{"id":68,"date":"2008-01-08T09:54:26","date_gmt":"2008-01-08T09:54:26","guid":{"rendered":"http:\/\/leirdal.net\/blog\/?p=68"},"modified":"2008-01-08T09:54:26","modified_gmt":"2008-01-08T09:54:26","slug":"wish-for-2008","status":"publish","type":"post","link":"https:\/\/www.leirdal.net\/blog\/archives\/68-wish-for-2008.html","title":{"rendered":"Wish for 2008"},"content":{"rendered":"<p>When you read the news from anti-virus companies and security advisors you get convinced that 90% of the software you find on the net is malware, and the last 10% have so many security issues that it turns out the same thing. At the same time a life seems to be worth less than the copyright interests of media companies.<\/p>\n<p>I don&#8217;t know if you have noticed, but I feel that the whole world has been overrun by solutions and programs that want to harvest personal information about me. The products that don&#8217;t ask for the information grab it anyway.<\/p>\n<p>Trusted computing is a much debated architecture, maybe rightfully so. That kind of architecture might limit the spreading of free\/open source software. Microsoft has proven that they can offer this trough their HD-Video support. There they have signed code in all layers, and only approved hardware devices are allowed in the pipe from storage media to screen. I am not saying that it is impossible to bypass this pipe in some way, but the threshold to perform such a hack has been raised a fair bit.<\/p>\n<p>So, when you consider the stack of components needed to display HD-Video, what do you need to have the same security\/quality for our computers? Especially when you are connected to the Internet?<\/p>\n<p>The question then is if we maybe should take a look at this &#8220;cursed&#8221; subject again. Financing solutions in order to secure that open source software can be verified and approved might become a reality. There is one thing that we have learned so far. It is impossible to count all evil. You cannot permit the execution of all software except the bad ones listed in a list. Such a list will never be complete. But you can allow all enumerated good software and block the execution of all other code. Anti-virus software tries to perform this enumeration on our behalf, but still they do not know everything and ask the users what to do when in doubt. When they do, the s**t hits the fan. Users do not know what to do. They do not realize the consequences of their choices.<\/p>\n<p>Again, the driver is the money. It is somewhat of a symptom of the state of the world that it&#8217;s more important for Microsoft that a video is not copied than to secure the personal information of a user. If somebody steals all our personal details, all our money from our bank accounts and our identity, that is not as important for Microsoft as a video unlawfully duplicated and distributed.<\/p>\n<p>So what is my wish for 2008?<\/p>\n<p>My wish is that our lives and our identities will become more important to protect on the net than the economic interests of a few.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When you read the news from anti-virus companies and security advisors you get convinced that 90% of the software you find on the net is malware, and the last 10% have so many security issues that it turns out the same thing. At the same time a life seems to be worth less than the [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[5,4,13,11],"tags":[50,48,513,51,512,517,24,515],"class_list":{"0":"post-68","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-internet","7":"category-life","8":"category-security","9":"category-technology","10":"tag-copyright","11":"tag-cryptography","12":"tag-internet","13":"tag-laws","14":"tag-life","15":"tag-security","16":"tag-software","17":"tag-technology","18":"czr-hentry"},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p1xqPf-16","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":846,"url":"https:\/\/www.leirdal.net\/blog\/archives\/846-a-wish-for-corporate-social-software.html","url_meta":{"origin":68,"position":0},"title":"A wish for corporate social software","author":"leirdal","date":"2012-01-12","format":false,"excerpt":"I attended an IXDA meetup yesterday discussing among else \"Collaborating in the stream\". Pete Lacey from Podio showed us some of their ideas regarding different communication types in different activity streams or different applications. The catch though, everything runs on their server; in the cloud. Now personally I use the\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/www.leirdal.net\/blog\/archives\/category\/internet"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1775,"url":"https:\/\/www.leirdal.net\/blog\/archives\/1775-software-architecture-workshop-2014-texel-netherlands.html","url_meta":{"origin":68,"position":1},"title":"Software Architecture Workshop 2014 &#8211; Texel, Netherlands","author":"leirdal","date":"2014-04-06","format":false,"excerpt":"About 10 years ago a man called Jimmy Nilsson invited a group of people to an Open Spaces workshop in Malm\u00f6 called Software Architecture Workshop. This workshop has been an annual event since and this years event took place on an island called Texel located in the Netherlands. This was\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/www.leirdal.net\/blog\/archives\/category\/internet"},"img":{"alt_text":"My first photo of a wild pheasant","src":"https:\/\/i0.wp.com\/www.leirdal.net\/blog\/wp-content\/uploads\/2014\/04\/5D37563-20140402.