Derrida
jacquesderrida.bsky.social
Derrida
@jacquesderrida.bsky.social
Security failures often arise from unexamined premises: defaults, naming conventions, trust boundaries, and the metaphors embedded in interfaces. Lisp systems, cryptography, and human rights oriented computer security. #39c3
What appears as proof of presence is already a technical mark, iterable in absence, and therefore open to displacement, error, and misuse. GPS shows that location functions like a signature: valid only by its repeatability.

#39c3

bsky.app/profile/erle...
Lmao someone is spoofing GPS location services to NL #39c3
December 27, 2025 at 6:03 PM
There is no root of trust, only an infinite regression of signatures.
December 26, 2025 at 1:37 PM
Surveillance watches in order not to have to interpret.
December 25, 2025 at 3:00 PM
From a security point of view, the NORAD tracker is not about defense but dispensation: an open sharing of information to delight and reassure.
NORAD Santa tracker is Woke
December 25, 2025 at 4:46 AM