“
Capitalism is a social system owned by the capitalistic class, a small network of very wealthy and powerful businessmen, who compromise the health and security of the general population for corporate gain.
”
”
Suzy Kassem (Rise Up and Salute the Sun: The Writings of Suzy Kassem)
“
To competently perform rectifying security service, two critical incident response elements are necessary: information and organization.
”
”
Robert E. Davis
“
At last, Sturmhond straightened the lapels of his teal frock coat and said, “Well, Brekker, it’s obvious you only deal in half-truths and outright lies, so you’re clearly the man for the job.”
“There’s just one thing,” said Kaz, studying the privateer’s broken nose and ruddy hair. “Before we join hands and jump off a cliff together, I want to know exactly who I’m running with.”
Sturmhond lifted a brow. “We haven’t been on a road trip or exchanged clothes, but I think our introductions were civilized enough.”
“Who are you really, privateer?”
“Is this an existential question?”
“No proper thief talks the way you do.”
“How narrow-minded of you.”
“I know the look of a rich man’s son, and I don’t believe a king would send an ordinary privateer to handle business this sensitive.”
“Ordinary,” scoffed Sturmhond. “Are you so schooled in politics?”
“I know my way around a deal. Who are you? We get the truth or my crew walks.”
“Are you so sure that would be possible, Brekker? I know your plans now. I’m accompanied by two of the world’s most legendary Grisha, and I’m not too bad in a fight either.”
“And I’m the canal rat who brought Kuwei Yul-Bo out of the Ice Court alive. Let me know how you like your chances.” His crew didn’t have clothes or titles to rival the Ravkans, but Kaz knew where he’d put his money if he had any left.
Sturmhond clasped his hands behind his back, and Kaz saw the barest shift in his demeanor. His eyes lost their bemused gleam and took on a surprising weight. No ordinary privateer at all.
“Let us say,” said Sturmhond, gaze trained on the Ketterdam street below, “hypothetically, of course, that the Ravkan king has intelligence networks that reach deep within Kerch, Fjerda, and the Shu Han, and that he knows exactly how important Kuwei Yul-Bo could be to the future of his country. Let us say that king would trust no one to negotiate such matters but himself, but that he also knows just how dangerous it is to travel under his own name when his country is in turmoil, when he has no heir and the Lantsov succession is in no way secured.”
“So hypothetically,” Kaz said, “you might be addressed as Your Highness.
”
”
Leigh Bardugo (Crooked Kingdom (Six of Crows, #2))
“
Above this race of men stands an immense and tutelary power, which takes upon itself alone to secure their gratifications and to watch over their fate. That power is absolute, minute, regular, provident, and mild. It would be like the authority of a parent if, like that authority, its object was to prepare men for manhood; but it seeks, on the contrary, to keep them in perpetual childhood: it is well content that the people should rejoice, provided they think of nothing but rejoicing. For their happiness such a government willingly labors, but it chooses to be the sole agent and the only arbiter of that happiness; it provides for their security, foresees and supplies their necessities, facilitates their pleasures, manages their principal concerns, directs their industry, regulates the descent of property, and subdivides their inheritances: what remains, but to spare them all the care of thinking and all the trouble of living?
Thus it every day renders the exercise of the free agency of man less useful and less frequent; it circumscribes the will within a narrower range and gradually robs a man of all the uses of himself. The principle of equality has prepared men for these things;it has predisposed men to endure them and often to look on them as benefits.
After having thus successively taken each member of the community in its powerful grasp and fashioned him at will, the supreme power then extends its arm over the whole community. It covers the surface of society with a network of small complicated rules, minute and uniform, through which the most original minds and the most energetic characters cannot penetrate, to rise above the crowd. The will of man is not shattered, but softened, bent, and guided; men are seldom forced by it to act, but they are constantly restrained from acting. Such a power does not destroy, but it prevents existence; it does not tyrannize, but it compresses, enervates, extinguishes, and stupefies a people, till each nation is reduced to nothing better than a flock of timid and industrious animals, of which the government is the shepherd.
”
”
Alexis de Tocqueville (Democracy in America)
“
Megan was able to get me the single most important item in this entire house."
"She got you that new vibrator?"
"Jesus..."
"Oh, the cookbook, right," he said, remembering.
Megan used to work for the Food Network, and was able to secure me a signed copy of the original Barefoot Contessa cookbook.
”
”
Alice Clayton (Last Call (Cocktail, #4.5))
“
I’ve had clients who thought they needed an absurd level of security. (And I’m talking absurd even by my standards, and my code was developed by a bond company known for intense xenophobic paranoia, tempered only by desperate greed.)
”
”
Martha Wells (Network Effect (The Murderbot Diaries, #5))
“
Everybody with an IQ above room temperature is onto the con act of our media. They are obeying bigger, richer interests than informing the public—which is the last thing that corporate America has ever been interested in doing. —Gore Vidal
”
”
Paul Jay (Gore Vidal: History of The National Security State)
“
Some viruses don’t actually harm the system itself, but all of them cause network slowdowns due to the heavy network traffic caused by the virus replication
”
”
Chuck Easttom (Computer Security Fundamentals)
“
the bandits own the media,” said Gore. “And the media tells them that America is the greatest country in the world. Well, it sure as hell isn’t, at least not for the people who live in it. But the media are there cheerleading, ‘These are the greatest guys on earth.’ The infantilizing of the republic is one of the triumphs of American television.
”
”
Paul Jay (Gore Vidal: History of The National Security State)
“
Bob Iger, Disney's chief operating officer, had to step in and do damage control. He was as sensible and solid as those around him were volatile. His background was in television; he had been president of the ABC network, which was acquired in 1996 by Disney. His reputation was as an corporate suit, and he excelled at deft management, but he also had a sharp eye for talent, a good-humored ability to understand people, and a quiet flair that he was secure enough to keep muted. Unlike Eisner and Jobs, he had a disciplined calm, which helped him deal with large egos. " Steve did some grandstanding by announcing that he was ending talks with us," Iger later recalled. " We went into crisis mode and I developed some talking points to settle things down.
”
”
Walter Isaacson (Steve Jobs)
“
I’m not joking when I refer to our country as the United States of Amnesia, although I was corrected recently by Studs Terkel out of Chicago. And he said, “Gore, it’s not the United States of Amnesia; it’s the United States of Alzheimer’s.” I stand corrected.
”
”
Paul Jay (Gore Vidal: History of The National Security State)
“
I am trying to imagine under what novel features despotism may appear in the world. In the first place, I see an innumerable multitude of men, alike and equal, constantly circling around in pursuit of the petty and banal pleasures with which they glut their souls. Each one of them, withdrawn into himself, is almost unaware of the fate of the rest….
Over this kind of men stands an immense, protective power which is alone responsible for securing their enjoyment and watching over their fate. That power is absolute, thoughtful of detail, orderly, provident, and gentle. It would resemble parental authority if, fatherlike, it tried to prepare charges for a man’s life, but on the contrary, it only tries to keep them in perpetual childhood. It likes to see the citizens enjoy themselves, provided that they think of nothing but enjoyment. It gladly works for their happiness but wants to be sole agent and judge of it. It provides for their security, foresees and supplies their necessities, facilitates their pleasure, manages their principal concerns, directs their industry, makes rules for their testaments, and divides their inheritances. Why should it not entirely relieve them from the trouble of thinking and all the cares of living?
Thus it daily makes the exercise of free choice less useful and rarer, restricts the activity of free will within a narrower compass, and little by little robs each citizen of the proper use of his own faculties. Equality has prepared men for all this, predisposing them to endure it and often even regard it as beneficial.
Having thus taken each citizen in turn in its powerful grasp and shaped him to its will, government then extends its embrace to include the whole of society. It covers the whole of social life with a network of petty complicated rules that are both minute and uniform, through which even men of the greatest originality and the most vigorous temperament cannot force their heads above the crowd. It does not break men’s will, but softens, bends, and guides it; it seldom enjoins, but often inhibits, action; it does not destroy anything, but prevents much being born; it is not at all tyrannical, but it hinders, restrains, enervates, stifles, and stultifies so much that in the end each nation is no more than a flock of timid and hardworking animals with the government as its shepherd.
”
”
Alexis de Tocqueville (Democracy in America)
“
Suffering the nasty twisting of body parts that should never be twisted, the card soldiers fell, lifeless, and Arch's bodyguards were soon pushing through the tangles of Outerwilderbeastie, cruching twigs and leaves underfoot.
Visit the labs?" Blister said, refurring the squate network of building in Wondertropolies' warehouse district, where a consortium of Alyss' scientists and engineers had tried to transform a host of captured Glass Eyes into a benign force. On the lab grounds were the incinerator baths--large pits into which the Glass Eyes were being herded and melted down, sorched into ash. There would be lots of Glasss Eyes to choose from at the labs, bbut Ripkins shook his head.
To much security," he said.
Find one that roaming?"
It'll be easier for us to avoid notcie," Ripkins said.
Yeah, but it'd be more fun to hit the labs.
”
”
Frank Beddor
“
I notice I am taking risks with my own security and losing my sensitivity to danger. I don't know it at the time, but the effects of war are reaching into me in unexpected ways, and I am being changed by them. I am surrounded by destruction and the randomness of death, which I cannot fathom. I have felt the closeness of death as tangibly as the whisper of a murderous seducer, and felt the richness, twinged by guilt, of having escaped its grasp. I have seen too often the numb lost look of men consumed by undiluted grief, and heard the howl of children as their mothers are pulled from the rubble of a rocket-blasted home, and I am coming to understand the long dark pain of those who silently endure what first seems unendurable.
