Linux tip: How to mount a BitLocker® NTFS partition on Debian/Ubuntu Linux™

First of all install dislocker, for doing that install aptitude and then

$sudo aptitude search dislocker

once you find dislocker install it, with:

$sudo apt-get install dislocker

once you have it installed, then you should run something similar to this:

$sudo fdisk -l

to discover your disk, and then

$sudo dislocker -u[YOUR_PASSWORD_GOES_HERE] /dev/sdb1 /mnt/hdext
$sudo mount /mnt/hdext/dislocker-file /mnt/hd

Cloud Computing

“Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a large part of the IT industry, making software even more attractive as a service and shaping the way IT hardware is designed and purchased” (Armbrust et al., 2010).

INTRODUCTION

Cloud computing concept didn’t come to the light to swallow all the data-center market in the world, but this concept better defined in this discussion, allows companies to do things that earlier before was something harder to do, such as deploying a pilot project would take several weeks or months on creating an infrastructure and making the availability and the elasticity of supporting the grown of the desired application without the need of implementing something in an expensive reality.

DEFINITION

The idea of cloud computing is to make it possible to offer services such as software on a very established new way of business, which is called SaaS – Software as a Service, PaaS – Platform as a Service and IaaS – Infrastructure as a Service, which also has its own specific way of charging its users based on the usage as introduced by (Armbrust et al., 2010).

THE STARTUP EXAMPLE

For that ones who are deploying its first early versions of their startup project (an iPhone or Android app, for instance), the cloud computing enables the power of reducing the cost of enabling a minimal data-center and the way it grows bigger it also allows the elasticity of supporting millions of users, and enabling the possibility of the startup idea to not be failed and the service-fee based can be more close to the reality of the business in case (People Driven Solutions, 2017).

 But it is not only startup companies who are moving the cloud, as it can be seen, that almost all of the Fortune 500 companies have experiences with the cloud computing model.

THE MARKET SHARE BATTLE

With the popularization of the concept of cloud computing, many service providers were born such as Amazon AWS, Microsoft Azure and Google Cloud Platform. Today, the presence of Amazon AWS is dominant, with a market share of 40% it is the biggest player on the market, followed by Microsoft Azure and Google Cloud Platform as the biggest ones, as stated by The Fortune in the Article entitled “Amazon Still Leads Cloud Rankings, But Competition Is Coming On Strong”, which is based and compiled in articles from Gartner, research institutes and companies CEO’s (Darrow, 2017). 

CONCLUSION

The decision of moving to the cloud need to be based on the analysis of every service deployed, analyzed the impacts in terms of security, availability, latency and even costs. In my viewpoint cloud is not only a reality in supporting the businesses in achieving their goals today, but a trend that will continue to change dramatically the IT industry based on its innovative way of providing services which before were not accessible for many companies, such as providing an application in a data-center which allows better performance in terms of latency (enabling a data-center in São Paulo and improving the service availability in Latin America, for instance).

 REFERENCES

Armbrust, et al., 2010. A view of cloud computing, [Magazine] New York: Communications of the ACM. Available at: http://dl.acm.org/citation.cfm?id=1721672 (Accessed 24 September 2017).

People Driven Solutions, 2017. How Cloud Computing Enables Our Startup’s Success [Online] Available at: http://peopledriven.co/cloud-computing-enables-startups-success/ (Accessed 24 September 2017).

Darrow, 2017. Amazon Still Leads Cloud Rankings, But Competition Is Coming On Strong. [Online] Available at: http://fortune.com/2017/06/15/gartner-cloud-rankings/ (Accessed 24 September 2017).

Biometric Technology

INTRODUCTION

With the introduction of biometric studies into the computer science, the first devices and methodologies started to grow in such manner we can see fingerprints scanners in airports, voting machines in democratic countries and even in ATM’s (very common in Brazil). There are different methods to identify an information system user, including fingerprints and facial recognition, for instance.

FACIAL RECOGNITION BIOMETRY

One of the most popular methods of identifying an information systems user is by the facial recognition. As a user I have already used this technology to be identified by companies which required my facial recognition to emit educational certificates, I was requested to be identified by Coursera as stated by Vrankulj (2013) and Duolingo (n.d), and both companies applied the technology to identify me as the real student, what allowed the institution to emit the certificate with assurance that I was the student who was in class and doing the required tests.