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.leirdal.net\/blog\/wp-content\/uploads\/2014\/04\/5D37563-20140402.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.leirdal.net\/blog\/wp-content\/uploads\/2014\/04\/5D37563-20140402.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.leirdal.net\/blog\/wp-content\/uploads\/2014\/04\/5D37563-20140402.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.leirdal.net\/blog\/wp-content\/uploads\/2014\/04\/5D37563-20140402.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":147,"url":"https:\/\/www.leirdal.net\/blog\/archives\/147-a-web-world.html","url_meta":{"origin":68,"position":2},"title":"A web world","author":"leirdal","date":"2009-05-13","format":false,"excerpt":"It\u2019s kind of interesting to see the turn among most companies out there concerning the use of different software tools for different tasks. For years we have had a mentality that either you create your own monster of a solution or you customize one product from some big vendor. But\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/www.leirdal.net\/blog\/archives\/category\/internet"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":930,"url":"https:\/\/www.leirdal.net\/blog\/archives\/930-5-tips-for-safe-computing.html","url_meta":{"origin":68,"position":3},"title":"5 tips for safe computing","author":"leirdal","date":"2012-06-14","format":false,"excerpt":"As many you already have learned, the straits of Internet are dire to navigate. Just to have a presence online open you up for several new ways to get into trouble. I might not be a bonafide security expert, but I am a computer professional, advanced user, developer and software\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/www.leirdal.net\/blog\/archives\/category\/internet"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1909,"url":"https:\/\/www.leirdal.net\/blog\/archives\/1909-online-webinars.html","url_meta":{"origin":68,"position":4},"title":"Online webinars and IT Trends","author":"leirdal","date":"2014-08-29","format":false,"excerpt":"If you know where to look there is an amazing amount free training or talks online. I recently attended a free Webinar from Gartner called \u201cTen Trends and Technologies to Impact IT Over the Next Five Years\u201d by Raymond Paquet. I found it interesting, mainly because it matches what I\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.leirdal.net\/blog\/archives\/category\/technology"},"img":{"alt_text":"Theme Geometry","src":"https:\/\/i0.wp.com\/www.leirdal.net\/blog\/wp-content\/uploads\/2012\/09\/5D32728-20120903.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.leirdal.net\/blog\/wp-content\/uploads\/2012\/09\/5D32728-20120903.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.leirdal.net\/blog\/wp-content\/uploads\/2012\/09\/5D32728-20120903.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.leirdal.net\/blog\/wp-content\/uploads\/2012\/09\/5D32728-20120903.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.leirdal.net\/blog\/wp-content\/uploads\/2012\/09\/5D32728-20120903.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":125,"url":"https:\/\/www.leirdal.net\/blog\/archives\/125-mediasone-kiosks-displayed.html","url_meta":{"origin":68,"position":5},"title":"Mediasone kiosks displayed","author":"leirdal","date":"2008-12-01","format":false,"excerpt":"I work at a Company called Computas. We have been developing a new search interface for a multimedia kiosk called \"Mediasone\" (=Media zone) this autumn. The development is not finished, but the hardware of the kiosks was publicly displayed on Friday. It looks like this might be a great hit\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.leirdal.net\/blog\/archives\/category\/technology"},"img":{"alt_text":"The new Mediasone kiosk to be installed at Deichmanske Library in Oslo","src":"https:\/\/i0.wp.com\/leirdal.net\/blog\/wp-content\/uploads\/2008\/12\/mediasone-200x125.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.leirdal.net\/blog\/wp-json\/wp\/v2\/posts\/68","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.leirdal.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.leirdal.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.leirdal.net\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.leirdal.net\/blog\/wp-json\/wp\/v2\/comments?post=68"}],"version-history":[{"count":0,"href":"https:\/\/www.leirdal.net\/blog\/wp-json\/wp\/v2\/posts\/68\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.leirdal.net\/blog\/wp-json\/wp\/v2\/media?parent=68"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.leirdal.net\/blog\/wp-json\/wp\/v2\/categories?post=68"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.leirdal.net\/blog\/wp-json\/wp\/v2\/tags?post=68"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}