Seeing Like a Network

Don’t call it threat modeling

Quinn Norton
Aug 8, 2014 · 12 min read
Image for post
Image for post

The Internet

Communicating and Cryptography

Image for post
Image for post
How to do passwords better, care of the eternally wonderful XKCD

Malware, Viruses, Trojans, and Other Nasty Things

Image for post
Image for post
Hacking the Gibson, from the notorious movie Hackers. The internet doesn’t look like this, but we constantly wish it did.
Image for post
Image for post
Sadly, the internet mostly looks like this phishing attack email. (Look closely)
Image for post
Image for post

The End of the Beginning


The Message

A Pandaemonium Revolver Collection.

Thanks to CollegeFool

Quinn Norton

Written by

A journalist of Hackers, Bodies, Technologies, and Internets. ‘’Useless in terms of… tactical details’’ -Stratfor Contact me here: https://t.co/u4F7yfikU4

The Message

A Pandaemonium Revolver Collection. Season 2 stars @anildash @alanalevinson @ftrain @hipstercrite @itsthebrandi @jamielaurenkeiles @vijithassar @yungrama @zeynep. Season 1 available on DVD shortly.

Quinn Norton

Written by

A journalist of Hackers, Bodies, Technologies, and Internets. ‘’Useless in terms of… tactical details’’ -Stratfor Contact me here: https://t.co/u4F7yfikU4

The Message

A Pandaemonium Revolver Collection. Season 2 stars @anildash @alanalevinson @ftrain @hipstercrite @itsthebrandi @jamielaurenkeiles @vijithassar @yungrama @zeynep. Season 1 available on DVD shortly.