Skip to main content

Posts

Week 15: IT and Ethics

In my last blog post, I will be touching upon an ethical theory and how I see it implemented in IT. For the theory, I chose Social Contract Theory that was first formulated by the English philosopher Thomas Hobbes. According to the theory, society should strive to develop a set of rules that make sense to everyone (making people follow them voluntarily). For instance, driving on the right (or in some places, left) could be a common example - drivers keep to the right not for fearing the police but to avoid confusion and possible crashes. I think this pretty much describes how online communication and hacking work. Although there aren't really any rules strictly in place other than netiquette rules on how you should behave online or how, who, and if to hack someone, most people obey a set of rules that just make sense to everyone without really having them written down. Even though there are some netiquette rules, it's merely a recommendation, not a requirement. So everyone can
Recent posts

Wiki Review: The Chinese Social Credit System

For my Wiki review I chose a paper by Bálint Adám, Dominik Kovács, Benedek Matveev, Luca Mizzi and Carlos Rodriguez on The Chinese Social Credit System. I think the topic chosen is really interesting, hence why I chose this article to review, and important at the same time. As the Chinese government is really invading people's privacy, at least in my opinion, by tracking its citizens and companies. It's important to know about the problem so we could avoid this also happening in the western world. All in all, I think the most important aspects of the topic got covered, at least what I was hoping to learn from it while reading the article, and it was presented in a good manner so it was interesting to read. The structure of the article was good, it was organized in a logical way and was divided into subcategories, although they could have been tied a bit better. The viewpoint or angle of the article was for the most part pretty neutral as it should be. Maybe it was a bit to the

Week 14: Accessibility in gaming

This week's blog once again touches upon HCI (human-computer interaction) and gaming, a topic that is very close to my heart. But more specifically I am going to talk about the accessibility of video games, mainly for people with motor impairments. Video games, in general, are heavily dependent on physical interaction with the device being used, something that the average gamer with no disabilities (other than being toxic and flaming is League of Legends) usually doesn't even notice. Gamers with motor impairments may find it extremely difficult to play some games. I'd like to bring some examples from the gaming industry where companies actually care about people with disabilities and have taken their needs into account by offering alternative technologies. When it comes to software in gaming, one of the biggest problems is no way of remapping controls, which would allow players to move functions around the input device, would it be a controller, keyboard, or something else.

Week 13: linux distros

This week's blog is about different Linux distributions. I'm still quite new to Linux and have experience with pretty much only one distro which is ubuntu, so apologies if I'm not the most accurate. But I have chosen to compare two extremely popular yet almost uncomparably different distributions - Arch and Ubuntu .  Ubuntu was first released in October of 2004 and it's built on Debian's architecture. The target users for ubuntu are mainly people that are new to Linux or just aren't too interested in the ins and outs of their OS, although it is also used by experts. It is really easy to set up as it comes with a proper installer, unlike Arch, and you don't have to configure every aspect of the system when setting it up. Ubuntu comes with the GNOME desktop environment and a lot of preinstalled applications which make it easy to use and ready to go right after you install it. Although this makes it a lot more bloated compared to a fresh install of Arch. Ubunt

Week 12: hacking in the modern world

 Pekka Himanen, a Finnish philosopher, has proposed seven different values that would shape the information age. In this week's blog, I'm going to go over these points one by one. Passion - I think this aspect applies to pretty much every field, if you want to be good at something and be satisfied with yourself, you should do it with passion. And if possible you should always strive to make that passion and hobby into your career. Freedom or playful cleverness - I agree with this aspect and I really think that freedom is essential as promotes innovative thinking and develops us further. And at least from my experience, rigid rules really hinder passion and creativity. Hacker work ethic - this aspect states that rules should be born from debates rather than blindly following the given rules. The coin of "blindly not following rules" of course has two sides and a lot of people misinterpret it sadly. Hacker money ethic - in a world where we are extremely materialistic

Week 11: Privacy and censorship

This week's topic was censorship, privacy and the Internet and I'd like to talk about examples of both censorship and privacy. The first thing that pops into my head regarding censorship is the famous Chinese app TikTok. Amongst TikTok already having tons of privacy issues and security risks, TikTok has also been caught censoring its content that would be okay in the Western world and Europe but wouldn't be in China. As TikTok is owned by the Chinese company ByteDance, it cooperates with the Chinese government and they have said this openly before, although they don't really specify exactly how. But TikTok users have noticed how some content that is being posted is heavily censored. Examples of this are the BLM and ACAB movements and Hongkong protests. The app has only one main feed that you can't filter yourself, it just feeds you content based on your watch time, likes, and personal data. So when these movements were at their peak people started noticing how all o

Week 10: Cybersecurity in Estonia

In this week’s blog I am going to talk about cybersecurity in Estonia based on the Kevin Mitnick formula. The formula describes security by three aspects: technology, training and policies. The first aspect - technology - covers encryption, firewalls, antivirus software, etc. Training, in my opinion, one of the most important parts, covers security awareness in general amongst people. And finally, policies, which is more of the bureaucratic part, having rules on who can do what. In general, when it comes to technology , I would say that Estonia is well ahead of most countries, as pretty much all of our public services have been available online for quite some time now. We have an e-voting system, e-residency, and pretty much everyone owns an ID card which allows you to use banks, healthcare systems all online. So for that to be reliable, Estonia had to and has to contribute quite a lot to the security aspect of it. When it comes to training , after the 2007 cyberattacks on Estonia, the