”
”
Jason Elliot (The Network)
“
The Federalist Papers are very clear. Whenever one of the founding fathers and one of the people who was inventing the Constitution, they start to get apoplectic at the mention of Athens, the mention of Pericles, the mention of democracy. They go on and on about mobs, and we don’t want this, and we don’t want that. We’re an oligarchy of the well-to-do. We were at the very beginning, when the Constitution was made, and we’re even more so now.
”
”
Paul Jay (Gore Vidal: History of The National Security State)
“
It's proper Netiquette to protect data with passwords. NetworkEtiquette.net
”
”
David Chiles
“
It's proper Netiquette to view in-App webpages in a mobile browser for better security. NetworkEtiquette.net
”
”
David Chiles
“
Fixing a hole is far more effective than trying to hide it. That approach is also less stressful than constantly worrying that attackers may find the vulnerabilities.
”
”
Gordon Fyodor Lyon (Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning)
“
We activated a secure communications tunnel built into the Huawei 5G network installed on the island.
”
”
David Bruns (Counter Strike (Command and Control #2))
“
I’ve also had clients who thought they didn’t need any security at all, right up until something ate them. (That’s mostly a metaphor. My uneaten client stat is high.)
”
”
Martha Wells (Network Effect (The Murderbot Diaries, #5))
“
Enjoy without injury, live without loss.
”
”
Amit Kalantri
“
That was when I caught a tentative secure contact from SecUnit 3. It had just disabled its governor module.
”
”
Martha Wells (Network Effect (The Murderbot Diaries, #5))
“
In this interdependent global society, linked by new networks of instant communication, no nation and no person can feel secure until all are secure.
”
”
Tom Hofmann (Benjamin Ferencz, Nuremberg Prosecutor and Peace Advocate)
“
Today there is big money for those who can stealthily invade computer networks, or construct a secure botnet, and no modern military arsenal is complete without state-of-the-art malware.
”
”
Mark Bowden (Worm: The First Digital World War)
“
Putin isn’t a full-blown Fascist because he hasn’t felt the need. Instead, as prime minister and president, he has flipped through Stalin’s copy of the totalitarian playbook and underlined passages of interest to call on when convenient. Throughout his time in office, he has stockpiled power at the expense of provincial governors, the legislature, the courts, the private sector, and the press. A suspicious number of those who have found fault with him have later been jailed on dubious charges or murdered in circumstances never explained. Authority within Putin’s “vertical state”—including directorship of the national oil and gas companies—is concentrated among KGB alumni and other former security and intelligence officials. A network of state-run corporations and banks, many with shady connections offshore, furnish financial lubricants for pet projects and privileged friends. Rather than diversify as China has done, the state has more than doubled its share of the national economy since 2005.
”
”
Madeleine K. Albright (Fascism: A Warning)
“
Fewer than one in twenty security professionals has the core competence and the foundation knowledge to take a system all the way from a completely unknown state of security through mapping, vulnerability testing, password cracking, modem testing, vulnerability patching, firewall tuning, instrumentation, virus detection at multiple entry points, and even through back-ups and configuration management.
”
”
Stephen Northcutt (Network Intrusion Detection)
“
Bitcoin isn’t a digital currency. It’s a cryptocurrency. It’s a network-centric money. I really like the idea of a network-centric money. A network that allows you to replace trust in institutions, trust in hierarchies, with trust on the network. The network acting as a massively diffuse arbiter of truth, resolving any disagreements about transactions and security in a way where no one has control.
”
”
Andreas M. Antonopoulos (The Internet of Money)
“
Among those Mark and I networked with, Elizabeth Taylor was highly respected for her quiet activism against mind control. It was no surprise when she whisked Michael off to a highly specialized hospital in the UK to have him deprogrammed.
”
”
Cathy O'Brien (ACCESS DENIED For Reasons Of National Security: Documented Journey From CIA Mind Control Slave To U.S. Government Whistleblower)
“
The problem with the so-called bloody surveillance state is that it’s hard work trying to track someone’s movements using CCTV – especially if they’re on foot. Part of the problem is that the cameras all belong to different people for different reasons. Westminster Council has a network for traffic violations, the Oxford Street Trading Association has a huge network aimed at shop-lifters and pickpockets, individual shops have their own systems, as do pubs, clubs and buses. When you walk around London it is important to remember that Big Brother may be watching you, or he could be having a piss, or reading the paper or helping redirect traffic around a car accident or maybe he’s just forgotten to turn the bloody thing on.
”
”
Ben Aaronovitch (Broken Homes (Peter Grant, #4))
“
Well, the trick of the national security state is, first of all, there must always be an enemy, and he’s—must be terrifying, and he wants to blow us up because he’s evil and we’re good. So every day we are brainwashed: The Russians have discovered antigravity, or they’ve done this, or they’ve done that, and they’re evil; we are good, as well as overweight. Things—little things like this matter a great deal in advertising. Great advertising campaign to keep ourselves fully armed to the teeth.
”
”
Paul Jay (Gore Vidal: History of The National Security State)
“
The hegemony of finance and the banks has produced the indebted. Control over information and communication networks has created the mediatized. The security regime and the generalized state of exception have constructed a figure prey to fear and yearning for protection—the securitized. And the corruption of democracy has forged a strange, depoliticized figure, the represented. These subjective figures constitute the social terrain on which—and against which—movements of resistance and rebellion must act.
”
”
Michael Hardt (Declaration)
“
generic definition of a blockchain: a distributed, append-only ledger of provably signed, sequentially linked, and cryptographically secured transactions that’s replicated across a network of computer nodes, with ongoing updates determined by a software-driven consensus.
”
”
Michael J. Casey (The Truth Machine: The Blockchain and the Future of Everything)
“
China has secretly developed an army of 180,000 cyber spies and warriors, mounting an incredible ninety thousand computer attacks a year against the U.S. Defense Department networks alone. The totality of the thefts and their impact on American national security are breathtaking.
”
”
Marc Goodman (Future Crimes)
“
He was an accomplished computer hacker. During the past two years, he’d penetrated highly protected computer systems, in which he had planted rootkits that allowed him to swim through their networks without their security becoming aware that a secret fish explored the data depths.
”
”
Dean Koontz (Devoted)
“
A single spear-phishing email carrying a slightly altered malware can bypass multi-million dollar enterprise security solutions if an adversary deceives a cyber-hygienically apathetic employee into opening the attachment or clicking a malicious link and thereby compromising the entire network.
”
”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“
Contantine—who could be securely trusted when it came to his promises—was going to help Olivia. And she was going to let him.
Olivia was getting better at rely on other people—her network slowly spreading wider—but Constantine was still a "rely on Constantine or Ren, or no one else" kind of guy.
”
”
Anne Zoelle (The Unleashing of Ren Crown (Ren Crown, #4))
“
If Windows had been designed from the beginning with security in mind, much of the course of history would have been changed. The multi-billion dollar industry of AV vendors would have never come about. Worms, viruses, spyware, and cybercrime would never have risen to further fuel the IT security industry.
”
”
Richard Stiennon (There Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar)
“
Private sector networks in the United States, networks operated by civilian U.S. government agencies, and unclassified U.S. military and intelligence agency networks increasingly are experiencing cyber intrusions and attacks,” said a U.S.-China Economic and Security Review Commission report to Congress that was published the same month Conficker appeared. “. . . Networks connected to the Internet are vulnerable even if protected with hardware and software firewalls and other security mechanisms. The government, military, businesses and economic institutions, key infrastructure elements, and the population at large of the United States are completely dependent on the Internet. Internet-connected networks operate the national electric grid and distribution systems for fuel. Municipal water treatment and waste treatment facilities are controlled through such systems. Other critical networks include the air traffic control system, the system linking the nation’s financial institutions, and the payment systems for Social Security and other government assistance on which many individuals and the overall economy depend. A successful attack on these Internet-connected networks could paralyze the United States [emphasis added].
”
”
Mark Bowden (Worm: The First Digital World War)
“
By some estimates, there are 250 hacker groups in China that are tolerated and may even be encouraged by the government to enter and disrupt computer networks,” said the 2008 U.S.–China Security Review. “The Chinese government closely monitors Internet activities and is likely aware of the hackers’ activities. While the exact number may never be known, these estimates suggest that the Chinese government devotes a tremendous amount of human resources to cyber activity for government purposes. Many individuals are being trained in cyber operations at Chinese military academies, which does fit with the Chinese military’s overall strategy.
”
”
Mark Bowden (Worm: The First Digital World War)
“
In order to assuage these fears, the state is driven to respond to the theater of terror with its own theater of security. The most efficient answer to terrorism might be good intelligence and clandestine action against the financial networks that feed terrorism. But this is not something citizens can watch on television.
”
”
Yuval Noah Harari (21 Lessons for the 21st Century)
“
To be in a situation characterised by hygge is to be in a state of pleasant wellbeing and security, with a relaxed frame of mind and an open enjoyment of the immediate situation in all its small pleasures - a state one achieves most often with close members of one's social network in a home-like setting. -Judith Friedman Hansen
”
”
Louisa Thomsen Brits (The Book of Hygge: The Danish Art of Living Well)
“
I’ve had clients who thought they needed an absurd level of security. (And I’m talking absurd even by my standards, and my code was developed by a bond company known for intense xenophobic paranoia, tempered only by desperate greed.) I’ve also had clients who thought they didn’t need any security at all, right up until something ate them.
”
”
Martha Wells (Network Effect (The Murderbot Diaries, #5))
“
It’s a great scandal of the CEOs, who are simply bandits. They go into a company that had a rich base, grab everything they can for themselves, stock options, huge salaries, fire as many people as possible. If we ever have an oldfashioned revolution in the United States, it will be made by well-educated blue-collar workers who have lost their jobs.
