Studying trust and perceived trust I came across this excerpt in the  brainstorm group
the only reason i am waiting, is because i see certain things which these people  are planning to do half done technically and i know how easily they can be  undone by people who know how to buck the system…and we do know of people who  are VERY GOOD at bucking the system…
i hate cloak and dagger myself, and to be fair, the information has been  liberally shared with all the people who were there in the meet over a phone  call, so i do not really think it is only being given to a few privileged  members….
but i do understand that some information on a forum like brainstorm might  defeat the purpose…i myself am cagey about spelling out some of the stuff i  would be involved in (when they are of the sensitive nature) on this forum as i  know who are the people watching this group…
A couple of keywords caught my attention “Cloak and dagger” “Bucking the system”
What does bucking the system mean? And how does Cloak and dagger come into  the couchsurfing equation.
wikipedia
Cloak and dagger is  a term sometimes used to refer to situations involving espionage, mystery, or  even assassination. The
phrase dates from the early 19th century.
thefreedictionary
cloak-and-dagger cloak-and-dagger – conducted with or marked by hidden aims or  methods; “clandestine intelligence operations”; “cloak-and-dagger activities  behind enemy lines”; “hole-and-corner intrigue”; “secret missions”; “a secret  agent”; “secret sales of arms”; “surreptitious mobilization of troops”; “an  undercover investigation”; “underground resistance”
Some of reference I found about “Bucking the system“. So I am not sure  what cryptic message where hidden in those words.
Bucking  the system: Andrew Wilkie and the difficult task of the whistleblower
 Buck the System, Cosby Tells Teachers — nytimes
I want you to realize who you are and stop these people from grading you until  they grade the system,” he said. ”How can you teach if you have no books? The  system ties their legs and says, ‘Run.’ It ties their arms and says, ‘Defend  yourself.’ ”
The post was very interesting because of the trust matrices involved and a the  different in the perception of trust on a  global scale.
Effect of  Culture, Medium, and Task on Trust Perception Qiping Zhang
DISCUSSION
Most of hypotheses were confirmed except that the interaction effect of culture  and media on trust perception.
The results of higher level of trust perceived by Americans than by Chinese  actually contradicted with our hypothesis.
The theory of nationality trust and social distance provide a possible  explanation. In our study, AA pairs seemed more willing to treat each other as a  temporary in-group member instead of a “real stranger”, while CC pairs seemed  treating the partner as an out-group relationship due to lack of longterm  relationship.
The ambassador system is placed on the two factors perceived trust and  reputation .It is perceived and not real trust as you can see the scales  fluctuating so wildly. People going from best friend to no friend to being  deleted from the friends list.
http://www.trustlet.org/ A trust metric is a technique for predicting how much a  certain user can be trusted by the other users of the community.
But by the above interactions you can see the perception of trust.
A recent definition  of trust has been put forth by Grandison and Sloman [Grandison and Sloman,  2000] who define trust as – the firm belief in the competence of an entity to  act dependably, securely, and reliably within a specified context.
Related to trust  is the concept of reputation. Abdul-Rehman and Hailes define reputation as  an expectation about an individual’s behavior based on information about or  observations of its past behavior
The cloak-and-daggercloak-and-dagger – conducted with or marked by hidden aims  or methods; “clandestine intelligence operations“; “cloak-and-dagger  activities behind enemy lines“; “hole-and-corner intrigue”; “secret  missions”; “a secret agent”; “secret sales of arms”; “surreptitious mobilization  of troops”; “an undercover investigation”; “underground resistance”
Got me thinking on trying to see if Kerckhoff’s Principle can be applied to  member safety and perceived trust.
The following article relate to cryptography and they have been used before by  kasper to highlight security concerns. In the code. I feel these laws are  universal and can be used to highlight global social networking trust  perceptions as related to global member security.
Kerckhoff’s Principle states.
“a cryptosystem should be secure even if everything about the system, except the  key, is public knowledge”
The team moves on trust and this perceived trust fluctuates wildly as shown  above. The  weakest link needs to be located to gain trust.
Social engineering reloaded 
Kevin Mitnick,in his book The Art of Deception, goes further to explain that  people inherently want to be helpful and therefore are easily duped. They assume  a level of trust in order to avoid conflict.
 http://www.securityfocus.com/infocus/1860/2
“anyone who thinks that security products alone offer true security is  settling for the illusion of security.”
Risky business: Keeping  security a secret — zdnet.com
If you depend on a secret for your security, what do you do when the secret is  discovered? If it is easy to change, like a cryptographic key, you do so. If  it’s hard to change, like a cryptographic system or an operating system, you’re  stuck. You will be vulnerable until you invest the time and money to design  another system.
 How to use cryptography in computer security –itmanagersjournal.com
Myth 3: Secrecy is important for security.
The prevalence of this myth may be attributed to the historical confusion  between keeping your data secret and keeping your security algorithms themselves  secret. On the contrary, the only worthwhile insurance of security comes from  having your algorithm published and well analyzed by as many cryptographers as  possible. The principle that security should not rely on algorithms being secret  has been well-established for over a century, and various pithy restatements of  it are often cited:
“Security should reside only in the key” (Kerckhoff), “The enemy knows the  system” (Shannon), and “Anyone can design a cryptosystem which he himself cannot  break” (Schneier).
wikipedia.org  http://en.wikipedia.org/wiki/Kerckhoffs’_principle
 http://www.fplc.edu/risk/vol7/spring/kunreuth.htm
At this juncture, we need to move forward in one of two directions. One path  that has been advocated by a number of researchers is to work toward increasing  public trust in risk management. While it is much too soon to express either  optimism or pessimism about the likely success of this strategy, it is a  significantly challenging problem that at the moment appears to have no easy  answers.
Now what we need to find out is, does it help making the system public knowledge  .Or does it help having a system which is continuously leaking information due  to the perception of trust.
Would a system be more secure with the system being public knowledge (only the  system not the cases)?
		 
		
	
Recent Comments