

Click Here to Kill Everybody
Chapter Summaries
What's Here for You
In a world where 'everything is becoming a computer,' are you ready for the profound implications? Bruce Schneier's 'Click Here to Kill Everybody' pulls back the curtain on the escalating risks of our interconnected digital lives. This isn't just about cybersecurity; it's about the fundamental shift in how our world operates, and how that shift makes us increasingly vulnerable. Schneier expertly dissects why our current security paradigms, like patching, are failing, and how the very entities meant to protect us—governments and corporations—often inadvertently, or even deliberately, foster insecurity. You'll gain a clear-eyed understanding of why risks are becoming catastrophic, moving beyond mere inconvenience to potentially devastating consequences. But this book isn't just a wake-up call; it's a roadmap. You'll explore what a truly secure internet could look like, and crucially, how we can get there. Schneier delves into the vital role of government in enabling security, advocating for a shift towards defense over offense, and illuminating the policy pitfalls that can derail progress. Prepare for an intellectually stimulating journey that combines sharp analysis with a pragmatic vision for a more trusted, resilient, and peaceful digital future. This is your essential guide to navigating the complex, and often perilous, landscape of our hyper-connected reality.
Everything Is Becoming a Computer
Bruce Schneier, in his chapter 'Everything Is Becoming a Computer,' unveils a profound transformation: the relentless march of computing power into every facet of our lives. He explains that as the cost of embedding computers plummets, driven by mass-produced, general-purpose chips, manufacturers find it economically logical to integrate connectivity and intelligence into even the most mundane objects. This isn't just about smart refrigerators or internet-connected toothbrushes; it's a convergence of trends—the Internet of Things, miniaturized sensors, AI, cloud computing, pervasive connectivity, and robotics—creating a single, hyperconnected global system that senses, thinks, and acts. Schneier illustrates this by noting that humans themselves are becoming components within these systems, providing inputs and accepting outputs, effectively becoming virtual cyborgs. This evolution, he argues, represents a fundamental shift from a difference in degree to a difference in kind, where disparate systems now affect each other, even without direct interoperability, on the same network. The central tension arises from this ubiquity: as our world becomes more integrated and automated, it also becomes exponentially less secure. The author posits that traditional security models, which worked adequately when security was primarily about privacy and bits, are now insufficient because the threats have escalated to life and property. A hacked pacemaker or a compromised power grid can have catastrophic consequences, moving security from an inconvenience to an existential concern. Schneier's narrative arc moves from the inevitability of this hyperconnected future to the urgent need for a fundamental rethinking of security, highlighting that the market alone cannot solve these complex, systemic risks. He advocates for government intervention, not as a panacea, but as a necessary counterweight to misaligned business incentives and market failures, suggesting the creation of new government agencies and a shift in focus from offensive cyber capabilities to robust defense. Ultimately, Schneier frames internet security as a 'wicked problem,' complex and difficult to solve, requiring a new approach that acknowledges the intricate interplay of technology, policy, economics, and sociology, and calls for a deliberate, collective decision to build a more resilient and peaceful digital future.
Computers Are Still Hard to Secure
Bruce Schneier, in his chapter 'Computers Are Still Hard to Secure,' illuminates a fundamental truth: security is always a negotiation, a delicate dance between convenience, features, performance, and safety. He reminds us that even nearly three decades ago, the only truly secure system was a powered-off, concrete-encased, armed-guarded one, a sentiment that echoes with unsettling relevance today for everything from our personal devices to the vast, interconnected web of the Internet of Things. Schneier reveals that the pervasive insecurity stems from multiple deep-seated issues. Firstly, most software is simply poorly written, a consequence of market forces that prioritize speed and cost over quality, leaving systems riddled with bugs and vulnerabilities that even rudimentary tools can exploit, much like finding a single loose thread in an impossibly large tapestry. Secondly, the very architecture of the Internet, born in a bygone era of trust and limited access, was never designed with security as a primary concern, leaving foundational protocols like BGP and DNS inherently vulnerable to manipulation, a historical oversight that continues to haunt us. Furthermore, the inherent extensibility of modern computing, the very feature that makes our devices so powerful and versatile, also makes them profoundly difficult to secure, as this adaptability means any computer, however specialized its intended purpose, can be reprogrammed for malicious ends, turning a thermostat into a potential entry point for an attacker. Perhaps most critically, Schneier explains that complexity is security's greatest enemy; the sheer scale and intricacy of our interconnected digital world create an overwhelming attack surface, granting attackers the advantage of finding a single weak point while defenders must fortify every possible avenue, a battle where the odds are perpetually stacked against protection. This dynamic is exacerbated by the fact that attacks always improve, becoming faster, cheaper, and easier, while our defenses struggle to keep pace, a relentless arms race against creative and adaptive human adversaries. Finally, the interconnectedness of systems, where a vulnerability in one can cascade into unforeseen and catastrophic failures across others, creates emergent risks that no single designer could ever anticipate, reminding us that even individually secure components can lead to collective disaster. The chapter underscores that computers fail differently, with distance and skill decoupled, and the potential for 'class breaks' that can compromise millions of devices simultaneously, transforming isolated incidents into widespread crises, a stark departure from the localized risks of the physical world.
Patching Is Failing as a Security Paradigm
Bruce Schneier, in his chapter "Patching Is Failing as a Security Paradigm," illuminates a fundamental clash of security philosophies, pitting the "get it right the first time" ethos of physical engineering against the "move fast and break things" agility of the digital world. He reveals how this collision is playing out in increasingly connected devices, from cars to medical implants, where the cost of failure is no longer theoretical but life-threatening. The author explains the traditional cybersecurity model: vulnerabilities are discovered, disclosed to vendors, patched, and then installed by users. This process, honed over decades, relies on a delicate ecosystem of researchers, vendors, and consumers. Schneier meticulously dissects the cracks in this system, starting with the end-user. He paints a stark picture of the "patching gap," where a significant portion of users, especially in specialized industrial, military, and healthcare systems, are hesitant or unable to install updates, leaving systems vulnerable for years, like a forgotten door left ajar in a busy street. Examples like the Equifax hack, WannaCry, and the Amnesia IoT botnet serve as chilling reminders of the consequences. The author then delves into the challenges on the vendor side, detailing how slow patch release cycles, sometimes months behind vulnerability disclosure, and the unreliability of patches—which can "break more than they fix"—further erode security. He highlights the dire situation for embedded systems and IoT devices, where low profit margins, outsourced design, and a lack of ongoing support mean hundreds of millions of devices sit perpetually unpatched, a digital ghost fleet adrift on the internet. Even expensive devices like cars and pacemakers face patching hurdles, requiring inconvenient recalls or clinic visits, a far cry from the seamless, automatic updates of a Tesla or Kindle. Schneier also addresses the chilling effect of laws like the DMCA, which can stifle crucial security research, and the reluctance of new industries to embrace security best practices, often treating vulnerability disclosures with denial and legal threats. The core tension, Schneier argues, is that the rapid integration of computing into every facet of our lives has outpaced our ability to secure it using the established patching paradigm. The digital world, like a constantly flowing river, demands a more adaptable approach than the rigid, slow-moving processes suited for the analog past. He posits that we must find a way to integrate the long-term stability of traditional design with the reactive speed of agile development, acknowledging that while we lack the perfect upfront security, we must urgently improve our capacity for rapid and effective mitigation, lest the very technologies designed to improve our lives become our greatest vulnerabilities.
