<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>counterinterlligence &#8211; Software, Fitness, and Gaming &#8211; Jesse Warden</title>
	<atom:link href="https://jessewarden.com/tag/counterinterlligence/feed" rel="self" type="application/rss+xml" />
	<link>https://jessewarden.com</link>
	<description>Software &#124; Fitness &#124; Gaming</description>
	<lastBuildDate>Sun, 10 Nov 2013 14:58:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://jessewarden.com/wp-content/uploads/2016/08/cropped-Lambda2-32x32.png</url>
	<title>counterinterlligence &#8211; Software, Fitness, and Gaming &#8211; Jesse Warden</title>
	<link>https://jessewarden.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Trade Offs in Cyber Security by Dan Geer</title>
		<link>https://jessewarden.com/2013/11/trade-offs-in-cyber-security-by-dan-geer.html</link>
					<comments>https://jessewarden.com/2013/11/trade-offs-in-cyber-security-by-dan-geer.html#comments</comments>
		
		<dc:creator><![CDATA[JesterXL]]></dc:creator>
		<pubDate>Sun, 10 Nov 2013 14:53:57 +0000</pubDate>
				<category><![CDATA[Blogging]]></category>
		<category><![CDATA[counterinterlligence]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[intelligence]]></category>
		<category><![CDATA[networkneutrality]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[socialengineering]]></category>
		<category><![CDATA[telecommunications]]></category>
		<guid isPermaLink="false">http://jessewarden.com/?p=4434</guid>

					<description><![CDATA[Some wonderfully choice quotes from this cyber security essay by Dan Geer. Quite long, but (somewhat?) clearly illustrates the challenges of living in a society where there is so much data about you easily accessible, even if you don&#8217;t actually intentionally contribute. Additionally, he covers the increasing struggle how we conform to these loss of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Some wonderfully choice quotes from this <a href="http://geer.tinho.net/geer.uncc.9x13.txt">cyber security essay by Dan Geer</a>. Quite long, but (somewhat?) clearly illustrates the challenges of living in a society where there is so much data about you easily accessible, even if you don&#8217;t actually intentionally contribute. Additionally, he covers the increasing struggle how we conform to these loss of freedoms which is the antithesis of being an American, yet we keep doing it. While he has a call out to fight it, as far as I can see, there aren&#8217;t any easy/obvious solutions, nor did he provide any.</p>
<blockquote><p>In the 21st century, we have a physical army of volunteers but a digital army of conscripts.</p></blockquote>
<p><span id="more-4434"></span></p>
<blockquote><p>One is not anti-government to say that doing a good job at preventing terrorism is better than doing a perfect job.</p></blockquote>
<blockquote><p>We will soon live in a society where identity is not an assertion like &#8216;My name is Dan,&#8217; but rather an observable like &#8216;Sensors confirm that is Dan.&#8217; With enough sensors, concentration camps don&#8217;t need to tatoo their inmates.</p></blockquote>
<blockquote><p>Hello, Uncle Sam here.</p>
<p>You can charge whatever you like based on the contents of what you are carrying, but you are responsible for that content if it is illegal; inspecting brings with it a responsibility for what you learn.</p>
<p>&#8211; or &#8211;</p>
<p>You can enjoy common carrier protections at all times, but you can neither inspect nor act on the contents of what you are carrying and can only charge for carriage itself. Bits are bits.</p>
<p>Choose wisely. No refunds or exchanges at this window.</p></blockquote>
<blockquote><p>We learned in the financial crisis that there are levels of achievable financial return that require levels of unsustainable financial risk. We learned that lesson on the large scale and on the small, on the national scale and on the personal one. I would like us to not have to learn the parallel lesson with respect to data that powers the good versus data that powers the bad. If we can, for the moment, think of data as a kind of money, then investing too much our own data in an institution too big to influence is just as insensate as investing too much of our own money in an institution too big to fail.</p></blockquote>
<p><a href="http://geer.tinho.net/geer.uncc.9x13.txt">http://geer.tinho.net/geer.uncc.9&#215;13.txt</a></p>
<p>via <a href="https://plus.google.com/108683401848384520995">+Richard Lord</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://jessewarden.com/2013/11/trade-offs-in-cyber-security-by-dan-geer.html/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
