Making Privacy Great Again (?) – The Blackphone Story – Part 2 – Ride on Time

(to those who miss, here is part 1…) Everyone wants to be secure, or so it seems, and that what makes the whole story of Silent Circle so sad. A group of extremely talented people (Phil Zimmerman (PGP), Jon Callas (Apple, OpenPGP), Mike Kershaw (Kismet) etc.) gathered and created Silent Circle… and developed phone that…

Making Privacy Great Again (?) – The Blackphone Story – Part 1 – Introduction

Ever since my last post I’ve been more silent than usual. The reason for it was a phone called Blackphone‍ 2 or BP2‍ , a “Private by Design” product of a company called Silent Circle‍. What made me extremely interested in the product was the fact that in January Silent Circle started to brick phones…

Mr Big (Data)

Why big data and analytics are sexy, and why only awareness can secure them.   What doesn’t kill you will make you…suffer longer (Paraphrasing Friedrich Nietzsche)   S-E-X-Y Information is sexy, and sexy sells. These days, nothing seems to be sexier to than the “Big Data” and “Analytics”, which are the latest buzz words in the…

The Cyber Minority Report: Gender Affairs

Investigating the evolutionary relationship between women, information, and security, via the prism of the red queen hypothesis. In 1973, an evolutionary scientist called Leigh Van Valen published an academic paper called “a new evolutionary law”. In it he defined a law called “law of constant extinction”, which state that the probability of extinction does not…