Tuesday, September 30, 2014

Risks of cutting the cake into pieces

Risks, you say? Even history cannot get rid of them. Ephemeris: Such a day like today, on September 30 in 2005, the Parliament of Catalonia approved its third Statute of Autonomy. The calendar’s whim makes that other similar debates pose risks to both Spain and the autonomous region nine years later.

Daily life carries risks at any level. Those risks have to be addressed preferably in a better way than the arrival of iOS 8 in the market. After the initial fright brought by its version 8.0.1, which left the new iPhone 6 without a network connection, now it comes the 8.0.1 one, which may erase the data from your iCloud account. At least in this case, the bug only affect us if we reset the device to factory settings from its menu, so if you've already upgraded to 8.0.2, do not ever reset it.

It could be defined as a tornado falling on your roof when you least expect it, right? It happened as well to many of Electronic Arts’ (among others) servers with a massive denial of service attack that left all its online users without service, including those who enjoyed its new brand MMO (masive multiplayer online) game and sales leader, "Destiny".

Addressing all economic and political dangers coming from a possible Catalonia’s separation from Spain requires a complex analysis of the entire Spanish social system, and even the European’s one. And probably the most acceptable way is negotiation, taking a seat and checking what elements of the chain are weaker, strengthening them against future crises. At WeLiveSecurity they explain the strategies that any business can take to obfuscate and prevent systems from any intrusion’s first stage: the exploration phase.

Would it help at some point to give more responsibilities to the citizen? In the case of the third environment and its users everything seems to indicate it would not. Using strong passwords is not the best method to protect user data, while secure client-server schemes, encrypted end-to-end communications, protection against brute force attacks and second factor authentication are much more powerful tools.

The debate is now focused on whether it is constitutional or unconstitutional what for some people is a popular referendum, and for others it is an illegal plebiscite. Spaniards suffer this situation because we have democracy in our country. On the contrary, it would not happen in China, where the government is free to censor Internet content when it wants. Supporters of democracy in Hong Kong are thus silenced their fight, since ALL social networks present in the country  (Instagram, Facebook, Twitter and Sina Weibo) have been closed. Baidu, the default search engine in the country does not present any results about the event either, just like television and newspapers do, articulated by the government. Added to this, it is prohibited to purchase Apple devices due to this company is considered a tool of American intelligence. Meanwhile Alibaba, the Chinese e-commerce giant, has gone public sweeping other digital giants like Facebook since it dominates in the social field, now censored in its own country.

Worms arises precisely from the fact that one region attempt to perform a voting system without national approval, which is a crisis of confidence after all. To avoid it in the case of banking Trojan Dyreza, cybercriminals use secure communications lying on a certificate issued by them to lap any victim’s doubt (after all, the site he is browsing and his communication with his alleged bank taking place through a secure protocol).

How will be Spain without Catalonia if the proposal comes true? How will be Catalonia without Spain? The future of these negotiations is on politicians’ hands that surely will end up in fruition.


Post a Comment