Erinevus lehekülje "The clash of motivations: different players in the field" redaktsioonide vahel

Allikas: KakuWiki
Mine navigeerimisribaleMine otsikasti
26. rida: 26. rida:
  
 
=== The Big Brother ===
 
=== The Big Brother ===
 +
 +
While there are countries where govermental violations of citizens' privacy have been established policy for long (former Eastern Europe, China, Cuba, North Korea), the near future has raised increasing concern over privacy in the so-called democratic countries, especially the US. The countermeasures following the September 11, 2001 attacks introduced a number of developments which substantially reduced privacy. A
  
 
[http://en.wikipedia.org/wiki/Magic_Lantern_%28software%29 Wikipedia: Magic Lantern]
 
[http://en.wikipedia.org/wiki/Magic_Lantern_%28software%29 Wikipedia: Magic Lantern]
  
 
WOO, C., SO, M. (2002) [http://jolt.law.harvard.edu/articles/pdf/v15/15HarvJLTech521.pdf The Case for Magic Lantern: September 11 Highlights the Need for Increased surveillance]. Harvard Journal of Law & Technology, Volume 15, Number 2, Spring 2002.
 
WOO, C., SO, M. (2002) [http://jolt.law.harvard.edu/articles/pdf/v15/15HarvJLTech521.pdf The Case for Magic Lantern: September 11 Highlights the Need for Increased surveillance]. Harvard Journal of Law & Technology, Volume 15, Number 2, Spring 2002.
 
  
 
=== Privacy / human rights organisations ===
 
=== Privacy / human rights organisations ===

Redaktsioon: 24. juuli 2006, kell 17:36

Intro

Karl Marx, one of the controversal thinkers of human history, has used the concept of 'the unity and struggle of opposites'. While not in its exact philosophical sense, something similar can be seen in security context. Here it means two adversary sides of security keepers/providers and breachers: yet the "security industry" cannot exist without breachers. Quoting Freddie Mercury - I can't live with you, I can't live without you...

Another dimension is often added by need for privacy. More often than not, privacy and security are two extremes of the same scale - total security equals no privacy and vice versa. The main point is to acquire the optimal balance of the two factors for any given situation. On the other hand, the principle "good security is invisible" applies nearly everywhere, including the online world.


Malware makers

Starting from around 2000, spyware (software that will forward information about the host computer and its user to third parties without the users' consent) has gradually replaced viruses as the prime threat to security and privacy in the Internet. Spyware has gradually intertwined with adware (advertisement software), many spyware specimens contain advertisement modules as a part of their "business model". In more modest cases, the 'spying' features focus only on recording the web pages that the user visits (however, these may also be forwarded to the software authors) and the data is used to display relevant advertisements - e.g. if someone regularly visits websites dedicated to hunting, s/he will get ads on outdoor goods, hunting rifles, maps etc.

Gradually, this relatively innocent spying made way to more serious business as some of today's spyware will target sensitive information stored in the host computer. These include keyloggers, password catchers and sniffers - see the link below for lots of examples. Note that this is 99,9% Windows-specific phenomenon - combining the widest distribution and the questionable quality of the system, plus the most uneducated user base.

Ordinary Windows users are more than often in blissful ignorance, until the machine starts to slow down. There have been cases when people are buying new computers due to the old one 'becoming too slow'... It is common that incompetently managed computers have got literally thousands of instances of spyware installed, which will seriously hamper its performance.

Spyware Encyclopedia @ pestpatrol.com .

Security business

There is a joke about two doctors, father and son. Once a long-time patient of the father goes to the son, and in two months, gets rid of his problem. The son goes proudly to the father: "Dad, you treated Mr. Smith for seven years. I solved his problem in two months!". The father replies: "Son, I used his money to pay for your education."

Of course, security as business subject is not the product of the information age. From the early days of mankind, people have paid others to keep them safe. Kings had their guard, countries had their armies. In modern times, we have police and security firms. And probably already the earliest security specialists realised that a) security is about selling a safe feeling, and b) it is wise to keep potential threats at bay, not eliminate them - thus ensuring that there is work for tomorrow as well.

Even if we now speak about security of bits and bytes, the main things remain largely the same. The large companies offering a wide variety of computer security solutions benefit a lot from the chaotic situation in the Net. One might argue that the day when all malware and spam will be gone from the Net will be an unhappy one for McAfee, Sophos, Kaspersky, F-Secure... These firms would not like the day when everyone would use Mac or Linux either.


The Big Brother

While there are countries where govermental violations of citizens' privacy have been established policy for long (former Eastern Europe, China, Cuba, North Korea), the near future has raised increasing concern over privacy in the so-called democratic countries, especially the US. The countermeasures following the September 11, 2001 attacks introduced a number of developments which substantially reduced privacy. A

Wikipedia: Magic Lantern

WOO, C., SO, M. (2002) The Case for Magic Lantern: September 11 Highlights the Need for Increased surveillance. Harvard Journal of Law & Technology, Volume 15, Number 2, Spring 2002.

Privacy / human rights organisations

These organisations have an increasing role of balancing the field, especially due to

  • politically motivated privacy violations by governments
  • economically motivated violations by various business and quasi-business (RIAA, BSA) organisations



For discussion

  • Would you rather invest in a fully specialised anti-malware company or a company which has malware fighting as a smaller part of their business?


Links

  • What's In a Name? - from the F-Secure Weblog; a very good example of rogue 'anti-spyware' programs which are in fact spyware themselves.