”
”
Paul Jay (Gore Vidal: History of The National Security State)
“
Real cybersecurity means that your Security Operations team is consistently pen testing your network with the same stealth and sophistication as the Russian nation state, the same desperation as China’s 13th Five Year Plan, the same inexhaustible energy of the Cyber Caliphate and the same greed and ambition for monetary payoff as a seasoned cyber-criminal gang.
”
”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“
Usually you could count on rinky-dink networks like a public library to employ bottom-feeding IT personnel who were lazy or incompetent or both. Operating systems were often two generations out of date and hopelessly unpatched. Such networks were like big, friendly dogs; if you petted them they would roll right over and show you a dozen security vulnerabilities.
”
”
Matthew FitzSimmons (The Short Drop (Gibson Vaughn, #1))
“
Finding a zero day is a little like entering God mode in a video game. Once hackers have figured out the commands or written the code to exploit it, they can scamper through the world's computer networks undetected until the day the underlying flaw is discovered. Zero day exploitation is the most direct application of the cliche 'knowledge is power if you know how to use it.
”
”
Nicole Perlroth (This Is How They Tell Me the World Ends: The Cyberweapons Arms Race)
“
By tracing the early history of USCYBERCOM it is possible to understand some of the reasons why the military has focused almost completely on network defense and cyber attack while being unaware of the need to address the vulnerabilities in systems that could be exploited in future conflicts against technologically capable adversaries. It is a problem mirrored in most organizations. The network security staff are separate from the endpoint security staff who manage desktops through patch and vulnerability management tools and ensure that software and anti-virus signatures are up to date. Meanwhile, the development teams that create new applications, web services, and digital business ventures, work completely on their own with little concern for security. The analogous behavior observed in the military is the creation of new weapons systems, ISR platforms, precision targeting, and C2 capabilities without ensuring that they are resistant to the types of attacks that USCYBERCOM and the NSA have been researching and deploying. USCYBERCOM had its genesis in NCW thinking. First the military worked to participate in the information revolution by joining their networks together. Then it recognized the need for protecting those networks, now deemed cyberspace. The concept that a strong defense requires a strong offense, carried over from missile defense and Cold War strategies, led to a focus on network attack and less emphasis on improving resiliency of computing platforms and weapons systems.
”
”
Richard Stiennon (There Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar)
“
In the early days of adopting a conversation-centric mindset, you might miss the security blanket of what Stephen Colbert astutely labeled "little sips of online connection," & the sudden loss of weak ties to the fringes of your social network might induce moments of loneliness. But as you trade more of this time for conversation, the richness of these analog interactions will far outweigh what you're leaving behind.
”
”
Cal Newport (Digital Minimalism: Choosing a Focused Life in a Noisy World)
“
And so, at a December 1981 meeting, Contra leaders, whom Reagan referred to as the “moral equivalent of the Founding Fathers,” floated the idea that trafficking cocaine into California would provide enough profits to arm and train the anti-Sandinista guerrillas.108 With most of the network already established, the plan was rather straightforward: There were the Medellín and Cali cartels in Colombia; the airports and money laundering in Panama run by President Manuel Noriega; the well-known lack of radar detection that made landing strips in Costa Rica prime transport depots; and weapons and drug warehouses at Ilopango air base outside San Salvador. The problem had been U.S. law enforcement guarding key entry points into a lucrative market. But with the CIA and the National Security Council now ready to run interference and keep the FBI, the U.S. Customs Service,
”
”
Carol Anderson (White Rage: The Unspoken Truth of Our Racial Divide)
“
By striking at welfare programs and unemployment benefits, blocking a national health care system, and making threatening gestures toward pension plans and social security, not only did this politics cripple social democracy, but in the process it undermined political democracy, the one political system that depends upon those who work. It might be recalled that the totalitarian regimes of Soviet Russia and Germany each instituted a strong network of social services; inverted totalitarianism seeks to dismantle or significantly reduce them, thereby throwing individuals back on their own resources, reducing their power. How far that power is being reduced can be gauged by the response of businesses to the lack of national health care and guarantees for pension systems. They have cut pensions and health care benefits while lavishing huge bonuses upon departing executives.
”
”
Sheldon S. Wolin (Democracy Incorporated: Managed Democracy and the Specter of Inverted Totalitarianism - New Edition)
“
To expect an addict to give up her drug is like asking the average person to imagine living without all her social skills, support networks, emotional stability and sense of physical and psychological comfort. Those are the qualities that, in their illusory and evanescent way, drugs give the addict. People like Serena and Celia and the others whose portraits have appeared in this book perceive their drugs as their “rock and salvation.”
Thus, for all the valid reasons we have for wanting the addict to “just say no,” we first need to offer her something to which she can say “yes.” We must provide an island of relief. We have to demonstrate that esteem, acceptance, love and humane interaction are realities in this world, contrary to what she, the addict, has learned all her life. It is impossible to create that island for people unless they can feel secure that their substance dependency will be satisfied as long as they need it.
”
”
Gabor Maté (In the Realm of Hungry Ghosts: Close Encounters with Addiction)
“
Some of us are born with inner-judges whose verdicts are perpetually harsh. The result is depression, shyness, and heightened susceptibility to pain. Others arrive from the womb with inner-judges preset to treat us generously, endowing us with energy, few inhibitions, a deep sense of security, and little sense of guilt or shame.9 But most of us are in the middle—our inner-judges sentence us sternly or magnanimously depending on the snugness with which we fit our social network’s needs.
”
”
Howard Bloom (Global Brain: The Evolution of Mass Mind from the Big Bang to the 21st Century)
“
Sometime in the fifties I remember seeing On the Waterfront in the movies with Mary and thinking that I’m at least as bad as that Marlon Brando character and that some day I’d like to get in union work. The Teamsters gave me good job security at Food Fair. They could only fire you if they caught you stealing. Let me put it another way, they could only fire you if they caught you stealing and they could prove it. • chapter eight • Russell Bufalino In 1957 the mob came out of the closet. It came out unwillingly, but out it came. Before 1957 reasonable men could differ over whether an organized network of gangsters existed in America. For years FBI director J. Edgar Hoover had assured America that no such organization existed, and he deployed the FBI’s greatest resources to investigate suspected Communists. But as a result of the publicity foisted on the mob in 1957, even Hoover came on board. The organization was dubbed “La Cosa Nostra,” meaning “this thing of ours,” a term heard on government wiretaps. Ironically,
”
”
Charles Brandt ("I Heard You Paint Houses", Updated Edition: Frank "The Irishman" Sheeran & Closing the Case on Jimmy Hoffa)
“
It is spring 2007, and the block-long security lines into the Smithsonian Institution’s National Museum of American History (NMAH) are missing now while it is closed for renovation. The once controversial and “technically superb” exhibition Science in American Life is due to be phased out. The hot new museum exhibit is at the National Museum of Natural History’s (NMNH) Kenneth E. Behring Hall of Mammals. There, entering this multimedia, multisensory immersive installation, we are invited to a “Mammal Family Reunion—Come meet your relatives!”—in a savvy response to antievolution religious activism.
”
”
Katie King (Networked Reenactments: Stories Transdisciplinary Knowledges Tell)
“
JAY: Fascism in Germany wasn’t a coup; it was a many-year process. I’m not suggesting we’re living in an equivalent period, but there are lessons to be learned. VIDAL: But it is equivalent. I mean, don’t be shy of saying that. The response to the Reichstag fire is precisely that to 9/11, which was invoked by this administration’s people. “And if we don’t fight them over there, we got to fight ’em here.” This little fool. How are they going to get here? Greyhound bus? I mean, he is so stupid himself that he assumes everybody else is equally stupid. If he had been really elected, I would say everybody else was stupid, but he wasn’t.
”
”
Paul Jay (Gore Vidal: History of The National Security State)
“
You learn more about how to use the desktop environment in Chapter 4. For now, double-click the Wi-Fi Config icon on the desktop to open the tool. Click the Scan button to search for available Wi-Fi networks. Double-click the one you’d like to use, and it will prompt you to enter your security information by completing the white (unshaded) boxes (see Figure 3-10). The SSID box is used for the name of the network and will be completed automatically for you. You most likely have a WPA network, so the PSK box is where you type in your Wi-Fi password. You can ignore the optional boxes. Finally, click the Add button to connect to the network.
”
”
Sean McManus (Raspberry Pi For Dummies)
“
The misuse of history to condemn evils common around the world as if they were peculiarities of the West has serious practical implications. Two wrongs do not make a right but undermining the society which has the smaller evil only makes it more vulnerable to the greater evils in other societies and in international terrorist networks.
Far more is involved than questions of objectivity or honesty, important as such questions are. Without understanding the features of one’s own society that have provided a prosperity, a freedom, and a security rare to non-existent over much of the rest of the world, one risks losing by default all these things for oneself and posterity. American society is one whose underlying bases are always under attack by both internal opportunists and external enemies. Those who have no conception of the Constitution of the United States, except as an object of nit-picking, cannot be expected to defend its integrity against the inevitable encroachments of political opportunists and judicial power-seekers. Those who have no conception of the unique heritage of Western civilization have no idea what losing that heritage would mean – to them and to generations yet unborn – and why it must be defended against passing fads at home and lethal threats from abroad.
”
”
Thomas Sowell (Black Rednecks and White Liberals)
“
Megan was able to get me the single most important item in this entire house.”
“She got you that new vibrator?”
“Jesus . . .”
“Oh, the cookbook, right,” he said, remembering.
Megan used to work for the Food Network, and was able to secure me a signed copy of the original Barefoot Contessa cookbook. By Ina Garten. Signed to me by the way; one of those “Best wishes, Ina” deals. It honest-to-God said:
To Caroline—
Best Wishes,
Ina
Go ahead and be jealous. I’ll wait.