Knowing Who’s Who on the Internet Is Getting Harder
The digital landscape, once a place where anonymity reigned supreme—'On the Internet, no one knows you're a dog,' as a famous cartoon quipped—has evolved into a paradoxical space where both utter anonymity and undeniable identification coexist, often simultaneously. Bruce Schneier, in this chapter, unravels the complex and increasingly challenging nature of authentication, revealing that the most common and insidious threat isn't sophisticated zero-day exploits, but the far simpler, yet devastatingly effective, act of credential stealing. Attackers, whether state-sponsored hackers or opportunistic criminals, routinely bypass robust security by simply acquiring what we already possess: our passwords, our logins, our very identities. This is the Achilles' heel of our digital lives; as Schneier explains, the very systems designed to protect our personal and proprietary information are often weakened by our own human tendencies—weak passwords, reuse, and careless storage. The infamous case of John Podesta, tricked by a sophisticated phishing email, serves as a stark reminder that even the technically savvy can fall prey to these meticulously crafted deceptions, highlighting how attackers only need one successful attempt to breach a system. The author then delves into the fundamental methods of authentication—something you know (passwords), something you are (biometrics), and something you have (tokens)—explaining that while each has vulnerabilities, their combination through two-factor authentication offers a significant, though not impenetrable, layer of security. He illustrates this with examples like Google's Advanced Protection Program and differential authentication, where security measures adapt to perceived risk, and even touches upon future possibilities like continuous authentication based on typing patterns. Yet, the core dilemma persists: the eternal tension between usability and security. As Schneier points out, an overly cumbersome security system will inevitably be circumvented by users seeking convenience, leading them to leave doors unlocked, metaphorically speaking. This challenge extends to the massive scale of interconnected devices, where our smartphones have become central security hubs, but also single points of failure. The ease with which a phone number can be hijacked to reset countless accounts underscores the precariousness of our current digital infrastructure. Furthermore, the act of attribution—identifying who is behind an online action—is becoming a high-stakes game of cat and mouse. While law enforcement and intelligence agencies possess increasingly sophisticated tools, often involving massive surveillance, to unmask perpetrators, the virtual nature of cyberattacks, coupled with classified evidence, makes definitive attribution difficult and often unprovable for the public, leading to a trust gap. Ultimately, Schneier posits that while authentication will become less convenient, it is a necessary evolution, akin to adopting house keys or seat belts, trading minor annoyances for significantly enhanced security in a world where every connected device, from a thermostat to a nuclear power plant, will demand verification.
Everyone Favors Insecurity
Bruce Schneier, in 'Everyone Favors Insecurity,' unravels a disquieting truth: the internet's pervasive insecurity isn't merely a bug; it's often a feature, deliberately cultivated by the very entities that shape our digital world – governments and corporations. He reveals how these powerful architects, driven by their own distinct interests, have manipulated the network, creating a landscape where convenience and profit often trump genuine security. Corporations, he explains, fuel 'surveillance capitalism,' a model built on the constant, natural byproduct of our digital lives – data. Every click, every search, every carried smartphone becomes raw material, meticulously collected and analyzed, primarily to serve the insatiable advertising engine that underpins much of the internet. This relentless data harvesting, as Schneier illustrates, allows companies like Google and Facebook to build startlingly intimate profiles, predicting our emotions and desires to more effectively sell us products. But this pursuit of data doesn't stop at commerce; governments, too, leverage this inherent insecurity for law enforcement, social control, and international espionage, utilizing the same corporate surveillance infrastructure, sometimes through coercion or legal compulsion. The author paints a vivid picture of this dynamic: imagine a vast, invisible web where every thread, every interaction, is not just observed but cataloged, not for our protection, but for theirs. This creates a profound tension, as our desire for seamless, free services clashes with the reality of our constant surveillance and the inherent risks it entails. Furthermore, Schneier highlights how this insecurity is actively maintained through legal mechanisms like the DMCA, which corporations exploit to control products, restrict repairs, and enforce proprietary ecosystems, turning user-owned devices into licensed platforms. This corporate control, amplified by the network effect, means that even seemingly small companies can exert significant power over our digital lives, creating a new form of digital feudalism where allegiance is pledged to platforms rather than individuals. The narrative then pivots to the global stage, where cyberwarfare has become the new normal. Countries, prioritizing offensive capabilities over defensive ones, exploit the internet's vulnerabilities, turning it into a battlefield where the lines between peace and war blur, and attacks can range from espionage to the disruption of critical infrastructure, like the Stuxnet attack on Iran's nuclear facilities, a stark example of digital weaponry causing physical damage. Finally, Schneier turns to the criminal element, showing how these same insecurities are a goldmine for cybercriminals who profit from ransomware, identity theft, and sophisticated fraud, operating with relative impunity across borders. The chapter leaves us with a sobering understanding: the internet's insecurity is a complex, multi-faceted problem, intentionally perpetuated by powerful actors for profit and control, a precarious balance that leaves us all vulnerable.
