A lot of ICT security musings don’t take into account that before being “ICT”, security is first “security”. This means that in designing a strategy, the “security architect” should know the basic meaning of the word: preventing threats and, in case the worst happens, terminate the threat as fast and ruthlessly as possible. Continue reading “On Killing (A disturbing attitude on ICT Security)”
I don’t enter into the merit of the tantamount hypocrisy surrounding Kevin Spacey’s fall from the Hollywood’s sky to the boiling Inferno of the media cauldron. I’m rather interested in the decision to re-take with another actor all the scenes of the movie where Mr. Spacey act as Paul Getty that looks like an Orwell’s Big Brother job. Continue reading “Kevin Spacey’s Replacement as Paul Getty is the Sign of the Big Brother”
History , (financial) scams and criminal trials teach us a lesson: public institutions, companies and private citizen need cash to enter into “private” transactions.
Be the unofficial payment of a political ransom, the black fund to hide management wrongdoing or an attempt at run from the tax authorities, the assumption remains the same: currency privacy is an asset. Continue reading “The Need for Currency Privacy. An Hard Truth About Bitcoin and Its Siblings”
I took this picture in Liverpool (UK) back in 2006 while I was hired to assist a Swiss Television crew shooting a documentary on the Echelon’s station at RAF Menwith Hill base. Continue reading “The Early 2000th BT Way to Sell the Internet”
A side effect of Fuchmanns vs Germany is the (hopefully final) clarification that Right to Be Forgotten has nothing to do with Privacy protection.
Fuchmanns vs Germany, indeed, is an European Court of Human Rights Article 8 (privacy) case, while Right to Be Forgotten is an EU Fundamental Chart Article 7 (personal data protection) right.
Trying to use privacy as a legal basis for the Right to be forgotten is just plain wrong.