The Science of Insecurity

From last week’s 28th Chaos Communication Congress (28C3) – an annual four-day conference on technology, society and utopia – there are a couple of really interesting talks. Of course, these are freely available (the logo on the right directs to their youtube-channel, the link in the blockquote takes you to the wiki) under a creative commons (BY-NC-ND) license.

As practised with 26C3 and 27C3 we want you to come together. no nerd left behind: Allow those unable to attend the Congress in Berlin to celebrate their own Hack Center Experience, watch the streams, participate via twitter or chats, drink Tschunk, cook and have a good time.

Here I’d just like to highlight two of the talks:

First, Meredith L. Patterson and Sergey on “The Science of Insecurity” make a well-founded (in theoretical computer science) point of avoiding Turing-complete protocols between Turing-machines (i.e. your computer):

This also refers to the excellent previous talk by Cory Doctorow “The coming war on general computation

Enough thought-provoking stuff for about 2hours, plus plenty more to sift through (for example Evgeny Morozov: “Marriage from Hell – On the Secret Love Affair Between Dictators and Western Technology Companies”) – enjoy!

As an afterthought: considering the cellular nucleus as a molecular turing machine, would cellular signaling follow the guidelines described here?

, , , , , ,

  1. #1 by cistronic on 2012/01/03 - 02:02

    for more on the topic of general computation see also
    “The PC is dead. Why no angry nerds?”
    on Jonathan Zittrain’s (Professor of Law at Harvard Law School)
    blog at and the controversial discussion there.

    found via Jörg Kantel’s SchockWellenReiter (,
    who wrote and gave talks along those lines (“The iPad is just a remote-control.”)
    already some time ago:
    “Das iPad ist nur eine Fernbedienung”

    Overall, it sounds like rephrasing the old truth as
    “Those who sacrifice computational freedom for comfort deserve neither”.

further hints, constructive criticism, questions, praise

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: