Posts by bellasys

What do Big Pharma and CCPA have in common?

Posted by on Nov 13, 2018 in Vision

Developing a solution for which there is no problem- then engineering the perfect problem. But wait. If you think this is headed towards another conspiracy, you don’t understand the problem yet. It is true that consumer privacy protection is a problem. The CCPA is a solution to that problem, but it may not be what it was created for. Besides, that makes a pretty boring conspiracy “Silicon Valley wants to solve the most ubiquitous problem on the planet…” it’s an ABC Afterschool snooze-fest. As a successful hacker (in that I’ve never been caught…) and former systems security analyst here is the problem: California’s leading skull-and-crossbones flagship, Silicon Valley, might be engineering the perfect device to gut companies which cannot hopefully comply with the CCPA mandate to provide data tracking – and complete oversight as to how and during which processes Consumer Data is being manipulated. What sounds reasonable- at least as reasonable as imposing gun control in the United States- sets the stage for the perfect class action lawsuit against an entire industry based on a single bad actor being commonly implemented- and exploited. It reminds me of the United States Congress suing Microsoft for Monopoly when Microsoft was given exclusive license to develop the portion of the network it claimed to hold monopoly over. It also reminds me of the Cambridge Analytics scandal, an inquisition also spearheaded by the United States Congress that devalued Facebook stock by $20B (yes, Billion) presumably due to privacy breaches and information tampering that were heinous, wrong, and Orwellian in scope… aaaand had 10,000 times LESS impact than Facebook’s social graphing origins had (c.2005-2008) with Choicepoint, the NSA, and other Pseudo-governmental agencies involved, as the largest breach of public privacy ever staged before or since. What do these things have in common? In any business there is always an exit strategy. When Microsoft (c.1998) was chosen to receive mega-millions to develop an infrastructure that coupled the stealing of latent CPU cycles from consumer host machines left on the network- and to provide a logistical upgrade to the up-and-coming broadband network to scale up the potential for the additional Petaflops of compute power enabled by the new network architecture, it only took Congress a few years (officially 2002-2003 based on a 2001 anti-trust lawsuit) to collect their dividends. Considering the latest scandal in which $20Bn Facebook Stock Dollars literally vaporized overnight, it makes the scale about 100x. Apparently Bitcoin (BTC) has some challengers when it comes to 1000x investments, and the Pirates of Silicon Valley know this only too well. Motive + Opportunity = ? The motive is always capital. Large amounts of capital. The lynchpin is created with CCPA. Now it requires the perfect opportunity. Do not target one business. Launching Class Action against one business pales in comparison, to, for example. launching Class Action against the Banking Industry, or why not the...

Read More »

MiCASA™ Email Service Ends Spam Forever

Posted by on Aug 30, 2018 in Vision

SPAM is junkmail, but it is so much more than a nuisance. Reports show that over 50% of SPAM targets victims with Phishing attacks of some kind, using seemingly innocuous Email as clickbait or to steal personal information. With more and more desperate measures being taken by criminal organizations, there is also an increase in nuisance type SPAM. It can be difficult for the average person to appreciate the degree to which SPAM creates problems on a day to day basis, particularly when compared to the real threat of Identity Theft or other Credit Card fraud, however the threat is very real. The majority of all Phishing attacks and SPAM/Scam mail are not directly criminal, meaning that they merely facilitate aggressive advertising, nuisance advertising (failing to honor unsubscribes), or build Identity Theft profiles using your Personal Information- all of which can be sold. Remember, other than the rare cases of Industrial Espionage or targeted attacks directed toward you personally, it’s simply a numbers game driven by monetary reward. Whether or not you feel savvy enough to avoid falling prey to some Email scam, there are so many different types of scams that you will become a Phishing victim sometime in your life, even if you are very tech savvy. Imagining a future in which this doesn’t happen is possible, but it is absolutely unlikely unless significant changes happen. Ending Spam Forever? The MiCASA™ Public Trust (MPT) outlines a new platform that promises to end SPAM Email forever. The platform is not just about technology. It is technology serving a very real human concern about security and ethics. It stands to create a commercial zone whose security underpinnings maintain ethical communications and mutual respect. Fortunately, the technology to do this has already been imagined, it has already been built, and the only people who need to do things differently are you, the public. This isn’t about convincing lawmakers or lobbying Big Tech to change a thing. Your participation makes all the difference in the world, and the significance only grows as certain milestones are achieved. “Who says that political activism ended with the Boomers? When collectively enough people have joined the MiCASA Public Trust, the tides will turn as policy makers and the tech world follow suit…” Sound lofty? This is about a Social System rather than Software. True enough, advanced technology fuels it all, but this is a technology-forward application whose aimed at the social good. It remains inclusive to all who would enter- private individuals as well as small business, non-profits and entrepreneurs- all except the Spammers, of course. Commerce, Privacy and Trust [Note: Please follow along this mini-discussion to collect talking points and criterion] The issue preventing sufficient regulation of Email to destroy bad SPAM are the topics of Commercial Interest, Privacy, and Trust. In reality nothing will slip by the demands of commercial interest. Generally speaking, laws...

Read More »

OpenResty (Nginx + Lua) Makes History: Now Supports Windows Server

Posted by on May 17, 2018 in News, Technologies

Major news for the OpenResty team led by agentzh + avid community of prescient (and pre-eminent) coders. For the first time in its history OpenResty now offers native 64-bit packages for Windows Server. In other major news for this upstart language/production environment, native support for UDP downstream modules as of today’s release date means that UDP applications for n-tier architectures are fully supported. This is major news from my favorite DevOps group, the OpenResty team. What does this news mean for Bellasys group and in particular the Octopi Integrated Data Engine and MiCASA Identity software in particular? MiCASA exists as (up to) cryptographically secure Identity software which handles Authentication across multiple networks, and ad-hoc networks- therefore it securely authenticates to support Networking-On-The-Fly. Two specific classes of applications that benefit from this are native Cross-Site-Data-Sharing (without CORS, or AJAX!) and Resource sharing particularly where 3rd party services or web services are involved. While this is not supposed to be origin-spoofing (and in fact the Authentication layer model in MiCASA presupposes all Data Layer transactions for truly secure infrastructure), think of it as (granular) policy supported hacking to re-originate data, and reapportion resources, OTF of course. If you are too young to have heard of On The Fly or to be impressed by it, this is like JIT for front-end services and single request http resolution of complex and potentially multi-homed operations. One example of Networking on the fly is frequently experienced in P2P networks; however the gist there is pooling resources aimed at increases in bandwidth and static file resources; here instead pre-arranged agreements exist to support entire Application Architectures acting on real-time data all while observing local and global policy-based permissions. Concretizing this in one go: how about an affiliate site selling a product using the main site’s web-commerce solution all while retaining local policy definitions (as well as satisfying the data-origin policy of the main site), retaining local UX, and for the biggest AND – doing this without that extra...

Read More »