21 Matching Annotations
  1. Jan 2026
    1. Today's links The Post-American Internet: My speech from Hamburg's Chaos Communications Congress. Hey look at this: Delights to delectate. Object permanence: Error code 451; Public email address Mansplaining Lolita; NSA backdoor in Juniper Networks; Don't bug out; Nurses whose shitty boss is a shitty app. Upcoming appearances: Where to find me. Recent appearances: Where I've been. Latest books: You keep readin' em, I'll keep writin' 'em. Upcoming books: Like I said, I'll keep writin' 'em. Colophon: All the rest. The Post-American Internet (permalink) On December 28th, I delivered a speech entitled "A post-American, enshittification-resistant internet" for 39C3, the 39th Chaos Communications Congress in Hamburg, Germany. This is the transcript of that speech. Video Playerhttps://archive.org/download/doctorow-39c3/39c3-1421-eng-A_post-American_enshittification-resistant_internet.mp400:0000:0001:01:12Use Up/Down Arrow keys to increase or decrease volume. Many of you know that I'm an activist with the Electronic Frontier Foundation – EFF. I'm about to start my 25th year there. I know that I'm hardly unbiased, but as far as I'm concerned, there's no group anywhere on Earth that does the work of defending our digital rights better than EFF. I'm an activist there, and for the past quarter-century, I've been embroiled in something I call "The War on General Purpose Computing." If you were at 28C3, 14 years ago, you may have heard me give a talk with that title. Those are the trenches I've been in since my very first day on the job at EFF, when I flew to Los Angeles to crash the inaugural meeting of something called the "Broadcast Protection Discussion Group," an unholy alliance of tech companies, media companies, broadcasters and cable operators. They'd gathered because this lavishly corrupt American congressman, Billy Tauzin, had promised them a new regulation – a rule banning the manufacture and sale of digital computers, unless they had been backdoored to specifications set by that group, specifications for technical measures to block computers from performing operations that were dispreferred by these companies' shareholders. That rule was called "the Broadcast Flag," and it actually passed through the American telecoms regulator, the Federal Communications Commission. So we sued the FCC in federal court, and overturned the rule. We won that skirmish, but friends, I have bad news, news that will not surprise you. Despite wins like that one, we have been losing the war on the general purpose computer for the past 25 years. Which is why I've come to Hamburg today. Because, after decades of throwing myself against a locked door, the door that leads to a new, good internet, one that delivers both the technological self-determination of the old, good internet, and the ease of use of Web 2.0 that let our normie friends join the party, that door has been unlocked. Today, it is open a crack. It's open a crack! And here's the weirdest part: Donald Trump is the guy who's unlocked that door. Oh, he didn't do it on purpose! But, thanks to Trump's incontinent belligerence, we are on the cusp of a "Post-American Internet," a new digital nervous system for the 21st century. An internet that we can build without worrying about America's demands and priorities. Now, don't get me wrong, I'm not happy about Trump or his policies. But as my friend Joey DaVilla likes to say "When life gives you SARS, you make sarsaparilla." The only thing worse than experiencing all the terror that Trump has unleashed on America and the world would be going through all that and not salvaging anything out of the wreckage. That's what I want to talk to you about today: the post-American Internet we can wrest from Trump's chaos. A post-American Internet that is possible because Trump has mobilized new coalition partners to join the fight on our side. In politics, coalitions are everything. Any time you see a group of people suddenly succeeding at a goal they have been failing to achieve, it's a sure bet that they've found some coalition partners, new allies who don't want all the same thing as the original forces, but want enough of the same things to fight on their side. That's where Trump came from: a coalition of billionaires, white nationalists, Christian bigots, authoritarians, conspiratorialists, imperialists, and self-described "libertarians" who've got such a scorching case of low-tax brain worms that they'd vote for Mussolini if he'd promise to lower their taxes by a nickel. And what's got me so excited is that we've got a new coalition in the War on General Purpose Computers: a coalition that includes the digital rights activists who've been on the lines for decades, but also people who want to turn America's Big Tech trillions into billions for their own economy, and national security hawks who are quite rightly worried about digital sovereignty. My thesis here is that this is an unstoppable coalition. Which is good news! For the first time in decades, victory is in our grasp.

