Archive

Archive for the ‘Secuity’ Category

Circle Of Miles And Taxes

Gas taxes in the state of Washington based on http://dor.wa.gov/content/findtaxesandrates/othertaxes/tax_mvfuel.aspx  we’re taxed about .67 per gallon of gas sold.  A lot of our property taxes go for highway projects as well.  Changing to the system of miles traveled will cause in the short term a drop of state tax revenue.  And, you know they will try and replace that lost income.  Keep incentives for purchasing electric cars and charge declining flat tax based on purchase price over the life span of the car. Transportation and autonomous vehicles will become a reality. Uber is experimenting in Ohio and has made an autonomous beer delivery run.

Take a look at a map and draw a circle in a 100 mile radius from your home you’ll be surprised at how much there is to do and see right where you live.  We don’t get much out of our home zone.  And, within that zone lies our commute paths. To and from work. And, on weekends an occasional trip across the mountains.  Other than taxation for miles driven, possibly tracked by gps, laws will have to be assessed to see how to protect our privacy. New laws either need to be created or old ones enforced to protect our privacy and our home locations.  From the metric centric point of view, the correlations provide a unique challenge for all of us.  Just random thoughts. J

Electric hybrids are supposed to be more efficient and at this time our state don’t tax based on miles driven.

People who work in SF, sometimes live 2-3 hours away from the job. Would self-driving cars change that?  Not sure but If I were to take an automatic vehicle I would hope that there would be lanes of traffic to account for autonomous driving.

10 years into the future a self-driving car will be smaller and lighter. They will go forward and back and from side to side.  The rules of the road will have changed because these little things would get crushed.  You’ll start out in the morning leaving in your self-driving car. You strap in and pull down the table in front of you and get comfortable for the commute. On your head are the latest in 3D real vision. You’ll Watch a little news, reply to email and take a quick 3d selfie to post on the airwaves channel. Life is good.

Arriving stress free at work your self-driving car drives directly to the parking garage elevator where you are whisked away and delivered promptly to your office.  Lunch is 3d printed ham and cheese on rye. . Life is good.

On the way home, put your 3D real vision on get lost playing the latest game.  Arriving home safe and rested, Life is good.

Perhaps flex time. Commute every other day in the self-driving cars.  It is and will happen as roads get more congested.

What solutions would you offer for autonomous and self-driving vehicles?

SECURITY and PRIVACY :- Twitters Privacy Update Policy

SECURITY and PRIVACY :- Twitters Privacy Update Policy

Security and privacy should be important for everyone.  Just now I noticed that the privacy policy for tacking on twitter has changed.  I would encourage you
to edit your values and turn off all tracking.  When I first looked all values were checked!
Giving up your right to privacy I think is a security risk.  But, discern for yourself what you wish to do. 🙂

What are your thoughts on data tracking?

Joseph

CYBER-ATTACKS :- We’re too late! Engage clocking device then notify the fleet and return to base.

May 17, 2017 2 comments

CYBER-ATTACKS

We’re too late! Engage clocking device then notify the fleet and return to base.

Future cyber-attacks won’t be done by man. Cyber-attacks will be performed by AI.  Various AI trained by machine learning will vulnerability check and then drop helper bots on vulnerable networks and computers along the way.  Undetected, these additional bots will further the attack by increasing the depth and breadth that gives worldwide impact to such attacks. Quite possibly it will run on one of the major cloud platforms where global staging of bits that do the damage are housed and can go undetected for a long time.  Not only are they asking for ransom but the biggest ransomed users will start demanding global ID’s in hopes of stopping these types of attacks. In fact I believe that the attacks will increase until that nefarious plan succeeds.  Granted, personal activities that are initiated by you either via an email link, or some other source of link, or do some kind of application install causes most of the issues.  But not all.  More education in this area would help.

Not only will these attacks continue, but the online games that millions of kids of varying ages use every day, have live chat rooms.

Why is that important? And, how does that relate to cyber-attacks?

Chat rooms are being used in games to organize others as groups in the games and to make trades for items gathered during game play. That’s easy enough. But, with young kids for the thought of getting extra game items or items for free, will click on, download and install some application only to find out their password was stolen, game assets drained and have been locked out of their account. Not quite the same as recent cyber-attacks that have struck around the world, but a personal attack nevertheless and ones that often go unreported. And, just maybe a yet to be detected bot?  (Parental setup and security control of a kid’s computer is another topic)

Most online games and platforms for game play state that those under certain age should not have access unless they have their legal guardian’s permission.  I wonder how many pass up reading the access rules!  Kids seem to have more computer knowledge than parents and many don’t bother following up after setting up a kid on a platform.  A lot use Facebook whom are under the age of 18. The smart kids will gain access quite easily.

This should bother everyone.   Kids really don’t know how old or who the person’s on the other end of the chat are. Their susceptible to screen chatter and are not on the guard when someone might be asking probing questions such as do you have pets. What’s your school’s mascot name? Etc, add your own and it can be scary indeed. The social engineering aspect that kids face can be challenging.  They exist and everyone has vulnerabilities.

Kids are now playing augmented reality games on smart devices and as the games move to 3d glasses, uncontrolled augmented reality games could be a catalyst for cyberattacks.  Couldn’t it? Meet me at the cemetery our job is to grave rob.  The prize is located 6 feet down and looks like a sack of shingles If found will be worth 20,000 bit coins.  Hey we’re having a 100 person march tonight in support of macaroni and cheese school lunch Thursdays. Meet us at the school with a can of orange paint for a chance for a secret Santa surprise.

Perhaps none of this will be like that if we’re aware and teach our kids. But what if things like that have happened and are continuing to happen?

I mean parents can’t sit and watch everything a kid does online or can they?  Are you a parent with school age kids?  Kids that use the internet that play games such as ROBLOX.COM? And, other free online games?  They are fun but I would be very concerned if you did not check into and understand what these online games are.   As mentioned most have chat rooms to communicate with others in a game. But, kids really don’t know how old the persons on the other end of the chat are. Maybe an AI Trained chat bot that we help train!! Nice. And, that has recently happened.

Some possible solutions.

  1. Create automatic sandboxes for running games either on desktop or place browser functionality into a sandbox no matter who the vendor of the browser.
  2. Deliver all email with links and active content turned off by default.
  3. Allow easier access to mail headers and provide mail header tracing for validation and research.
  4. Remove cross site cookie tracking and web beacons. Less tracking would eliminate targeted threats.
  5. Allow 3d glasses to work only within 20 feet of a matched base station.
  6. A drive for personal photos and documents that could never be used or locked by unauthorized sources. Cloud as backup perhaps?
  7. Two factor authentication where the parent receives the code to login. Could be too much but is a good idea if it would work.
  8. And, while not mentioned above fix IoT security. This will help as well.

However, removing tracking will be difficult as it generates millions of dollars for advertisers. Media watching and usage changes are taking the industry by storm. Many have given up cable and are doing so at a rapid pace.  Desktop usage has gone down as users become more mobile.  Advertisers large and small still need a way to push advertisements to consumers.

Just a few years ago bandwidth was more expensive and users did not want all the extra ads being displayed.  Application availability was sparse and not many that good. Bubble popper was my favorite and could be heard in many restrooms.  Now at the speed of thought and light our devices via tracking, application usage, site participation with voice activation and weather are presenting the prepared “Just For You” items that tracks across owned devices.  The metrics!!! Damn, the metrics.

We all need knowledge of how to protect ourselves and our families in the digital age from current and future cyber-attacks.   The rapidly changing false headlines this past year could have been a cyber attack. Couldn’t it?  Makes us all Wanna Cry.

Perspective is what it is.