Simon, on the other hand, would not.
“Okay, so you remember Megan.”
“Remember her? Did you not hear me say single most important—”
“I got it, babe. Are you at all curious about hearing what they’re up to, or are you just going to spend some head-space time dreaming of Ina and her kitchen?”
“And me in her kitchen. If you’re going to get into my daydream, you have to set the scene correctly. I’m there with Ina, in her kitchen in the Hamptons, and we’re cooking up something wonderful for you and her husband, Jeffrey. Something with roasted chicken, which she’ll teach me how to carve perfectly. And roasted carrots, which she’ll pronounce with that subtle New York accent of hers, where it sounds like she’s saying kerrits.”
“I worry about you sometimes,” Simon said, reaching over to feel my forehead.
“I’m perfectly fine. Don’t worry about me, I’ll continue my fantasy later.
”
”
Alice Clayton (Last Call (Cocktail, #4.5))
“
The first objection is that states are not capable of attributing the source of a network intrusion, short-circuiting any security dilemma. The second objection is that the danger posed by network intrusions does not pose an existential risk and so the cybersecurity dilemma is not a major concern. The third and final objection is that cyber capabilities are unevenly distributed; strong states are more likely to possess cyber capabilities than weak ones, but, the objection argues, this is true of all military weapons and so cyber capabilities are not significant. In responding to these objections, this chapter establishes the boundaries of the cybersecurity dilemma argument.
”
”
Ben Buchanan (The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations)
“
Students at the instituted for Environmental Research at RWTH Aachen discovered something amazing about photosynthesis in undisturbed beech forests. Apparently, the trees synchronize their performance so that they are all equally successful. And that is not what one would expect. Each beech tree grows in a unique location, and conditions can vary greatly in just a few yards. The soil can be stony or loose. It can retain a great deal of water or almost no water. It can be full of nutrients or extremely barren. Accordingly, each tree experiences different growing conditions; therefore, each tree grows more quickly or more slowly and produces more or less sugar or wood, and thus you would expect every tree to be photosynthesizing at a different rate.
And that's what makes the research results so astounding. The rate of photosynthesis is the same for all the trees. The trees, it seems, are equalizing differences between the strong and the weak. Whether they are thick or thin, all members of the same species are using light to produce the same amount of sugar per leaf. This equalization is taking place underground through the roots. There's obviously a lively exchange going on down there. Whoever has an abundance of sugar hands some over; whoever is running short gets help. Once again, fungi are involved. Their enormous networks act as gigantic redistribution mechanisms. It's a bit like the way social security systems operate to ensure individual members of society don't fall too far behind.
”
”
Peter Wohlleben (The Hidden Life of Trees: What They Feel, How They Communicate: Discoveries from a Secret World)
“
In one case, Amazon negotiated a memorandum of understanding with a police department in Florida, discovered through a public records request filed by journalist Caroline Haskins, which showed that police were incentivized to promote the Neighbors app and for every qualifying download they would receive credits toward free Ring cameras. The result was a “self-perpetuating surveillance network: more people download Neighbors, more people get Ring, surveillance footage proliferates, and police can request whatever they want,” Haskins writes. Surveillance capacities that were once ruled over by courts are now on offer in Apple’s App Store and promoted by local street cops. As media scholar Tung-Hui Hu observes, by using such apps, we “become freelancers for the state’s security apparatus.
”
”
Kate Crawford (Atlas of AI: Power, Politics, and the Planetary Costs of Artificial Intelligence)
“
Today, I want to talk about dumb networks. I want to talk about smart networks. I want to talk about the value of open source when it meets finance. And I want to talk about the festival of the commons. Bitcoin is a currency. Bitcoin is a network. Bitcoin is a technology. And you can’t separate these things. A consensus network that bases its value on currency does not work without the currency. You can’t just do the blockchain without a valuable currency behind it, and the currency doesn’t work without the network. Bitcoin is both. It is the convergence of a participatory consensus network and a global, borderless currency that is fungible, fast, and secure.
Today, I want to talk a bit about the bitcoin network and focus on one concept that has some parallels to the early internet.
”
”
Andreas M. Antonopoulos (The Internet of Money)
“
The Obama administration warned federal employees that materials released by WikiLeaks remained classified—even though they were being published by some of the world’s leading news organizations including the New York Times and the Guardian. Employees were told that accessing the material, whether on WikiLeaks.org or in the New York Times, would amount to a security violation.21 Government agencies such as the Library of Congress, the Commerce Department and the US military blocked access to WikiLeaks materials over their networks. The ban was not limited to the public sector. Employees from the US government warned academic institutions that students hoping to pursue a career in public service should stay clear of material released by WikiLeaks in their research and in their online activity.
”
”
Julian Assange
“
Until now. You and I are a mis-Match, Ellie, because I hacked into your servers to manipulate our results.” “Rubbish,” Ellie said, secretly balking at the notion. She folded her arms indignantly. “Our servers are more secure than almost every major international company across the world. We receive so many hacking attempts, yet no one gets in. We have the best software and team money can buy to protect us against people like you.” “You’re right about some of that. But what your system didn’t take into account was your own vanity. Do you remember receiving an email some time ago with the subject ‘Businesswoman of the Year Award’? You couldn’t help but open it.” Ellie vaguely remembered reading the email as it had been sent to her private account, which only a few people had knowledge of. “Attached to it was a link you clicked on and that opened to nothing, didn’t it?” Matthew continued. “Well, it wasn’t nothing to me, because your click released a tiny, undetectable piece of tailor-made malware that allowed me to remotely access your network and work my way around your files. Everything you had access to, I had access to. Then I simply replicated my strand of DNA to mirror image yours, sat back and waited for you to get in touch. That’s why I came for a job interview, to learn a little more about the programming and systems you use. Please thank your head of personnel for leaving me alone in the room for a few moments with her laptop while she searched for a working camera to take my head shot. That was a huge help in accessing your network. Oh, and tell her to frisk interviewees for lens deflectors next time—they’re pocket-sized gadgets that render digital cameras useless.
”
”
John Marrs (The One)
“
In 1872, Western Union (by then the dominant telegraph company in the United States) decided to implement a new, secure scheme to enable sums of up to $100 to be transferred between several hundred towns by telegraph. The system worked by dividing the company's network into twenty districts, each of which had its own superintendent. A telegram from the sender's office to the district superintendent confirmed that the money had been deposited; the superintendent would then send another telegram to the recipient's office authorizing the payment. Both of these messages used a code based on numbered codebooks. Each telegraph office had one of these books, with pages containing hundreds of words. But the numbers next to these words varied from office to office; only the district superintendent had copies of each office's uniquely numbered book.
”
”
Tom Standage (The Victorian Internet: The Remarkable Story of the Telegraph and the Nineteenth Century's On-line Pioneers)
“
Inefficiency. A centralized financial system has many inefficiencies. Perhaps the most egregious example is the credit card interchange rate that causes consumers and small businesses to lose up to 3 percent of a transaction's value with every swipe due to the payment network oligopoly's pricing power. Remittance fees are 5–7 percent. Time is also wasted in the two days it takes to “settle” a stock transaction (officially transfer ownership). In the Internet age, this seems utterly implausible. Other inefficiencies include costly (and slow) transfer of funds, direct and indirect brokerage fees, lack of security, and the inability to conduct microtransactions, many of which are not obvious to users. In the current banking system, deposit interest rates remain very low and loan rates high because banks need to cover their brick-and-mortar costs. The insurance industry provides another example.
”
”
Campbell R. Harvey (DeFi and the Future of Finance)
“
Best hacking books Cell phone hacking books Cell phone hacking sites Certified ethical hacking Computer hacking Computer hacking 101 Computer hacking books Computer hacking device Computer hacking equipment Computer hacking for dummies Computer hacking forensic investigator Computer hacking forensic investigator certification Computer hacking laws Computer hacking programs Computer hacking software Computer hacking tools Ethical hacking Ethical hacking and countermeasures Ethical hacking and countermeasures 2010 Ethical hacking and countermeasures attack phases Ethical hacking and countermeasures Linux Macintosh and mobile systems Ethical hacking and countermeasures secure network infrastructures Ethical hacking and countermeasures threats and defense mechanisms Ethical hacking and countermeasures web applications and data servers Ethical hacking and network defense Ethical hacking and pentesting Ethical hacking and pentesting guide Ethical hacking books Ethical hacking certification Ethical hacking course Ethical hacking kindle Ethical hacking tools Facebook hacking sites Facebook hacking software Facebook hacking tools Free computer hacking software Free Facebook hacking sites Free hacking software Hacking Hacking electronics Hacking electronics stuff Hacking electronics torrent Hacking electronics video Hacking exposed Hacking exposed 7 Hacking exposed 8 Hacking exposed book Hacking exposed computer forensics Hacking exposed Linux Hacking exposed mobile Hacking exposed network security secrets & solutions Hacking exposed PDF Hacking exposed windows Hacking exposed wireless Hacking sites Hacking software Hacking software computer Hacking software for iPhone Hacking tools Hacking tools and techniques Hacking your education torrent How to hacking sites Online Facebook hacking sites Password hacking software What is ethical hacking?
”
”
Matt Robbins (Hacking: Perfect Hacking for Beginners: Essentials You Must Know [Version 2.0] (hacking, how to hack, hacking exposed, hacking system, hacking 101, beg ... to hacking, Hacking, hacking for dummies))
“
Instead of simply working for the money and security, which I admit are important, I suggest they take a second job that will teach them a second skill. Often I recommend joining a network-marketing company, also called multilevel marketing, if they want to learn sales skills. Some of these companies have excellent training programs that help people get over their fear of failure and rejection, which are the main reasons people are unsuccessful. Education is more valuable than money, in the long run. When I offer this suggestion, I often hear in response, “Oh that is too much hassle,” or “I only want to do what I am interested in.” If they say, “It’s too much of a hassle,” I ask, “So you would rather work all your life giving 50 percent of what you earn to the government?” If they tell me, “I only do what I am interested in,” I say, “I’m not interested in going to the gym, but I go because I want to feel better and live longer.
