Toggle light / dark theme

IN AN AGE of nonstop breaches and hacks, getting a handle on your own digital security matters more than ever. But everyone has their own threat model—a set of concerns unique to themselves. The average smartphone user doesn’t need to know what a Faraday cage is; an NSA contractor probably already has a good grasp of security basics. (Or … do they?) In this guide, we’ve included a few ways to improve your online security posture based on those different levels of risk. These won’t prevent the next megabreach or banish ransomware from the earth. They’re not all-encompassing. But they’ll help get you in the mindset of the types of steps you should be taking based on your particular situation. And they’ll help ensure that the next time you read one of those paralyzing headlines, it doesn’t apply to you.


In an age of nonstop breaches and hacks, getting a handle on your own digital security matters more than ever. But everyone has their own threat model—a set of concerns unique to themselves. The average smartphone user doesn’t need to know what a Faraday cage is; an NSA contractor probably already has a good grasp of security basics. (Or … do they?) In this guide, we’ve included a few ways to improve your online security posture based on those different levels of risk. These won’t prevent the next megabreach or banish ransomware from the earth. They’re not all-encompassing. But they’ll help get you in the mindset of the types of steps you should be taking based on your particular situation. And they’ll help ensure that the next time you read one of those paralyzing headlines, it doesn’t apply to you.

Read more

As digital innovations continue to transform the way we live, a lot of things we once took for granted are falling by the wayside. Paper money and coins could soon be among them.

The use of digital payments in all forms is fast becoming commonplace. A cashless society, once considered remote if not unimaginable, is now more imminent, with staggering amounts of transactions being digitally processed daily. In Nordic countries, especially Sweden and Denmark, the majority of all transactions are now made through electronic or digital means.

Governments around the world are working to prepare their citizens to fully benefit from a digital future. India, for example, has hundreds of millions of people in the database of its Aadhaar biometric identity and payment system. But the country’s Supreme Court recently ruled that the system could compromise citizens’ fundamental right to privacy, underscoring one of the key concerns about the new digital era.

Read more

Israel notified the NSA, where alarmed officials immediately began a hunt for the breach, according to people familiar with the matter, who said an investigation by the agency revealed that the tools were in the possession of the Russian government.

Israeli spies had found the hacking material on the network of Kaspersky Lab, the global anti-virus firm under a spotlight in the United States because of suspicions that its products facilitate Russian espionage.

Last month, the Department of Homeland Security instructed federal civilian agencies to identify Kaspersky Lab software on their networks and remove it on the grounds that “the risk that the Russian government, whether acting on its own or in collaboration with Kaspersky, could capitalize on access provided by Kaspersky products to compromise federal information and information systems directly implicates U.S. national security.” The directive followed a decision by the General Services Administration to remove Kaspersky from its list of approved vendors. And lawmakers on Capitol Hill are considering a governmentwide ban.

Read more

David Brin: “Our midweek posting resumes the ongoing saga of transparency and freedom, and how (surprise?) each year’s declared “secure” system gets stripped bare, in the next. Now it’s Yahoo and Equifax and Billions of records. Millions of sincere people can see an Orwellian nightmare looming. Yet, the common reflex is to call for more shadows and walls! For us to HIDE from elites! It won’t work. It cannot work. It will never work. But there is an alternative. The very same trick that got us our freedom and wealth, in the first place.”

“We will not preserve freedom by hiding. Nor will it ever be possible to conceal info from elites. Moreover, that is not how we got the freedom that we already have.”

“We will remain free by aggressively applying these tools upon all elites. It is the only way we ever got freedom and it is the only way we can retain it.”


The reason why people will always have a hard time believing in the idea of reciprocity in transparency is that it that knowing the elite’s misbehavior is completely useless unless you have some way to punish them. Or to put it in this little dialogue: Elite: I can know everything about you, peon, including your treasonous thoughts. Peon: I also know everything about you, including your treasonous actions. Elite: That’s cute. I also have a death squad. What you gonna do about it, insect? Peon: Oh… Forgot about the death squad. Without some way for mister peon to counter act the traditional strengths of elites, ie: money, power, lackeys, brute force, he is going to be very reticent to give up his one advantage of stealth.

Read more

Tattoos are fast becoming more than just a means of self-expression: soon they could be used for more practical applications, like tracking blood alcohol levels or turning the skin into a touchscreen. Now, a team from Harvard and MIT has developed a smart ink that could make for tattoos that monitor biometrics like glucose levels, and change color as a result.

Currently, bodily biomarkers can be monitored through a wardrobe-load of wearables, but they usually need batteries for power and wireless communication systems to transmit data. Using biosensitive inks (bio-inks), the Harvard and MIT design is self-contained, and since it works on simple chemical reactions it doesn’t require power for any data processing or transmission.

The inks interact with the body’s interstitial fluid, which transfers nutrients into cells and carries waste out of them. The fluid works closely with blood plasma, meaning it acts as a decent indicator of the chemical concentrations in the blood at a given time.

Read more

To help you understand the significance of this, in terms of cameras, we’re looking at 6 times more than the total number of our global population today. And in terms of sensors, we’re looking at 133 times more than the total number of our global population.

To quote economics theorist Jeremy Rifkin at length:

While privacy has long been considered a fundamental right, it has never been an inherent right. Indeed, for all of human history, until the modern era, life was lived more or less publicly, as befits the most social species on Earth. As late as the sixteenth century, if an individual was to wander alone aimlessly for long periods of time in daylight, or hide away at night, he or she was likely to be regarded as possessed. In virtually every society that we know of before the modern era, people bathed together in public, often urinated and defecated in public, ate at communal tables, frequently engaged in sexual intimacy in public, and slept huddled together en masse.

Read more

Breakthroughs in biometric science mean future troops will fight with weapons that understand them — inside and out.

Imagine a group of volunteers, their chests rigged with biophysical sensors, preparing for a mission in a military office building outfitted with cameras and microphones to capture everything they do. “We want to set up a living laboratory where we can actually pervasively sense people, continuously, for a long period of time. The goal is to do our best to quantify the person, the environment, and how the person is behaving in the environment,” Justin Brooks, a scientist at the Army Research Lab, or ARL, told me last year.

ARL was launching the Human Variability Project, essentially a military version of the reality- TV show Big Brother without the drama. The Project seeks to turn a wide variety of human biophysical signals into machine-readable data by outfitting humans and their environment with interactive sensors.

Read more