This technology in the past was in the hands of a few companies, but today with my experience of developing such kind of systems, the facial recognition can be easily implemented using the OpenCV (Open Source Computer Vision) library OpenCV(n.d), which is available on an open source license, and with a few efforts can be achieved a fully functional facial recognition solution.

FIGHT AGAINST CYBERCRIME

As mentioned in the topic above, one of the most effective ways of ensuring the identification of an internet user is by facial recognition biometry. On my viewpoint, this technology is becoming so trusted that the Australian border and immigration control has efforts on replacing the use of passports with facial recognition as stated by The Guardian (2017).

There are more studies on the way, which impacts the facial recognition technology with the use of alternative methods that goes beyond the technology we have today, with 3-d scanning to be implemented by Apple in the iPhone 8 as stated by The Fortune (2017), what in my viewpoint are efforts to minimize the possibility of the facial recognition system to be cracked (think about using a picture of someone instead of the real person at the moment of the recognition, what can be a controversy on the effectiveness of such technology).

THE EFFECT OF THE USAGE OF SUCH TECHNOLOGIES

If you think that by implementing a fingerprint scanner in an ATM, reduces a high possibility of fraud in the banking system since the bank card is not allowed to be used by another person. Not even considering all the ghost users that the banking system may possibly identify by the use of such technology.

In spite of bringing costs to the system, we live in a society today where all social classes may be possibly corrupted. Corruption in inserted in all kinds of social classes and people, especially thinking about the banking system, which is the source of the money transactions and may be the easiest way of detect corruption by the implementation of such technologies.

If you consider that to implement such a system there is a cost, the users which do not practice corrupt activities may have the impact of paying the price of that one who practices it, however when you think about society as a whole, most of the non corrupt users can be positively affected by the reduction of the frauds, since they can also be a victim.

REFERENCES

Vrankulj (2013) Coursera looks to verify online student identity with photo, keystroke dynamics [ONLINE] Available at: http://www.biometricupdate.com/201301/coursera-looks-to-verify-online-student-identity-with-photo-keystroke-dynamics. (Accessed 17 September 2017).

Duolingo (n.d) Introducing Duolingo Language Certificates [ONLINE] Available at: https://www.duolingo.com/comment/834824/Introducing-Duolingo-Language-Certificates-Beta. (Accessed 17 September 2017).

OpenCV (n.d) Face Recognition with OpenCV [ONLINE] Available at: http://docs.opencv.org/2.4/modules/contrib/doc/facerec/facerec_tutorial.html. (Accessed 17 September 2017).

The Guardian (2017) Facial recognition to replace passports in security overhaul at Australian airports [ONLINE] Available at: https://www.theguardian.com/australia-news/2017/jan/22/facial-recognition-to-replace-passports-in-security-overhaul-at-australian-airports. (Accessed 17 September 2017).

Fortune (2017) Apple Is Reportedly Testing 3D Facial Scans to Unlock iPhones [ONLINE] Available at: http://fortune.com/2017/07/03/apple-3d-face-scans-unlock-iphones/. (Accessed 17 September 2017).

Auditing for Security

INTRODUCTION

Today we have methods to make it possible to audit systems, which can be used for good or for the worse, and it is something that can be achieved through external or third-party systems, or it can be implemented with some methodology and techniques which allows the investigation and analysis of events which occurred while the operation of information systems Piattini (1999, pp. 3-5).

EXPERIENCE WITH THE ORGANIZATION

Some years ago, I worked as a consultant for the “Tribunal Regional do Trabalho” (freely translated to Regional Labor Court), which was responsible for the labor-related process in the states of Parana and Santa Catarina. As the systems where all important, the need of auditing was something important since it had to log who was the user who was imputing information in the system, for instance. This was something common with the type of framework which we were using at that time, which was also based on the concept of auditing, and making it available for its subsystems Alvim (2017).

METHODS TO MAKE SYSTEMS AUDITABLE

The auditing can be achieved on customized software by developing its functionalities and adding security proceedings like logging the user and using logical exclusion, for instance. I will give the example of record auditing on relational databases.

Once you have a table, you may have two additional columns to that, username and date and hour. By having this two additional columns and making your software input the user logged in and the hour and date of the event, you have the desired auditing which will allow the proceedings of investigations on your software.

There is also a resource which can help a lot on the investigation, which is the database logging. Some commercial and open source SGDB’s support this feature, however there are some alternatives like Huang & Liu (2009) presents in their paper entitled “A Logging Scheme for Database Audit”, which is based on intercepting the database communication, parsing and processing the database protocol and making it auditable for further investigation procedures.

