Context: Utah cyberattacks on the rise as millions paid out in new ‘double-extortion’ ransomware schemes Does there ever come a point at which the accelerating combinatorial complexity of this context transcends human aptitude to comprehend and mitigate the hyper-inflating entropy of the problem-space? I imagine that as long as human brains, incentives and motivations are […]
The perceived value of any particular information system, entity or artefact is directly proportional to the combined resources applied to protect it from unauthorised access. It is only as a function of the most simply-conceived models and idealised frameworks that such a dynamical system could ever remain static and unchanging. The reality is that complex […]
The discussion that no one appears willing to have is that from the very inception of these information technologies, doubt and uncertainty has been endemic and irreducible. Turing’s proof of the implicit undecidability of computation took its recursive cues from Gödel’s prime number shenanigans in the Incompleteness proof. These systems are first and foremost open […]
“The joint statement did not name any of the attacked organizations, but two people familiar with the matter said one of the targets was Gilead, whose antiviral drug remdesivir is the only treatment so far proven to help patients infected with COVID-19. The hacking infrastructure used in the attempt to compromise the Gilead executive’s email […]
A game of information, influence and seeded (or targeted) turbulence is unlikely to be winnable (or won) by reproducing and reinforcing the structural, organisational components that merely reproduce and self-validate the axioms, grammars and rules of that game. These games are won by rewriting the rules; by extending an existing grammar and logical framework in […]
Creating an “unhackable” system is a lofty aspiration; systemic closure is an implicit logical problem.
The reason that no one has been able to provide sufficient, comprehensive and integrated responses to digital security is that no sufficient, comprehensive and integrated response to digital security actually exists.