#I want to reiterate that I like all of the SCPs in this post
Explore tagged Tumblr posts
chorus-the-mutate · 8 days ago
Text
2025 is the year of fuck it, we ball and in the spirit of that I'm dropping my most nuclear SCP opinion: I don't like the idea of any fanon interpretation of SCP 231 trying to water down the horrors of 110 Montauk, the treatment of SCP 231-1 through 7 or the Scarlet King becoming canon. The entire point of SCP 231 is the horrific, unfair consequences these girls endure because of the Scarlet King and his cult and the moral ramifications that the foundation faces because of the horrific acts of violence they have to inflict on these girls they sympathize with in order to keep the world at large safe. It is the definitive moral quandary of the foundation and stripping away the immoral aspects of SCP 231 removes the moral nuances that give the story of SCP 231-1 through 7 any weight.
With that being said I will say that I like and respect Fear Alone as an alternative interpretation of SCP 231's story because it subverts the initial expectations of horror you'd expect with SCP 231 and shifts the moral quandary to how fucked up it is to gaslight foundation staff into truly believing that they are harming a child. And I especially like how Katherine (SCP 231-7) is humanized and is turned into a character instead of a number. I just don't believe it should be canon because it strips away the immorality that makes SCP 231 a real moral quandary for the foundation.
If anything I think there are ways to humanize SCP 231-1 through 7 while still facing the full horror of SCP 231 as a story, even if you don't want to directly write about 110 Montauk. While I don't personally know how long SCP 231-7 endures 110 Montauk someone could interpret that there are breaks between each ritual and spin the administering of class a amnestics as a mercy when in reality it is a tool to inflict more suffering. And by focusing on the times between each ritual you have time to characterize SCP 231-7 and the staff around her, to show that SCP 231-7 has a life outside of these rituals, even if that life is scary or confusing for her. Then between the transitions of time someone would want to put in this hypothetical story they could imply the horror of what SCP 231-7 goes through without showing it and instead focusing on the medical assistance she'd need afterwards. Even if someone wouldn't want to go that route because it doesn't provide any real closure they could write about SCP 231-6's escape attempt and how she almost got away, or even how her death was faked. Or they could even write about SCP 231-7's escape or escape attempt and all of the ramifications that come along with her escape or demise.
With the more positive stuff out of the way I will say that I genuinely dislike the fanon interpretation of SCP 231's story that casts SCP 682 and SCP 999 as children of SCP 231-4 and SCP 231-7. And yes I am saying fanon interpretation because while SCP files are under a creative commons license this interpretation of SCP 231's story or Fear Alone were, to my knowledge, not made by SCP 231's original author. Even with all of the redacted information on SCP 231's file I don't think any of it is supposed to be legible even if it was put through a block text translator to maintain a sense of mystery. (Trust me I tried putting the SCP numbers through a block text translator and I couldn't find anything legible.) Plus SCP 999 isn't mentioned in the document at all and the document isn't written in a way that would intentionally misdirect readers about SCP 231-7's fate while implying she gave birth. The document is solely about SCP 231-7 and the moral implications of what she's going through. And that's how it should be.
Making SCP 682 a child of SCP 231-4 strips away SCP 682's agency as a character and ties him in with a story that flattens the nuances of his character. If SCP 682 is a child of the Scarlet King his hatred for humanity just becomes this inherent evil within him instead of leaving room for interpretation about why SCP 682 hates humanity even though he has the capacity to befriend SCP 053 and SCP 079. Using a familial tie to the Scarlet King as an explanation for why SCP 682 hates humanity strips away any humanity SCP 682 has as a character and that will always be an inherent disservice to his character.
