Peer2Politics
135.7K views | +0 today
Peer2Politics
on peer-to-peer dynamics in politics, the economy and organizations
Curated by jean lievens
Your new post is loading...
Scooped by jean lievens
Scoop.it!

Security Tips Every Signal User Should Know

Security Tips Every Signal User Should Know | Peer2Politics | Scoop.it
Here’s how to maximize the security of your most sensitive conversations — the ones that could be misinterpreted by an employer; be of interest to snooping governments; or allow a hacker to steal your identity.
No comment yet.
Scooped by jean lievens
Scoop.it!

4 Things To Do Immediately When Your Facebook Account Is Hacked

4 Things To Do Immediately When Your Facebook Account Is Hacked | Peer2Politics | Scoop.it
For most people, having their Facebook account hacked is a nightmare. Imagine if someone had access to all your private messages, could contact your friends, abuse your Facebook page, and delete your personal information. To avoid this, you should regularly update your password and keep other security settings tight.
No comment yet.
Scooped by jean lievens
Scoop.it!

‪[NIS Hacking Scandal] NIS Agent's Suicide Note, "My Excessive Desire to Do the Work Well..."

‪[NIS Hacking Scandal] NIS Agent's Suicide Note, "My Excessive Desire to Do the Work Well..." | Peer2Politics | Scoop.it

A senior agent in his forties who had overseen the cyber security field at the National Intelligence Service (NIS) for a long time took his own life. He left behind a suicide note mentioning the use of the controversial hacking program which the intelligence service had purchased.

No comment yet.
Scooped by jean lievens
Scoop.it!

What does the collaborative economy mean for information security? - CSO Online

What does the collaborative economy mean for information security? - CSO Online | Peer2Politics | Scoop.it
But what if the dynamic changed such that employees could use corporate and office items for their personal profit? Most firms have never thought about the concept and certainly have no processes in place to deal with it.
No comment yet.
Scooped by jean lievens
Scoop.it!

Promoting Digital Security in Tunisia at the World Social Forum

Promoting Digital Security in Tunisia at the World Social Forum | Peer2Politics | Scoop.it
Fifty thousand activists from 5,000 NGOs around the world attended the World Social Forum in Tunis last week to press for change on a wide variety of issues.
No comment yet.
Scooped by jean lievens
Scoop.it!

Cybersecurity And The Future Digital Economy - TechCrunch

Cybersecurity And The Future Digital Economy - TechCrunch | Peer2Politics | Scoop.it
Just a week ago, Director of National Intelligence James Clapper testified before Congress that his fundamental concern focuses on the “moderate, iterative..
No comment yet.
Scooped by jean lievens
Scoop.it!

Internet Security and the Limits of Open Source and Peer Production - P2P Foundation

Internet Security and the Limits of Open Source and Peer Production - P2P Foundation | Peer2Politics | Scoop.it

"Open source and peer production have been praised as organisational models that could change the world for the better. It is commonly asserted that almost any societal activity could benefit from distributed, bottom-up collaboration — by making societal interaction more open, more social, and more democratic. However, we also need to be mindful of the limits of these models. How could they function in environments hostile to openness? Security is a societal domain more prone to secrecy than any other, except perhaps for romantic love. In light of the destructive capacity of contemporary cyber attacks, how has the Internet survived without a comprehensive security infrastructure? Secrecy vs. openness describes the realities of Internet security production through the lenses of open source and peer production theories. The study offers a glimpse into the fascinating communities of technical experts, who played a pivotal role when the chips were down for the Internet after large-scale attacks. After an initial flirtation with openness in the early years, operational Internet security communities have put in place institutional mechanisms that have resulted in less open forms of social production."

No comment yet.
Scooped by jean lievens
Scoop.it!