Risks Are Becoming Catastrophic
Bruce Schneier, in his chapter 'Risks Are Becoming Catastrophic,' illuminates a profound shift in the digital landscape. The author explains that while the underlying technologies and trends aren't new, their integration into society has amplified their impact, moving threats beyond mere confidentiality to critical issues of integrity and availability. He paints a stark picture: confidentiality breaches, like stolen data or embarrassing leaks, affect our privacy, but attacks on integrity and availability can directly endanger life and property. Imagine a hacker not just stealing your medical records, but altering your blood type, or worse, disabling life-saving equipment in a hospital – the stakes escalate from personal inconvenience to existential peril. Schneier details how industrial control systems, from dams and power plants to chemical facilities, are now internet-connected and vulnerable, capable of causing physical devastation, as demonstrated by incidents involving turbines, centrifuges, and even a dam's sluice gates. He underscores that as computer systems become more autonomous and powerful, particularly with the rise of machine learning, our ability to understand and control them diminishes, creating a new layer of risk. These algorithms, which learn and adapt, are increasingly making decisions that impact our lives, from credit scores to medical diagnoses, yet their internal workings can be opaque, even to their creators. This autonomy, coupled with the speed at which algorithms operate, can lead to rapid, cascading failures, as seen in stock market flash crashes or the accidental publication of false news that briefly destabilizes markets. The author then turns to the vulnerability of our global supply chains, where hardware and software can be compromised at any stage of production, distribution, or maintenance, potentially embedding backdoors or malicious code before a product even reaches the consumer. This intricate web, spanning multiple countries and processes, creates blind spots and makes robust security a monumental challenge. Schneier concludes by emphasizing that our critical dependence on interconnected systems means that the potential for catastrophic failure, whether accidental or malicious, is growing exponentially. While acknowledging that extreme 'movieplot' scenarios might be unlikely, he stresses that the underlying trends – the scaling of attacks through technology, the increasing autonomy of systems, and the interconnectedness of our infrastructure – are very real, demanding a fundamental shift in how we approach security from designing less vulnerable systems from the outset, rather than merely reacting to threats.
What a Secure Internet+ Looks Like
Bruce Schneier, in 'What a Secure Internet+ Looks Like,' illuminates the stark reality of our interconnected world, a landscape riddled with vulnerabilities that extend far beyond the digital realm into the fabric of our daily lives. He begins by unfurling a chilling narrative, starting with the seemingly innocuous Internet-connected dolls like 'My Friend Cayla,' which, a Norwegian Consumer Council found, disregarded basic privacy rights, shared personal data with third parties for unknown purposes, and possessed virtually no embedded security, allowing anyone to eavesdrop or broadcast through them. This isn't an isolated incident; even Mattel's 'Hello Barbie' shared similar security flaws. Schneier then pivots to the colossal Equifax breach, a catastrophic event where 150 million Americans had their most sensitive data stolen, not through a sophisticated attack, but by exploiting a known vulnerability that the company had failed to patch for months. This reveals a systemic issue: security is an afterthought, a compliance exercise that slows development rather than being an integral part of the design process. The author posits a fundamental shift is required: security must be 'engineered by design,' woven into every system and component from inception, much like fuel efficiency became a standard in the automotive industry through regulation and market pressure. He outlines a vision for a secure internet, segmented into actionable principles: secure our devices with transparent, patchable software, secure defaults, predictable failure modes, and encrypted data; secure our data by minimizing collection, ensuring secure storage and transfer, and transparent usage; secure our algorithms by demanding transparency, explainability, and auditability, even when full comprehension is impossible; secure our network connections by empowering ISPs to act as a first line of defense, providing secure connections, and educating consumers; secure our critical infrastructure by prioritizing energy, finance, and telecommunications, acknowledging the immense cost and complexity but also the existential necessity; and finally, disconnect systems where security cannot be guaranteed, challenging the prevailing ethos of 'connect it all' and advocating for a return to smart devices and dumb networks, a mindful approach to connectivity that prioritizes societal welfare over unchecked expansion. The chapter serves as a powerful call to action, a roadmap for a future where security is not an add-on, but the very foundation upon which our digital world is built, moving us from a state of pervasive vulnerability to one of considered resilience.
How We Can Secure the Internet+
Bruce Schneier, in 'How We Can Secure the Internet+', lays bare the intricate tapestry of policy and incentives needed to fortify our digital world, moving beyond the 'what' to the crucial 'how.' He reveals that while the technological solutions for a secure internet largely exist, the chasm lies in the lack of compelling reasons for companies to implement them. Schneier proposes a robust policy toolkit, encompassing proactive regulations, punitive measures for negligence, mandatory transparency, and market design, all aimed at recalibrating the scales to either raise the cost of insecurity or lower the cost of security. He emphasizes that the goal isn't absolute safety, but rather creating powerful incentives for safer behavior. The author meticulously details the necessity of establishing clear, principle-based standards, akin to 'exercise caution when it's snowing' rather than rigid rules, allowing for flexibility in the rapidly evolving landscape of internet security. A pivotal insight is the urgent need to correct the profound misalignments in incentives, where short-term profits often overshadow long-term security risks, leaving society to bear the brunt of failures. Schneier illustrates this with stark examples, showing how the personal financial well-being of executives can remain insulated from catastrophic company-wide breaches, a dynamic akin to a 'prisoner's dilemma' on a corporate scale. He argues passionately for clarifying liabilities, suggesting that software, like tangible products, should be subject to stricter product liability laws, potentially through statutory damages, to ensure accountability. Furthermore, Schneier highlights the pervasive 'lemons market' in technology, where consumers, lacking the expertise to discern security features, are often lulled into a false sense of safety by vague marketing claims, driving secure products out of the market. To combat this, he advocates for clear labeling and rating systems, much like those found on food or automobiles, to empower consumers with actionable information. The author also stresses the critical importance of public education, not to turn everyone into an engineer, but to foster an understanding of individual roles in cybersecurity and to empower citizens to pressure companies and governments for better security. Finally, Schneier underscores the necessity of raising professional standards for software engineers, drawing parallels to licensed professions like architecture and medicine, and the urgent need to close the cybersecurity skills gap by investing in education and retraining. He concludes by calling for increased research and sustained funding for the maintenance and upkeep of our increasingly fragile digital infrastructure, painting a picture of a complex, multi-faceted endeavor requiring a concerted, long-term commitment to secure our interconnected future.
