Is cyber security a complex game? Of course, it (i.e cyber) is all a game – of probability, of information entropy, of indefinitely-extensible logical or material systems and of successfully negotiating the vast and hyper-inflating, self-gravitating referential spaces of technology, communication and psychological or socioeconomic and ideological motivations that provide momentum here. To attenuate an […]
Tag: cyber
Cyber: Hidden Patterns
Consider the many ways that the cyber arms-race is precisely this – a procedurally-incremental measure, counter-measure, counter-counter-measure. The hyper-inflating combinatorial possibility space of attack and defence as a gestalt creates it’s own momentum and self-propagating, patterned structure(s) and open or extensible system(s). The evolutionary nature of this process is inescapable. Each act of interdiction then […]
Context: Like many other Governments around the world, the Australian Government is seeking to use mobile device tracking technology to assist suppressing the COVID-19 virus through contact tracing. The Australian Government has found itself as a valuable pawn in a corporate game of power and profiteering. The Australian people have found themselves and their data […]
“The joint statement did not name any of the attacked organizations, but two people familiar with the matter said one of the targets was Gilead, whose antiviral drug remdesivir is the only treatment so far proven to help patients infected with COVID-19. The hacking infrastructure used in the attempt to compromise the Gilead executive’s email […]
…as a general observation: All of this (shared) online aspiration to reflexively self-validating identity-construction and participatory meaning-generation masks a howling vacuum of dissimulated subjectivity. We seek self-expression but no such endpoint exists, no epistemogical closure or certainty and (certainly) nothing even vaguely approximating to that monster-image of projected, illusory control that stares back at us […]
Cyber security is now just a part of everyday life. Update, update, update… all this requires is a sufficiently entertaining marketing campaign to elaborate and celebrate the fulfilment of a life spent in the gamified Panopticon of endless technical paranoia and system updates; sitcoms and lifestyle gurus explaining the invaluable personal experience of incessant technical […]
An encrypted internet for all? An impressive technology, to be sure, but the nature and the essence of this game of information assurance and technological systems is surely that – not only does a ratchet up the ladder of sophisticated security add complexity (and an associated information entropy regarding degrees of freedom) to a context […]
The accelerating hyper-inflation of information and communications technology networks and systems is an overextended structural entity. The primary reason it does not immediately collapse back upon itself is the existence of uncertainty, useful ambiguity and logical entropy. The more components and logical relationships we have, the more those systems themselves generate further artefacts, abstractions and […]
The whole cybersecurity enterprise seems to be built upon a suite of psychological and culturally-reflexive assumptions that assert that there exists even a possibility of logical or systemic closure. No such closure or completion is possible and this is rarely acknowledged.
The Nasdaq will now be protected by a centaur team of human analysts and deep learning systems. The broader context of autonomous network and data system defence is clearly an accelerating arms race. If there is sufficient perceived benefit to be derived to offset the cost of development, which – as the pursuit of profit […]
Cyber security is a fascinating and rapidly evolving problem-space. What possible solutions exist in regards to coordinated governance and oversight? If a centralised software and hardware development methodology iss used – compliance to formal standards could be assured but the (logically and materially inevitable) emergence of vulnerability and exploit would mean that this systemic coherence […]
Here is some interesting content on the topic of identifying fake news and media content Verifying online information: The absolute essentials. Related to this – AI is rapidly becoming proficient at generating compelling, targeted falsehoods and dissimulating sources across diverse media artefacts, channels and contexts. In information security there is a turn towards entirely automated […]