Skip to content

Commit

Permalink
still living in a way that attracts lock-picking intruders
Browse files Browse the repository at this point in the history
  • Loading branch information
MarkBruns committed Apr 10, 2024
1 parent 2e31baa commit e0d4fde
Showing 1 changed file with 10 additions and 7 deletions.
17 changes: 10 additions & 7 deletions _posts/2024-03-01-00.01.00-real-time-fault-tolerance.md
Original file line number Diff line number Diff line change
Expand Up @@ -125,17 +125,18 @@ The robotics portion covers essential concepts and ROS2 integration.

# Distributed Systems And Wireless Networking (20 modules):

These distributed systems modules START to prepare us for the challenges of swarm robotics, such as coordination, resilience, and security.
These distributed systems modules *START* to prepare us for the challenges of swarm robotics, such as coordination, resilience, and security.

181-184: [Distributed algorithms](https://arxiv.org/search/?query=Distributed+algorithms&searchtype=all&abstracts=show&order=-submitted_date&size=200), [consensus](https://arxiv.org/search/?query=consensus+algorithm&searchtype=all&source=header), [gossip](https://arxiv.org/search/?query=gossip+algorithm&searchtype=all&source=header)
181-186: **Swarm Intelligence**: This sort of transcends the research topic of [distributed algorithms in computer science](https://arxiv.org/search/?query=Distributed+algorithms&searchtype=all&abstracts=show&order=-submitted_date&size=200) and *relatively* basic or fundamental topics like [consensus theory](https://arxiv.org/search/?query=consensus+algorithm&searchtype=all&source=header) or [gossip theory](https://arxiv.org/search/?query=gossip+algorithm&searchtype=all&source=header) and [gossip protocol styles](https://en.wikipedia.org/wiki/Gossip_protocol). It takes us into things like [multi-agent systems](https://en.wikipedia.org/wiki/Multi-agent_system), [crowd simulation](https://en.wikipedia.org/wiki/Crowd_simulation), [complex system topics](https://en.wikipedia.org/wiki/Complex_system) and [complex adaptive systems](https://en.wikipedia.org/wiki/Complex_adaptive_system) made up of intelligent agents such the human social group-based endeavors of [political parties](https://en.wikipedia.org/wiki/Political_party), [communities](https://en.wikipedia.org/wiki/Community), [geopolitical relations](https://en.wikipedia.org/wiki/Geopolitics), [organizations such as companies, institutions or criminal associations](https://en.wikipedia.org/wiki/Organization), [resistance movements](https://en.wikipedia.org/wiki/Resistance_movement) and [leaderless resistance](https://en.wikipedia.org/wiki/Leaderless_resistance), [clandestine cell system](https://en.wikipedia.org/wiki/Clandestine_cell_system), [intelligence tradecraft](https://en.wikipedia.org/wiki/Tradecraft) and war
the categories of topics that fall under the heading [*"network science"*](https://en.wikipedia.org/wiki/Category:Network_science) or [ "social network analysis"](https://en.wikipedia.org/wiki/Category:Social_network_analysis) including things like [sociograms](https://en.wikipedia.org/wiki/Sociogram), [sociomapping](https://en.wikipedia.org/wiki/Sociomapping), [sociometry](https://en.wikipedia.org/wiki/Sociometry), [social dynamics](https://en.wikipedia.org/wiki/Social_dynamics), [social contangion](https://en.wikipedia.org/wiki/Social_contagion), [swarm behavior](https://en.wikipedia.org/wiki/Swarm_behaviour) and [swarm intelligence](https://en.wikipedia.org/wiki/Swarm_intelligence), [shoaling (staying together for social reasons) and schooling(swimming together in a coordinated manner)](https://en.wikipedia.org/wiki/Shoaling_and_schooling), attempts at modeling artificial life with [boids](https://en.wikipedia.org/wiki/Boids) and [self-propelled particles](https://en.wikipedia.org/wiki/Self-propelled_particles)

185-188: Fault tolerance, replication, sharding
187-190: Fault tolerance, replication, sharding

189-196: Wireless networking, reliable message passing, standard protocols, [SDR](https://arxiv.org/search/?query=software+defined+radio+SDR&searchtype=all&source=header) and [cognitive radio](https://arxiv.org/search/?query=%22cognitive+radio%22&searchtype=all&source=header), [signal processing research](https://arxiv.org/list/eess.SP/recent)
191-196: Wireless networking, reliable message passing, standard protocols, [SDR](https://arxiv.org/search/?query=software+defined+radio+SDR&searchtype=all&source=header) and [cognitive radio](https://arxiv.org/search/?query=%22cognitive+radio%22&searchtype=all&source=header), [signal processing research](https://arxiv.org/list/eess.SP/recent)

197-200: *Cybersecurity**: It's probably impossible to map out the giant rabbithole that information security has become in the last three or four decades, but it's probably not a bad idea to try to develop your own prioritized list of some of the best blogs, repositories, newsletters, and other infosec resources. Spending a few days developing a prioritized list that one might come back to on a weekly basis is more than enough to immerse anyone in the truly hysterical topic of cybersecurity.
197-200: **Cybersecurity**: It's probably impossible to map out the giant rabbithole that information security has become in the last three or four decades, but it's probably not a bad idea to try to develop your own prioritized list of some of the best blogs, repositories, newsletters, and other infosec resources. Spending a few days developing a prioritized list that one might come back to on a weekly basis is more than enough to immerse anyone in the truly hysterical topic of cybersecurity.