CONCLUSION

Today, with the penetration of the information systems in all the spheres of the governmental and private market, the systems auditing became a very important subject, with many ways of implementing it, as seen in the Huang & Liu (2009) article, which uses alternative resources to implement security and auditing in a very creative and original manner.

REFERENCES

Piattini, M (1999) Auditing Information Systems. London: Idea Group Publishing.

Paulo A. (2017) Java EE 6 Open Source com jCompany Developer Suite [online] Available at: http://www.powerlogic.com.br/powerlogic/ecp/comunidade.do?app=portal&pg=540&idConteudo=1263 (Accessed 17 September 2017).

Huang Q & Lianzhong L (2009) ‘A Logging Scheme for Database Audit’, IEEE Conference Publications, 2, pp-390-393.

Copyright Compensation

INTRODUCTION

As an example of copyright infringement, since the MPEG layer 3 compression algorithm was made available on the internet in the ’90s (Davis, 1995), the ease of getting a CD device, ripping it and making this available for millions of users through the internet, allowing users to make the use of the artistic and intellectual material without paying any cent to the producer of such IPO has surged and only increased having even allowing the users of the peer-to-peer networks to have the delighted usage of millions of materials, by just having to download it instantly on the peer-to-peer networks.

A BIT ABOUT HISTORY

In the late ’90s, a peculiar file sharing program called Napster came to the light on the internet, allowing millions of copyrighted music to be downloaded for free, and encouraging the ripping and sharing of copyrighted material through this very curious platform. At that time, the impact of this software has incredibly huge what triggered one of the most famous cases in the law court which ruled against Napster and the platform disappeared after that.

After Napster, the internet users seeing how this file sharing model used to bring some kind of facility on accessing (in this case for instance music), had been supporting this kind of application and many derivative or inspired applications came to the light in the early 2000s.

One of the most decent solutions to the case of music file sharing and such derivatives, came when Apple released the first iPod platform (Macworld, 2011) in conjunction with the iTunes service, which until today exists and is one of the most reliable and formal ways of distributing music and royalties, without damaging the music industry.

TODAY’S COPYRIGHT AND ROYALTIES RELATED ISSUES ON THE INTERNET

Today, we have some music streaming services such as Spotify and Deezer; Netflix for accessing movies and TV shows; Amazon has its book platform based on Kindle and there are some other platforms which encourage the correct usage of copyrighted material. At certain reflection they all are effective, however, there are barriers which may include the Music Recording Companies, the Offices related to the IPO related issues. I think most of the platforms we have today are effective business models, in spite of believing the prices may surge the way it becomes more effective in terms of the quantity of the exploration of such markets and products.

MY MODEL

My model of distributing royalties for such owners of IPO that are shared on the internet through streaming and peer-to-peer file sharing is based on the Audio Home Recording Act of 1992, which is part of the United States Copyright Law (MIT, n.d), what this law simply does is a regulatory way of making the producer of blank media producers in paying for the copyright owners which are affected by the use of such technology, and is in my viewpoint a very established way of protecting copyrights, however when you think about streaming, you cannot have the same control over what is reproduced and what is consumed by the internet users (not even considering peer-to-peer).

Based on such law, I personally believe the Internet Service Providers (ISP) should be encouraged and regulated by the law, based on the principle that the streaming exists and it is massive, and the peer-to-peer continues to transfer an unimaginable quantity of copyrighted material without paying any cent for all that ones who owns it.

By charging the ISP a certain percentage of its yield, based on the principle that the internet industry also makes trillions in charging users for the transfer of data, especially if you think about the mobile technology, which in my opinion is one of the most expensive ways of transferring data today.

I do believe most of the users would not be affected, and if so would be in the internet prices, anyways it would be a very simple and effective way of increasing the royalty collection/levy and making it available for the IPO owners and the regulators of copyrights.

REFERENCES

Davis, P. (1995) A tutorial on MPEG/Audio Compression. IEE [Online] 60-74. Available at: https://www.ee.columbia.edu/~dpwe/e6820/papers/Pan95-mpega.pdf (Accessed 10 September 2017).

Washington University School of Law (2013) Case Study: A&M Records, Inc. v. Napster, Inc. [ONLINE] Available at: https://onlinelaw.wustl.edu/blog/case-study-am-records-inc-v-napster-inc/. (Accessed 10 September 2017).