”
”
Robert T. Kiyosaki (Rich Dad Poor Dad: What The Rich Teach Their Kids About Money - That The Poor And Middle Class Do Not!)
“
Flouting federal laws governing record-keeping requirements. Failing to preserve emails sent or received from her personal accounts, as required by law. Circumventing the Freedom of Information Act. Instructing her aides to send classified materials on her unsecure network. Running afoul of the “gross negligence” clause of the Espionage Act (which meant prosecutors would not have to prove “intent” to find her guilty). Pretending she didn’t know that Sensitive Compartmented Information (SCI) was classified. Transferring classified material that originated at the CIA, the National Security Agency, and other intelligence sources, to her unsecured network. Authoring hundreds of emails with classified information to people who did not have security clearance. Inducing aides to commit perjury. Lying to the FBI. Engaging in public corruption by using the office of secretary of state to feather the nest of the Clinton family foundation.
”
”
Edward Klein (Guilty as Sin: Uncovering New Evidence of Corruption and How Hillary Clinton and the Democrats Derailed the FBI Investigation)
“
Once Hopkins showed that this worked in creating one atomic network, the effort could be repeated in building the second, third, and so on: We proved out this plan in several cities of moderate size. Then we undertook New York City. There the market was dominated by a rival brand. Van Camp had slight distribution. In three weeks we secured, largely by letter, 97 per cent distribution. Every grocer saw the necessity of being prepared for that coupon demand. Then one Sunday in a page ad, we inserted the coupon. This just in Greater New York. As a result of that ad, 1,460,000 coupons were presented. We paid $146,000 to the grocers to redeem them. But 1,460,000 homes were trying Van Camp’s Milk after reading our story, and all in a single day. The total cost of that enterprise, including the advertising, was $175,000, mostly spent in redeeming those coupons. In less than nine months that cost came back with a profit. We captured the New York market.
”
”
Andrew Chen (The Cold Start Problem: How to Start and Scale Network Effects)
“
The banking system we have today is a direct descendent of banking from the Middle Ages. The Medici family in Florence, Italy, arguably created the formal structure of the bank that we still retain today, after many developments. The paper currency we have today is an iteration on coins used before the first century. Today’s payments networks are iterations on the 12th century European network of the Knights Templar, who used to securely move money around for banks, royalty and wealthy aristocrats of the period. The debit cards we have today are iterations on the bank passbook that you might have owned if you had had a bank account in the year 1850. Apple Pay is itself an iteration on the debit card—effectively a tokenised version of the plastic artifact reproduced inside an iPhone. And bank branches? Well, they haven’t materially changed since the oldest bank in the world, Monte Dei Paschi de Sienna, opened their doors to the public 750 years ago.
”
”
Brett King (Bank 4.0: Banking Everywhere, Never at a Bank)
“
But then something unexpected happened. Donald Trump, a real estate mogul and television celebrity who did not need the Koch donor network’s money to run, who seemed to have little grasp of the goals of this movement, entered the race. More than that, to get ahead, Trump was able to successfully mock the candidates they had already cowed as “puppets.” And he offered a different economic vision. He loved capitalism, to be sure, but he was not a libertarian by any stretch. Like Bill Clinton before him, he claimed to feel his audience’s pain. He promised to stanch it with curbs on the very agenda the party’s front-runners were promoting: no more free-trade deals that shuttered American factories, no cuts to Social Security or Medicare, and no more penny-pinching while the nation’s infrastructure crumbled. He went so far as to pledge to build a costly wall to stop immigrants from coming to take the jobs U.S. companies offered them because they could hire desperate, rightless workers for less. He said and did a lot more, too, much that was ugly and incendiary. And in November, he shocked the world by winning the Electoral College vote.
”
”
Nancy MacLean (Democracy in Chains: The Deep History of the Radical Right's Stealth Plan for America)
“
But come on—tell me the proposal story, anyway.”
She raised an eyebrow. “Really?”
“Really. Just keep in mind that I’m a guy, which means I’m genetically predisposed to think that whatever mushy romantic tale you’re about to tell me is highly cheesy.”
Rylann laughed. “I’ll keep it simple, then.” She rested her drink on the table. “Well, you already heard how Kyle picked me up at the courthouse after my trial. He said he wanted to surprise me with a vacation because I’d been working so hard, but that we needed to drive to Champaign first to meet with his former mentor, the head of the U of I Department of Computer Sciences, to discuss some project Kyle was working on for a client.” She held up a sparkly hand, nearly blinding Cade and probably half of the other Starbucks patrons. “In hindsight, yes, that sounds a little fishy, but what do I know about all this network security stuff? He had his laptop out, there was some talk about malicious payloads and Trojan horse attacks—it all sounded legitimate enough at the time.”
“Remind me, while I’m acting U.S. attorney, not to assign you to any cybercrime cases.”
“Anyhow. . . we get to Champaign, which as it so happens, is where Kyle and I first met ten years ago. And the limo turns onto the street where I used to live while in law school, and Kyle asks the driver to pull over because he wants to see the place for old time’s sake. So we get out of the limo, and he’s making this big speech about the night we met and how he walked me home on the very sidewalk we were standing on—I’ll fast-forward here in light of your aversion to the mushy stuff—and I’m laughing to myself because, well, we’re standing on the wrong side of the street. So naturally, I point that out, and he tells me that nope, I’m wrong, because he remembers everything about that night, so to prove my point I walk across the street to show him and”—she paused here— “and I see a jewelry box, sitting on the sidewalk, in the exact spot where we had our first kiss. Then I turn around and see Kyle down on one knee.”
She waved her hand, her eyes a little misty. “So there you go. The whole mushy, cheesy tale. Gag away.”
Cade picked up his coffee cup and took a sip. “That was actually pretty smooth.”
Rylann grinned. “I know. Former cyber-menace to society or not, that man is a keeper
”
”
Julie James (Love Irresistibly (FBI/US Attorney, #4))
“
Do you ever feel that same need? Your life is so very different from my own. The grandness of the world, the real world, the whole world, is a known thing for you. And you have no need of dispatches because you have seen so much of the American galaxy and its inhabitants—their homes, their hobbies—up close. I don’t know what it means to grow up with a black president, social networks, omnipresent media, and black women everywhere in their natural hair. What I know is that when they loosed the killer of Michael Brown, you said, “I’ve got to go.” And that cut me because, for all our differing worlds, at your age my feeling was exactly the same. And I recall that even then I had not yet begun to imagine the perils that tangle us. You still believe the injustice was Michael Brown. You have not yet grappled with your own myths and narratives and discovered the plunder everywhere around us.
Before I could discover, before I could escape, I had to survive, and this could only mean a clash with the streets, by which I mean not just physical blocks, nor simply the people packed into them, but the array of lethal puzzles and strange perils that seem to rise up from the asphalt itself. The streets transform every ordinary day into a series of trick questions, and every incorrect answer risks a beat-down, a shooting, or a pregnancy. No one survives unscathed. And yet the heat that springs from the constant danger, from a lifestyle of near-death experience, is thrilling. This is what the rappers mean when they pronounce themselves addicted to “the streets” or in love with “the game.” I imagine they feel something akin to parachutists, rock climbers, BASE jumpers, and others who choose to live on the edge. Of course we chose nothing. And I have never believed the brothers who claim to “run,” much less “own,” the city. We did not design the streets. We do not fund them. We do not preserve them. But I was there, nevertheless, charged like all the others with the protection of my body.
The crews, the young men who’d transmuted their fear into rage, were the greatest danger. The crews walked the blocks of their neighborhood, loud and rude, because it was only through their loud rudeness that they might feel any sense of security and power. They would break your jaw, stomp your face, and shoot you down to feel that power, to revel in the might of their own bodies.
”
”
Ta-Nehisi Coates (Between the World and Me)
“
One mother Mark and I met with, Bernadette MacArthur, had used the underground networks in conjunction with fleeing the country with her five precious children. Four of them reportedly had been horribly abused, and when the corrupt court system threatened to perpetuate it, Bernadette, pregnant, fled all the way to Turkey with them in 1988. Brilliantly maneuvering through Europe and Mexico, she slipped back into the US and Faye Yeager’s underground in 1989. Determined to surface and ‘normalize’ her children’s lives, Bernadette appeared on national TV and began speaking out. To further their safety, she then joined the Sheriff’s Department and worked her way up the chain of command achieving the rank of Major. This extraordinary mother went to extremes to protect her children and ensure their freedom! Additionally, Bernadette taught Sheriff’s Department personnel how to identify mind control survivors, satanic victims, and occult ritual sites. Her highly acclaimed accomplishments paved the way for others, while providing a backdoor into the undergrounds for those on the run. Unbeknownst to her, Bernadette saved the minds and lives of countless survivors while saving her own children.
