Around fraudulent fraudulent draws, not around the technology of the use of the credit card itself. I was going to add, we talked about security and confidentiality. We didnt mention the availability part. People talk about the triad that comes up a lot and this is a case of availability, people are dependent on a system in order to eat and this is not having that secured against an attack is a place where the security failed a group of very Vulnerable People and again, nothing to do with confidentiality but availability, we have to think about that, as well. One of the sayings in communities that are focused on Economic Justice or Community Development is that systems for the poor are poor systems. And hopefully well see that changing in the future. I saw a hand go up here. Yes, this gentleman in the green. My question is about the like the topography or the geography of how the Digital World actually appears. Just thinking about the weather these days and about that weather doesnt fo
So i had spent time in the field where im observing people in the classroom, usually older adults, again, someone, you know, that has limited language, english language skills, who spends someone who spends at least three classes literally trying to figure out how to drag the mouse from one side of the computer screen to the other right . So thats the first bit. The second bit, usually the last five weeks of the class, is in understanding what in the world is a username . And the password. And so what ive seen is, you know, just like this complete cognitive dissident as to what does is mean to have an identity online, you know, people are definitely choosing insecure passwords, something that is easy to remember. And if you have low literate skills or limited english skills, youre going to pick something that is much easier to remember that a computer could decipher quite easily. You are more than likely sharing your password and username with other individuals because youve not done t
People with full anonymity and confidentiality and privacy protection. There are often gaps in terms of what i would call key management, how you identify the remote parties that youre communicating with. I think the communities you work with are right to be concerned with, that what theyre getting doesnt live up to the security they need. There are tools out there that are a significant up from where they had been. She mentioned you know, three years ag c there was traffic was a small fraction of what was going on, on the internet. Now if you look at all web traffic, its significantly larger than it used to be. Many people who run websites had decided we need to be doing this. This should be the new standard. Why were we sending unencrypted communication across the internet in the first place . So this doesnt get all the way to the endtoend encryption, but it is a step up and it does protect users against certain attacks. There are still failures. I dont know if anyone heard about the
To take on these tools and pick them up and use them actively even if you dont particularly feel that you are a member. We have time for questions. Im just going to open up to the floor, and i know that we have a cache hashtag where people are potentially joining our conversation and i will point out to those of you listening it is newamcyber. We have questions . Yes, in the back. One of the most disenfranchised groups in afghanistan are the women that fight every day for a quality. We established the trust of the network. We think it is a matter of life and death and not just whether you lose your account. There is a secure means by which you can get on the network through the portal entirely secure and they can discuss issues from everything from Small Businesses that they are attempting to educational issues. So there are things out there when it comes to the portal technologies that are secure enough for people especially those in a difficult situation like women and children are i
And this is literally how political scientists think about war. This isnt really how it works. We dont really think that since cyberspace with her ever serious. We dont look them square in the face like this. And for those of you that dont know this is and we dont square off in the face and in fact we dont do good battles like fun battles in cyberspace. We hit below the belt. We do just enough to be irritating but not enough to trigger what we consider an act of war. And this is really telling so how do we figure out when all of these below the belt issues are coming out. It would be really nice if we had Something Like a dark mark from harry potter that told us when our networks were insecure, that all of our data would pop up on the screen. You are owned. The dark lord is coming. But we dont have any of this stuff. Its really hard to enforce our rights claims in cyberspace. This is where i think immanuel kant, is to the rescue. And we think about cyberspace and think about rights cla