Differences between revisions 1 and 2
Revision 1 as of 2020-02-28 19:40:51
Size: 22
Comment:
Revision 2 as of 2020-02-28 19:52:05
Size: 579
Comment:
Deletions are marked like this. Additions are marked like this.
Line 2: Line 2:
== Bruce Schneier Central 005.8 s359d 2015 ==

Surveillance technologies create assymetries, individuals trading freedom for convenience. Lots of worries in this book, take home message: minimize large transactions, use cash, turn off your cell phone, travel with borrowed/rented equipment.

Encryption can be strong, but it rests on vulnerable, exploitable platforms and weak endpoints. If everyone encrypts, surveillance becomes a lot more expensive. But so does all that encrypting, which I don't have enough time for.

Lots more in the book.

Data And Goliath

Bruce Schneier Central 005.8 s359d 2015

Surveillance technologies create assymetries, individuals trading freedom for convenience. Lots of worries in this book, take home message: minimize large transactions, use cash, turn off your cell phone, travel with borrowed/rented equipment.

Encryption can be strong, but it rests on vulnerable, exploitable platforms and weak endpoints. If everyone encrypts, surveillance becomes a lot more expensive. But so does all that encrypting, which I don't have enough time for.

Lots more in the book.

DataAndGoliath (last edited 2020-02-28 19:52:05 by KeithLofstrom)