Home » Internet
Category Archives: Internet
The world’s largest internet companies are either in China or USA (except for a few in Japan)
China’s strategy has helped it in the following-
- protect it’s citizen’s data from foreign data collection
- helped safeguard the industrial secrets of it’s own corporations
- create a domestic ecosystem that benefits it’s own entrepreneurs and investors
- created basic infrastructure for resisting cyber warfare (et Stuxnet virus)
Rest of the non Chinese World has now the following ignominy-
- Most of profits from IPOs, Ads flow to US companies
- US Govt arm spy in active collaboration with US companies including gathering industrial secrets for trade negotiations
- Almost zero non Chinese non American Internet Infrastructure
- built a monopoly of California led companies across rest of world
- led to brain drain of top technical talent to USA
- Great ecosystem of investors and tech in USA- to the detriment of all other countries
Internet is the new opium, and after getting the rest of the world addicted- USA law makers are abandoning core principles like net neutrality and opting for unrestricted warrant less spying , as well as preparing inroads for cyber attacks
China is correctly safeguarding the future interests of it’s citizens- while the rest of the world is now a cyber colony mostly occupied by USA
Countries have no friends, only interests
- Much more progress has been made in data storage , data querying and data analysis of huge amounts of personally identifiable information , than in encrypting such information
- Big Data has as much dual use usage for governments and corporations as uranium has for building bombs or power plants.
- There is as much lucre and potential revenue for encrypted data streams in the cloud era – as there for anti virus software in the PC era
- Tracking citizens totally is evil- the total costs of such programs is unjustified given the thwarted terrorism plots by Big Data ‘s Cyber Spying. At best I can understand governments spying on citizen’s of other countries to gain advantages in trade
- The American dominance of cyber spying and big data threaten to unravel and undermine it’s credibility as de facto leader of the Internet. It proves China’s vision of a walled off internet makes sense and that is a dangerous precedent which could lead to the break up of the internet along national boundaries of electronic fire walls.
Definition-(of an image, video, piece of information, etc.) circulated rapidly and widely from one Internet user to another.
- Channels- Some content goes viral on some particular channels (like 4chan, or Tumblr) while gets ignored on other social media channels
- Content Type- the type of content should match the audience type (technical or non technical) and channel used for dissemination (like Pinterest or Tumble for images)
- Celebrity- Getting a celebrity (say with high enough influence score) endorsement greatly helps viral content to reach beyond initial network
- Credibility by Counts or Network Effects- People find it easier to like or share content which is already proved to be a viral content or beyond a certain threshold. Some people would like the content if it already is very successful.
- Content Customer type-Content consumers can be influencers, sharers, innovators, or passive. It is critical to meet a certain threshold of certain customer types to hit viral counts.
- Context- One man’s viral content is another man’s spam.
- Comment and Circulation – How easy is it to circulate the content? to share it or show appreciation? to add customized comments? This affects viral nature- though it is mostly a function of hosting website than the content itself
\bonus the 8th C – Cuteness and Catiness – On the internet cute babies and cats rule in a duo-poly
I would like to write a thank you note to some of the people who helped make Decisionstats.com possible . We had a total of 150,644 views this year.For that, I have to thank you dear readers for putting up with me- it is now our seventh year.
I would like to thank Chris (of Mashape) for helping me with some of the interviews I wrote here .I did 26 interviews this year for Programmable Web and a total of 30+ articles including the interviews in 2013.
Of course- we have now reached 116 excellent interviews on Decisionstats.com alone ( see http://goo.gl/V6UsCG )I would like to thank each one of the interviewees who took precious time to fill out the questions.
Sponsors- I would like to thank Dr Eric Siegel ( individually as an author and as founder chair of www.pawcon.com ) , Nadja and Ingo (for Rapid-Miner) , Dr Jonathan ( for Datamind) , Chris M (for Statace.com ) , Gergely ( Author) and many more during all these six years who have kept us afloat and the servers warm in these days of cold reflection, including Gregory (of KDNuggets.com) and erstwhile AsterData founders.
Training Partners- I would like to thank Lovleen Bhatia ( of Edureka for giving me the opportunity to make http://www.edureka.in/r-for-analytics which now has 1721 learners as per http://www.edureka.in/)
I would also specially say Thank you to Jigsaw Academy for giving me the opportunity to create
the first affordable and quality R course in Asia http://analyticstraining.com/2013/jigsaw-completes-training-of-300-students-on-r/
These training courses including those by Datamind and Coursera remain a formidable and affordable alternative to many others catching up in the analytics education game in India ( an issue I wrote here)
Each and Everyone of my students (past and present) and Everyone in the #rstats and SAS-L community, including people who may have been left out.
Thank you sir, for helping me and Decisionstats.com !
Wish each one of you a very happy and Joyous Happy New Year and a great and prosperous 2014!
We are trying to hypothesize realistic scenarios based on existing or near by technologies between the two extreme and popular notions of cyber warfare- that promoted by Die Hard 4 and those who think it is only about bringing down databases.
A Cyberwar is like any war – it will have stages
Reconnaissance and Spying- Not just port sniffing or spear phishing, it will identify the primary and secondary targets in the first and second wave of attacks. It will include both civilian and military strategic targets as well as tactical ones.
