Replies

This profile is from a federated server and may be incomplete. Browse more on the original instance.

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

Exaggerating the effects of foreign influence campaigns serves only the foreign operatives.

Downplaying the threat of foreign disinformation campaigns risks making it easier for bad actors to take advantage of an unprepared public.
Overstating the power of propaganda risks amplifying not only the original falsehood, but also an even more corrosive and polarizing narrative—that politicians are somehow remote-controlled, and that citizens don’t have agency.

https://www.foreignaffairs.com/russian-federation/dont-hype-disinformation-threat

LukaszOlejnik,
@LukaszOlejnik@mastodon.social avatar

@ErikJonker there’s no such thing as hybrid warfare. Hybrid methods are below the warfare threshold.

LukaszOlejnik,
@LukaszOlejnik@mastodon.social avatar

@ErikJonker EU/NATO states aren't in armed conflict with Russia, there's no space to differ here - these are objective facts.

LukaszOlejnik,
@LukaszOlejnik@mastodon.social avatar

@ErikJonker in intl law yes, it is precisely binary.

LukaszOlejnik,
@LukaszOlejnik@mastodon.social avatar

@ErikJonker So a better word is: conflict, competition. War is devoid of meaning.

LukaszOlejnik, to privacy
@LukaszOlejnik@mastodon.social avatar
LukaszOlejnik,
@LukaszOlejnik@mastodon.social avatar

@hanscees The analysis is based on data protection law, GDPR. The definition of personal data does not consider cpu and electricity. Hence why it stands.

LukaszOlejnik,
@LukaszOlejnik@mastodon.social avatar

@hanscees Did you read the dissertation?

LukaszOlejnik, to Cybersecurity
@LukaszOlejnik@mastodon.social avatar

My book 'PROPAGANDA: from disinformation and influence to operations and information warfare' treats the subject adequately, comprehensively, broadly, expertly. Information surrounds us. How does information influence work? An expert arrangement of the subject. https://blog.lukaszolejnik.com/propaganda-my-book-on-information-security/

LukaszOlejnik,
@LukaszOlejnik@mastodon.social avatar

@stf Well, I know how I wrote the book - the thing is that I used references through the book, so it is based on sources. And obviously the sentence is "in my view/opinion", since I said that. Would it sound better to you if I spoke negatively about my work? :-)

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

Russian cyber group infiltrated the systems of a hydroelectric dam in France and water utilities in the United States and Poland. Claims to tamper with industrial control settings. Sabotage attempt?

The aimed political effect of these cyber operators is evident.

It may be seen as crossing the threshold interference in internal affairs.

https://www.wired.com/story/cyber-army-of-russia-reborn-sandworm-us-cyberattacks/

https://services.google.com/fh/files/misc/apt44-unearthing-sandworm.pdf

image/png
image/png
image/png

LukaszOlejnik,
@LukaszOlejnik@mastodon.social avatar

It’s PROPAGANDA. Information operations. They claimed to have hacked Courlon-sur-Yonne hydroelectric power plant. The intrusion did happen. But… To systems of a water mill in a village of 300 habitats. Nobody in the village noticed anything. Nothing happened. In Poland too/ no effects for people or environment https://www.lemonde.fr/pixels/article/2024/04/17/comment-sandworm-les-hackeurs-d-elite-de-l-armee-russe-ont-pirate-un-moulin-francais-en-pensant-attaquer-un-barrage_6228320_4408996.html

LukaszOlejnik,
@LukaszOlejnik@mastodon.social avatar

@humanhorseshoes thresholds are assigned to particular events.

1br0wn, (edited ) to random
@1br0wn@eupolicy.social avatar

Welcome to our new Fedi-experiment: a Lemmy (Fedi-Reddit) community to share academic/policy articles on tech policy! Web: https://lemmy.ml/c/mae Fedi: @mae

I've recently joined @robin @mnot and @chadkoh in a small discussion group where we’ve done that privately. But why not make it a broader resource! You can browse the links without an account. If you sign up, you can up/down-vote articles and leave comments as well!

LukaszOlejnik,
@LukaszOlejnik@mastodon.social avatar

@mnot @1br0wn @mae @robin @chadkoh followed

LukaszOlejnik,
@LukaszOlejnik@mastodon.social avatar

@mnot @1br0wn @mae @robin @chadkoh how? The bot is already written :-)

LukaszOlejnik,
@LukaszOlejnik@mastodon.social avatar

@mnot mail me :)

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

Acts amounting to direct participation in hostilities must meet 3 requirements: (1) a threshold regarding the harm likely to result from the act, (2) a relationship of direct causation between the act and the expected harm, and (3) a belligerent nexus between the act and the hostilities conducted between the parties to an armed conflict.

This applies also to the management and uses of technology. Including servers. Including cyberattacks/operations. Such civilians become unlawful combatants.

LukaszOlejnik,
@LukaszOlejnik@mastodon.social avatar

@robryk this example does satisfy the wording. It may directly contribute to military operations.

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

deleted_by_author

  • Loading...
  • LukaszOlejnik,
    @LukaszOlejnik@mastodon.social avatar

    @GossiTheDog Good movie/book scenario.

    LukaszOlejnik, to random
    @LukaszOlejnik@mastodon.social avatar

    What's the privacy of Apple Pay? Unsurprisingly, it's not cash, even when paying in over-the-counter cafe or store. Theoretically merchants may request user addresses. However, if I understand correctly these may be edited out in "Wallet & Apple Pay defaults in Settings" to be arbitrary. Of course bank/card-provider still have real addresses, but maybe there's little reason to share it with retailers (when they do not need it)? :-)

    image/png

    LukaszOlejnik,
    @LukaszOlejnik@mastodon.social avatar

    @xot @LukaszOlejnik merchant integration guide. Perhaps a bit less popular than the one with security/privacy in the title :-) https://developer.apple.com/apple-pay/Apple-Pay-Merchant-Integration-Guide.pdf

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • GTA5RPClips
  • thenastyranch
  • ethstaker
  • everett
  • Durango
  • rosin
  • InstantRegret
  • DreamBathrooms
  • magazineikmin
  • Youngstown
  • mdbf
  • slotface
  • tacticalgear
  • anitta
  • kavyap
  • tester
  • cubers
  • cisconetworking
  • ngwrru68w68
  • khanakhh
  • normalnudes
  • provamag3
  • Leos
  • modclub
  • osvaldo12
  • megavids
  • lostlight
  • All magazines