March 2014 Archives

"We spend our waking hours studying systems of all types. We subvert them. We fix and improve them. We secure them. Do you even wonder why it's then so easy for us to profit from them?" ~@ralphlogan


Adam Shostack and Threat Modeling

Adam Shostack (@adamshostack) discusses Threat Modeling on Mozilla Air. Excellent presentation (so far)

MIT Big Data Privacy Workshop

Reading up on location based privacy...below are a few articles spanning 7 years that tackle the issues from a few different angles. Brush, Krumm, and Scott's paper is especially interesting as they look specifically at end-user values of location data privacy, what and how they chose to protect that data, and how they share that data.



On multidisciplinary teams...

"It is hardly possible to overrate the value...of placing human beings in contact with persons dissimilar to themselves, and with modes of thought and action unlike those with which they are familiar....Such communication has always been, and is [particularly] in the present age, one of the primary sources of progress."

John Stuart Mill,
Principles of Political Economy, 1848