truth is that behind the Great Firewall — the system of censorship designed to block content that could challenge the Chinese Communist Party — China’s tech scene is flourishing in a parallel universe.” – BEHIND THE FIREWALL: How China tamed the Internet | This is part 4 of 6 of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.
America wants to believe China can’t innovate. Tech tells a different story. Read More“This is what China calls “Internet Plus,” but critics call a 21st-century police state.” – BEHIND THE FIREWALL: How China tamed the Internet | This is part 5 of 6 of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.
China’s plan to organize its society relies on ‘big data’ to rate everyone Read More“For some highflying U.S. Internet businesses, the China dream is fading; for others, it looks radically different from what they had hoped.” – BEHIND THE FIREWALL: How China tamed the Internet | This is part 6 of 6 of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.
U.S. companies want to play China’s game. They just can’t win it. Read MoreIn law and in practice, China is creating the world’s largest online thought prison. It turns the idea of the Internet as a force for freedom on its head, and as China goes, so go other tyrants. From Vietnam to Saudi Arabia, from Russia to Turkey, the age of Internet repression has blossomed.
China’s vast Internet prison Read MoreThe country’s cyber forces have raked in billions of dollars for the regime by pulling off schemes ranging from A.T.M. heists to cryptocurrency thefts. Can they be stopped?
The Incredible Rise of North Korea’s Hacking Army Read MoreHere’s the bigger picture of what all this guidance from governments and tech companies alike is recognising: security is increasingly about a composition of controls which when combined, improve the overall security posture of a service. What you’ll see across this post is a collection of recommendations which all help contribute to a more robust solution by virtue of complementing one another.
Passwords Evolved: Authentication Guidance for the Modern Era Read MoreWho invented the computer password?
The World’s First Computer Password? It Was Useless Too Read MoreThis is the story, then, of how another first microprocessor, a secret one, came to be—and of my own entwinement with it. The device was designed by a team at a company called Garrett AiResearch on a subcontract for Grumman, the aircraft manufacturer. It was larger, it was a combination of six chips, and it performed crucial functions for the F-14 Tomcat fighter jet, which celebrates the 50th anniversary of its first flight this week.
The Secret History of the First Microprocessor, the F-14, and Me Read MoreOur nation’s failure to invest in information technology has severely limited our Covid response. A federal chief experience officer could change that.
The US Government Needs to Invest in Digital Design Read MoreGoogle’s claim to “organize the world’s information and make it universally accessible and useful” has earned it an aura of objectivity. Its dominance in search, and the disappearance of most competitors, make its lists of links appear still more canonical. An experimental new interface for Google Search aims to remove that mantle of neutrality.
A New Tool Shows How Google Results Vary Around the World Read MoreThe retail empire is obsessed with your data. But is the convenience worth giving up your personal information?
All the Ways Amazon Tracks You—and How to Stop It Read More