Difference between revisions of "Security"
(→Related news: Freedom Hosting Taken Down, Founder Arrested, Users fed Javascript Exploits) |
|||
Line 12: | Line 12: | ||
== Second Realm statement on Security == | == Second Realm statement on Security == | ||
Security starts with keeping the peace. While this might sound obvious it is nevertheless often forgotten. Keeping the peace means that one is active in not starting trouble and to stay out of harmʼs way before a conflict can start or escalate. We must refrain from provoking others to attack us by the behavior we display. It starts with not employing violence ourselves unless it happens in self-defense, not defrauding others, not breaking agreements, not bragging and challenging. Quietness, integrity and honesty combined with confidence reduces the risk of conflict greatly. | Security starts with keeping the peace. While this might sound obvious it is nevertheless often forgotten. Keeping the peace means that one is active in not starting trouble and to stay out of harmʼs way before a conflict can start or escalate. We must refrain from provoking others to attack us by the behavior we display. It starts with not employing violence ourselves unless it happens in self-defense, not defrauding others, not breaking agreements, not bragging and challenging. Quietness, integrity and honesty combined with confidence reduces the risk of conflict greatly. | ||
+ | |||
+ | == Related news == | ||
+ | *2013-08-04: [http://bitcoinmagazine.com/freedom-hosting-taken-down-founder-arrestes-users-fed-javascript-exploits/ Freedom Hosting Taken Down, Founder Arrested, Users fed Javascript Exploits] | ||
+ | *2013-07-27: [http://rt.com/news/new-zealand-protest-bill-683/ New Zealanders protest national security bill] | ||
+ | *2012-11-20: [http://www.bbc.co.uk/news/science-environment-13940928 Quantum cryptography done on standard broadband fibre] | ||
+ | *2rother] | ||
+ | *2013-06-25: [http://news.netcraft.com/archives/2013/06/25/ssl-intercepted-today-decrypted-tomorrow.html SSL: Intercepted today, decrypted tomorrow] ''- see also the Perfect Forward Secrecy setup in [[Install a new server]]'' | ||
+ | *2012-12-09: [http://boingboing.net/2012/12/09/congressman-calls-for-ban-on-3.html Congressman calls for ban on 3D printed guns] | ||
+ | *2012-10-03: [http://keccak.noekeon.org/ The Keccak sponge function family] ''- NIST selects Keccak for SHA-3'' | ||
+ | *2012-08-05: [http://articles.mercola.com/sites/articles/archive/2012/08/05/internet-security-virus.aspx If You See This Google Warning, Act Fast: Big Brother is Watching] | ||
+ | *2012-08-03: [http://www.emptyage.com/post/28679875595/yes-i-was-hacked-hard Yes, I was hacked. Hard.] ''- iCloud hack'' | ||
+ | *2012-07-30: [http://arstechnica.com/security/2012/07/broken-microsoft-sheme-exposes-traffic/ Attack against Microsoft scheme puts hundreds of crypto apps at risk] | ||
+ | *2012-06-25: [http://arstechnica.com/security/2012/06/securid-crypto-attack-steals-keys/ Scientists crack RSA SecurID 800 tokens, steal cryptographic keys - in under 15 minutes] | ||
== See also == | == See also == |
Revision as of 13:45, 5 August 2013
This few paragraphs from Bastiat's The Law is a good introduction to personal security; What, then, is law? It is the collective organization of the individual right to lawful defence.
Each of us has a natural right — from God — to defend his person, his liberty, and his property. These are the three basic requirements of life, and the preservation of any one of them is completely dependent upon the preservation of the other two. For what are our faculties but the extension of our individuality? And what is property but an extension of our faculties?
If every person has the right to defend — even by force — his person, his liberty, and his property, then it follows that a group of men have the right to organize and support a common force to protect these rights constantly. Thus the principle of collective right — its reason for existing, its lawfulness — is based on individual right. And the common force that protects this collective right cannot logically have any other purpose or any other mission than that for which it acts as a substitute. Thus, since an individual cannot lawfully use force against the person, liberty, or property of another individual, then the common force — for the same reason — cannot lawfully be used to destroy the person, liberty, or property of individuals or groups.
The assurance of physical security can be provided to members of a social mechanism in the same way as other aspects of the common vision are achieved - using a trust group based assurance system to avoid the need for a centralised institution. Members behave together as a group in alignment with the common vision to ensure fundamental shared values are maintained such as protecting them against harm and preventing them from harming others.
Informational security
Another important aspect of security concerns the assurance that our data is private and distributed. A huge population of people around the world are now realising the need to work together in alignment with the common vision, and realise that to do this we need to have full control over our information in our own hands, but at the same time we also need to take advantage of distributed storage. The only answer to really achieving this is peer-to-peer networks. The so called "cloud" services offered by centralised corporations are unable to offer true security or privacy.
Second Realm statement on Security
Security starts with keeping the peace. While this might sound obvious it is nevertheless often forgotten. Keeping the peace means that one is active in not starting trouble and to stay out of harmʼs way before a conflict can start or escalate. We must refrain from provoking others to attack us by the behavior we display. It starts with not employing violence ourselves unless it happens in self-defense, not defrauding others, not breaking agreements, not bragging and challenging. Quietness, integrity and honesty combined with confidence reduces the risk of conflict greatly.
Related news
- 2013-08-04: Freedom Hosting Taken Down, Founder Arrested, Users fed Javascript Exploits
- 2013-07-27: New Zealanders protest national security bill
- 2012-11-20: Quantum cryptography done on standard broadband fibre
- 2rother]
- 2013-06-25: SSL: Intercepted today, decrypted tomorrow - see also the Perfect Forward Secrecy setup in Install a new server
- 2012-12-09: Congressman calls for ban on 3D printed guns
- 2012-10-03: The Keccak sponge function family - NIST selects Keccak for SHA-3
- 2012-08-05: If You See This Google Warning, Act Fast: Big Brother is Watching
- 2012-08-03: Yes, I was hacked. Hard. - iCloud hack
- 2012-07-30: Attack against Microsoft scheme puts hundreds of crypto apps at risk
- 2012-06-25: Scientists crack RSA SecurID 800 tokens, steal cryptographic keys - in under 15 minutes
See also
- Privacy
- SSL
- The social mechanism
- Governance
- Introduction To Capability Based Security
- Your Cellphone is Covered in Spiders - Pragmatic Android Security - by Cooper Quintin
- Random numbers, Encryption and Hashing
- MovementMetric - authentication mechanism using simple body movements such as winking