Macworld (2011) The iPod: How Apple’s legendary portable music player came to be [ONLINE] Available at: https://www.macworld.com/article/1163181/consumer-electronics/the-birth-of-the-ipod.html. (Accessed 10 September 2017).

MIT. (n.d) What about the Audio Home Recording Act? [ONLINE] Available at: http://trillian.mit.edu/~jc/ideas/AudioHomeRecordingAct.html. (Accessed 10 September 2017).

Electronic Monitoring

INTRODUCTION

In spite of the electronic devices such as cameras, fingerprints and identity cards, for instance being used by the police in the past in regards to criminal situations, today is very and very more often that this devices are developed by the industry to help companies on achieving their goals, being possibly regarding policies of the company or even to help the company to operate in a good health helping it to succeed in the business world.

With the usage of electronic monitoring the company is able to check how much time the employee spend at work, how productive they are, the usage of applications and when they do better at work and when they do less (HubStaff, 2017).

ABOUT MY COMPANY

Today I am working as a consultant for a small size company where there are no policies being formalized, but there are rules the employees know they have to follow.

INTERNET MONITORING

In the company I work today. we have a very little  monitoring system which is called Squid. This tools is not only used for monitoring for also for caching internet results which were already accessed in the past (Squid, 2017).

CAMERA MONITORING

Cameras are everywhere in the company, not only to supervise the professionals, but in my country it is very common to have assaults in all kind of companies, so this is common that the company equip every room with cameras as a security device to serve as footage in case something happens.

BIOMETRIC ACCESS

In the company I work for there is the usage of fingerprints to unlock doors, in order to provide access in some rooms only for allowed persons. For instance, in the development room is accessed only by the development related people (Advance Systems, 2017).

PERSONAL INSIGHTS

I personally think since the company have its concerns in regards to the good performance of its operations and the need of being successfully achieving the customer deals or negotiations, monitoring is valid in the terms which will allow the company to operate the way it needs to do. I personally believe the security devices are ways to secure the company to allow that its operations happens without surprise or even lead to the bankrupt of the company.

REFERENCES

Squid, 2017. Squid: Optimising Web Delivery. [Online] Available at: http://www.squid-cache.org. [Accessed 02 September 2017].

Hubstaff. 2017. What is Employee Monitoring?. [ONLINE] Available at: https://hubstaff.com/employee_monitoring. [Accessed 3 September 2017].

Advance Systems. 2017. Track Employee Hours Using Biometric Fingerprint Scanner. [ONLINE] Available at: https://advancesystemsinc.com/track-employee-hours-using-biometric-fingerprint-scanner/. [Accessed 3 September 2017].

Blocking Methods

In usage almost 99% of the companies computers, the Windows operating system have huge evidence of its fragility in the protection of malware and spyware, which are easily installed and replicated through many machines in the work environment (Chris Hoffman, 2016).

As a security solution blocking methods including blocking websites, and monitoring the computer activity can be effective in the manner the company evicts to be the spy or even to suffer hacker attacks. I do personally believe most of the blocking are not methods to disallow the usage of the internet, but for sure to improve the security of such companies.

In order to provide access to blocking and internet security some type of products are available such as:

  • Squid – a tool which can be used to block or to improve the internet availability through cache (Squid, 2017);
  • Task monitoring software;
  • Keyloggers;

THE ADVANTAGES

  • Blocking downloading websites, torrents, porn websites may allow computers to have more security, and evict the heavy workload of replacing and reinstalling the operating system very often;
  • Blocking some retard culture websites may reduce the loss of interest of the employee in the work it is meant to do;

THE DISADVANTAGES

  • Depending on the quantity and what kind of website is blocked by the company, the employee may feel the company doesn’t have trust in his ethical and moral behavior;
  • Many resources are spent to produce this kind of security in companies, employees should be contracted to work on that, software needs to be acquired to that;

Based on my experience and cultural factors, the possibility of measuring the employee productivity having reports and feedback based on every ones productivity doesn’t seem to work well, since the gap in the IT professionals and the difficult to contract professionals may give these professionals somehow a sense of comfort, based on the principle of “if we leave, who is going to do the work”. But of course, this is a cultural aspect that happens in my country since it is difficult to contract IT professionals (Novais, A. 2012).

REFERENCES

Chris Hoffman, 2016. Why Windows Has More Viruses than Mac and Linux. [Online] Available at: https://www.howtogeek.com/141944/htg-explains-why-windows-has-the-most-viruses. [Accessed 02 September 2017].

