Institutionalised Positioning

Yes, we can take IP in several directions. For me it started yesterday at 17:15 when I got home with my new iPad, after 6 months, minus one week, my iPad finally arrived. So happy happy joy joy. Yet the story is not that simple. I was able to get mot of the apps from my iPad 1st generation onto my iPad Air 4th generation, in a few cases I bought the program again (the $5 will not kill me I assume). And for the most, these programs held up for a long time, so I am happy. 

Yet there the issue started. You see, there was a problem with one program, the program no longer existed. It was a data vault, this data vault kept projects in directories, and they were all hidden. When I needed it I could open one of the folders and I was ready for the presentation. This was the first hurdle. There were all kinds of programs, I must have liked at a few dozen of them, all with cloud backup, all with options to hide all these secret pictures, WTF do I care? I needed a specific application and the 2-3 dozen are all copies of one another, all copies of an idea they all had at the same time. With the exception of two, a massive waste (in my specific case). I got one of them working first with two projects, that was the one I got. Some will think that I am all about the fuss, all about paranoia. So consider January 2020, Forbes gives us ‘Microsoft Security Shocker As 250 Million Customer Records Exposed Online’, with the two additional quotes “Paul Bischoff, a privacy advocate and editor at Comparitech, has revealed how an investigation by the Comparitech security research team uncovered no less than five servers containing the same set of 250 million records”, as well as “the researchers say that many contained plain text data including customer email addresses, IP addresses, geographical locations, descriptions of the customer service and support claims and cases, Microsoft support agent emails, case numbers and resolutions”, as this point, do you think that I am trueing any cloud with my IP? Do you think that I will give any reliability to any firm handing control of their cloud to the NSA? The IP wi worth a pretty penny and there is no way in hell that I trust anyone with that. Especially when you consider “A new report from the National Security Agency (NSA) titled “Mitigating Cloud Vulnerabilities” identifies what the agency considers the top cloud security issue plaguing organisations: misconfigured privacy settings” (source: unconfirmed), so according to the source, not only is it a cloud solution, but the makers cannot properly administer this, so the NSA is needed? I have question marks, but more so in the direction of Microsoft who had been shoving this solution down our throats like it was the second coming. It reminds me, there was a comedian who had this story: “I apparently had a rare disease, but my older brother knew the cure, just eat a handful of sand, thank god for older brothers”, I think you can relate this to both Azure and Microsoft, can you? So as my trust is close to zero Kelvin, I have my IP in a secure location, and I have an encrypted version that I can access via Webmail and then into the Vault. It takes a few steps, but the chance it gets hacked is less than 2%, this in light of Business Insider giving us “Seventy percent of companies using cloud computing vendors get hacked or leak data, Sophos found”, so I am rather picky on how and where my data goes. The fact that almost NONE of the data vaults took that precaution, r allows for it is the larger stage that needs addressing. Apple gave me 4 confrontations in that regard, and let’s be clear, this is not the fault of Apple. Their app store has limits and abilities and as such we are confronted with the larger evil, and evil Apple did not create, the developers are optionally also unaware of the stage that they are on, but the stage we do see is that things need to change, a new IP, one that has the foundations of a 30 year old program called DBMS/Copy, with the foundations of something that resembles ODBC. A setting where WE decide what the source is, where the source is and how we get it to the point of destination, if the cloud can no longer be trusted, we need that solution fast and we need it to be clearly controlled and set in a station where the user is allowed to make the decisions. Now, let be clear, this is not for all, this is not a solution we all need to consider, but enough need to consider it, for one, all those with bankable IP. 

So when we are in a stage where we have 25-50 passwords, and the setting is now that we can’t rely on these passwords because the rainbow tables of today are more and more efficient, in some cases we added simplicity to the working of these tables, as such, in a stage where we enter 5G, where dat travels 10-25 times faster, a rainbow table becomes a lot more dangerous to a much larger group of people and when you see the alleged Microsoft Blunders, we have a lot more to fear. And let be clear, Microsoft might be the clearest example, I for one am unwilling to believe that they are the only one, especially when you see the Sophos numbers. 

In all this, the institutionalised positioning is that there is no issue, there are no glitches and there is no lack of safety. I will let you decide whether I am right, or whether I am wrong, type is enough out there to form your own opinion, yet when you do and you get it wrong, do not come crying. Consider that IP can only be sold once (if it is done right), do you really want to take a chance on something that could be your life’s work and sets you up for retirement? I will let you decide, because that is your right.

Leave a comment

Filed under IT, Media, Science

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.