If You Were Ahead of the Curve 30 or 40 Years Ago… That means you built a first-principles understanding of computing, networks, and systems. Most people today—even in AI—are building on abstractions. But you? You understand the layers beneath. And remember: that’s not obsolete; it’s leverage. What I’m really saying is, you’re lucky if you… Continue reading Your Technical Foundation Is Rare
Category: Controversial
What is research and why is it crucial for elevating your knowledge in computer security?
Doing research in computer security since 1989 has kind of put me in a situation where I could organically learn what research really is and what I expect from it. To start with, perhaps it’s easier to say what is “not” considered research. These days, when people talk about research, they’re simply referring to Googling… Continue reading What is research and why is it crucial for elevating your knowledge in computer security?
What is your background in Computer Security?
Can you be a cybersecurity professional just because you are passionate about it or overnight got a certificate? Real quick answer: NO, not at all! That is actually one of the main reasons behind hackers being always ahead of the security community. I hear people in this industry, well, I should say in this commercial… Continue reading What is your background in Computer Security?
AI Stuff
…Generations have already lost their Appetite to Learn, to Explore, and to Cherish the Beauty of Science and True Knowledge, let alone Pursuing Wisdom… First of all, I think we excessively use the term “AI” irrelevantly; most of the time, I mean the term “artificial intelligence” is being overly used in a way that is… Continue reading AI Stuff
Who do you think is going to be the winner, the hacker or the security practitioner?
Who do you think is going to be the winner, the hacker or the security practitioner? This question is in the same ballpark as: Do we need more cybersecurity professionals who are getting more and more certifications? Then why are we just getting weaker compared to the hacker’s community? For example, is the ability to… Continue reading Who do you think is going to be the winner, the hacker or the security practitioner?
Who is the biggest spammer?
It is certainly nothing new that those labeling their spamming activity as ‘email marketing’ have no idea what real email marketing looks like, but that is not the point of this short article. I have been closely observing that so-called ‘security companies’ are generating most of the junk email traffic. It is ironic that companies… Continue reading Who is the biggest spammer?
Doctoring Data: How to sort out medical advice from medical nonsense
That’s the name of a book: *Doctoring Data* by Dr. Malcolm Kendrick. It teaches you how to spot misleading medical claims and understand the tricks used in health research and media. But you could easily generalize it to all kinds of data. The mindset is there — the idea — and you can definitely see… Continue reading Doctoring Data: How to sort out medical advice from medical nonsense
Privacy—Again, But in Different Words
Privacy: your online identity isn’t masked by using a VPN. A VPN simply redirects your traffic to a private sector—where targeting you becomes easier and more meaningful. Whatever we call a “privacy model” is baked into the nature of the system itself. It can’t be changed or avoided unless you opt out entirely. If you… Continue reading Privacy—Again, But in Different Words