Government Is Who Enables Security
Bruce Schneier, in 'Government Is Who Enables Security,' posits a fundamental truth often overlooked in our technologically saturated world: true, collective security is largely a government-enabled endeavor. He draws a compelling parallel with air travel, illustrating how an inherently dangerous act—hurtling through the sky in a metal tube—has become remarkably safe not through market competition on safety itself, but through decades of stringent, invisible government regulation. Airlines don't advertise their safety records; consumers don't choose airlines based on safety metrics; yet, we implicitly trust that the flight will be safe. This trust, Schneier argues, is built on a bedrock of government mandates, forcing improvements in design, training, and procedures. This historical precedent, he contends, is precisely what's needed for the internet, an industry largely left to its own devices and consequently, a breeding ground for insecurity. He critiques market-driven solutions and voluntary standards as insufficient, highlighting that industry self-interest often prioritizes immediate cost savings over long-term safety, a pattern observed across industries from pharmaceuticals to automobiles before government intervention. The current governmental structure, however, is fragmented, with agencies operating in silos that fail to grasp the interconnected nature of the internet. To address this, Schneier proposes the creation of a new federal agency, a National Cyber Office (NCO), modeled after the Office of the Director of National Intelligence, to coordinate expertise, set priorities, and advise other agencies. This entity wouldn't necessarily be a direct regulator but a central hub of knowledge, facilitating holistic policy-making for a system that transcends traditional jurisdictional boundaries. He acknowledges the challenges: the inherent slowness of government compared to technological advancement, the difficulty of defining the scope of regulation in a rapidly evolving landscape, the potential for regulatory capture by powerful industries, and the risk of stifling innovation. Yet, he asserts that these are not insurmountable obstacles, citing how governments have successfully navigated similar complexities with new technologies throughout history. Schneier emphasizes that regulation is not merely about prohibitions but about shifting incentives and nudging behavior, much like mandating seat belts rather than demanding perfect car safety. He concludes that while international cooperation is crucial, domestic action sets global norms, and a coordinated, government-led approach, though imperfect, is the most effective path toward securing our increasingly interconnected digital lives, moving us from a state of inherent risk to one of managed safety.
How Governments Can Prioritize Defense over Offense
Bruce Schneier, in his chapter 'How Governments Can Prioritize Defense over Offense,' implores governments to fundamentally reorient their approach to Internet security, shifting from a posture of offensive capability to one of robust defense. He posits that the current paradigm, where intelligence agencies like the NSA maintain the ability to exploit vulnerabilities for surveillance and attack, is no longer tenable in our interconnected world. The very systems used to surveil foreign adversaries are inextricably linked to our own, meaning any insecurity we leave in place for offensive purposes leaves us vulnerable. Schneier illustrates this with a compelling analogy: imagine every house could be opened with a master key; fixing those locks would also secure criminals' safe houses, but the overwhelming benefit of protecting everyone's home makes the choice obvious. This principle, he argues, applies even more acutely to the Internet, where the risks are dramatically amplified. A central tension arises from the 'dual-use' nature of software vulnerabilities – they can be patched for collective security, or hoarded for offensive advantage. Schneier highlights the market for 'zero-day' exploits, where lucrative rewards from cyberweapons manufacturers far outweigh bug bounties offered by vendors, creating a powerful incentive for secrecy. The chapter delves into the complexities of the US government's Vulnerabilities Equities Process (VEP), a secret interagency review of whether to disclose or hoard vulnerabilities, revealing its inherent bias towards secrecy and the potential for significant security risks, as evidenced by the ETERNALBLUE exploit. Schneier contends that this hoarding, even of so-called 'NOBUS' (nobody but us) vulnerabilities, is a dangerous illusion, as stolen exploits can become public, and independent discovery is common. He then pivots to the need for governments to actively design for security rather than exploit insecurity, citing historical examples where agencies deliberately weakened encryption standards or pushed for insecure protocols, ultimately benefiting criminals and hostile states. The author calls for a radical increase in encryption across all layers of the internet – from end-to-end communications and device security to data in transit and large databases – recognizing it as a foundational security technology that forces attackers to be more targeted and makes mass surveillance more difficult. Finally, Schneier argues for a structural separation of offensive intelligence operations from defensive security initiatives, suggesting that agencies like the NSA, by maintaining both missions, are fundamentally mistrusted and thus hindered in their ability to secure the internet. He advocates for specialized agencies focused purely on defense, alongside making law enforcement more technically adept and fostering closer, more transparent partnerships between government and industry to share threat intelligence and build a more resilient digital infrastructure for everyone.
Plan B: What’s Likely to Happen
Bruce Schneier, in 'Click Here to Kill Everybody,' paints a stark picture of the United States' likely trajectory regarding cybersecurity, a landscape characterized more by inertia than progress. He observes how even significant breaches, like Equifax, or well-intentioned legislation, such as the IoT Cybersecurity Improvement Act, often dissolve into partisan bickering or outright neglect, leaving consumers vulnerable. Schneier posits that this inaction stems from a deep-seated psychological bias in politicians, who, much like corporate CEOs, tend to prioritize immediate, visible concerns over long-term, abstract threats. Imagine a politician weighing funds for a looming cyber-catastrophe against a popular local project; the latter often wins, leaving security underfunded and under-addressed. This dynamic is compounded by the powerful lobbying of the tech industry, which fiercely opposes regulation, and the difficulty in attributing direct blame for cyber-related harm, unlike clear-cut accidents like faulty automobiles, as exemplified by Ralph Nader's exposé on car safety. He notes that only when the Internet begins to cause undeniable, physical fatalities, much like the automobile industry faced after Nader's work, will robust regulation likely emerge. However, Schneier finds a beacon of hope in Europe, where the GDPR represents a significant regulatory shift, imposing strict data privacy and security requirements on companies worldwide. This regulatory power, he suggests, positions the EU as a potential global standard-setter, influencing international trade and product design, much like California's emissions standards affect the entire US auto market. While the US federal government remains largely stagnant, individual states like New York and California are beginning to implement their own security measures, attempting to fill the void. Ultimately, Schneier concludes that meaningful change in the US may depend on a future generation of leaders, but in the interim, individuals and organizations must proactively manage their own security, make informed trust decisions, and use their purchasing power and lobbying efforts to advocate for a more secure digital world, acknowledging that much of our security is now inextricably linked to the practices of others.
