Secure Cloud Procedures

 The cloud is not secure for entry-level users. 

My personal security has been pwnd, leaving open questions about my competency, by criminal hackers who employ their creativity to enable malice and occasionally spite, such as revenge porn. 

This blog once reflected the language "with grim determination," alluding to my motives for implementing Erasthmus's sieve on an odd number line. Now it says "mad cap experiment," instead. I cannot even correct an error on blogger dot com once published. Caching takes over and the update never populates.

But in a new development, my book "The Devil's Hangover," has been updated for me. When I first wrote it, I had the original bad guys named "Rurek" and "Harold York."

However, this reflects offline preparatory drafts, and the only cloud interaction it might have seen was as a zip file to my Google Drive as a backup.

At the time of publishing, I labored to correct every occurrence of Rurek the more common Yorick. From the time I originally looked up Howard Stanton's name online, I changed all occurrences of Harold York to Howard Frick, leaving my chosen prose of "the two Howards had struck up a friendship, " as slightly British, but my own.

I am angry about the vulnerability of the common internet denizen to attack and misrepresentation. 

Snowden broke the law

He broke the law doing it, but what he was doing was whistle-blowing.

The ability of a hacker or bureaucrat to change EVERY occurrence of a comment THREATENS ACADEMIA, who otherwise might benefit from a certain fixedness to publishing. It holds amateurs and incompetents accountable.

Why would an attacker spoof or redirect a URL, when he can just as easily change the original?

It is both intimidating AND destroys the peace of mind!

Comments

Popular posts from this blog

A Question About Erasthmus' Sieve

An Improvement To The Three Second Hold Rule

Notice of corrupted results: Vigenere may yet be found to be a "group."