<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    So things are happening, although we're not sure what.<br>
    <br>
    <a
href="http://www.nytimes.com/2013/06/02/world/asia/us-and-china-to-hold-talks-on-hacking.html?ref=computersecurity">http://www.nytimes.com/2013/06/02/world/asia/us-and-china-to-hold-talks-on-hacking.html?ref=computersecurity</a><br>
    (amusing, if nothing else, to imagine they'll sit down and be
    brutally honest over some fine rum.) &nbsp;&nbsp;&nbsp; <br>
    <br>
    <a
href="http://www.nytimes.com/2013/06/02/opinion/sunday/the-banality-of-googles-dont-be-evil.html?pagewanted=all&amp;src=ISMR_AP_LO_MST_FB">http://www.nytimes.com/2013/06/02/opinion/sunday/the-banality-of-googles-dont-be-evil.html?pagewanted=all&amp;src=ISMR_AP_LO_MST_FB</a><br>
    (Assange is many things, but he's a good writer, and not wrong. I
    fear his "dead man walking" status has left him a bit pessimistic,
    however.)<br>
    <br>
    <a
href="http://www.nytimes.com/2013/06/01/opinion/an-elizabethan-cyberwar.html?ref=computersecurity&amp;_r=0">http://www.nytimes.com/2013/06/01/opinion/an-elizabethan-cyberwar.html?ref=computersecurity&amp;_r=0</a><br>
    (They had the bad luck to write this op-ed after <a
href="http://addxorrol.blogspot.com/2013/06/analogies-piracy-attribution-and-law-of.html">Halvar's
      keynote</a>) <br>
    <br>
    Ben Nagy wonders how something as insubstantial as cyber, no matter
    how powerful, could defeat a nation-state. But of course,
    nation-states like money, are themselves powerful and insubstantial
    things. The easiest way to look at the detente between China and the
    US right now, is that the Chinese most likely did not think of
    something as banal as IP theft as something that threatened the US
    at an existential level. <br>
    <br>
    But if companies cannot rely on their country to protect them from
    nation-grade threats, they take matters into their own hands in a
    way that does not look like trojaned callback pdf's or deleting your
    own documents from some random C&amp;C. And that is an existential
    threat.<br>
    <br>
    Fun times! :&gt;<br>
    <br>
    -dave<br>
    (I'm flying to DC tomorrow and I remembered my hash-prompt lapel pin
    this time! You're naked in DC if you don't have a lapel pin.)<br>
  </body>
</html>