This paper explores how four approaches to cyber security are constructed, motivated and justified by different values such as privacy, economic order and national security and what this means for the actors involved.
Filtered results
Cryptography
Post-Snowden cryptography and network security
The “ Post-Snowden Crypto conference ” last week pondered over repairing or replacing core parts of the net, the morale of cryptography and the nihilism of the surveilled society.