The Next Internet? Inside PARC’s Vision of Content Centric Networking | Xconomy

The fundamental idea behind Content Centric Networking is that to retrieve a piece of data, you should only have to care about what you want, not where it’s stored. Rather than transmitting a request for a specific file on a specific server, a CCN-based browser or device would simply broadcast its interest in that file, and the nearest machine with an authentic copy would respond.

Read Article.

10 Things I Learned from ‘We Are Anonymous’ | Peter Mehit

I read Parmy Olsen’s ‘We Are Anonymous’ over the weekend. It is the story of the infamous hacker collective that brought down the Church of Scientology, Pay Pal, Master Card, Visa, Sony, the FBI and CIA among their numerous conquests. It’s a fascinating read about a group based on a contradiction: A few very talented, capable, creative people performed truly heinous acts because they thought their lives were pointless. This nihilistic perspective drove them until they were caught.

The participants were young. The oldest was 28, the youngest 16. Uniformly, they were the socially awkward. They were bullied and marginalized for most of their lives. Most left the education system in middle school because they were bored or mistreated. All of them lived with parents or relatives, reeking havoc on some of the largest organizations in the world from their bedrooms.

Anonymous was more of accident than a movement. The book details how the hacker collective transitioned from a  chaotic, leaderless group looking for lulz (fun at other people’s expense) to very small team that stole the private information of millions of people only to give it away to secure fame and respect from the hacking community. Without recounting the book, because it’s worth reading to understand hacker culture and the underworld of the internet, I was struck by several points:

Continue reading “10 Things I Learned from ‘We Are Anonymous’ | Peter Mehit”

Hacked companies fight back with controversial steps | Reuters

Some experts also say executives should identify their most prized intellectual property and keep it off of networked computers and consider evasive action – such as having 100 versions of a critical digitized blueprint and only one that is genuine, with the right one never identified in emails.

“There is a reason that people fly halfway around the world to have a one-hour meeting,” Joffe said of intelligence agencies.

Read Article.

The Download.com Debacle | Electronic Frontier Foundation

CNET’s Download.com site has been embedding adware into the install process for all kinds of software, including open source software like NMAP.  For the unwary, some of the ads could have been read to suggest accepting the advertised service (e.g., the Babylon translation tool bar) was part of the installation process.  Users who weren’t paying attention may also have clicked “accept” simply by accident.  In either event, after their next restart, they would have been surprised to find their settings had been changed, new tool bars installed, etc.

Read Article.