But the worst offender of this fanon interpretation by far is SCP 999. Don't get me wrong, I like SCP 999, I really do. But I don't think SCP 999 is supposed to be a character, I think he's supposed to be an embodiment of good in its purest form. He doesn't need to be some big hero in someone else's story because saving the world isn't what being good is about. Hell, the SCP foundation itself, especially in this case, shows that being good and saving the world are very much not the same thing sometimes. Being good is as simple as showing a genuine love for the people around you and putting in a genuine effort to make things better for those people. And that's all SCP 999 ever needed to show. Throwing him into the lore of SCP 231 and the Scarlet King as SCP 231-7's child ditches the point SCP 999 originally made about being good and flattens the moral nuances involved with SCP 231's lore in general by providing a cop out solution to the moral quandary SCP 231 was built on to begin with. Plus I think implying that the torture SCP 231-7 has endured was not only for nothing but that her violation directly produced a messianic figure that could save the world from her abuser is infinitely crueler than SCP 231 as a story canonically is now. SCP 231 isn't an incel fantasy like Redo of Healer or hedonistic torture porn for the sake of it like Marquis de Sade's works, it is a piece of horror. And the horror is the fact that these girls are victims that cannot be saved, no matter how much anyone in the foundation sympathizes with them. The girls are not to blame for anything that happened to them but they cannot be humanized by the foundation or else the foundation will not have the resolve to keep the world safe. SCP 231-1 through 7's treatment is supposed to be the blight on the foundation they can never wash away. And at this point I would rather have this incredibly bleak story about these girls than a happy ending where SCP 999 saves the day and erases these girls from their own story, their own suffering.
If anyone reading this doesn't like the grave moral implications of SCP 231 that is perfectly fine, but I would rather you spend time reading or making content about SCPs you do like than stripping away the moral complexities of this SCP to make it more palatable.
13 notes · View notes
incorrecttwoset · 5 years ago
Text
Lesson time with Dani:
youtube
I think the lesson we all learned here today is why do we still watch top ten channels? Or just... list channels? In general? Like sure, i watch them sometimes when i know the info is real and legit like top 10 Philippine urban legends you've never heard of (lol thats a lie, everyone knows that literally every Philippine university is fucking haunted and i grew up on that shit bitch) but when the listing is so BLATANTLY FAKE with the most clickbait thumbnail, why do people still fuckin fall for that shit, ugh. Didn't we already learn from last year's youtube rewind? Jesus...
Anyways, let's get on to twosets... CRITIQUE on their top 10 hardest instruments.
10. Drums. Oh. My. Fuckin. God. So the conductors are literally just hired to fucking stand there and look pretty? And that all that practice of trying to play that song or piece oN TIME WITH AND WITHOUT PERCUSSION was for nOTHING? Oh my gosh, i never kNEW. And like, dude. Driving needs all four limbs at once, is it considered doing four separate things at once??? Fucking nO, BECAUSE ALL THE LIMBS ARE DOING AND ACCOMPLISHING ONE GOAL. AKA DRIVING. And like, AJSKBSOSDJ watch twoset's explanation. I don't think i can properly explain without going into a rant... its also midnight and my brain is fucking deteriorating. (Even more so with this top 10 video)
9. Pipe organ. Dude, i was immediately lost after they showed the bumblebee clip. There are!!! So many!!! More good!!! And more amazing!!! Classical pieces!!! Than fucking bUMBLEBEE!!! Dude, you could've just asked her to play Bach toccata and fugue in d minor. oH, AND SPEAKING OF TOCCATA AND FUGUE IN D MINOR, WHY DID YOU- AJSNSJDKANDK YOU PUT THE ORGAN IN THERE WHY DID- ASOFBEIFJEK OKAY okay. Im calm. It's just different recordings, its fine. And the sentence the guy said while that clip was playing? Bro, i watched that part multiple times, and i sTILL don't get what you're trying to sayyyyyyy. And the divine intervention thing? Bro, i wish this top 10 vid had a divine intervention.
8. Acordion. Dude. Let me just... let me just pull a direct quote. Ahem... bASS NOTES ANE KEYBOARD DOESNT MEAN YOURE OLAYING TWO INSTRUMENTS. I just... the levels of frustration ive ascended to. My god, for once im glad that i didn't get to post this at midnight. Gave me some time to gather my head so i can watch this without fucking bursting.
7. Oboe. Oh boy. Dude. I've learned a bit of recorder and im pretty fUCKING sure that you make a sound by moving your fingers and lightly blowing into it, not by fucking folding paper origami with your mouth. And like, the moistness doesn't even matter that much. Your mouth will naturally moist the mouthpiece, you don't need to fucking spit on it. God.
6. Guitar. Okay, first time i saw guitar on this list i actually laughed out loud. (No offense guitarists i still think yalls music is great) Also, what the fuck. What the fuck. What the FUCK are they saying. First, yall say that it's all played the same way. THEN, you follow it up play saying it has tons of styles?! Oh my god, its like the video inforgraphics made for the scp foundation all over again... fam i haven't even watched that vid but i already know its shit.