1. [Schneier on Security](https://www.schneier.com/) -- Easily the most level-headed and sanely PROFESSIONAL resource on information security. As a general rule, at least one a week or maybe more frequently everyone should read [***Schneier On Security***](https://www.schneier.com/). We all know that infosec is something that we should be more aware of ... the reason that normal, well-adjusted people tend shy away from this topic is that, unfortunately, MOST OF, but not quite all of material on information security is like antivirus software being worse than viruses ... people shy away from infosec blogs because they don't want to catch infosec mindrot. EXCEPT FOR [Schneier on Security](https://www.schneier.com/) most of the ad-heavy content, which inherently needy and likely to be insecure or even quasi-malicious trackering malware, out there is mostly just out-and-out hysteria barrage coated in disgusting slop of stewed fear-mongering grease, ie "*THIS <new threat> is something you need to be totally terrified of and you're probably already fucked, but it's too slippery for you to grasp, so get yourself some of our X or book me for a seminar immediately.*"
1. [Schneier on Security](https://www.schneier.com/) -- Easily the most level-headed and sanely PROFESSIONAL resource on information security. As a general rule, at least one a week or maybe more frequently everyone should read [***Schneier On Security***](https://www.schneier.com/). We all know that infosec is something that we should be more aware of ... the reason that normal, well-adjusted people tend shy away from this topic is that, unfortunately, MOST OF, but not quite all of material on information security is like antivirus software being worse than viruses ... people shy away from infosec blogs because they don't want to catch infosec mindrot. EXCEPT FOR [Schneier on Security](https://www.schneier.com/) most of the ad-heavy content, which inherently needy and likely to be insecure or even quasi-malicious trackering malware, out there is mostly just out-and-out hysteria barrage coated in disgusting slop of stewed fear-mongering grease, ie "*THIS* ***new threat*** *is something you need to be totally terrified of and you're probably already fucked, but it's too slippery for you to grasp, so get yourself some of our X or book me for a seminar immediately.*"

2. [OWASP (Open Web Application Security Project)](https://github.com/OWASP) is a nonprofit foundation with tens of thousands of members working to improve the security of software with community-led open source projects including code, documentation, and standards. Different materials might be particular useful to people trying to learn as much as possible as quickly as possible about security. OWASP provides a wealth of resources, including: [Cheat Sheet Series](https://cheatsheetseries.owasp.org/IndexASVS.html) [Software Assurance Maturity Model](https://owasp.org/www-project-samm/)

Expand Down Expand Up @@ -176,5 +177,7 @@ These distributed systems modules START to prepare us for the challenges of swar

There are different terms and key words that are important in [cybersurity for IoT](https://www.nist.gov/itl/applied-cybersecurity/nist-cybersecurity-iot-program), which is related to but it's focus is necessarily different than [general cybersecurity](https://www.nist.gov/blogs/cybersecurity-insights) which is focused on humans, social engineering, identity theft and malevolent actors that tend to be financially motivated.

[authentication](https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html), [authorization](https://cheatsheetseries.owasp.org/cheatsheets/Authorization_Cheat_Sheet.html), encryption [digital signatures](https://cloud.google.com/kms/docs/digital-signatures) [cryptographic storage](https://cheatsheetseries.owasp.org/cheatsheets/Cryptographic_Storage_Cheat_Sheet.html), [PGP deficiencies](https://www.latacora.com/blog/2019/07/16/the-pgp-problem/) and [why PGP should just die](https://blog.cryptographyengineering.com/2014/08/13/whats-matter-with-pgp/) [signing arbitrary data with your SSH keys](https://www.agwa.name/blog/post/ssh_signatures)
[Encryption](https://en.wikipedia.org/wiki/Encryption) is always an infinitely beguiling topic to strategists; this will be true even after we understand the inevitability of its **eventual** vulnerability to things like [quantum computing and communication](https://en.wikipedia.org/wiki/Timeline_of_quantum_computing_and_communication) and meta-algorithmic combinations of technological [flanking strategies](https://en.wikipedia.org/wiki/List_of_military_strategies_and_concepts) which exploit both [quantum coherence](https://en.wikipedia.org/wiki/Coherence_(physics)#Quantum_coherence) and [quantum decoherence](https://en.wikipedia.org/wiki/Quantum_decoherence). It will always be possible to hide things in plain sight or to use multiplexed [steganography] to convey information within riddles within enigmas within other message channels.

This is why security specialists study and debate topics like multi-factor [authentication](https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html), [authorization](https://cheatsheetseries.owasp.org/cheatsheets/Authorization_Cheat_Sheet.html), [digital signatures](https://cloud.google.com/kms/docs/digital-signatures), [cryptographic storage](https://cheatsheetseries.owasp.org/cheatsheets/Cryptographic_Storage_Cheat_Sheet.html) ... *the OLD ways will always keep getting figured out by the bad guys* ***FASTER than the good guys can come up with NEW ways*** ... so even though we are aware of things like [glaring PGP deficiencies](https://www.latacora.com/blog/2019/07/16/the-pgp-problem/) and [why PGP should just die](https://blog.cryptographyengineering.com/2014/08/13/whats-matter-with-pgp/), there will always be a new scramble to move on to something slightly more secure, such as [signing arbitrary data with your SSH keys](https://www.agwa.name/blog/post/ssh_signatures) ... which in a meta-sense is likely continually changing your pas$word by a single letter or changing the locks on your house but still living in a way that attracts lock-picking intruders.

0 comments on commit e0d4fde

Please sign in to comment.