For example- communication systems of military infantry and other ground forces are comparatively hardened , but completely disabling the military hospital infrastructure of a country is likely to have more psychological and impact effects. This could range from industrial machines to critical hardware all linked up nicely
The communication system of emergency services is more easily disrupted digitally and can cause more damage than military communication. A simple attack on phone systems for emergency calls (i.e 9-1-1 or 3-1-1 for West or 100 , 101, 102 for India)
This could also include databases on individuals to be targeted including their civilian family members. If you hack the Senator’s daughter Facebook account, trust me it is easier and just as much distracting than hacking the Senator’s website. A list of possible databases to be hacked have been written about here and here
Add oil producing grids, dams, electricity grids and water supplies for civilians to this list and you can see how even messing with the digital diagnostics of the infrastructure can impact the efficiency of enemy response.
So the next time you wear that Pirate Bay T Shirt and participate in the masked rally, know that you are not just protesting war you are unwillingly and unwittingly participating in one.
Personally I think a browser with inbuilt backdoors to Tor Relays and data transfer by Bit Torrrents could be worthy a project too.
Quit the bullshit, Google- you are as evil as The Russian Communist Empire
I was just reading up on my weekly to-read list and came across this interesting method. It is called Play Color Cipher-
Each Character ( Capital, Small letters, Numbers (0-9), Symbols on the keyboard ) in the plain text is substituted with a color block from the available 18 Decillions of colors in the world  and at the receiving end the cipher text block (in color) is decrypted in to plain text block. It overcomes the problems like “Meet in the middle attack, Birthday attack and Brute force attacks ”.
It also reduces the size of the plain text when it is encrypted in to cipher text by 4 times, with out any loss of content. Cipher text occupies very less buffer space; hence transmitting through channel is very fast. With this the transportation cost through channel comes down.
Visual Cryptography is indeed an interesting topic-
Visual cryptography, an emerging cryptography technology, uses the characteristics of human vision to decrypt encrypted
images. It needs neither cryptography knowledge nor complex computation. For security concerns, it also ensures that hackers
cannot perceive any clues about a secret image from individual cover images. Since Naor and Shamir proposed the basic
model of visual cryptography, researchers have published many related studies.
Visual cryptography (VC) schemes hide the secret image into two or more images which are called
shares. The secret image can be recovered simply by stacking the shares together without any complex
computation involved. The shares are very safe because separately they reveal nothing about the secret image.
Visual Cryptography provides one of the secure ways to transfer images on the Internet. The advantage
of visual cryptography is that it exploits human eyes to decrypt secret images .
ESPECIALLY SEE |THIS AND THIS
Even more fun—– visual cryptography using a series of bar codes – leaving the man in middle guessing how many sub images are there and which if at all is the real message
Color Visual Cryptography Scheme Using Meaningful Shares
Visual cryptography for color images
- Visual Crypto – One-time Image Create two secure images from one by Robert Hansen
- Visual Crypto Java Applet at the University of Regensburg
- Visual Cryptography Kit Software to create image layers
- On-line Visual Crypto Applet by Leemon Baird
- Extended Visual Cryptography (pdf) by Mizuho Nakajima and Yasushi Yamaguchi
- Visual Cryptography Paper by Moni Noar and Adi Shamir
- Visual Crypto Talk (pdf) by Frederik Vercauteren ESAT Leuven
- t the University of Salerno web page on visual cryptogrpahy.
- Visual Crypto Page by Doug Stinson
Constructions and Bounds for Visual Cryptography
Lecture Notes in Computer Science 1099 (1996), 416-428 (23rd International Colloquium on Automata, Languages and Programming).
- Visual Cryptography for General Access Structures
Information and Computation 129 (1996), 86-106 (this paper is an expanded and revised version of the conference paper).
- On the Contrast in Visual Cryptography Schemes
Journal of Cryptology 12 (1999), 261-289.
- Extended Schemes for Visual Cryptography
Theoretical Computer Science 250 (2001), 143-161.
- Threshold Visual Cryptography Schemes With Specified Whiteness Levels of Reconstructed Pixels
Designs, Codes and Cryptography 25 (2002), 15-61.
- Contrast Optimal Threshold Visual Cryptography Schemes
SIAM J. on Discrete Math. 16 (2003), 224-261.
- “Visual Cryptography: Seeing is Believing” availablehere,
- example- face http://cacr.uwaterloo.ca/~dstinson/VCS-happyface.html
- flag http://cacr.uwaterloo.ca/~dstinson/VCS-flag.html
- pi http://cacr.uwaterloo.ca/~dstinson/VCS-pi.html
- Simple implementation of the visual cryptography scheme based on Moni Naor and Adi Shamir, Visual Cryptography, EUROCRYPT 1994, pp1–12. This technique allows visual information like pictures to be encrypted so that decryption can be done visually.The code outputs two files. Try printing them on two separate transparencies and putting them one on top of the other to see the hidden message. http://algorito.com/algorithm/visual-cryptography
- Moni Naor and Adi Shamir, Visual Cryptography , Eurocrypt 94. Postscript , gzipped Postscript
- Moni Naor and Adi Shamir, Visual Cryptography II , Cambridge Workshop on Protocols, 1996. Postscript, gzipped Postscript
- Moni Naor and Benny Pinkas, Visual Authentication , Crypto 97. Postscript, gzipped Postscript
Ajay- I think a combination of sharing and color ciphers would prove more helpful to secure Internet Communication than existing algorithms. It also levels the playing field from computationally rich players to creative coders.