5. Piano. Like twoset's point, if you're making a top 10 HARDEST, gET SOME HARDER PIECES AND RECORDINGS. DUDE, THERES FUCKING LISZT, RACHMANINOFF, THE LIST GOES ON. God, yall could've found a recording of La campanella and i would be fine. Fur elise even. But okay, sure. Do whatever. At least twoset gets more content this way. And wOW ALL THOSE HOURS OF PRACTICE WAS USELESS AND FOR NOTHING?!?!?!? aMaZiNG!!!! Can you tell i want to die.
4. Harp. Like I said earlier, if you're gonna play a recording of a piece, might as well make it match to the instrument but okay sure this is fine. Put a fucking recording of an ORGAN piece to the harp but okayyyyyy sureeeeee. I mean i get that musicians can play whatever they want but like, dude. This is a list. Do some fucking research. I don't even think i need to say anymore on the subject. The boys already said it all. And im tired. I just woke up and immediately, i am tired. Tsvtwt, please bless me with pics and fancams pLEASE.
3. Bagpipes. Do i need to reiterate my point from harp.and piano? Also, wha- how- why- dude. Ugh, all the shit this guy said in this entire video can just be slapped onto literally any instrument, as twoset said.
2. French horn. I have never met any brass players but, im pretty fucking sure you don't need an ego the size of texas to play that. I just- man, i wanna go back to sleep. It's morning already and fUCK analyzing how fucking wrong watchmojo is, is killing me.
Fuck dude, i had to scroll thru tsvtwt for energy. This is how wrecked my bad is. I never take tsvtwt breaks in the middle of making these posts. God...
And dude. Theremin is so much better than that. Agt... yall couldve hotten a better recording...
Anyways, back to the listing.
1. Violin. (Heavy flashbacks to instrument ranking vid) Dude. Wh-why you showing a fiddle recording. I- just look at my points for piano and harp. And dude, holding the instrument is probably the easiest part. Watch me sink into the floor and turn into a puddle of frustration guys.
Sigh. I think the lesson we all learned here today (other than the lesson up top) is that all instruments are hard.
14 notes · View notes
moonshugar · 8 years ago
Link
Hot New Top Share a link Discuss Mooka_Molaka 0 | 136 | 913 | Manage | | messages | Log off Search Voat Limit to v/pizzagate Submission Info Posted by: WixFix Posting time: 3 hours ago on 2/26/2017 4:02:21 PM Last edit time: never edited. Traffic stats Views: 1593 Score SCP: 78 79 upvotes, 1 downvotes (99% upvoted it) Share a link Discuss pizzagate unsubscribe block 12363 subscribers ~1014 users here now Darknet Hack DATA COLLATION MEGATHREAD Pizzagate Subverse Network /v/AskPizzagate – Pizzagate-related questions /v/pizzagatewhatever – anything Pizzagate-related /v/PizzagateMemes – Pizzagate memes /v/pizzagatemods – meta concerns and Pizzagate moderation discussion Submission Requirements Please review BEFORE you submit content. Submissions not meeting these requirements will be removed. 1 ALL submissions should be directly related to Pizzagate, and this is how we define Pizzagate. It is the responsibility of the poster to demonstrate relevance. In most cases this will require a Discussion post where you provide a brief explanation of how your content relates to the investigation. Sometimes there will be content (like an article on Pizzagate) where a link post with an accurate, descriptive title will be enough to satisfy this requirement. 2 EVERY claim that is made as part of your post needs to be sourced. If you are asking a question, give a brief summary of what led to your question, and provide sources for those elements. If you are giving an explanation of how your content relates to Pizzagate (satisfying Rule 1), and you need to connect a few dots to do so, please provide sources for your "dots". If you wish to ask general questions about Pizzagate, please do so HERE. 3 LINK posts (VIDEO, IMAGE, ARTICLE, etc.) all need to include an accurate description of the actual content. If you can't provide an accurate summary in the title of a Link post then you must submit it as a Discussion post where you provide the link with a brief description of the content. 4 META submissions and general discussion submissions without sources will be removed. To avoid diluting the front page, please make those sorts of submissions HERE. Please bring any meta concerns you have HERE (this is also where the mods will discuss moderating the sub, so you are welcome to participate in those conversations as well). 5 Standalone MEMES will be removed. Please post standalone memes HERE. If you feel that a given meme can be used to raise awareness, please link it as part of a Discussion post where you source the elements that it is related to and discuss the best ways to use it. If you want to discuss the accuracy of a meme, again, link it in a Discussion post that sources the relevant elements from the investigation. 6 NSFW submissions (gore, nudity, etc.) must be labeled as such. This is not an adult subverse. Adspam, illegal content, and personal info about Voat subscribers will be removed, and the offender will be banned. Moderator Rules and On-Demand Removal Explanations Submission Removal Log WARNING! Due to the nature of this investigation, some links could result in the opening of incriminating material. Always practice common sense before clicking links, and make sure you're browsing safely. Use archive.is to archive and distribute sources. Links Resources for Investigators Memes and Infographics List of Independent Pizzagate Subverses List of External Pizzagate Sites – Stay secure! Chatroom #voatpizzagatemain:matrix.org (Riot) created by kingkongwaswrong a community for 3 months Advertisement Muslim Feminism is NOT an oxymoron! You white boys better shut up and learn some respect! Want to advertize on Voat? message the moderators MODERATORS kingkongwaswrong [O] Crensch [O] heygeorge [D] VictorSteinerDavion [O] Millennial_Falcon [M] rktyp [J] belphegorsprime [M] wecanhelp [M] l4l1lul3l0 [J] Kwijibo [J] Vindicator [M] abortionburger [J] SpikyAube [J] sensitive [J] MODERATION LOGS Removed submissions Removed comments Banned users 79 Red Pill John McCain (pizzagate) submitted 3 hours ago by WixFix McCain Institute Caught Stealing Millions In Child Trafficking Donations Source: http://yournewswire.com/mccain-institute-child-trafficking/ McCain cuts off questions about Saudi donation Source: http://www.12news.com/mb/news/politics/mccain-cuts-off-questions-about-saudi-donation/114870450 McCain runs a foundation called McCain Institute, accepting Saudi donations. They fight Human Trafficking. Ashton Kutcher is on their board and was kissing McCain's ass at the Senate Hearing. The traffickers are in control of all aspects of Human Trafficking prevention. Source: http://imgur.com/a/gQBUIImgur Album McCain accused of accepting improper donations from Rothschilds Source: https://www.theguardian.com/world/2008/apr/29/johnmccain.uselections2008 20 comments unsave source report sort by: New Bottom Intensity Old Sort: Top [–] islandofdelight 21 points (+21|-0) 2.4 hours ago  McCain really is an evil man. Most likely behind the formation of Islamic State with Lindsey Graham. Deep state connections... He has a lot in common with both the Rothschilds and the Wahhabis of Saudi Arabia. They are all technically 'satanic/luciferian' which comes in many disguises but it is sadism, pain, death and trauma for power. permalink save source reply report [–] JohnnySkidmarx 3 points (+3|-0) 46 minutes ago  Too bad the Viet Cong didn't off his ass. permalink parent save source reply report [–] OhRutherfordBehave 1 points (+1|-0) 21 minutes ago  There is a picture of him out there with known ISIS members. permalink parent save source reply report [–] Cc1914 0 points (+0|-0) 6 minutes ago  I wonder what his daughter thinks. She seems to be looking a little unsure of herself lately . She must know her dad is an evil man permalink parent save source reply report [–] novictim 0 points (+0|-0) 34 minutes ago  McCain really is an evil man. Most likely behind the formation of Islamic State with Lindsey Graham. It would not surprise anyone, now, if that were proven true. These two are the worst folks, most dangerous to Western Civilization,we have in the USA Senate. permalink parent save source reply report [–] strix-varia 7 points (+7|-0) 2.3 hours ago  Unreal how so many degenerates are exalted to levels of such superiority. permalink save source reply report [–] jenidaninja 7 points (+7|-0) 2.5 hours ago  McCain is generally incompetent at EVERYTHING he does. permalink save source reply report [–] Baxterbaxter 0 points (+0|-0) 57 minutes ago  He must have the goods on an awful lot of people! permalink parent save source reply report [–] Deflo56 4 points (+4|-0) 2.7 hours ago  Never did trust him. When he was running for president he didn't seem to want to win. I guess he was just a part of the group. They have the power of the sadist. We must take away their prey. Keep an eye out for the mascocist. They may be helpful to see inside the group. permalink save source reply report [–] ArthurEdens 3 points (+3|-0) 1.8 hours ago  (edited 1.7 hours ago) McCain is a pos, he shames vets and curses at protestors who question him, cowars around his voters when he's caught, and just smarmy all around. His stepford wife looks like she get mkultra shock treatment every night. I bet he was never a pow, just a deserter that crashed his plane because of incompetence and the cia busted his hands with a hammer in a plea deal to own him permalink save source reply report [–] GoatyMcGoatface 2 points (+2|-0) 1.3 hours ago  He is very