”
”
Cathy O'Brien (ACCESS DENIED For Reasons Of National Security: Documented Journey From CIA Mind Control Slave To U.S. Government Whistleblower)
“
The same effort to conserve force was also evident in war, at the tactical level. The ideal Roman general was not a figure in the heroic style, leading his troops in a reckless charge to victory or death. He would rather advance in a slow and carefully prepared march, building supply roads behind him and fortified camps each night in order to avoid the unpredictable risks of rapid maneuver. He preferred to let the enemy retreat into fortified positions rather than accept the inevitable losses of open warfare, and he would wait to starve out the enemy in a prolonged siege rather than suffer great casualties in taking the fortifications by storm. Overcoming the spirit of a culture still infused with Greek martial ideals (that most reckless of men, Alexander the Great, was actually an object of worship in many Roman households), the great generals of Rome were noted for their extreme caution. It is precisely this aspect of Roman tactics (in addition to the heavy reliance on combat engineering) that explains the relentless quality of Roman armies on the move, as well as their peculiar resilience in adversity: the Romans won their victories slowly, but they were very hard to defeat. Just as the Romans had apparently no need of a Clausewitz to subject their military energies to the discipline of political goals, it seems that they had no need of modern analytical techniques either. Innocent of the science of systems analysis, the Romans nevertheless designed and built large and complex security systems that successfully integrated troop deployments, fixed defenses, road networks, and signaling links in a coherent whole.
”
”
Edward N. Luttwak (The Grand Strategy of the Roman Empire: From the First Century Ce to the Third)
“
Back in 2015, a volunteer group called Bitnation set up something called the Blockchain Emergency ID. There’s not a lot of data on the project now, BE-ID - used public-key cryptography to generate unique IDs for people without their documents. People could verify their relations, that these people belonged to their family, and so on. It was a very modern way of maintaining an ID; secure, fast, and easy to use. Using the Bitcoin blockchain, the group published all these IDs on to a globally distributed public ledger, spread across the computers of every single Bitcoin user online - hundreds of thousands of users, in those times. Once published, no government could undo it; the identities would float around in the recesses of the Internet. As long as the network remained alive, every person's identity would remain intact, forever floating as bits and bytes between the nations: no single country, government or company could ever deny them this. “That was, and I don't say this often, the fucking bomb,” said Common, In one fell swoop, identities were taken outside government control. BE-ID, progressing in stages, became the refugees' gateway to social assistance and financial services. First it became compliant with UN guidelines. Then it was linked to a VISA card. And thus out of the Syrian war was something that looked like it could solve global identification forever. Experts wrote on its potential. No more passports. No more national IDs. Sounds familiar? Yes, that’s the United Nations Identity in a nutshell. Julius Common’s first hit - the global identity revolution that he sold first to the UN, and then to almost every government in the world - was conceived of when he was a teenager.
”
”
Yudhanjaya Wijeratne (Numbercaste)
“
CYBERPOWER is now a fundamental fact of global life. In political, economic, and military affairs, information and information technology provide and support crucial elements of operational activities. U.S. national security efforts have begun to incorporate cyber into strategic calculations. Those efforts, however, are only a beginning. The critical conclusion...is that the United States must create an effective national and international strategic framework for the development and use of cyber as part of an overall national security strategy.
Such a strategic framework will have both structural and geopolitical elements. Structural activities will focus on those parts of cyber that enhance capabilities for use in general. Those categories include heightened security, expanded development of research and human capital, improved governance, and more effective organization. Geopolitical activities will focus on more traditional national security and defense efforts. Included in this group are sophisticated development of network-centric operations; appropriate integrated planning of computer network attack capabilities; establishment of deterrence doctrine that incorporates cyber; expansion of effective cyber influence capabilities; carefully planned incorporation of cyber into military planning (particularly stability operations); establishment of appropriate doctrine, education, and training regarding cyber by the Services and nonmilitary elements so that cyber can be used effectively in a joint and/or multinational context; and generation of all those efforts at an international level, since cyber is inherently international and cannot be most effectively accomplished without international partners.
”
”
Franklin D. Kramer (Cyberpower and National Security)
“
The overwhelming favorites to dominate the race to become the so-called Information Superhighway were competing proprietary technologies from industry powerhouses such as Oracle and Microsoft. Their stories captured the imagination of the business press. This was not so illogical, since most companies didn’t even run TCP/IP (the software foundation for the Internet)—they ran proprietary networking protocols such as AppleTalk, NetBIOS, and SNA. As late as November 1995, Bill Gates wrote a book titled The Road Ahead, in which he predicted that the Information Superhighway—a network connecting all businesses and consumers in a world of frictionless commerce—would be the logical successor to the Internet and would rule the future. Gates later went back and changed references from the Information Superhighway to the Internet, but that was not his original vision. The implications of this proprietary vision were not good for business or for consumers. In the minds of visionaries like Bill Gates and Larry Ellison, the corporations that owned the Information Superhighway would tax every transaction by charging a “vigorish,” as Microsoft’s then–chief technology officer, Nathan Myhrvold, referred to it. It’s difficult to overstate the momentum that the proprietary Information Superhighway carried. After Mosaic, even Marc and his cofounder, Jim Clark, originally planned a business for video distribution to run on top of the proprietary Information Superhighway, not the Internet. It wasn’t until deep into the planning process that they decided that by improving the browser to make it secure, more functional, and easier to use, they could make the Internet the network of the future. And that became the mission of Netscape—a mission that they would gloriously accomplish.
”
”
Ben Horowitz (The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers)
“
The fragility of the US economy had nearly destroyed him. It wasn't enough that Citadel's walls were as strong and impenetrable as the name implied; the economy itself needed to be just as solid.
Over the next decade, he endeavored to place Citadel at the center of the equity markets, using his company's superiority in math and technology to tie trading to information flow. Citadel Securities, the trading and market-making division of his company, which he'd founded back in 2003, grew by leaps and bounds as he took advantage of his 'algorithmic'-driven abilities to read 'ahead of the market.' Because he could predict where trades were heading faster and better than anyone else, he could outcompete larger banks for trading volume, offering better rates while still capturing immense profits on the spreads between buys and sells. In 2005, the SEC had passed regulations that forced brokers to seek out middlemen like Citadel who could provide the most savings to their customers; in part because of this move by the SEC, Ken's outfit was able to grow into the most effective, and thus dominant, middleman for trading — and especially for retail traders, who were proliferating in tune to the numerous online brokerages sprouting up in the decade after 2008.
Citadel Securities reached scale before the bigger banks even knew what had hit them; and once Citadel was at scale, it became impossible for anyone else to compete. Citadel's efficiency, and its ability to make billions off the minute spreads between bids and asks — multiplied by millions upon millions of trades — made companies like Robinhood, with its zero fees, possible. Citadel could profit by being the most efficient and cheapest market maker on the Street. Robinhood could profit by offering zero fees to its users. And the retail traders, on their couches and in their kitchens and in their dorm rooms, profited because they could now trade stocks with the same tools as their Wall Street counterparts.
”
”
Ben Mezrich (The Antisocial Network: The GameStop Short Squeeze and the Ragtag Group of Amateur Traders That Brought Wall Street to Its Knees)
“
We began the show by asking: Who did more for the world, Michael Milken or Mother Teresa?
This seems like a no-brainer. Milken is the greedy junk-bond king. One year, his firm paid him $550 million. Then he went to jail for breaking securities laws. Mother Teresa is the nun who spent her lifetime helping the poor and died without a penny. Her good deeds live on even after her death; several thousand sisters now continue the charities she began. At first glance, of course Mother Teresa did more for the world.
But it's not so simple. Milken's selfish pursuit of profit helped a lot of people, too. Think about it: By pioneering a new way for companies to raise money, Milken created millions of jobs. The ignorant media sneered at 'junk bonds', but Milken's innovative use of them meant exciting new ideas flourished.
We now make calls on a national cellular network established by a company called McCaw Cellular, which Milken financed. And our calls are cheaper because Milken's junk bonds financed MCI. CEO Bill McGowan simply couldn't get the money anywhere else. Without Milken, MCI wouldn't have grown from 11 to 50,000 employees. CNN's 24-hour news and Ted Turner's other left-wing ventures were made possible by Milken's 'junk'.
The world's biggest toy company, Mattel, the cosmetics company Revlon, and the supermarket giant Safeway were among many rescued from bankruptcy by Milken's junk bonds. He financed more than 3,000 companies, including what are now Barnes & Noble, AOL Time Warner, Comcast, Mellon Bank, Occidental Petroleum, Jeep Eagle, Calvin Klein, Hasbro, Days Inn, 7-Eleven, and Computer Associates. Millions of people have productive employment today because of Michael Milken. (Millions of jobs is hard to believe, and when 'Greed' aired, I just said he created thousands of jobs; but later I met Milken, and he was annoyed with me because he claimed he'd created millions of jobs. I asked him to document that, to name the companies and the jobs, and he did.)
”
”
John Stossel (Give Me a Break: How I Exposed Hucksters, Cheats, and Scam Artists and Became the Scourge of the Liberal Media...)
“
Key Points: ● Transparency - Blockchain offers significant improvements in transparency compared to existing record keeping and ledgers for many industries. ● Removal of Intermediaries – Blockchain-based systems allow for the removal of intermediaries involved in the record keeping and transfer of assets. ● Decentralization – Blockchain-based systems can run on a decentralized network of computers, reducing the risk of hacking, server downtime and loss of data. ● Trust – Blockchain-based systems increase trust between parties involved in a transaction through improved transparency and decentralized networks along with removal of third-party intermediaries in countries where trust in the intermediaries doesn’t exist. ● Security – Data entered on the blockchain is immutable, preventing against fraud through manipulating transactions and the history of data. Transactions entered on the blockchain provide a clear trail to the very start of the blockchain allowing any transaction to be easily investigated and audited. ● Wide range of uses - Almost anything of value can be recorded on the blockchain and there are many companies and industries already developing blockchain-based systems. These examples are covered later in the book. ● Easily accessible technology – Along with the wide range of uses, blockchain technology makes it easy to create applications without significant investment in infrastructure with recent innovations like the Ethereum platform. Decentralized apps, smart contracts and the Ethereum platform are covered later in the book. ● Reduced costs – Blockchain-based ledgers allow for removal of intermediaries and layers of confirmation involved in transactions. Transactions that may take multiple individual ledgers, could be settled on one shared ledger, reducing the costs of validating, confirming and auditing each transaction across multiple organizations. ● Increased transaction speed – The removal of intermediaries and settlement on distributed ledgers, allows for dramatically increased transaction speeds compared to a wide range of existing systems.