Where Policy Can Go Wrong
Bruce Schneier, in 'Where Policy Can Go Wrong,' illuminates the perilous path of governmental responses to the internet's growing capacity to inflict harm, a shift that inevitably brings it into the realm of regulation. The author posits that when policymakers, often motivated by fear of attack or weakness, inevitably turn their attention to the internet's security vulnerabilities, the choice will not be between regulation and no regulation, but between smart and stupid. He casts a wary eye on the latter, recalling the hasty, poorly conceived PATRIOT Act enacted after 9/11, a decision whose consequences echo for years. Schneier warns that legislative responses to future internet security disasters, while headline-grabbing, may not truly improve security, but rather embed flawed policies that exacerbate problems, citing the ineffectual Child Online Protection Act and the counterproductive Digital Millennium Copyright Act as cautionary tales. A central concern is the persistent governmental demand for backdoors into encryption, a demand rooted in law enforcement's desire to overcome the 'going dark' phenomenon, a narrative that has evolved from encrypted phone calls to messaging apps and smartphones. Schneier dissects this demand, revealing it as a dangerous fallacy; there is no such thing as a secure backdoor for law enforcement that cannot also be exploited by criminals and foreign adversaries, thus making everyone less secure. He illustrates this with the FBI's evolving proposals, from key escrow to mandating vulnerabilities and exploiting update processes, all under euphemisms like 'responsible encryption.' This isn't a solely American concern, as similar legislative pressures emerge globally, from the UK's Investigatory Powers Act to EU deliberations and actions in countries like Brazil and Egypt. Schneier argues forcefully that this pursuit of backdoors fundamentally compromises security by prioritizing surveillance over protection, and that the FBI's problem is a lack of technical expertise, not a lack of access. He further explores the misguided notion of limiting encryption outright, a policy reminiscent of Cold War-era munitions controls, which would be rendered obsolete by the internet's global nature and impossible to enforce without draconian measures. The author also critiques proposals to ban online anonymity, arguing that while anonymity can be abused, it is also a vital tool for dissent and privacy, and that such bans are ultimately ineffective and detrimental to liberty. Finally, Schneier addresses the allure of mass surveillance and hacking back, labeling both as ineffective and dangerous. Mass surveillance, he contends, is a poor tool for crime prevention, better suited for social control, and ultimately fails against sophisticated adversaries. Hacking back, or 'active cyber defense,' is equally perilous, risking misattribution, international incidents, and escalating conflicts, ultimately sanctioning vigilantism. The core tension, woven throughout, is the struggle between legitimate security concerns and the potential for poorly conceived, fear-driven policy to undermine the very digital infrastructure it seeks to protect, leading to a world where 'stupid' regulation, rather than enhanced security, becomes the unintended consequence.
Towards a Trusted, Resilient, and Peaceful Internet+
Bruce Schneier, in his chapter 'Towards a Trusted, Resilient, and Peaceful Internet+', implores us to consider the bedrock of human society: trust. He reveals that our daily lives are a constant, often unconscious, exercise in trusting millions of people, institutions, and systems, from the food we eat to the digital tools we rely on. This intricate web of trust, however, is fraying, particularly on the internet, where incidents of data breaches and manipulation have eroded confidence. Schneier argues that this declining trust, fueled by surveillance capitalism and government overreach, is unsustainable, threatening to destabilize economies and individual well-being, much like a delicate house of cards teetering on the edge of collapse. He posits that for the internet, and by extension society, to thrive, we must actively cultivate trustworthiness, demanding transparency from corporations and governments alike. This requires a shift from prioritizing offense to defense, from secrecy to openness, and from insecure practices to public, verifiable security measures. Beyond trust, Schneier champions the concept of resilience, drawing on sociological theories of complex systems. He explains that the internet, being both nonlinear and tightly coupled, is inherently fragile, susceptible to cascading failures and catastrophic attacks. True resilience, he contends, is the capacity to cope with and bounce back from unanticipated dangers, a quality essential for both technological systems and society as a whole. This resilience isn't just about technical defenses like redundancy and isolation, but also about the psychological fortitude of individuals and communities. Finally, Schneier calls for a demilitarization of cyberspace, urging us to move beyond combative metaphors and embrace a vision of a peaceful internet. He introduces the idea of 'cyber peace,' not as the absence of attacks, but as a proactive network of regimes that clarify norms, reduce conflict, and promote global cybersecurity through multistakeholder collaboration. This vision acknowledges the grim realities faced by billions in less free societies, underscoring the urgency for collective action to shape the internet into a force for human ideals like trust, security, resilience, peace, and justice.
Conclusion
Bruce Schneier's "Click Here to Kill Everybody" serves as a stark and essential wake-up call, dismantling the comforting illusion that our increasingly computerized world is inherently secure. The core takeaway is that the pervasive integration of computing into every object, driven by economic incentives prioritizing cost and convenience over safety, has created a global system of unprecedented fragility. This "wicked problem" of internet insecurity is not an accident but a consequence of fundamental design flaws, misaligned incentives, and a pervasive cultural preference for agility over robustness. The emotional lesson is one of urgent concern; the abstract digital threats of yesterday have transmuted into tangible risks to life and property, demanding a profound societal shift in our understanding of security. We are no longer just protecting data; we are safeguarding physical well-being and societal stability. The practical wisdom gleaned from Schneier's analysis is multifaceted and demands systemic intervention. He argues forcefully that traditional market-based approaches are insufficient. Instead, a fundamental reorientation of policy is required, with governments playing a crucial, proactive role. This includes correcting market failures, imposing liability on corporations for security lapses, and prioritizing defense over offensive cyber capabilities. The book emphasizes that security must be "engineered by design" from the ground up, not an afterthought. Furthermore, Schneier highlights the failure of the patching paradigm and the need for more resilient systems, the critical role of government-mandated standards and regulations, and the necessity of fostering transparency and accountability from both corporations and governments. The path forward, though fraught with challenges like political inertia and resistance to regulation, necessitates a collective commitment to building a trusted, resilient, and peaceful digital future, acknowledging that true security is a shared, government-enabled endeavor.
Key Takeaways
The economic incentives of decreasing computerization costs and standardized chip production are driving the pervasive integration of computing and connectivity into nearly all objects, regardless of perceived user need.
The convergence of multiple technological trends—IoT, AI, cloud computing, robotics, and miniaturization—is creating a single, interconnected global system that directly impacts the physical world, blurring the lines between the digital and real.
The increasing interconnectedness of systems, including humans as components, transforms security from a concern about data privacy to a critical issue involving life and property, rendering traditional market-based security approaches inadequate.
The current state of internet security is a 'wicked problem,' characterized by complex, interconnected technical, political, and economic factors that defy simple solutions and require systemic intervention.
Effective internet security necessitates a fundamental shift in policy, including a greater role for government to address market failures and misaligned business incentives, and a prioritization of defense over offensive cyber capabilities.
The pervasive insecurity of computer systems is not an accident but a direct consequence of prioritizing convenience and cost over robust security measures in software development and market incentives.
