Security Cyclone

Spread the love
Reading Time: < 1 minute

Security. Let’s open the discussion.

I used to write long preaching texts about subject X, whatever it was. Now, it would be interesting to see what kinds of results we can get by anonymously co-writing a piece of blog. So, jump in. Comment here. 🙂

Subjects (not exhaustive list)

– round up of security threats (technical, social, cognitive, active, passive, blackmail, scam, bot-generated non-intentional, …)

– how the methods of identification vary from each other (and why..). What kinds of effects the mosaic of ID methods brings to use scenarios? Eg. people go around the security. But what would be a reliable single point of id-tech, for global use? There’s always the argument for national security, trust, etc.

– security changes every day! An unfortunate fact. Going in the Internet is like driving in traffic; the scenario is different

– sociality is both a defense, but it’s also prone to push people into making errors they wouldn’t do alone

– desktop laptop mobile Eyetap – convergence? But still different

– plausibility

– your privacy record; Google Dashboard, Facebook,, ordinary Google search, record-straightening services, etc.

– how does something in web get credibility? Do people believe or don’t they? What makes the difference. How individuals, the media, and other entities try to influence social credibility, why, and for what costs?

– how long are records kept? No one knows actually.

Facebook Comments

Published by jukkasoft

Hi! A bit updated description. Code enthusiasta, technology optimist, but also a realist. In my blog I wrote 80% of technology related articles, mostly in English and Finnish. I like to envision and ponder about things, how life could be, what we are doing wrong today, and so on. "Invented" a facebook -like system in 2000, as a short product pamphlet. Haven't yet realized the 20+ ideas that might have become big things. Maybe learning this skill one of these days!

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: