Categories
Philosophy

Semantic Ambiguity

The dynamism and flexibility of language is simultaneously its strength and its weakness. This is a corollary of the abstract/logical and concrete/material extensibility that haunts technology as cyber (in)security but is by no means limited there. It is an irreducibly discontinuous symmetry of uncertainty that plagues all organisations and institutional contexts. The incessant invention of […]

Categories
technology

Cyber: The House Always Wins

Is cyber security a complex game? Of course, it (i.e cyber) is all a game – of probability, of information entropy, of indefinitely-extensible logical or material systems and of successfully negotiating the vast and hyper-inflating, self-gravitating referential spaces of technology, communication and psychological or socioeconomic and ideological motivations that provide momentum here. To attenuate an […]

Categories
technology

Cyber: Hidden Patterns

Consider the many ways that the cyber arms-race is precisely this – a procedurally-incremental measure, counter-measure, counter-counter-measure. The hyper-inflating combinatorial possibility space of attack and defence as a gestalt creates it’s own momentum and self-propagating, patterned structure(s) and open or extensible system(s). The evolutionary nature of this process is inescapable. Each act of interdiction then […]

Categories
technology

Is it Secure to Store Private Mobile Device COVID Tracking Data with Foreign-Owned Corporations ?

Context: Like many other Governments around the world, the Australian Government is seeking to use mobile device tracking technology to assist suppressing the COVID-19 virus through contact tracing. The Australian Government has found itself as a valuable pawn in a corporate game of power and profiteering. The Australian people have found themselves and their data […]

Categories
technology

COVID-19, Cybersecurity and an Underlying Enigma

“The joint statement did not name any of the attacked organizations, but two people familiar with the matter said one of the targets was Gilead, whose antiviral drug remdesivir is the only treatment so far proven to help patients infected with COVID-19. The hacking infrastructure used in the attempt to compromise the Gilead executive’s email […]

Categories
Philosophy

Cyber: Technology, Information, Identity and Conflict

…as a general observation: All of this (shared) online aspiration to reflexively self-validating identity-construction and participatory meaning-generation masks a howling vacuum of dissimulated subjectivity. We seek self-expression but no such endpoint exists, no epistemogical closure or certainty and (certainly) nothing even vaguely approximating to that monster-image of projected, illusory control that stares back at us […]

Categories
culture technology

The Constancy and Enduring Paranoia of Digital Security Updates

Cyber security is now just a part of everyday life. Update, update, update… all this requires is a sufficiently entertaining marketing campaign to elaborate and celebrate the fulfilment of a life spent in the gamified Panopticon of endless technical paranoia and system updates; sitcoms and lifestyle gurus explaining the invaluable personal experience of incessant technical […]

Categories
technology

Impenetrable Online Encryption: Logic Seeks to Differ

An encrypted internet for all? An impressive technology, to be sure, but the nature and the essence of this game of information assurance and technological systems is surely that – not only does a ratchet up the ladder of sophisticated security add complexity (and an associated information entropy regarding degrees of freedom) to a context […]

Categories
technology

Technological Overextension: Security, Entropy, Logical Hyperinflation

The accelerating hyper-inflation of information and communications technology networks and systems is an overextended structural entity. The primary reason it does not immediately collapse back upon itself is the existence of uncertainty, useful ambiguity and logical entropy. The more components and logical relationships we have, the more those systems themselves generate further artefacts, abstractions and […]

Categories
systems technology

Cybersecurity’s Unacknowledged Truth

The whole cybersecurity enterprise seems to be built upon a suite of psychological and culturally-reflexive assumptions that assert that there exists even a possibility of logical or systemic closure. No such closure or completion is possible and this is rarely acknowledged.

Categories
technology

“Centaur” Human/AI Teams to Guard Nasdaq

The Nasdaq will now be protected by a centaur team of human analysts and deep learning systems. The broader context of autonomous network and data system defence is clearly an accelerating arms race. If there is sufficient perceived benefit to be derived to offset the cost of development, which – as the pursuit of profit […]

Categories
technology

Cyber Security and Governance: to Centralise or not to Centralise?

Cyber security is a fascinating and rapidly evolving problem-space. What possible solutions exist in regards to coordinated governance and oversight? If a centralised software and hardware development methodology iss used – compliance to formal standards could be assured but the (logically and materially inevitable) emergence of vulnerability and exploit would mean that this systemic coherence […]