We are destroying our counter-intelligence capabilities

Justification of espionage States have to ensure the continuity of their own existence, or in other words to ensure their sovereignty. For this, they must ensure their resources and fight threats. Their resources come from the taxation of the activity taking place on their territories. The threats come from players capable of changing the balance Read more about We are destroying our counter-intelligence capabilities[…]

The internet of things is really the internet of connected services

From a continuously connected use of Internet Connection / disconnection In the early 2000s, citizen-users used to connect and disconnect from the internet. The main true personal data they provided was their credit card number. It is still true for some US citizens: they don’t have affordable quality high speed internet service. A continuous self-representation Read more about The internet of things is really the internet of connected services[…]

Clicking and accepting applications: a long-term contract

A long-term contract There is a difference between a software wholly distributed to its users and a software which client only is distributed to its users. When a user clicks and accepts the terms of use of Google, Twitter, Facebook or Whatsapp, he is agreeing to use a software which client only is distributed to Read more about Clicking and accepting applications: a long-term contract[…]

Personal data market: legal and black

I used until now the “social media industry” expression to refer to business models based on the exploitation of citizen’s personal data. As for the oil industry where oil is the raw material, citizen’s personal data are the raw material of the social media industry. From now on, I will use the expression “citizen’s personal Read more about Personal data market: legal and black[…]