smarmy. He might be top ten smarmiest politicians. John McCain, that is. permalink parent save source reply report [–] Baxterbaxter 3 points (+3|-0) 2.1 hours ago  Watch - MSM won't pick up this story either - especially because Rothschilds are mentioned. permalink save source reply report [–] WixFix [S] 3 points (+3|-0) 2.5 hours ago  (edited 2.5 hours ago) Crazed Harpy Beats Wings, Crows To Minions http://www.zerohedge.com/news/2017-02-25/hillary-clinton-calls-resistance-we-need-stay-engaged-ill-be-you-every-step-way Heroin/Fentanyl kills more Americans than Guns http://www.zerohedge.com/news/2017-02-25/americas-fentanyl-crisis-surging-no-end-sight permalink save source reply report [–] Roy38 2 points (+2|-0) 56 minutes ago  In 2008 McCain tried to get campaign donations from recently murdered Russian diplomat. From wikileaks: 20 Oct 2008 statement from the Russian Federation to the United states in relation to an alleged letter from the McCain campaign requesting a financial contrbution from Russia: "We have received a letter from Senator John McCain requesting financial contribution to his Presidential campaign. In this connection we would like to reiterate that Russian officials, the Permanent Mission of the Russian Federation to the United Nations or the Russian Government do not finance political activity in foreign countries." permalink save source reply report load more comments ▼ (6 remaining)
2 notes · View notes
terabitweb · 6 years ago
Text
Original Post from Amazon Security Author: Becca Crockett
Mark Ryland at the AWS Summit Berlin keynote
In the weeks leading up to re:Inforce, we’ll share conversations we’ve had with people at AWS who will be presenting at the event so you can learn more about them and some of the interesting work that they’re doing.
How long have you been at AWS and what’s your current role?
I’ve been at AWS for almost eight years. For the first six and a half years, I built the Solutions Architecture and Professional Services teams for AWS’s worldwide public sector sales organization—from five people when I joined, to many hundreds some years later. It was an amazing ride to build such a great team of cloud technology experts.
About a year and a half ago, I transitioned to the AWS Security team. On the Security team, I run a much smaller team called the Office of the CISO. We help manage interaction between our customers and the leadership team for AWS Security. In addition, we have a number of internal projects that we work on to improve interaction and information flow between the Security team and various AWS service teams, and between the AWS security team and the Amazon.com security team.
Why is your team called “the Office of the CISO”?
A lot of people want to talk to Steve Schmidt, our Chief Information Security Officer (CISO) at AWS. If you want to talk to him, it’s very likely that you’re going to talk to me or to my team as a part of that process. There’s only one of him, and there are a few of us. We help Steve scale a bit, and help more customers have direct interaction with senior leadership in AWS Security.
We also provide guidance and leadership to the broader AWS security community, especially to the customer-facing side of AWS. For example, we’re leaders of the Security and Compliance Technical Field Community (TFC) for AWS. The Security TFC is made up of subject matter experts in solutions architecture, professional services, technical account management, and other technical disciplines. We help them to understand and communicate effectively with customers about important security and compliance topics, and to gather customer requirements and funnel them to the right places.
What’s your favorite part of your job?
I love communicating about technology — first diving deep to figure it out for myself, and then explaining it to others. And I love interacting with our customers, both to explain our platform and what we do, and, equally important, to get their feedback. We constantly get great input and great ideas from customers, and we try to leverage that feedback into continuous improvement of our products and services.
What does cloud security mean to you, personally? Why is it a topic you’re passionate about?
I remember being at a private conference on cybersecurity. It was government-oriented, and organized by a Washington DC-based think-tank. A number of senior government officials were talking about challenges in cybersecurity. In the middle of an intense discussion about the big challenges facing the industry, a former, very senior official in the U.S. Government intelligence community said (using a golfing colloquialism), “The great thing about the cloud is that it’s a Mulligan; it’s a do-over. When we make the cloud transition, we can finally do the right things when it comes to cybersecurity.”
