As every new systemic weakness and information system vulnerability emerges, I can never quite escape a wistful philosophical reflection on the core problems and generalised solutions which might yet exist in this complex space. If vulnerability and insecurity is an endemic and irreducible property of information systems as a function of the intractable presence of […]
Categories