The Historical, Philosophical & Cultural Dimensions of Biometric Identity Verification

Biometric identity verification has deep historical, philosophical, and cultural roots that go beyond mere technology. From ancient philosophical inquiries into the nature of self to modern discussions on ethics and privacy, the concept of identity has been a subject of ongoing debate. Understanding these dimensions is crucial as biometrics become increasingly integrated into our daily lives, influencing societal norms, practices, and public perception. Contemporary perspectives on identity, influenced by thinkers like Foucault and Derrida, challenge fixed notions and emphasize its fluid and dynamic nature. As we navigate this evolving landscape, it’s essential to consider the ethical, legal, and social implications of biometric technologies, ensuring they align with our values and respect individual autonomy. ...

April 19, 2025 · 1 min · 123 words · bjr

The first Blockchain firewall

Fuse and Check Point are tackling one of blockchain’s most significant challenges: the constant threat of hacks and cyberattacks that have cost crypto platforms over $2.2 billion in 2024 alone, eroding trust and slowing adoption. Traditional security methods, such as smart contract audits and post-incident monitoring, haven’t been enough to stop increasingly sophisticated threats targeting wallets, smart contracts, and decentralised apps. To solve this, they’re building the first real-time, AI-powered blockchain firewall—a proactive security layer that continuously monitors network activity, identifies malicious transactions, and blocks them before they can cause damage. By leveraging Check Point’s decades of threat intelligence and prevention technology, this solution aims to set a new industry standard, protecting the entire Fuse blockchain and paving the way for safer, more scalable Web3 payments and applications. ...

April 19, 2025 · 1 min · 138 words · bjr

the Cypherpunks mailing list

In the early 1990s, as the internet was beginning to shift from a government and academic experiment into a globally connected system, a quiet revolution was forming among a small but determined group of mathematicians, programmers, and digital activists. They saw what few others did: that the very architecture of this new digital realm could become either a tool of unprecedented freedom — or a mechanism for total surveillance and control. ...

April 18, 2025 · 4 min · 746 words · bjr

Mobile Hacking: Cellular Infrastructure to Avoid Surveillance

This story of the Mexican cartel communication networks represents more than just a technological achievement – it demonstrates the extraordinary lengths to which criminal organizations will go to maintain operational security (OPSEC). As these networks continue to evolve, they pose significant challenges for law enforcement and telecommunications policy. With the advent of Software Defined Radio (SDR) and open-source cellular software such as OpenBTS and srsRAN, we will likely see a proliferation of private cellular networks by organizations seeking to guarantee their privacy. ...

March 3, 2025 · 1 min · 97 words · bjr