There’s a lot of truth to that, just in terms of general IT modernization. The cloud simply makes security easier. Not “easy” — there are still challenges. But you’re much more equipped to do the right thing—to build automation, to build tooling, and to take full advantage of the base protections that are built into the platform. With a little bit of care, what you do is going to be better than what you did before. The responsibility that remains for you as the customer is still significant, but because everything is software-defined, you get far more visibility and control. Because everything is API-driven, you can automate just about everything.
Challenges remain; I want to reiterate that it’s never easy to do security right. But it’s so much easier when you don’t have to run the entire stack from the concrete floor up to the application, and when you can rely on the inherent visibility and control provided by a software-defined environment. In short, cloud migration represents the industry’s best opportunity for making big improvements in IT security. I love being in the center of that change for the better, and helping to make it real.
What initiatives are you currently working on that you’re particularly excited about?
Two things. First, we’re laser-focused on improving our AWS Identity and Access Management capabilities. They’re already very sophisticated and very powerful, but they are somewhat uneven across our services, and not as easy to use as they should be. I’m on the periphery of that work, but I’m actively involved in scoping out improvements. One recent example is a big advance in the capabilities of Service Control Policies (SCPs) within AWS Organizations. These now allow extremely fine-grained controls — as expressive as IAM polices—that can easily be applied globally across dozens or hundreds of AWS accounts. For example, you can express a global policy like “nobody but [some very special role] can attach an internet gateway to my VPCs, full stop.”
I’m also a networking geek, and another area I’ve been actively working on is improvements to our built-in networking security features. People have been asking for greater visibility and control over their VPCs. We have a lot of great features like security groups and network ACLs, but there’s a lot more we can and will do. For example, customers are looking for more visibility into what’s going on inside their VPCs beyond our existing VPC Flow Logs feature. We have an exciting announcement at our re:Inforce conference this week about some new capabilities in this area!
You’ll be speaking at re:Inforce about the security benefits of running EC2 instances on the AWS Nitro architecture. At a high level, what’s so innovative about Nitro, and how does it enable better security?
The EC2 Nitro architecture is a fundamental re-imagining of the best way to build a secure virtualization platform. I don’t think there’s anything else like it in the industry. We’ve taken a lot of the complicated software that’s needed for virtualization, which normally runs in a privileged copy of an operating system — the “domain 0,” or “dom0” to use Xen terminology, but present in all modern hypervisors — and we’ve completely eliminated it. All those features are now implemented by custom software and hardware in a set of powerful co-processor computers inside the same physical box as the main Intel processor system board. The Nitro computers present virtual devices to the mainboard as if they were actual hardware devices. You might say the main system board — despite its powerful Intel Xeon processor and big chunks of memory — is really the “co-processor” in these systems; I call it the “customer workload co-processor!” It’s the main Nitro controller and not the system mainboard that’s fundamentally in charge of the overall system, providing a root of trust and a secure layer between the mainboard and the outside world.
There are bunch of great security benefits that flow from this redesign. For example, with the elimination of the dom0 trusted operating system running on the mainboard, we’ve completely eliminated interactive access to these hosts. There’s no SSH, no RDP, no interactive software mechanisms that allow direct human access. I could go on and on, but I’ll stop there — you’ll have to come to my talk on Wednesday! And of course, we’ll post the video online afterward.
You’re also involved with a session to encourage customers to set up “state-of-the-art encryption.” In your view, what are some of the key elements of a “state-of-the-art” approach to encryption?
I came up with the original idea for the session, but was able to hand it off to an even better-suited speaker, so now I’ll just be there to enjoy it. Colm MacCarthaigh will be presenting. Colm is a senior principal engineer in the EC2 networking team, but he’s also the genius behind a number of important innovations in security and networking across AWS. For example, he did some of the original design work on the “shuffle sharding” techniques we use broadly, across AWS, to improve availability and resiliency for multi-tenanted services. Later, he came up with the idea, and, in a few weeks of intense coding, wrote the first version of S2N, our open source TLS implementation that provides far better security than the implementations typically used in the industry. He was also a significant contributor to the TLS 1.3 specification. I encourage everyone to follow him on Twitter, where you’ll learn all kinds of interesting things about cryptography, networking, and the like.
