The web was cool. So what next?

View this thread on: d.buzz | hive.blog | peakd.com | ecency.com
·@garryke·
0.000 HBD
The web was cool. So what next?
<html>
<p><img src="https://communitysense.files.wordpress.com/2014/03/world-wide-web.jpg" width="1200" height="1200"/></p>
<p><br></p>
<p>Back in the 80s technology was beginning to thrive and people were &nbsp;really going out of their way to introduce users to the next big thing. &nbsp;For instance, the GNU versus Linux debate that has ricocheted through &nbsp;time is <a href="https://www.gnu.org/gnu/gnu-linux-faq.html">still very much a thing</a>. &nbsp;And let's not forget the confusion between TLS and SSL continues today, &nbsp;all due to Microsoft and Netscape's aggressive attitudes in besting one &nbsp;another back in the 90s. Either way, since the internet arrived in our &nbsp;homes, its technology has changed almost daily. More so now than it did &nbsp;ten years ago - and certainly even more so than it did twenty years &nbsp;ago.&nbsp;</p>
<p><br>
But twenty-six years on, the internet has transformed &nbsp;our lives into, what i call the, inter-device-connected culture that we &nbsp;enjoy daily. From snaps of our dogs to reminding our loved ones we have &nbsp;them in mind over Facebook. Memes spreading around Twitter like wild &nbsp;fire; discussions on web forums. Wherever you look, you will see some &nbsp;crucial piece of information leave our fingertips and arrive on the web. And it's all thanks to the thousands of cables connecting our countries across the seven seas.<br>
</p>
<p><br>
And that's &nbsp;where the controversy lies. Because as our technology has continued to &nbsp;evolve - and will continue to do so forevermore - we have also seen a &nbsp;rise in the anti-technology deployed by the sinister governments to spy &nbsp;on the innocent until they can prove one way or another of a person's &nbsp;guilt. I took a look around the net a short while ago and saw just how &nbsp;large the lists grow when it comes to intelligence gathering devices &nbsp;these agencies use: boxes that mimic a radio tower to eavesdrop on a &nbsp;person; software that activates a powered off phone and make use of its &nbsp;camera and microphones; aggressive stripping of encrypted internet packets as the information leaves our computers and traverses the &nbsp;world-wide-web; intruding on the traversal of all internet packets via the cables themselves as they leave our fair countries. The list is horrifyingly endless. And it makes me &nbsp;wonder: why are we still using the internet?<br>
</p>
<p><br>
Of &nbsp;course, no one can argue that it's done some good. Information sharing &nbsp;has been its topmost advancement for our culture. Then we arrive to &nbsp;things like online entertainment and even things like online health &nbsp;assessments and banking and an even bigger list. But that's not my &nbsp;concern. My concern is the internet itself.&nbsp;</p>
<p><br>
<br>
For a start every issue about the internet and its supported protocols are indefensible.&nbsp;</p>
<p><br></p>
<p><strong>DDOS&nbsp;</strong></p>
<p><img src="https://pbs.twimg.com/profile_images/778039311082070016/ZGGWBshr.jpg" width="500" height="500"/><br>
<br>
Back &nbsp;in October, 2016, we witnessed the largest ever DDOS attack on Dyn, a &nbsp;company who controls a significant portion of the internet's DNS &nbsp;infrastructure. The attack was composed of a botnet of around &nbsp;one-hundred-thousand internet-connected devices from PCs to IoT &nbsp;technologies. More importantly, however, the attack was estimated by Dyn &nbsp;to have transmitted around 1.2 terrabytes of flood packets. That's &nbsp;1,200 gigabytes! It was extraordinary in its execution.&nbsp;</p>
<p><br>
