Far from solving all your problems, if you rely on government to solve your cyber-security problems, I think you’re more likely to end up with restricted access to the Internet and someone other than hackers evaluating your communications. And I mean this is a possibility not only from your own national government but due to future international “cooperation” among governments.
Here are five reasons why you have to build your own cyber-protection capabilities rather than relying on governments to solve any of your security (and cyber-attack) problems for you. And you have to be vigilant and aware of what’s going on that might put governments even more in control of your online communications, reducing the options you have available to communicate privately with others as well as to defend yourself. [Read more…]
When the web was new, the goal was to get as many “eyeballs” as possible looking at your site content—to aggregate readership with your site being the aggregation point. This pretty much followed the old rules of advertising and promotion—you needed people to see your advertising in order to succeed financially[1. Oh, wait, what do I mean “old rules” here? It’s still true, and that’s why the rest of this article is germane.]. The phrases “visit us often” or “bookmark this site” or “come back frequently” were the conventional wisdom, and web surfers used bookmarks to remember what sites they wanted to go back to and read later. But they mostly never did except for the big news or entertainment portals.
I work with a dozen or so clients at any given time, and in the last three (or thereabouts) weeks I’ve noticed that some sites on small servers with limited capacity are being “eaten alive” by spidery searchbots. And not just the usual suspects—Google, Yahoo, MSN—but by specialized searchbots that exhibit a kind of behavior I haven’t seen very much before. It used to be that web site owners prayed for the searchbots to come by, and searchbots by and large were sparing in their examination of pages, not hitting a site very hard at all, but building an overall image of the pages on the site over a long time. [1. Illustration: “Spider & Crossbones” pirate flag]
Who has access to your email addresses and your email-writing history?
This is the same process the Bush administration used, in the early 2000s, to ask libraries to turn over the records of books checked out by patrons, which was strongly resisted by librarians at that time.