Back to Results

HOUSE_OVERSIGHT_018341.jpg

Source: HOUSE_OVERSIGHT  •  other  •  Size: 0.0 KB  •  OCR Confidence: 85.0%
Download Original Image

Extracted Text (OCR)

an exploit.15¢ But the real drive to get inside is about more than an adrenaline rush. Remember that network power, the power that we're trying to figure out how to bend and shape for our own security, exists in a kind of dynamic tension. It’s like a stretched, taut fabric spread between concentrated cores and billions of connected users or devices. The logic of spreading and distributed power, the force that makes the network bigger, is driven by Baran’s principle of open design, and by our own hunger for communications and connection and cool new devices. But there is another side to this tension. In a sense, over the years, a whole set of hot, infectious pressures descended on the network of values and friendships and easy cooperation of the Hack-Tic days. “Be generous in what you receive,” had let the networks of our age grow at an incredible pace, but at the price of vulnerability, of commercial ambition, and of an eerie technological lemma that what made the systems faster and stronger might also kill them. A change in culture of the digital elite, naturally, followed. The brutal, inarguable, profitable demands of power and politics had cracked apart the unique social webs of the HacTic era. I did not like watching this sad evolution; none of us did, but anyhow it has produced the world in which our new sensibility will have to operate. The openness that we loved and craved in so many areas of life, from our minds to our markets, had now become a liability. “I remember what the Internet was like before it was being watched and there had never been anything in the history of man that is like it,” Edward Snowden once observed, nostalgic for the datascape he saw melt away during his time at the NSA. 157 I realize now that there is a whole new generation of young programmers that won’t ever know that original generous ethos of a place like Hacktic, a fresh cohort of the digital age that operates at levels of technical mastery far beyond anything we might have imagined in the Citicorp Tower basement 20 years ago. They will confront endless battles to get inside and exploit and make “weird” the cores of network power. They will know and design and manage instead a world of gates, built for protection. Their instincts will be for opacity and control, not openness and generosity. Invariably this shift will affect the design of the systems this new generation builds which will, in turn, affect all of us. The black boxes and the crackers are in a dance, now, a sort of dangerous evolutionary waltz that offers a foretaste of what you and I will face as we consider the problems of attack and defense and strategy in a networked age!*®. It reminds 156 There’s arush: Wael Khalifa, Kenneth Revett and Abdel-Badeeh Salem “In the Hacker’s Eye: The Neurophysiology of a Computer Hacker”, in Global Security, Safety and Sustainability & e-Democracy Volume 99 of the series Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, (Berlin: Springer), 112-119 157 “J remember what the Internet was like”: Snowden interview in CITIZENFOUR, Laura Poitras (2015) 158 The black boxes: Nikos Virvilis, Dimitris Gritzalis, Theodoros Apostolopoulos, “Trusted Computing vs. Advanced Persistent Threats: Can a defender win this game?” 2013 IEEE 10th International Conference on Ubiquitous Intelligence & 109 HOUSE_OVERSIGHT_018341

Document Preview

HOUSE_OVERSIGHT_018341.jpg

Click to view full size

Document Details

Filename HOUSE_OVERSIGHT_018341.jpg
File Size 0.0 KB
OCR Confidence 85.0%
Has Readable Text Yes
Text Length 3,413 characters
Indexed 2026-02-04T16:34:47.312644

Related Documents

Documents connected by shared names, same document type, or nearby in the archive.

Ask the Files