Category Archives: Security

Kandel on Memory and Identity

The NYT gives an interesting example of how identity fits with memory in an interview of Nobel Prize-winning neuroscientist Dr. Kandel:

So what’s the biggest problem in psychoanalysis? It’s memory!

What does he mean? Take his own memory as an example. His Nazi neighbours in Austria forced him to change his identity as a young boy.

I was 8 ½. Immediately, we saw that our lives were in danger. We were completely abandoned by our non-Jewish friends and neighbors. No one spoke to me in school. One boy walked up to me and said, “My father said I’m not to speak to you anymore.” When we went to the park, we were roughed up. Then, on Nov. 9, 1938, Kristallnacht, we were booted out of our apartment, which was looted. We knew we had to get out.

Then, when awarded a Nobel prize, his childhood memories blocked him from accepting Austrian efforts to give his identity back (or to claim his prize as their own).

Their newspaper people said, “Oh, wonderful, another Austrian Nobel Prize!” I said: “You’ve got this wrong. This is an American, an American Jewish Nobel Prize.” The president of Austria wrote me a note: “What can we do to recognize you?” I said, “I do not need any more recognition, but it would it be nice to have a symposium at the University of Vienna on the response of Austria to National Socialism.” He said, “That’s fine.” I’m very close to Fritz Stern, the historian, and he helped me put the symposium together. Ultimately, a book came out of it. It had a modest impact.

Insertion of memories is apparently easier than removal. Yet at the end of it all he indicates he does not approve of removing bad memories.

To go into your head and pluck out a memory of an unfortunate love experience, that’s a bad idea. You know, in the end, we are who we are. We’re all part of what we’ve experienced. Would I have liked to have had the Viennese experience removed from me? No! And it was horrible. But it shapes you.

“Unfollow” Nokia N9 Ad with Fan Bingbing

Here’s an advertisement from China, which emphasises individual freedom and innovation, based on my current favourite phone, the linux-based N9 “swipe” made by Nokia:

You may think I’m crazy
As I think everyone else is too ordinary…

I found this video as I noticed an unlocked black 64GB model can now be purchased new in the US for $500.

Nokia also has launched an “augmented reality” site, which emphasises simplicity in design and allows you to use your webcam to interact with an N9 simulation.

Collusion Add-on for Firefox

Mozilla has released an interesting link-analysis tool (like those used for police investigations but without events) called Collusion

Collusion is an experimental add-on for Firefox and allows you to see all the third parties that are tracking your movements across the Web. It will show, in real time, how that data creates a spider-web of interaction between companies and other trackers.

I fired it up to do a simple test with a blog site. A plugin called Sexybookmarks, infamously found in “over 200,000 websites,” seemed like a good place to start. It supposedly makes it easier for readers to share posts to Twitter, Facebook, and so forth but it also gives blog administrators a vague “track performance” option.

Notice how they put a “recommended” note next to the yes option to persuade a blog owner to leave it on. Other options do not say whether they are recommended or not. Suspicious, no?

It turns out there is reason to be concerned about the “recommended” option. I clicked on yes, reloaded and Collusion immediately picked up traffic being sent to media6degrees.com.

Very easy now for any Firefox user to visualise their traffic to other hidden sites when they visit familiar ones. More importantly it shows a single central repository of user actions formed from multiple sites that present themselves to a user as separate and distinct.

You may think you are going to site Alice and site Bob, which have nothing in common, but they could actually share an innocent-looking tool that (even unbeknownst to them) sends your information off to a third-party managed by authors of Sexybookmarks who then use your “performance” data to post stories and graphs to illustrate your online behavior and interests.

Our statistics, based on aggregate search data from more than 270 million unique monthly readers reached by more than 200,000 Shareaholic publishers, reveal that Hugo is favored for Best Picture with 33% of searches…

Now the tool just needs the ability to right-click and select “block” or “deny”.

Big Data Security, Big Challenges: Start Here

Thursday, March 22 at the GigaOm Structure:Data conference I will discuss with Dave Asprey, VP of Cloud Security at Trend Micro, the present and future state of security of big data.

We have a session called “Big Data Security, Big Challenges: Start Here

Security at scale is harder than you’d think, especially when your big data platform is based on Infrastructure as a Service cloud computing. Join us for this introductory fireside chat as we discuss encryption for big data, how virtualization affects the security of big data, and emerging practices that will provide a big boost for big data security.

Hope to see you there.

GigaOM