Now, to finally answer your question: Colm will be talking about how AWS does more and more encryption for you automatically, and how multiple layers of encryption can help address different kinds of threats. For example, without actually breaking TLS encryption, researchers have shown that they can figure out the content of an encrypted voice-over-IP (VOIP) call simply by analyzing the timing and size of the packets. So, wrapping TLS sessions inside of other encryption layers is a really good idea. Colm will talk about the importance of layered encryption, plus a bunch of other great topics: how AWS makes it easy to use encryption; where we do it automatically even if you don’t ask for it; how we’re inventing new, more secure means for key distribution; and fun stuff like that. It will be a blast!
What changes do you hope we’ll see across the global security and compliance landscape over the next 5 years?
I think that with innovations like the Nitro architecture for EC2, and with our commitment to continually improving and strengthening other security features and enabling greater automation around things like identity management and anomaly detection, we will come to a point where people will realize that the cloud, in almost every case, is more secure than an on-premises environment. I don’t mean to say that you couldn’t go outside of the cloud and build something secure (as long as you are willing to spend a ton of money). But as a general matter, cloud will become the default option for secure processing of very sensitive data.
We’re not quite there yet, in terms of widespread perception and understanding. There are still quite a few people who haven’t dug very far below the surface of “what is cloud.” There is still a common, visceral reaction to the idea of “public cloud” as being risky. People object to ideas like multitenancy, where you’re sharing physical infrastructure with other customers, as if it’s somehow inherently risky. There are risks, but they are so well mitigated, and we have so much experience controlling those risks, that they’re far outweighed by the big security benefits. Very consistently, as customers become more educated and experienced with the cloud, they tell us that they feel more secure in their cloud infrastructure than they did in their on-premises world. Still, that’s not currently the first reaction. People still start by thinking of the cloud as risky, and it takes time to educate them and change that perspective. So there’s still some important work ahead of us.
What’s your favorite way to relax?
It’s funny, now that I’m getting old, I’m reverting to some of the pursuits and hobbies of my youth. When I was a teenager I was passionate about cycling. I raced bicycles extensively at the regional and national level on both road and track from ages 14 to 18. A few minutes of my claim to 15 minutes of Warholian fame was used up by being in a two-man breakaway with 17-year-old Greg LeMond in a road race in Arizona, although he beat me and everyone else resoundingly in the end! I’ve ridden road bikes and done a bit of mountain biking over the years, but I’m getting back into it now and enjoying it immensely. Of course, there’s far more technology to play with these days, and I can’t resist. I splurged on an expensive pair of pedals with power meters built in, and so now I get detailed data from every ride that I can analyze to prove mathematically that I’m not in very good shape.
One of my other hobbies back in my teenage years was playing guitar — mostly folk-rock acoustic, but also electric and bass guitar in garage bands. That’s another activity I’ve started again. Fortunately, my kids, who are now around college-age plus or minus, all love the music from the 60s and 70s that I dust off and play, and they have great voices, so we have a lot of fun jamming and singing harmonies together.
What’s one thing that a visitor to your hometown of Washington, DC should experience?
The Washington DC area is famous for lots of great tourist attractions. But if you enjoy Michelin Guide-level dining experiences, I’d recommend a restaurant right in my neighborhood. It’s called L’Auberge Chez François, and it’s quite famous. It features Alsatian food (from the eastern region of France, along the German border). It’s an amazing restaurant that’s been there for almost 50 years, and it continues to draw a clientele from across the region and around the world. It’s always packed, so get reservations well in advance!
Want more AWS Security how-to content, news, and feature announcements? Follow us on Twitter.
Mark Ryland
Mark is the director of the Office of the CISO for AWS. He has more than 28 years of experience in the technology industry and has served in leadership roles in cybersecurity, software engineering, distributed systems, technology standardization and public policy. Prior to his current role, he served as the Director of Solution Architecture and Professional Services for the AWS World Public Sector team.
#gallery-0-5 { margin: auto; } #gallery-0-5 .gallery-item { float: left; margin-top: 10px; text-align: center; width: 33%; } #gallery-0-5 img { border: 2px solid #cfcfcf; } #gallery-0-5 .gallery-caption { margin-left: 0; } /* see gallery_shortcode() in wp-includes/media.php */
Go to Source Author: Becca Crockett AWS Security Profiles: Mark Ryland, Director, Office of the CISO Original Post from Amazon Security Author: Becca Crockett In the weeks leading up to re:Inforce, we’ll share conversations we’ve had with people at AWS who will be presenting at the event so you can learn more about them and some of the interesting work that they’re doing.
0 notes