      Sees the original fight by digital rights activists now joined by geopolitical economics and international cybersec. Thinks this combi will win out

  2. Dec 2025
    1. There’s also a security dimension to data hoarding that teams often miss. Every piece of data you expose through an MCP tool is a potential vulnerability. If an attacker finds an unprotected endpoint, they can pull everything that tool provides. If you’re hoarding data, that’s your entire customer database instead of just the three fields actually needed for the task.

      MCPs that are overloaded w data are new attack surfaces

    1. Daarin staat uitgewerkt welke acties er vanuit het Rijk en de gemeenten op dit moment al lopen. Ook staat erin beschreven wat de inzet is voor de komende tijd.

      Rapport geeft actielijst bestaande interventies. Doornemen

    2. digitale veiligheid in 4 aandachtsgebieden voor gemeenten: de interne digitale veiligheid; ontwrichting binnen gemeentegrenzen als gevolg van een cyberincident; cybercrime en gedigitaliseerde criminaliteit; online aangejaagde openbare-ordeverstoringen.

      Vraagstukken gegroepeerd in deze 4 clusters. Waar zou hybride aanval tbv staatsactor vallen? Cluster 1?

    3. digitale incidenten zich anders ontwikkelen dan fysieke incidenten. Het gaat sneller, grensoverschrijdend en is minder zichtbaar.

      duh. Cyberincidenten zijn haast per def internationaal, moet je actief op alert. Je kunt niet wachten tot gevolgen zichtbaar zijn. Dreiging ontwikkelt zich veel sneller dan zichtbaarheid

    4. schetst een beeld van de uitdagingen voor gemeenten op gebied van digitale veiligheid. En laat zien hoe verantwoordelijkheden en rollen binnen gemeenten zijn verdeeld.

      focus op cybersec, en hoe rollen en responsibilities verdeeld zijn

  3. Nov 2025
    1. Er zijn andere manieren om hardware een eigen nummer te geven, zoals de PUF (physical unclonable function) in een chipontwerp.  PUF-codes worden niet ingeëtst, maar zijn gebaseerd op een statistisch sommetje in het chipontwerp.

      It is not PUF, which is on chip, and sensitive to environmental factors, as well as taking space on the wafer.

    2. Unieke chips helpen de schade te beperken. Het toevoegen van zo’n nummer hoeft niet veel te kosten: dat kan in een later stadium van de chipproductie met goedkope apparatuur.

      the ID is added after the hightech productionphase making it affordable.

    3. De controle van de identificatie vindt plaats op een streng beveiligde server en daarbij worden geen sleutels uitgewisseld, zoals bij gangbare beveiliging. Niemand in de hele productieketen kent de sleutel, ook voor SandGrain is het een geheim. Zelfs al zouden criminelen het systeem weten te omzeilen – wat volgens de SandGrainers niet kan – dan hebben ze toegang tot maar één apparaat. Dat maakt het veel ingewikkelder om een volledig netwerk te saboteren.

      Sandgrain is key less and zero-K. ID is done through a (central?) server though.

      Circumventing it gains access to just one device, not all devices that use the same chip.

    4. Het principe is simpel: een chip met een uniek nummer bewaakt de toegang tot de achterliggende elektronica. Alleen als dat nummer wordt herkend, krijgt de gebruiker toegang tot het systee

      The ID serves as a gatekeeper for access to the system it is used in.

    5. Een nieuw Nederlands initiatief werkt aan chips met een uniek nummer, die als een slot op de deur dienen voor elektronica in cruciale infrastructuur.

      SandGrain (Eindhovense spinoff, Joeri Voets en Sander Koopmans) provides every chip with a unique ID.

  4. Sep 2025
    1. open source dependencies as supply chain risk and attack surface, vs how, here Obsidian mitigates against them: - reimplement small functions directly in your own code - fork modules and maintain as own code base - large libraries include version locked files - strongly limit the 3rd party packages that ship in your code to others

      For those lockfiled dependencies have a process for updates (and for onboarding a new one), and don't quickly update what already works. Use time as a buffer: issues with 3rd party stuff will surface over time.

  5. Jun 2024
  6. Jan 2024
    1. 99% of businesses that fall below the enterprise poverty line.

      This SME focused cybersecurity company called Huntress in their position offer mention an 'enterprise poverty line' for cybersecurity. In the Mastodon message announcing it they call it 'the cybersecurity poverty line'. Meaning a Coasean floor [[Vloer en plafond van organiseren 20080307115436]] I assume?