The Battle of Copyright-Fishes

Contrary to the public opinion, copryight’s abuses don’t belong to “pirates” only.

Using the “weight” of his business size, singer Ariana Grande allowed photographers to participate to her show only if they surrender their copyright over the picture they shoot.

That’s rather interesting and disturbing because to criticize this decision, f the photography industry “shouted fire” claiming an infringement of the freedom of press.

But ? the Arianagrandegate is about money, not freedom, and it is unfair – to say the least -to invoke free speech to protect a pure business interest.

So, it will be interesting to see how this will evolve: copyright fishes that peacefully swim in the same pond now discover that friends has become foes.

End everybody knows what happens when a smaller fish meets a bigger one.

 ?

If software were a military weapon

Software manufacturing is often compared to car building, and there are plenty of such analogies available, ranging from jokes to serious analysis.

A less considered match is the manufacturing of military weapons in contrast to sport weapons.

The history of the US Army contest that led Beretta to a winning over the German-Swiss Sig Sauer, thus securing the Italian company a rich supply contract of the “92” (renamed “M9” in the US Army naming system) is revealing.

The M9 was “the” most reliable gun in the market, being able to fire thousands of bullets without malfunctions, though enough to stand against the harshest environmental conditions and easy to both operate and maintains. Soldiers could rely upon this weapon to have the job done and not being let alone in critical moments.

How many software (from firmware, to operating systems, to platforms) are built like a Beretta M9?

Facebook to move from a public square into a living room. When the cure is worse than the disease

According to The Conversation, there is an upcoming shift of Facebook’s approach to its user privacy. This quote from Mark Zuckerberg clarifies the position of the company:

Over the last 15 years, Facebook and Instagram have helped people connect with friends, communities, and interests in the digital equivalent of a town square. But people increasingly also want to connect privately in the digital equivalent of the living room.

While the news has been (cautiously) saluted as an improvement of Facebook’s attitude towards the core of its business, actually the proposed cure is worse than the disease.

If, as Zuckerberg says, Facebook is going to move from a public square to a living room, this actually weakens the meaning of privacy because:

1 – it sends the message that privacy equals secrecy, while the notion of privacy is far wider,

2 – if everything is private, nothing is private. By not making
distinction between the intimate sphere and the public space, Facebook is
turning people into faceless being.

3 – Furthermore, by enhancing the “private ring” notion, people will lose the main role of a social network (in the sociological meaning of the word): challenging our individual and assumptions, become accustomed to diversity.

What Boxe and Knife Sparring teach about ICT Security

Time and Space are two key factors in any strategy, whether offensive or defensive. ? This is true regardless you are involved in large scale, symmetric conflict, in an ambush or in a direct attack. There are, though, serious differences among the possible reactive approaches according to the different factual circumstances.

An empty hand attack can be handled by taking into account to be hit as a way to “close the distance” and gain a tactical advantage. This is best exemplified by the way boxeurs manage the opponent: maybe they get partially hit by a jab, but in the meantime they set themselves in the right position and time to hit with a devastating cross.

Knife sparring – let alone actual “fighting” or self-defense – requires an entirely different approach. In such kind of training it is mandatory not to be hit because a hit actually means a “cut”. Therefore the training is focused on being as far as possible from the blade, and hitting the opponent’s hand with the defendant’s knife (this is called “defang the snake”.) In knife sparring everything is faster and the reaction’s options are very limited, as you don’t backstep and then hit back, or try to catch&parry a knife flying around your face or guts, as you would with just a bare fist.

This key difference matches a common underrated assessment when designing an ICT security model: is the infrastructure able to sustain a hit and remains operational while the “defense team” is summoned (as in the Boxing Sparring)? Or the infrastructure is not designed to act like that and, once hit, its operational capability is progressively hampered (as in the Knife Sparring)?

The answer to this questions is important because it helps the security manager to better define the structure, the roles and the budget of the incident management team.