Fundamental design flaws in early Internet protocols, built on an assumption of trust, have created inherent vulnerabilities that remain difficult and costly to remediate.
The very extensibility that makes modern computing powerful also makes it susceptible to unforeseen uses and malicious reprogramming, blurring the lines between intended function and exploitable features.
Systemic complexity inherently favors attackers by creating a vast attack surface, requiring defenders to secure everything while attackers need only find one vulnerability, a dynamic that makes defense a constant, uphill battle.
The rapid evolution and democratization of attack methods mean that threats are constantly improving in speed, cost, and ease of execution, outpacing defensive capabilities.
Interconnectedness creates emergent vulnerabilities where the interaction between individually secure systems can lead to cascading failures with widespread, unpredictable consequences.
The unique failure modes of computers—distance irrelevance, skill decoupling, and class breaks—necessitate a fundamental shift in security thinking from protecting against average threats to defending against the most capable adversaries.
The traditional "get it right the first time" security model of physical engineering is fundamentally at odds with the agile, "move fast and break things" approach of software and the Internet of Things (IoT), creating a critical security deficit as these worlds collide.
The patching ecosystem, reliant on timely vulnerability disclosure, vendor response, and user installation, is failing due to user hesitancy, vendor delays, technical limitations in embedded systems, and legal deterrents to security research, leaving vast numbers of devices perpetually vulnerable.
The economic models for many IoT and embedded systems prioritize rapid product cycles and low costs over long-term security maintenance, leading to a proliferation of devices that are difficult or impossible to patch, creating a massive attack surface.
Legal frameworks like the DMCA, intended to protect copyright, are weaponized by manufacturers to suppress security research, hindering the discovery and disclosure of vulnerabilities essential for improving digital safety.
The increasing integration of computing into critical infrastructure and everyday objects means that the failure of the patching paradigm poses direct threats to life and property, moving cybersecurity from an abstract digital concern to a tangible physical one.
A hybrid approach is needed, integrating the long-term stability of traditional design with the reactive capabilities of agile development to address the inherent complexity and rapid evolution of interconnected systems.
Credential stealing, not complex exploits, is the primary method of network breaches, exploiting the fundamental weaknesses in human authentication practices.
The inherent tension between usability and security in authentication systems often leads users to compromise security for convenience, creating exploitable vulnerabilities.
The proliferation of interconnected devices has transformed smartphones into critical security hubs, simultaneously creating significant single points of failure that attackers can exploit.
Attribution of cyberattacks is a complex, resource-intensive process, often reliant on classified intelligence, making it difficult for the public to verify and trust official claims, especially for non-state actors.
The future of digital interaction necessitates a continuous arms race in authentication, balancing the need for robust security with the demand for seamless user experience across an ever-expanding network of devices.
The internet's insecurity is not accidental but a deliberate outcome of corporate and governmental interests that benefit from surveillance and control, creating a fundamental tension between user privacy and institutional power.
Surveillance capitalism, driven by the commodification of personal data as a byproduct of digital interaction, forms the economic backbone of the internet, necessitating and perpetuating insecurity for profit.
Governments leverage the same surveillance infrastructure built by corporations for their own ends, including social control and espionage, highlighting a symbiotic relationship that compromises citizen security.
Corporate control over devices and services, often enabled by legal mechanisms and the network effect, limits user autonomy and fosters an environment where proprietary interests override security concerns.
Cyberwarfare has become an accepted tool of statecraft, where offensive capabilities are prioritized, further entrenching the internet's inherent vulnerabilities and blurring the lines between peace and conflict.
Criminals exploit the internet's insecurity for significant financial gain, utilizing sophisticated methods like ransomware and identity theft, often operating with impunity due to jurisdictional challenges.
The transition from confidentiality-focused cyber threats to integrity and availability threats elevates digital risks from privacy concerns to matters of life and death.
The increasing autonomy and opaque nature of machine learning algorithms introduce significant, potentially uncontrollable risks as they make critical decisions impacting society.
Globalized technology supply chains, with their complex international production and distribution networks, represent a vast and often overlooked vulnerability point for cyber attacks.
The scaling power of technology means that a smaller number of attackers can inflict exponentially greater damage, fundamentally altering the acceptable societal tolerance for risk.
Designing inherently secure systems from the ground up, rather than solely focusing on reactive threat mitigation, is essential to address the escalating catastrophic potential of cyber risks.
Security must be fundamentally 'engineered by design' into all systems and components from their inception, rather than being an afterthought or a compliance burden.
The pervasive lack of security in consumer devices and corporate infrastructure, exemplified by vulnerable smart toys and massive data breaches, highlights a systemic failure that demands a paradigm shift in development practices.
Securing our digital future requires a multi-faceted approach encompassing the robust design of devices, responsible data handling, transparent and auditable algorithms, and a proactive role for Internet Service Providers.
Critical infrastructure, particularly energy, finance, and telecommunications, must be prioritized for enhanced cybersecurity due to their foundational role in society, despite the significant costs and complexities involved.
The principle of disconnecting systems where security cannot be guaranteed is a valid, albeit counter-cultural, strategy that challenges the 'connect it all' mentality and offers a path to greater safety.
The Internet's original 'smart devices, dumb network' architecture offers a model for future security, suggesting a move towards more distributed systems and less reliance on centralized, all-encompassing connectivity.
Establish clear, principle-based standards for internet security that allow flexibility and adaptation to evolving threats, rather than rigid, prescriptive rules.
Correct misaligned corporate incentives by imposing significant financial liabilities and penalties on companies and executives for security failures, making the cost of insecurity prohibitively high.
Implement transparency mechanisms like product labeling and security ratings to combat information asymmetry in the technology market, empowering consumers to make informed security choices.
Enhance public education on cybersecurity, focusing on actionable advice and fostering public demand for better security practices from companies and governments.
Elevate the professionalism of software engineering through certification and licensing, akin to traditional engineering disciplines, to ensure accountability and expertise in system design.
Address the cybersecurity skills gap through increased investment in education, retraining programs, and the automation of security tasks to meet the growing demand for professionals.
Prioritize sustained public and private investment in research and development for novel security technologies and the continuous maintenance and modernization of internet infrastructure.
Collective security, particularly in rapidly evolving technological domains like the internet, is most effectively achieved through government-mandated standards and regulations, not solely market forces or voluntary industry initiatives.
Historical precedent demonstrates that industries consistently improve safety and security only when compelled by government regulation, as market incentives alone often favor short-term profits over long-term risk mitigation.