Obviously, &nbsp;though, there would be no way to deny an attack of this magnitude from &nbsp;succeeding. But it's a start to the argument. Not many people realise &nbsp;but DDOS was, back in the 90s at least, a secret tool used by government &nbsp;intelligence. Nobody had even ever heard of it. Then suddenly sixteen &nbsp;year olds from all around the world using pictures of Guy Fawkes as &nbsp;their social media profile pictures started to make use of scripts that &nbsp;would do just this to online services such as the Playstation Network &nbsp;and Xbox Live. They didn't stop there either. Visa, Mastercard, Paypal &nbsp;and other financial services were targeted all because they withdrew &nbsp;funding from WikiLeaks - <a href="https://en.wikipedia.org/wiki/Operation_Payback">Operation Payback</a>. DDOS mitigation is by far one of the biggest weaknesses of the internet.<br>
</p>
<p><br></p>
<p><br></p>
<p><strong>Big Brother</strong></p>
<p><br></p>
<p><br></p>
<p><img src="https://i.guim.co.uk/img/static/sys-images/Guardian/Pix/pictures/2013/6/21/1371830464333/Access-to-the-future-3-010.jpg?w=620&amp;q=55&amp;auto=format&amp;usm=12&amp;fit=max&amp;s=94c4b987f6a7ea16712ab83246f03122" width="460" height="276"/><br>
Then &nbsp;we arrive to the biggest threat facing not only the internet but to &nbsp;personal privacy too: government spying. Internet-of-Things (IoT) &nbsp;technology is on the rise now more than ever. From Raspberry Pi boards - &nbsp;miniaturised computer components - all the way down to children's toys, &nbsp;televisions, gaming consoles and even television remotes. Anything that &nbsp;is connected to the internet can be used not only for our entertainment &nbsp;but also to be the eyes and ears in a bid to curb the effect encryption &nbsp;is having on information retention, a threat GCHQ and the NSA sincerely &nbsp;regret. Hence my cleverly coined term: anti-technology.&nbsp;</p>
<p><br>
But &nbsp;this information retention is an interesting topic. We take things like &nbsp;SSL for granted at times but the truth is that it protects the &nbsp;information we transmit across the web. What can be read by humans as &nbsp;simple glyphs and letters, making words and sentences, enters a tunnel &nbsp;in which this text is turned into complete gibberish. It does the job. &nbsp;Only not so much anymore. I say this because agencies are now starting &nbsp;to tackle the problem of encryption by a process of "backdooring" the &nbsp;encryption codes, meaning they are able to decrypt packets sent via our &nbsp;Internet Service Providers (ISPs) on-the-fly. Even <a href="http://www.bbc.co.uk/news/technology-31619907">GCHQ and the NSA were linked to hacking Gemalto</a>, a large SIM card manufacturer, in an effort to obtain the encryption keys for millions of SIM cards. Not only that but by gaining physical access to the cables that compose the internet, the <a href="https://en.wikipedia.org/wiki/Tempora">UK GCHQ's Tempora</a> system is able to monitor just about everything that leaves any UK citizen's devices.&nbsp;</p>
<p><br>
How do we respond in order to keep our information secure? We turn to services like Tor, <a href="https://www.versionone.online/the-horrific-truth-about-the-tor-network/">which in some rare circumstances is dangerous to say the least</a>. Even efforts to deanonymise Tor are now entering academia. It won't be long until some form of weakness is found in that too.&nbsp;</p>
<p>Many people also turn to VPNs because "the professionals" claim they are the best approach. But the sad truth is that not even virtual private networks are much good to counteract the physical access Big Brother has to our transmissions anymore. To be truly safe in the world, you would have to be in a country that is not being watched so rigorously - and there really is not anywhere suitable in the world.<br>
<br>
The &nbsp;point I'm trying to make in this article is one of concern. I picture &nbsp;the internet, and of course ourselves, as plugging the holes of a slowly &nbsp;sinking ship. It may be working for the time being but sooner or later, &nbsp;after so many thousand tiny holes are plugged to cease the breaching &nbsp;tides, one of them will bring the entire thing down.&nbsp;</p>
<p><br>
Around &nbsp;the internet, technology continues to expand. Augment Reality (AR), &nbsp;Virtual Reality (VR), Artificial Intelligence (AI). Even synthetic &nbsp;lifeforms are now a thing!&nbsp;<br>
</p>
<p>So I wonder. Is it not time for an Internet V.2?&nbsp;</p>
<p><br></p>
<p>Originally written for my website, V1O.&nbsp;</p>
</html>
👍 , , , , , , , , , , , , ,