Cybersecurity Brainstorming: Difference between revisions
Jump to navigation
Jump to search
Line 30: | Line 30: | ||
*Voiceover puppets a la JZ's [http://www.youtube.com/watch?v=NggzBHSXdCo video explanation of Herdict] | *Voiceover puppets a la JZ's [http://www.youtube.com/watch?v=NggzBHSXdCo video explanation of Herdict] | ||
*PSA Announcement featuring Internationally Recognized Magician Michael Feldman | *PSA Announcement featuring Internationally Recognized Magician Michael Feldman | ||
*Lessig-style keynote presentation (as part | |||
Revision as of 22:02, 13 January 2010
This page reflects the brainstorming and discussion of the cybersecurity group in Jonathan Zittrain's Cyberlaw: Difficult Problems Class.
For the Mozilla-icon-privacy project see: Terms of Service Brainstorming.
Problems to Tackle
These are the three basic projects that we have talked about working on. We may also be interested in working on the Mozilla Privacy issue.
"Safeword"
- encrypted password storage within browser
- rejecting weak passwords
- require keystrokes for weak passwords (rejecting autofill)
- using recaptcha or pictures (esp game), etc as dual key for all passwords
Mesh Network Vaccination
Firefox plug-in used by the 5% of power users that can help patch the problems created by the larger base of security-ignorant or security-apathetic users. I made the analogy to tower defense at some point.
For your edification, see Tower Defense. Mfeld 05:18, 13 January 2010 (UTC)
Stop Badware
Distress Password
Have 2 passwords --
- (1) secure password -- shows all emails, all data
- (2) distress password -- shows limited data (like limited profile), only showing safe data
Presentational ideas
- "This is your internet, this is your internet on botnet"
- Ham Sandwich metaphor acted out in reality
- Voiceover puppets a la JZ's video explanation of Herdict
- PSA Announcement featuring Internationally Recognized Magician Michael Feldman
- Lessig-style keynote presentation (as part