The fragmented, siloed nature of current government agencies is ill-suited to address the interconnected, horizontal nature of the internet, necessitating a centralized coordinating body like the proposed National Cyber Office (NCO).
Effective internet regulation requires a nuanced approach that shifts incentives and nudges behavior rather than imposing rigid, outdated rules, focusing on human aspects and technological neutrality to maintain relevance.
While fraught with challenges like speed, scope, efficacy, and stifling innovation, the potential downsides of government regulation are outweighed by the risks of inaction in the face of pervasive digital threats.
International cooperation is vital for cybersecurity, but domestic regulations, particularly from major markets, can establish global norms and influence manufacturers worldwide due to the 'write-once-sell-everywhere' nature of software.
Governments must shift from prioritizing offensive cyber capabilities to a defense-dominant strategy, as the interconnected nature of the internet means any vulnerability exploited for offense inherently compromises one's own security.
Software vulnerabilities represent a critical choice: disclosure and patching for collective security, or hoarding for offensive advantage, with the latter creating significant risks due to the high likelihood of independent discovery or theft.
The inherent 'dual-use' nature of security tools and vulnerabilities means that deliberate weakening of security standards by governments for surveillance purposes ultimately undermines global digital safety and benefits adversaries.
Ubiquitous encryption is a core security technology that, while not a panacea, significantly enhances protection against mass surveillance and targeted attacks, forcing adversaries to expend greater resources and making bulk data collection more difficult.
Structural separation of offensive intelligence agencies from defensive cybersecurity bodies is essential for building trust and enabling genuine progress in securing the internet, as commingling these missions inherently prioritizes offense.
Law enforcement agencies require significant investment in technical expertise and modern investigative tools to adapt to an increasingly encrypted and secure digital landscape, rather than demanding backdoors that weaken security for all.
Effective cybersecurity necessitates a robust, transparent partnership between government and industry, involving shared threat intelligence and collaborative incident response, to address attacks that overwhelm private defenders.
US political inertia and psychological biases prevent proactive cybersecurity regulation, prioritizing short-term gains over long-term systemic risks.
The difficulty in directly attributing cyber-related fatalities, unlike physical accidents, hinders the public and political will for immediate regulatory action.
The European Union, through regulations like GDPR, is emerging as a global regulatory superpower, setting standards that influence international business practices and product design.
Individual US states are beginning to act as regulatory laboratories, attempting to address the federal government's inaction on cybersecurity and data privacy.
Meaningful cybersecurity progress in the US is likely to be slow, potentially requiring a generational shift in leadership, while proactive individual and organizational action is crucial in the interim.
Consumers and organizations must actively make informed decisions about trust and security, recognizing that much of their digital safety is outsourced and dependent on third-party practices.
Governmental responses to internet security threats often oscillate between ineffective 'stupid' regulation and well-intentioned but flawed 'smart' regulation, with fear being a primary, often detrimental, motivator.
The demand for encryption backdoors by law enforcement is a dangerous fallacy, as any such vulnerability, however well-intentioned, will inevitably be exploited by malicious actors, thereby compromising global security for all.
Policies aimed at restricting or banning strong encryption or online anonymity are ultimately futile due to the internet's global nature and the inherent extensibility of technology, while simultaneously eroding essential liberties.
Mass surveillance is a more effective tool for social control than for crime prevention, particularly against sophisticated threats, and its implementation carries significant risks to freedom and liberty.
The concept of 'hacking back' as a response to cyberattacks is a perilous form of vigilantism that risks misattribution, international conflict, and escalation, rather than providing a genuine security solution.
Technological progress, particularly the internet's ability to circumvent scarcity-based security models, necessitates proactive, engineered solutions to inherent system threats rather than relying on restrictive laws.
Human society fundamentally relies on a vast, often unexamined, network of trust, which is currently eroding, particularly within the digital realm, posing significant risks to societal stability.
The internet's inherent complexity, characterized by nonlinear interactions and tight coupling, makes it highly fragile and susceptible to cascading failures, necessitating a focus on resilient security measures.
Achieving a trustworthy and secure internet requires a paradigm shift towards transparency and accountability from both governments and corporations, moving away from secrecy and towards public verification of security practices.
Demilitarizing cyberspace and fostering 'cyber peace' involves actively creating norms and collaborative regimes that reduce conflict and espionage, rather than merely reacting to attacks.
True resilience in complex systems, including the internet and society, is not just about preventing failures but about the capacity to cope with and recover from them, building both technical and psychological fortitude.
The pursuit of a just and equitable internet must extend beyond liberal democracies to address the severe digital rights issues faced by users in more repressive regimes, requiring global advocacy and support for digital freedom.
Action Plan
Educate yourself on the converging trends that create hyperconnected systems and their inherent security risks.
Recognize that market forces alone are insufficient to address the systemic security challenges of an interconnected world.
Advocate for policy changes that prioritize defense and resilience in internet security, rather than solely offensive capabilities.
Consider the role of government intervention to correct market failures and align business incentives with public security needs.
Engage in discussions about the complex, 'wicked problem' of internet security, acknowledging its multifaceted nature.
Support the development of public-interest technologists who can bridge the gap between technical solutions and policy implementation.
Recognize that security is an ongoing process, not a one-time fix, and advocate for continuous security reviews and updates in systems you use or manage.
Be mindful of the trade-offs between convenience and security in your daily digital interactions, and make informed choices where possible.
Understand that software vulnerabilities are a feature of modern computing and develop habits like regular data backups to mitigate potential data loss.
Support and advocate for greater transparency and security standards in the development of the Internet of Things (IoT) devices.
Educate yourself and others about the inherent insecurities of foundational internet protocols and the importance of ongoing efforts to secure them.
When evaluating new technologies, consider not just their intended functionality but also their potential for misuse due to their extensibility.
Prioritize simplicity and modularity in system design where possible to reduce complexity and the attack surface.
Stay informed about evolving threats and security best practices, understanding that yesterday's defenses may not be sufficient for tomorrow's attacks.
Prioritize automatic updates for all devices where possible, and manually check for and install updates regularly for those that require it.
When purchasing new devices, research the manufacturer's track record for security updates and ongoing support.
Advocate for stronger cybersecurity regulations and responsible disclosure practices within your professional networks and communities.
Educate yourself and others about the security risks associated with IoT devices and common vulnerabilities like default passwords.
Support organizations and initiatives that promote ethical security research and advocate for legal protections for researchers.