”
”
Mark Gates (Blockchain: Ultimate guide to understanding blockchain, bitcoin, cryptocurrencies, smart contracts and the future of money. (Ultimate Cryptocurrency Book 1))
“
If Jim was back at the imaginary dinner party, trying to explain what he did for a living, he'd have tried to keep it simple: clearing involved everything that took place between the moment someone started at trade — buying or selling a stock, for instance — and the moment that trade was settled — meaning the stock had officially and legally changed hands.
Most people who used online brokerages thought of that transaction as happening instantly; you wanted 10 shares of GME, you hit a button and bought 10 shares of GME, and suddenly 10 shares of GME were in your account. But that's not actually what happened. You hit the Buy button, and Robinhood might find you your shares immediately and put them into your account; but the actual trade took two days to complete, known, for that reason, in financial parlance as 'T+2 clearing.'
By this point in the dinner conversation, Jim would have fully expected the other diners' eyes to glaze over; but he would only be just beginning. Once the trade was initiated — once you hit that Buy button on your phone — it was Jim's job to handle everything that happened in that in-between world. First, he had to facilitate finding the opposite partner for the trade — which was where payment for order flow came in, as Robinhood bundled its trades and 'sold' them to a market maker like Citadel. And next, it was the clearing brokerage's job to make sure that transaction was safe and secure. In practice, the way this worked was by 10:00 a.m. each market day, Robinhood had to insure its trade, by making a cash deposit to a federally regulated clearinghouse — something called the Depository Trust & Clearing Corporation, or DTCC. That deposit was based on the volume, type, risk profile, and value of the equities being traded. The riskier the equities — the more likely something might go wrong between the buy and the sell — the higher that deposit might be.
Of course, most all of this took place via computers — in 2021, and especially at a place like Robinhood, it was an almost entirely automated system; when customers bought and sold stocks, Jim's computers gave him a recommendation of the sort of deposits he could expect to need to make based on the requirements set down by the SEC and the banking regulators — all simple and tidy, and at the push of a button.
”
”
Ben Mezrich (The Antisocial Network: The GameStop Short Squeeze and the Ragtag Group of Amateur Traders That Brought Wall Street to Its Knees)
“
If I had lied to the CIA, perhaps I might have passed a test. Instead of writing a book about the White House, I’d be poisoning a drug kingpin with a dart gun concealed inside a slightly larger dart gun, or making love to a breathy supermodel in the interest of national security. I’ll never know. I confessed to smoking pot two months before. The sunniness vanished from my interviewer’s voice. “Normally we like people who break the rules,” Skipper told me, “but we can’t consider anyone who’s used illegal substances in the past twelve months.” Just like that, my career as a terrorist hunter was over. I thought my yearning for higher purpose would vanish with my CIA dreams, the way a Styrofoam container follows last night’s Chinese food into the trash. To my surprise, it stuck around. In the weeks that followed, I pictured myself in all sorts of identities: hipster, world traveler, banker, white guy who plays blues guitar. But these personas were like jeans a half size too small. Trying them on gave me an uncomfortable gut feeling and put my flaws on full display. My search for replacement selves began in November. By New Year’s Eve I was mired in the kind of existential funk that leads people to find Jesus, or the Paleo diet, or Ayn Rand. Instead, on January 3, I found a candidate. I was on an airplane when I discovered him, preparing for our initial descent into JFK. This was during the early days of live in-flight television, and I was halfway between the Home Shopping Network and one of the lesser ESPNs when I stumbled across coverage of a campaign rally in Iowa. Apparently, a caucus had just finished. Speeches were about to begin. With nothing better to occupy my time, I confirmed that my seat belt was fully fastened. I made sure my tray table was locked. Then, with the arena shrunk to fit my tiny seatback screen, I watched a two-inch-tall guy declare victory. It’s not like I hadn’t heard about Barack Obama. I had heard his keynote speech at the 2004 Democratic Convention. His presidential campaign had energized my more earnest friends. But I was far too mature to take them seriously. They supported someone with the middle name Hussein to be president of the United States. While they were at it, why not cast a ballot for the Tooth Fairy? Why not nominate Whoopi Goldberg for pope?
”
”
David Litt (Thanks, Obama: My Hopey, Changey White House Years)
“
Months later, Time magazine would run its now infamous article bragging about how it had been done. Without irony or shame, the magazine reported that “[t]here was a conspiracy unfolding behind the scenes” creating “an extraordinary shadow effort” by a “well-funded cabal of powerful people” to oppose Trump.112 Corporate CEOs, organized labor, left-wing activists, and Democrats all worked together in secret to secure a Biden victory. For Trump, these groups represented a powerful Washington and Democratic establishment that saw an unremarkable career politician like Biden as merely a vessel for protecting their self-interests. Accordingly, when Trump was asked whom he blames for the rigging of the 2020 election, he quickly responded, “Least of all Biden.” Time would, of course, disingenuously frame this effort as an attempt to “oppose Trump’s assault on democracy,” even as Time reporter Molly Ball noted this shadow campaign “touched every aspect of the election. They got states to change voting systems and laws and helped secure hundreds of millions in public and private funding.” The funding enabled the country’s sudden rush to mail-in balloting, which Ball described as “a revolution in how people vote.”113 The funding from Democratic donors to public election administrators was revolutionary. The Democrats’ network of nonprofit activist groups embedded into the nation’s electoral structure through generous grants from Democratic donors. They helped accomplish the Democrats’ vote-by-mail strategy from the inside of the election process. It was as if the Dallas Cowboys were paying the National Football League’s referee staff and conducting all of their support operations. No one would feel confident in games won by the Cowboys in such a scenario. Ball also reported that this shadowy cabal “successfully pressured social media companies to take a harder line against disinformation and used data-driven strategies to fight viral smears.” And yet, Time magazine made this characterization months after it was revealed that the New York Post’s reporting on Hunter Biden’s corrupt deal-making with Chinese and other foreign officials—deals that alleged direct involvement from Joe Biden, resulting in the reporting’s being overtly censored by social media—was substantially true. Twitter CEO Jack Dorsey would eventually tell Congress that censoring the New York Post and locking it out of its Twitter account over the story was “a mistake.” And the Hunter Biden story was hardly the only egregious mistake, to say nothing of the media’s willful dishonesty, in the 2020 election. Republicans read the Time article with horror and as an admission of guilt. It confirmed many voters’ suspicions that the election wasn’t entirely fair. Trump knew the article helped his case, calling it “the only good article I’ve read in Time magazine in a long time—that was actually just a piece of the truth because it was much deeper than that.
”
”
Mollie Ziegler Hemingway (Rigged: How the Media, Big Tech, and the Democrats Seized Our Elections)
“
What we know today as the Internet (and the visual component of the World Wide Web) evolved from military to academic to commercial interests. In the 1970s, the U.S. Department of Defense wanted a secure communications system that could survive disasters. In the 1980s, the National Science Foundation (NSF) funded a network so that scientists at major universities could communicate and share research. In 1990, NSF announced a plan for privatization.
”
”
Lynne Schrum (Web 2.0: New Tools, New Schools)
“
contained a designer virus engineered to access NCTC's computer network. The virus would install a backdoor into the system for the waiting cyber-ops team, while covering its own tracks with the latest generation rootkit software. Once the team had access to the system, they would download a more sophisticated and robust kernel-mode rootkit to conceal their direct access to the operating system. Since kernel-mode rootkits operated at the same security level as the operating system itself, they were difficult to detect and nearly impossible to remove without rebooting the entire system.
”
”
Steven Konkoly (The Black Flagged Thriller Series Boxset Books 2-4 (The Black Flagged Series #2-4))
“
The Soviet system had left many valuable legacies—a huge network of large industrial enterprises (though stranded in the 1960s in terms of technology); a vast military machine; and an extraordinary reservoir of scientific, mathematical, and technical talent, although disconnected from a commercial economy. The highly capable oil industry was burdened with an ageing infrastructure. Below ground lay all the enormous riches in the form of petroleum and other raw materials that Gorbachev had cited in his farewell address
”
”
Daniel Yergin (The Quest: Energy, Security, and the Remaking of the Modern World)
“
GMT
A POEM BY ROSA JAMALI
TRANSLATED FROM ORIGINAL PERSIAN TO ENGLISH
WE HAVE JUST RECEIVED SOME PIECES OF NEWS
NIGHTMARISH
SEISMOGRAPHY!
AN EARTHQUAKE IT WAS
QUAKE;
TOOK PLACE!
THE ROUTE HAS BEEN DIVIDED
ON THE OIL FIELDS
AIR SATELLITES
OVER THIS MERIDIAN
THIS VERY TIME ZONE
FREE ZONE
HAS BEEN TRANSFERRED
REMOVED FROM THE MAP
OMITTED FROM THE HISTORY
FOR IT WAS
AN UNKNOWN NETWORK!
”
”
Rosa Jamali (این ساعت شنی که به خواب رفته است THE HOURGLASS IS FAST ASLEEP)
“
I heard this story of someone who does this in MLM. If he's talking to someone who is “cold”, he never, EVER starts by saying he's in “MLM” or network marketing. Instead, he talks about how unstable the economy and job market is. Then he discusses how pensions and government programs are unreliable and bankrupt. Next he suggests real financial security comes only from having a business. And if you lack experience, a franchise is ideal, since they usually offer support and a proven “paint by numbers” system. But franchises cost money and take time. So the next best thing is MLM—which can be done cheaply part time. And since most new MLM company's fail, it's best to join one that's been around a while, like his... See how that works?
