A “golden key” or a universal back door method, allows the bypassing of normal authentication in a product, computer system or algorithm. If used ethically it can be used for securing remote access to a computer system or for debugging purposes. The controversy surrounding golden key methodology stems from the fact that in the wrong hands, it can also open up physical access to those with malicious intent.
Major hardware manufacturers like Apple, Microsoft and Blackberry have taken publicly dissimilar positions on releasing universal back doors to their devices. As the world increasingly depends on devices supplied by these few suppliers, it is important to know where they stand, so you have an idea where your sensitive personal data is likely to end up. Read more +
Botnets are robot networks made up of computers, or any device with network connectivity (computers, security cameras, smart TV’s, smart thermostats, etc.). Botnets have a long history in technology, as they have been around since the early days of the internet. While commonly perceived to be malicious in intent (and rightfully so), botnets do not exclusively perform destructive commands. Read more +
With the development and integration of artificial intelligence (AI) into our daily lives, ethics and bias quickly become main concerns. Both ethics and bias also make implementing artificial intelligence in a practical sense that more complicated. Whose definition of what is ethical are corporations programming their AI systems to default to? It’s highly unlikely that there will be a standard answer to this question across companies, industries and countries; especially considering the lack of diversity in the AI design world. Read more +
Bug bounties have good intentions but in a world where cyber warfare is a reality, it can lead to complex consequences were ethics and espionage come into play. When private companies compete to outbid each other’s bounties, it can create a dangerous playing ground that could potentially put million’s of users sensitive information at risk. Read more +
The Open Source community has been integral to the advancements we’ve seen in technology. Since enabling technology is essential to your business, it may be time to think further about how these tools are created, who profits, who contributes and more importantly, who doesn’t. Read more +