Be critical of products that offer "unbreakable" security claims without transparent update mechanisms, understanding that security is an ongoing process, not a static state.
Implement strong, unique passwords for all online accounts and consider using a password manager.
Enable two-factor authentication (2FA) wherever it is offered, especially for critical accounts like email, banking, and social media.
Be highly skeptical of unsolicited emails, text messages, or calls asking for personal information or urging you to click links, even if they appear legitimate.
Regularly review security settings on your online accounts and smartphone, looking for options to enhance protection.
Educate yourself and others about common phishing tactics and social engineering techniques.
Understand that even convenient security measures like fingerprint or facial recognition are not foolproof and should ideally be combined with other authentication factors.
Be mindful of the information you share online, as metadata or contextual details in photos or posts can sometimes be used for attribution.
Critically evaluate the 'free' services you use online, understanding the data trade-offs involved.
Strengthen personal digital security by enabling multi-factor authentication and reviewing app permissions regularly.
Advocate for stronger data privacy regulations and corporate accountability in your region.
Educate yourself and others about the mechanisms of surveillance capitalism and its implications.
Support companies and initiatives that prioritize user security and privacy over data exploitation.
Be mindful of the information you share online and its potential use by corporations and governments.
Investigate the security and privacy features of your devices and services, seeking alternatives when necessary.
Educate yourself on the evolving nature of cyber threats, distinguishing between confidentiality, integrity, and availability risks.
Advocate for and support the development of security principles in the design phase of new technologies and systems, rather than as an afterthought.
Understand the potential vulnerabilities within your own organization's or personal supply chains, from software dependencies to hardware origins.
Critically evaluate the level of autonomy granted to algorithms in decision-making processes, especially in high-stakes environments.
Support initiatives and policies that promote transparency and accountability in the development and deployment of complex technological systems.
Recognize that societal tolerance for risk decreases as individual attack capabilities increase, necessitating proactive and robust security measures.
Prioritize security by design in all new product development, integrating it from the initial concept phase through to deployment.
Advocate for and implement transparent privacy policies and clear data retention practices for all connected devices and services.
Ensure all software and firmware for connected devices are designed to be patchable and regularly updated to address vulnerabilities.
Configure devices with strong, unique passwords and enable multi-factor authentication wherever possible, disabling unnecessary remote administration features.
Minimize data collection and usage, ensuring data is only collected when essential and is anonymized or deleted when no longer needed.
Support and encourage responsible security research by allowing ethical vulnerability testing and promptly addressing reported issues.
Demand greater transparency and explainability from algorithms, especially those used in critical decision-making processes.
Consider the necessity of full connectivity for all devices, exploring options for local-only communication or air-gapped systems where appropriate.
Advocate for and support the creation of clear, principle-based security standards in your industry or community.
Assess and, where possible, implement policies that align corporate incentives with long-term security outcomes, not just short-term profits.
Demand greater transparency from technology vendors regarding security features and threat models through product labeling and ratings.
Educate yourself and others on basic cybersecurity practices and the importance of individual actions in maintaining digital safety.
Encourage professional development and adherence to ethical standards within the software engineering community.
Support initiatives aimed at closing the cybersecurity skills gap through education and retraining.
Advocate for increased investment in cybersecurity research and the continuous maintenance of critical digital infrastructure.
Advocate for clearer, coordinated governmental approaches to internet security policy.
Support the development of new federal agencies tasked with advising on and coordinating cyber policy.
Educate yourself on the regulatory frameworks (or lack thereof) governing the digital products and services you use.
Engage in discussions about the balance between innovation and security in technological development.
Consider how market incentives might be better aligned with security outcomes in your own professional context.
Support initiatives that promote international cooperation on cybersecurity standards and cybercrime prevention.
Recognize that invisible, government-driven safety standards are often the foundation of our technological security.
Advocate for government policies that prioritize the disclosure and patching of software vulnerabilities over their use for offensive purposes.
Support the widespread adoption and implementation of strong end-to-end encryption for communications and data storage.
Encourage transparency and public oversight of government processes related to cybersecurity, such as the Vulnerabilities Equities Process.
Promote the development and funding of specialized government agencies focused solely on defensive cybersecurity, separate from offensive intelligence operations.
Support initiatives that enhance the technical expertise and capabilities of law enforcement agencies to conduct investigations in the digital age.
Foster stronger, more open information-sharing partnerships between government entities and private sector organizations to collectively address cyber threats.
Demand that technology companies design products with security as a primary feature, rather than as an afterthought or a means for surveillance.
Educate yourself on the cybersecurity practices of companies whose products and services you use, making purchasing decisions based on this research where possible.
Advocate for stronger cybersecurity regulations by contacting your elected officials and supporting relevant policy initiatives.
Organizations should proactively assess the security of all connected devices and services, including those acquired through casual means, and make security a board-level concern.
When choosing cloud services or data storage providers, carefully consider the legal jurisdictions involved and the potential implications for your data's security and privacy.
Understand that 'cyber' is an umbrella term encompassing diverse threats; advocate for policy distinctions that address specific threats (e.g., cyberbullying vs. cyberterrorism) appropriately.
Engage in conversations about cybersecurity, both personally and professionally, to foster a greater societal understanding and demand for digital safety.
Advocate for 'smart' policy solutions by understanding the technical realities of cybersecurity and encryption, rather than succumbing to fear-driven reactions.
Support and utilize strong, default encryption for all communications and devices to enhance personal and collective security against inevitable backdoor vulnerabilities.
Engage in public discourse to highlight the value of online anonymity and strong encryption, countering narratives that frame them solely as tools for criminals.
Resist calls for mass surveillance by understanding its limited effectiveness in crime prevention and its significant risks to civil liberties.
Reject the notion of 'hacking back' and instead focus on strengthening defensive cybersecurity measures and international cooperation for attribution and prosecution.
Champion solutions that engineer security into systems from the ground up, rather than relying on restrictive laws that attempt to limit technological capabilities.
Actively question and scrutinize the trustworthiness of institutions and platforms you interact with daily, especially online.
Advocate for transparency and public disclosure of security practices by both corporations and governments.
Support organizations working to defend digital rights and promote a more just and equitable internet globally.
Educate yourself and others about the principles of resilience in complex systems and how they apply to the internet.
Engage in discussions and support initiatives aimed at demilitarizing cyberspace and fostering norms of cyber peace.
Demand that your own data and digital interactions are handled with respect and security, and hold entities accountable when they fail to do so.