Crown Jewels and Encryption Opportunities

As long as there is a need to accept, transmit and store personal and financial information, organized criminals and other self-righteous entities will attempt to breach the caretaker’s enterprise to obtain this information. Mastering the art and science of information security is an elusive quest. Few will ever achieve their goal. Few will ever reach… Read More

Laws of Power – 46

Never appear too perfect: Appearing better than others is always dangerous, but most dangerous of all is to appear to have no faults or weaknesses. Envy creates silent enemies. It is smart to occasionally display defects, and admit to harmless vices, in order to deflect envy and appear more human and approachable. Only gods and… Read More

Daily Digest for November 17th

mdpeters posted 13 items. Terrorism chiefs don’t know what they’ve censored online CN – Chinas Censorship 2.0: How companies censor bloggers New Internet Treaty Alarms Online Freedom Advocates Home Office accused of sexing-up mobile phone rescue WTO May Challenge Internet Censorship ICO chastises NHS over data losses Swiss roll Street View into court IGF censors… Read More

Laws of Power – 44

Disarm and infuriate with the mirror effect: The mirror reflects reality, but it is also the perfect tool for deception: When you mirror your enemies, doing exactly as they do, they cannot figure out your strategy. The Mirror Effect mocks and humiliates them, making them overreact. By holding up a mirror to their psyches, you… Read More