Secrecy versus openness: Internet security and the limits of open source and pee :: TU Delft Institutional Repository

Open source and peer production have been praised as organisational models that could change the world for the better. It is commonly asserted that almost any societal activity could benefit from distributed, bottom-up collaboration — by making societal interaction more open, more social, and more democratic. However, we also need to be mindful of the limits of these models. How could they function in environments hostile to openness? Security is a societal domain more prone to secrecy than any other, except perhaps for romantic love. In light of the destructive capacity of contemporary cyber attacks, how has the Internet survived without a comprehensive security infrastructure? Secrecy vs. openness describes the realities of Internet security production through the lenses of open source and peer production theories. The study offers a glimpse into the fascinating communities of technical experts, who played a pivotal role when the chips were down for the Internet after large-scale attacks. After an initial flirtation with openness in the early years, operational Internet security communities have put in place institutional mechanisms that have resulted in less open forms of social production. 

No comment yet.
Scooped by jean lievens
Scoop.it!

Opinion: Waging war on hackers actually hurts US cybersecurity efforts - Christian Science Monitor

Opinion: Waging war on hackers actually hurts US cybersecurity efforts - Christian Science Monitor | Peer2Politics | Scoop.it
While Obama wants tougher penalties for criminal hackers, the administration can't afford to alienate good hackers working to improve security.
No comment yet.
Scooped by jean lievens
Scoop.it!

How to be Safe in the Sharing Economy

How to be Safe in the Sharing Economy | Peer2Politics | Scoop.it
How to be Safe in the Sharing Economy
No comment yet.
Scooped by jean lievens
Scoop.it!

The Nerd Scare: How the U.S. Government Is Overreacting to Hackers and ... - Slate Magazine

The Nerd Scare: How the U.S. Government Is Overreacting to Hackers and ... - Slate Magazine | Peer2Politics | Scoop.it
Among both American and British law-enforcement communities, the temptation runs strong to treat hackers and hacktivists in simplistic terms.
No comment yet.
Scooped by jean lievens
Scoop.it!

Introduction by Golan Levin :: Deep Lab Lecture Series

Deep Lab is a collective of cyberfeminist researchers, organized by STUDIO Fellow Addie Wagenknecht to examine how privacy, security, surveillance, and anonymity are problematized in the arts and society. The Deep Lab participants, all women, are an international group of new-media artists, visualization designers, data scientists, software engineers, hackers, journalists and theoreticians, who are engaged in the critical assessment of contemporary digital culture. In the second week of December, these experts will work at the STUDIO on an accelerated pressure project, and deliver four evenings of public presentations: the Deep Lab Lecture Series.
No comment yet.
Scooped by jean lievens
Scoop.it!

ID3 Hopes You’ll Opt-In to Your Own Surveillance (Op-Ed)

ID3 Hopes You’ll Opt-In to Your Own Surveillance (Op-Ed) | Peer2Politics | Scoop.it
In a move not surprising from a partner organization of DATA (the organization that assisted New York state employees to write the “BitLicense”), ID3 has announced the release of new identity-tracking software that they hope cryptocurrency companies will make a pre-condition for customers wanting to do business.
No comment yet.
Scooped by jean lievens
Scoop.it!

ERCS Common Good: Ethics and Rights in Cyber Security

ERCS Common Good: Ethics and Rights in Cyber Security | Peer2Politics | Scoop.it
ERCS - Website for an ESRC funded project on the Common Good: Ethics and Rights in Cyber Security
No comment yet.
Scooped by jean lievens
Scoop.it!

Privacy, Public Safety Collide as Terror Groups Collaborate on Social Media - Government Technology

Privacy, Public Safety Collide as Terror Groups Collaborate on Social Media - Government Technology | Peer2Politics | Scoop.it
Following a coordinated attack in Paris on Nov. 13, some are asking whether law enforcement should have access to encrypted social network platforms, like Telegram, allegedly used for terrorist planning purposes.
No comment yet.
Scooped by jean lievens
Scoop.it!

Silicon Valley Is Creating 'The Camera Panoptic...

Silicon Valley Is Creating 'The Camera Panoptic... | Peer2Politics | Scoop.it
In this powerful and indignant article, Aral Balkan – verging on ‘mad as hell and I’m not going to take this any more‘ mode, exposes the nascent total surveillance state, what he calls ‘Spyware 2.0′ and their fraudulent ‘free’ services.
No comment yet.
Scooped by jean lievens
Scoop.it!

