Sublime
An inspiration engine for ideas
FBI file casts doubt on Bureau's investigation into the suspicious death of journalist Danny Casolaro
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
amazon.com
The correct use of a strong cipher is a clear boon to sender and receiver, but the misuse of a weak cipher can generate a very false sense of security.
Simon Singh • The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography

The megapolitical logic of cyberspace suggests that central command-and-control systems that currently dominate the world’s large-scale infrastructure will have to be replaced by multicentric models of security with distributed capabilities so they cannot be easily captured or blocked by a computer virus.
James Dale Davidson, Lord William Rees-Mogg • The Sovereign Individual: Mastering the Transition to the Information Age
Joseph Lubin • Blockchain Explained: How Web 3.0 Will Create New Business Models
The media net was designed from the ground up to provide privacy and security, so that people could use it to transfer money. That's one reason the nation-states collapsed—as soon as the media grid was up and running, financial transactions could no longer be monitored by governments, and the tax collection systems got fubared. So if the old IRS, f
... See moreNeal Stephenson • The Diamond Age: Or, a Young Lady's Illustrated Primer (Bantam Spectra Book)
distributed storage to guard against malicious content takedowns and of “zero trust” principles in ensuring the security of citizen accounts.