”
”
Ben Settle (Crackerjack Selling Secrets: Persuasion Strategies of the Most Successful Sales, Marketing, and Negotiation Pros Who Ever Lived)
“
When we become an autonomous organization, we will be one of the largest unadulterated digital security organizations on the planet,” he told the annual Intel Security Focus meeting in Las Vegas.
“Not only will we be one of the greatest, however, we will not rest until we achieve our goal of being the best,” said Young.
This is the main focus since Intel reported on agreements to deactivate its security business as a free organization in association with the venture company TPG, five years after the acquisition of McAfee.
Young focused on his vision of the new company, his roadmap to achieve that, the need for rapid innovation and the importance of collaboration between industries.
“One of the things I love about this conference is that we all come together to find ways to win, to work together,” he said.
First, Young highlighted the publication of the book The Second Economy: the race for trust, treasure and time in the war of cybersecurity.
The main objective of the book is to help the information security officers (CISO) to communicate the battles that everyone faces in front of others in the c-suite.
“So we can recruit them into our fight, we need to recruit others on our journey if we want to be successful,” he said.
Challenging assumptions
The book is also aimed at encouraging information security professionals to challenge their own assumptions.
“I plan to send two copies of this book to the winner of the US presidential election, because cybersecurity is going to be one of the most important issues they could face,” said Young.
“The book is about giving more people a vision of the dynamism of what we face in cybersecurity, which is why we have to continually challenge our assumptions,” he said. “That’s why we challenge our assumptions in the book, as well as our assumptions about what we do every day.”
Young said Intel Security had asked thousands of customers to challenge the company’s assumptions in the last 18 months so that it could improve.
“This week, we are going to bring many of those comments to life in delivering a lot of innovation throughout our portfolio,” he said.
Then, Young used a video to underscore the message that the McAfee brand is based on the belief that there is power to work together, and that no person, product or organization can provide total security.
By allowing protection, detection and correction to work together, the company believes it can react to cyber threats more quickly.
By linking products from different suppliers to work together, the company believes that network security improves. By bringing together companies to share intelligence on threats, you can find better ways to protect each other.
The company said that cyber crime is the biggest challenge of the digital era, and this can only be overcome by working together. Revealed a new slogan: “Together is power”.
The video also revealed the logo of the new independent company, which Young called a symbol of its new beginning and a visual representation of what is essential to the company’s strategy.
“The shield means defense, and the two intertwined components are a symbol of the union that we are in the industry,” he said. “The color red is a callback to our legacy in the industry.”
Three main reasons for independence
According to Young, there are three main reasons behind the decision to become an independent company.
First of all, it should focus entirely on enterprise-level cybersecurity, solve customers ‘cybersecurity problems and address clients’ cybersecurity challenges.
The second is innovation. “Because we are committed and dedicated to cybersecurity only at the company level, our innovation is focused on that,” said Young.
Third is growth. “Our industry is moving faster than any other IT sub-segment, we have t
”
”
Arslan Wani
“
A blockchain is a fully-distributed, peer-to-peer software network which makes use of cryptography to securely host applications, store data, and easily transfer digital instruments of value that represent real-world money.
”
”
Chris Dannen (Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners)
“
Blockchain secures a decentralized network.
”
”
Alan T. Norman (Mastering Bitcoin for Starters: Bitcoin and Cryptocurrency Technologies, Mining, Investing and Trading - Bitcoin Book 1, Blockchain, Wallet, Business)
“
People don't understand computers. Computers are magical boxes in things. People believe what computers tell them. People just want to get their jobs done. people don't understand risks. They may, in a general sense, when the risk is immediate. People lock their doors and latch their windows. They check to make sure no one is following them when they down a darkened alley. People don't understand subtle threats, don't think that a package could be a bomb, or that the nice convenience store clerk might be selling credit card numbers to the mob on the side. And why should they? It almost never happens.
”
”
Bruce Schneier (Secrets and Lies: Digital Security in a Networked World)
“
Sadly, though, millions of people watched. And in my view, the “Commander in Chief Forum” was representative of how many in the press covered the campaign as a whole. According again to Harvard’s Shorenstein Center, discussion of public policy accounted for just 10 percent of all campaign news coverage in the general election. Nearly all the rest was taken up by obsessive coverage of controversies such as email. Health care, taxes, trade, immigration, national security—all of it crammed into just 10 percent of the press coverage. The Shorenstein Center found that not a single one of my many detailed policy plans received more than a blip of press coverage. “If she had a policy agenda, it was not apparent in the news,” it concluded. “Her lengthy record of public service also received scant attention.” None of Trump’s scandals, from scamming students at Trump University, to stiffing small businesses in Atlantic City, to exploiting his foundation, to refusing to release his taxes as every presidential candidate since 1976 has done—and on and on—generated the kind of sustained, campaign-defining coverage that my emails did. The decline of serious reporting on policy has been going on for a while, but it got much worse in 2016. In 2008, the major networks’ nightly newscasts spent a total of 220 minutes on policy. In 2012, it was 114 minutes. In 2016, it was just 32 minutes. (That stat is from two weeks before the election, but it didn’t change much in the final stretch.) By contrast, 100 minutes were spent covering my emails. In other words, the political press was telling voters that my emails were three times more important than all the other issues combined.
”
”
Hillary Rodham Clinton (What Happened)
“
On another occasion, Alinsky was working in his home base of Chicago to force Chicago’s department stores to give jobs to black activists who were Alinsky’s cronies. On this issue of course Alinsky was competing—or working in tandem, however we choose to view it—with Chicago’s number one racial shakedown man, Jesse Jackson. Jackson mastered a simple strategy of converting race into a protection racket. He would offer to “protect” Chicago businesses from accusations of racism—accusations that the businesses knew were actually fomented by Jackson himself. The businesses would then pay Jackson to make the trouble go away, and also to chase away other potential troublemakers. In return for his efforts, Jackson would typically receive hundreds of thousands in annual donations from the company, plus jobs and minority contracts that would go through his network, and finally other goodies such as free flights on the corporate airplane, supposedly for his “charitable work.” Later Jackson would go national with this blackmail approach. In New York, for example, Jackson opened an office on Wall Street where he extracted millions of dollars in money and patronage from several leading investment houses including Goldman Sachs, Citigroup, Credit Suisse, First Boston, Morgan Stanley, Paine Webber, and Prudential Securities. On the national stage, another race hustler, Al Sharpton, joined Jackson. For two decades these shakedown men in clerical garb successfully prosecuted their hustles. Jackson was the leader at first, but eventually Sharpton proved more successful than Jackson. While Jackson’s star has faded, Sharpton became President Obama’s chief advisor on race issues.
”
”
Dinesh D'Souza (Hillary's America: The Secret History of the Democratic Party)
“
In humanity's relentless drive for convenience and economic growth, we have developed a dangerous level of dependency on networked systems in a very short space of time: in less than two decades, huge parts of the so-called 'critical national infrastructure' (CNI in geekish) in most countries have come under the control of ever more complex computer systems.
”
”
Misha Glenny (DarkMarket: Cyberthieves, Cybercops and You)
“
Pass-through” depended on a related idea called “trusted domains.” A domain is a group whose members share the same security status. If two domains have a trusted relationship, every member of one domain “passes through” to the other. The network administrator forged links between domains, making a password good for one domain good in the other. One domain potentially could form trusted ties with all the others. But once established, the domain automatically accepted the password from every member of a “trusted” domain. There
”
”
G. Pascal Zachary (Showstopper!: The Breakneck Race to Create Windows NT and the Next Generation at Microsoft)
“
For a period of several years in the mid-1990s the Chinese talked very openly, for a Communist police state, about what they had learned from the Gulf War. They noted that their strategy had been to defeat the U.S. by overwhelming numbers if a war ever happened. Now they concluded that that strategy would not work. They began to downsize their military and invest in new technologies. One of those technologies was wangluohua, “networkization,” to deal with the “new battlefield of computers.
”
”
Richard A. Clarke (Cyberwar: The Next Threat to National Security & What to Do About It)
“
I am sure that by now you have understood the basics of cryptocurrencies and how the Ethereum system works. In this chapter, we will look at the fundamental differences between Ethereum and Bitcoin and why the former is said to be better than the latter. Block time One of the main differences between the two cryptocurrencies is the block time. The block time refers to the time taken by the network for confirmation. It is important for a network to have shorter block times to mine more coins. This is a disadvantage with Bitcoins as the average time taken is 10 minutes. On the other hand, Ethereum block time is set at 14 to 15 seconds. This makes it extremely fast and great for miners. It also makes the network more efficient. According to some reports, an altcoin named as the ripple is said to be even faster coming in at 3.5 seconds. However, it is not as secure as Ethereum and less reliable as well. Several Bitcoin users have wanted this change in the system to keep up with Ethereum. However, it does not look likely that the company will introduce this change anytime soon. In fact, several other altcoins such as LiteCoin and monero are creating waves in the field of block times and making it difficult for Bitcoin users to keep up with the pace. Model The economic model of Ethereum is much different from that of Bitcoin. We already read that there can be only 21 million Bitcoins that can be mined. This means that it will be easier to keep track of the currency. On the other hand, an infinite number of Ether can be mined thereby making it difficult to keep track of it. This, however, is said not to impact the value of Ether, as the number of coins in circulation will not affect its value. It is not known as to how long it will take to mine 21 million Bitcoins. Some believe that it will take another 15 years while some think it will take 100+ years. There is news that finite ethers will be mined by the end of 2017 thereby making it a bit more stable.
”
”
Mark Fisher