Uber Gets Serious About Security With Latest Hire - Refinery29

Uber Gets Serious About Security With Latest Hire - Refinery29 | Peer2Politics | Scoop.it
The popular ride-hailing company hired Facebook's Chief Security Officer Joe Sullivan to head up its own security department, the New York Times reports today.
No comment yet.
Scooped by jean lievens
Scoop.it!

The Collective Intelligence: As Early as 2016, Robot Cops Will Be Patrolling Your Streets

The Collective Intelligence: As Early as 2016, Robot Cops Will Be Patrolling Your Streets | Peer2Politics | Scoop.it
As Early as 2016, Robot Cops Will Be Patrolling Your Streets
No comment yet.
Scooped by jean lievens
Scoop.it!

Data Security Is Becoming the Sparkle in Bitcoin

Data Security Is Becoming the Sparkle in Bitcoin | Peer2Politics | Scoop.it
With the price of Bitcoin plummeting, the technology that stores the currency’s transactions is gaining value as a safe and open way to keep other kinds of records.
No comment yet.
Scooped by jean lievens
Scoop.it!

Internet Security and the Limits of Open Source and Peer Production - P2P Foundation

Internet Security and the Limits of Open Source and Peer Production - P2P Foundation | Peer2Politics | Scoop.it

"Open source and peer production have been praised as organisational models that could change the world for the better. It is commonly asserted that almost any societal activity could benefit from distributed, bottom-up collaboration — by making societal interaction more open, more social, and more democratic. However, we also need to be mindful of the limits of these models. How could they function in environments hostile to openness? Security is a societal domain more prone to secrecy than any other, except perhaps for romantic love. In light of the destructive capacity of contemporary cyber attacks, how has the Internet survived without a comprehensive security infrastructure? Secrecy vs. openness describes the realities of Internet security production through the lenses of open source and peer production theories. The study offers a glimpse into the fascinating communities of technical experts, who played a pivotal role when the chips were down for the Internet after large-scale attacks. After an initial flirtation with openness in the early years, operational Internet security communities have put in place institutional mechanisms that have resulted in less open forms of social production."

No comment yet.
Scooped by jean lievens
Scoop.it!

Cyber security will shape the Internet of Things - ITProPortal

Cyber security will shape the Internet of Things - ITProPortal | Peer2Politics | Scoop.it
The premise of the Internet of Things carries with it a corollary statement; everything that can be connected to the Internet can be hacked.
No comment yet.
Scooped by jean lievens
Scoop.it!

Crowdsourcing America's cybersecurity is an idea so crazy it might just work - Washington Post (blog)

Crowdsourcing America's cybersecurity is an idea so crazy it might just work - Washington Post (blog) | Peer2Politics | Scoop.it
Given the size and complexity of the problem, we need more people to help.
No comment yet.
Scooped by jean lievens
Scoop.it!

CSE's Levitation Project: Does Mass Surveillance Prevent Terrorist Attacks? - Huffington Post Canada

CSE's Levitation Project: Does Mass Surveillance Prevent Terrorist Attacks? - Huffington Post Canada | Peer2Politics | Scoop.it
Mass trolling of internet data — as done by Canada's electronic spy agency in a project dubbed Levitation — can impede cyber spies in the hunt for extremists more than it helps, some security experts argue.
No comment yet.
Scooped by jean lievens
Scoop.it!

In Obama's war on hackers, everyone loses - Al Jazeera America

In Obama's war on hackers, everyone loses - Al Jazeera America | Peer2Politics | Scoop.it
Persecution of Barrett Brown offers chilling preview of cybersecurity proposals
No comment yet.
Scooped by jean lievens
Scoop.it!

Trackography - P2P Foundation

Trackography - P2P Foundation | Peer2Politics | Scoop.it
"project illustrates which companies track us when we read the news online, where our data travels to and how our data is handled everytime we access a media website"
No comment yet.