Categories
Philosophy

Technological Vulnerability

As every new systemic weakness and information system vulnerability emerges, I can never quite escape a wistful philosophical reflection on the core problems and generalised solutions which might yet exist in this complex space. If vulnerability and insecurity is an endemic and irreducible property of information systems as a function of the intractable presence of […]

Categories
technology

Information Technology is Implicitly Insecure

The discussion that no one (like  anywhere) appears willing to have is that from the very inception of these information technologies, doubt and uncertainty has been endemic and irreducible. Turing’s proof of the implicit undecidability of computation took its recursive cues from Gödel’s prime number shenanigans in the Incompleteness proof. These systems are first and […]

Categories
technology

Ransomware Attacks On Hospitals: Acts of War?

Implicit and endemic grey-zone ambiguities mean that this might never be attributed to anything other than (yet) another heartlessly self-serving criminal enterprise that is leveraging the inflated value of hospitals and health data during a public health crisis. I expect there are some logical and legal hurdles in defining acts of war this way. Not […]

Categories
technology

COVID-19, Cybersecurity and an Underlying Enigma

“The joint statement did not name any of the attacked organizations, but two people familiar with the matter said one of the targets was Gilead, whose antiviral drug remdesivir is the only treatment so far proven to help patients infected with COVID-19. The hacking infrastructure used in the attempt to compromise the Gilead executive’s email […]

Categories
Digital

Unhackable Systems ?

Creating an “unhackable” system is a lofty aspiration; systemic closure is an implicit logical problem.

Categories
culture

Digital Insecurity is the new Digital Security

The reason that no one has been able to provide sufficient, comprehensive and integrated responses to digital security is that no sufficient, comprehensive and integrated response to digital security actually exists.