Squid, 2017. Squid: Optimising Web Delivery. [Online] Available at: http://www.squid-cache.org. [Accessed 02 September 2017].

Novais A.. 2012. Professional Shortage in Brazil. [ONLINE] Available at: http://thebrazilbusiness.com/article/professional-shortage-in-brazil. [Accessed 3 September 2017].

The Therac-25 Case

INTRODUCTION

The objective of this discussion is to introduce the Therac-25 case, explain what happened in this historical event, discuss the ethical responsibilities of such individuals and organizations and at the end provide my viewpoint about this historical event.

THE THERAC-25 CASE

The way as the software becomes more complex and usable, this is very common that scientists introduce the use of software to the medicine. Between June 1985 and January 1987 disasters occurred with a system named the Therac-25, which was a computerized radiation therapy machine. In the related period, six known accidents occurred with massive overdoses applied to the patients (Leveson & Turner, 1993).

As stated by the Leveson & Turner, 1993, the Therac-25 software was developed by only one person, using the assembly language, and it took many years to be completed. However, there wasn’t much documentation.

The technical aspect of the Therac-25 failure is that that software controlled by the operator if the operator used to trigger the buttons of the controller board slowly, the machine would operate fine, because while the development of the Therac-25 machine it was tested with slow command inputs. However the operators of this machines after operating thousands and thousands of patients became familiar with the controller board, they got used to the machine and used to type very and very faster, what used to trigger the bug, and the bug started to send massive radiations over the patients. (Udacity – Software testing Course, 2017).

In my viewpoint, it is more of a software testing failure, but of course, as software testing is part of software engineering, it needs to be considered an engineering failure.

CONCERNS ABOUT SOFTWARE ENGINEERING

In spite of having to know that software developed in the seventies and to do not have been properly tested, is a big failure in the procedures of the development of the critical health machine. But a machine of such complexity in my viewpoint, to be developed by a single person without documentation is also a big mistake by the company who created it. Unfortunately, the software engineering methods and studies we have today weren’t available at that time.

Just by the factor of the software to have minimal or none documentation puts all the responsibility to the developer: How can we build something we don’t know how it works since assembly code is very close to the machine code and all the other equipment were handled by this single software? How could understand the error codes provided by the software since there is no documentation?

If the error code showed that the problem was related to the operating timing while using the control board, the software could be easily repaired and the machine could continue to be used and to save lives.

THE ETHICAL ASPECTS

Since technology is under development and it is not certainly free of problems and mistakes. According to the mistake evidenced in this documentation, in my opinion, it is not a case of cyberethics nor computer ethics, but a concern of professional ethics. I purely believe that because the operators of the Therac-25 had to be in a constant training environment of the use of such machines. Since the first case, that should be evidenced what was the mistake happened, what was the cause of that and why should we continue operating such machine since the first people who died because of the mistake which happened.

CONCLUSION

Spite of an engineering mistake mixed to an operative mistake, the development of software engineering and the advances of the medicine has, of course, much to improve the social quality of life in terms of the health. I consider many mistakes may have caused the Therac-25 case, but of course evicted. Spite of all the factors, it can be considered a software engineering failure, since the program was waiting for the perfect use of the software, the software had no documentation and the problems could not be fixed since it had no feedback of what was going on and could not help in the fix of such problem.

REFERENCES

N.G. Leveson, C. T., 1993. An investigation of the Therac-25 accidents. IEEE Computer Society, 26(7), pp.18-41.

Udacity, 2017. YouTube. [Video Online] Available at: https://www.youtube.com/watch?v=izGSOsAGIVQ [Accessed 27 August 2017].

The Wireless Communication and its Impact in the Society Today

Introduction 

The subject of my weekly discussion is social change caused by new communication resources created by the new inventions of mankind. To begin, I introduce ways of communicating like the wireless telegraph and the wireless telephone, how they impacted the way we communicate in the familiar, business and other regular human relationships.

 The invention of the Wireless Telephone

In spite of being unknown for some people, the priest Landell de Moura is with no doubt one of the most notable scientists in Brazil, and his contribution to the modern communication and society is relevant until today. He was the precursor of wireless communication. (Alencar, M. S., Alencar, T. T. & Lopes, T. A, 2004)

 The work of Landell de Moura

Landell de Moura is known as the inventor of the wireless telephone and the wireless telegraph. Landell he Moura moved temporarily to the United States with the objective of proving his inventions. Landell de Moura had success patenting in his inventions giving him the status of the most important scientists of that time. (US Patents 775846 A, 771917 A, US775337).

