Cazando hackers. Un regalo del ‘convidado de piedra’

Revista de Humanidades de Valparaíso 12:115-140 (2018)
  Copy   BIBTEX

Abstract

We can be hacked because there are not indiscreet questions but there are imprudent answers. The main aim of this paper is actually to learn how to create the best possible answers, the most prudent ones, in order to remain as safe as we can. That is what Hunting Hackers means: to think about what piece of information was relevant for the hacker and why that one in particular and not another. If we could preview our flaws then we would be able to keep our zone safer from hackers. In order to reach this objective, we will analyse how the cryptic language known as Russian Cards operates. This study does not intend to show how the cryptic language is broken into, but to take advantage of the learning gifted in knowing the flaw itself. It is precisely in the learning of the flaw that we can find the answer to what and why we may be hacked. In proportion to the amount of flaw information at our disposal, we will be able to hunt hackers: to stop them completely or, at least, to weaken a possible hacker attack.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 90,616

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Hunting Hackers. A gift from the ‘mute guest’.María Dolors Martínez-Cazalla - 2018 - Humanities Journal of Valparaiso 12:115-140.
Hacer Filosofía del Lenguaje.Kepa Korta - 2002 - Revista de Filosofía (Madrid) 27 (2):337-359.
Do Safety Failures Preclude Knowledge?J. R. Fett - 2018 - Principia: An International Journal of Epistemology 22 (2):301-319.
Dummett's Mew Strategies of Anti-Realism.Xiao-Ming Ren & Han-Sheng Zhang - 2004 - Nankai University (Philosophy and Social Sciences) 6:43-47.
Truly empiricist semantics.Igor Douven - 1998 - Dialectica 52 (2):127–150.
Truly Empiricist Semantics.Igor Douven - 1998 - Dialectica 52 (2):127-150.
Molecular biologists as hackers of human data: Rethinking IPR for bioinformatics research.Antonio Marturano - 2003 - Journal of Information, Communication and Ethics in Society 1 (4):207-215.
An ethical discussion on the network economy.Bao Zonghao - 2001 - Business Ethics, the Environment and Responsibility 10 (2):108-112.
An ethical discussion on the network economy.Bao Zonghao - 2001 - Business Ethics, the Environment and Responsibility 10 (2):108–112.
The Russian cards problem.Hans van Ditmarsch - 2003 - Studia Logica 75 (1):31-62.

Analytics

Added to PP
2019-03-04

Downloads
17 (#742,076)

6 months
2 (#668,348)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

Add more references