Berto Jongman: 20 Years Late, Council on Foreign Relations Has a Stab at Thinking About Cyber + Cyber Meta-RECAP

Defending an Open, Global, Secure, and Resilient Internet Overview This CFR-sponsored Independent Task Force warns that “escalating attacks on countries, companies, and individuals, as well as pervasive criminal activity, threaten the security and safety of the Internet.” The number of “state-backed operations continues to rise, and future attacks will become more sophisticated and disruptive,” argues …

Rickard Falkvinge: NSA is Stasi Scaled Global + Naked NSA RECAP

Stasi vs. The NSA Back To Back: Who’s Worse – A Visual Guide Privacy:  If you were to compare the evil, reprehensible Stasi to the NSA side by side in a visual comparison, who’s the worse surveillance hawk? The people over at OpenDataCity have put together a nice visual guide with astonishing results. We tend …

99% Android Devices Totally Open — How Long Before Open Source Security and Code Level Integrity Are Appreciated?

Mobile security startup Bluebox Security has unearthed a vulnerability in Android’s security model which it says means that the nearly 900 million Android phones released in the past four years could be exploited, or some 99% of Android devices. The vulnerability has apparently been around since Android v1.6 (Donut), and was disclosed by the firm to …

Jean Lievens: Rachel Botsman – How We Treat People Will Craft Our World – Collaborative Consumption and the Sharing Economy

Rachel Botsman: How We Treat People Will Ultimately Drive Our World Rachel Botsman advocated the advantage of reputation capital at Wired Money in London yesterday. She noted that an economy based on reputation is incredibly empowering, and will take us away from a financial world “based largely on faceless transactions and moving us to an …

Richard Stallman: Free Software Supporter Issue 63, June 2013

Free Software Supporter Issue 63, June 2013 TABLE OF CONTENTS Free Software Foundation statement on PRISM revelations A second FSF-certified device from ThinkPenguin: long-range USB Wifi adapter with Atheros chip April’s English translation team is recruiting volunteers MediaGoblin 0.4.0: Hall of the Archivist Announcing the newest fully free GNU/Linux distribution: LibreWRT FSF polo shirts have …

Jean Lievens: The Do It Yourself Maker Movement

“In this chapter, we investigate the maker subculture and its manifestation in fabbing ecosystem. In other words, how the love of making things, hacking, tinkering, circuit bending and doing/making everything so-called DIY is a significant peculiarity of Fab Labs. We first look at the meaning and the emergence of the maker subculture and the development …

Berto Jongman: Security for the Internet of Things — Cars Can Be Hijacked and Used to Murder People — This Matters

Rethinking Security for the Internet of Things by Chris Clearfield Harvard Business Review, June 26, 2013 Cyber attacks, once primarily directed against networks to steal confidential information and wreak virtual havoc, have begun to expand and are now directly affecting the physical world. For example, the recent hacking of the Associated Press’s Twitter account by …