 Impact on the Society

In spite of the wireless technology have its distance limits, today, we have the possibility of communicating with people being localized dispersed in the same city, state or even overseas. The further development of technology such as developed by the priest Landell de Moura allowed us to use mobile/cellphones which helps us to communicate with family, friends, and coworkers, in different localization and without the use of cables.

 Recent studies show that using phone and e-mail is the most common use of technology among Americans. The figure below shows the percentage of communication resources in a recent study among American society:

Figure 1 Gallup.com Poll, 2014

CONCLUSION

 

While communication is one of the most natural senses of human beings, technologies help us on such task by allowing resources such as the wireless telephone. In my opinion, society has been positively affected by the use of wireless communication. The example of distance, limits people to communicate, and communication could evict a disaster to happen, or a life to be saved.

REFERENCES

Alencar, M. S., Alencar, T. T. & Lopes, T. A, 2004. What Father Landell de Moura Used to Do in His Spare Time. Federal University of Campina Grande, [Online]. 7. Available at: https://www.researchgate.net/profile/Marcelo_Alencar/publication/220016508_What_Father_Landell_de_Moura_Used_to_Do_in_His_Spare_Time/links/09e41510800b720faf000000/What-Father-Landell-de-Moura-Used-to-Do-in-His-Spare-Time.pdf [Accessed 19 August 2017].

US Patents, Robert Landell De Moura. 22 November 1904. Wireless telephone. United States. Pat. US775337.

US Patents, Roberto Landell De Moura. 11 out. 1904. Wave-transmitter. United States. Pat. US 771917 A.

US Patents, Roberto Landell De Moura. 22 nov. 1904. Wireless telegraph. United States. Pat. US 775846 A.

Frank Newport, 2014. The New Era of Communication Among Americans, [Electronic] PRINCETON, N.J: Gallup.com. Available at: http://www.gallup.com/poll/179288/new-era-communication-americans.aspx. [Accessed 19 August 2017].

The Wikileaks Case

Introduction

The objective of this discussion is to introduce Wikileaks, describe the motivation of such activism, discuss the social impacts in the globalized world and at the end give a conclusion with my personal insight about the subject.

 About Wikileaks

The Wikileaks foundation was created by Julian Assange in 2006. In an analogy, it is very similar to Wikipedia while thousands of contributors worldwide provide his knowledge in order to produce a social tool to provide informative articles or documents. The key difference here is that different from Wikipedia, The Wikileaks is focused on governmental, spy and corruption documentation. This is a community of people who share secrets with this nonprofitable entity, in order to provide transparency between governmental or diplomatic relation between nations (Wikileaks.org, 2015).

The Motivations for such Activism

The motivations of bringing secrets up to the table can be many, in the enumeration below I list some of the most relevant motivations an organization like Wikileaks to have its importance:

1) Transparency: Usually transparency strikes out corruption. Based on the principle that secrets hold illegal acts or self-benefit motivations, the transparency that Wikileaks can bring to the table especially of diplomatic relations and be deep such to help countries to have benefits and to beat down corrupt governors.

2) The free market in the business: Companies may have thousands of secrets in deals and agreements which may reduce the competitiveness of many other businesses. Ethics and honesty is a key concern here. The Wikileaks foundation may serve as a tool to bring to the table ethical concerns about business deals in some countries or even around the globe (Forbes, 2010).

The ethical aspects of such leaks

Leaks can lead to prisons, scandals and even may cause a war. The ethical aspects of such activism can be glorious to some people but very bad reputation to others, which believe the response of such actions should live in jail. If the discussion is about pure ethics, the Wikileaks foundation does a very decent and important job in the world especially for people which believes in libertarianism.

Conclusion

I conclude this discussion as Julian Assange being a visionary, which created a tool to help people which libertarian mindset, but a headache for many governors and businessman involved in corruption, cartels and power obsession.

REFERENCES

Julian Assange, 2015. Wikileaks Foundation. [Online] Available at: https://wikileaks.org/What-is-Wikileaks.html. [Accessed 19 August 2017].

Forbes, 2010. An Interview With WikiLeaks’ Julian Assange. [Online] Available at: https://www.forbes.com/sites/andygreenberg/2010/11/29/an-interview-with-wikileaks-julian-assange/5/#32a45a861bc5. [Accessed 19 August 2017].