Heartfelt aspirations for good

Hello Fellow Members,

May we all stay safe, strong and healthy, and united in common cause for a better world better life during this global crisis.

I have developed software for embedded, systems and application security, network communication, telco OS, mobile OS and applications, enterprise, financial, banking, retail, IIoT, DOD, federal, state, law enforcement, and integration for more than 30 years. 

I think I have empathy and relative understanding of the passion, aspirations, and motives expressed by the diverse and global voices contributing, influencing, guiding, and leading this international forum. 

When I read this forum’s email communications, it seems the application stack is the target, and I think rightly so, because it is the application stack that most developers and the majority of standards bodies have purpose and access to for developing solutions and standards for public users. 

My experience has demonstrated, to me, the reality is...when it comes to security and privacy for public communications channels, the application stack has no access to or control of the underling physical infrastructure it seeks to utilize. 

Most nations and regimes control their communications channels, and co-op providers, or strip them of their licenses to operate. 

Criminals know this, and have the ability to temporarily circumvent discovery and capture. 

Criminals realize they cannot avoid tracking, and discovery, so they go to great lengths to obfuscate their identity by utilizing temporary identities owned by others, or obtain temporary identities utilizing fraudulent means. 

Communications physics has a limited number of mediums. Today primary mediums are metal, optic, and air. 

These mediums are easily monitored. 

End-to-end encryption is only effective for obfuscating information traveling across the medium, while origination and termination are discoverable; even internationally, provided the governing end point bodies cooperate in discovery. 

This is why certain locations are preferred and utilized for criminal activity and nation state cyberwarfare.

Understanding these constraints should yield the best opportunity for identifying valid use cases warranting the spending and use of time and resources for designing and developing valid adoptable solutions the public can benefit from within the constraint boundary I have described. 

Separation of the information flow, end point ownership, and device location and signal metrics is vital if one wants to offer realistic solutions with clear, valid, truthful, and understandable disclosures to the intended end user, which I assume is the public and acceptable to the governments that regulate, monitor, and control the mediums we use to carry out public communications.

Sincerely,
Mark Anthony Morris
Founder, Tarantula Technology Inc
Founder, Hempchain™ 
O’Reilly Author & Online Learning Trainer
Founder, Hyperledger Austin (est. 2016, 700+ members)
Founder, Austin Blockchain Technology (est. 2015, 2,200+ members) 
LinkedIn (18,000+ followers) https://www.linkedin.com/in/markmorrissupergeek/ <https://www.linkedin.com/in/markmorrissupergeek/>

Received on Thursday, 2 April 2020 08:37:09 UTC