Episode 4: It's a Data Lake, not a Data Public Swimming Pool

Published: April 4, 2018, 6 a.m.

b'Open source activism tends to focus on running on hardware you can trust and avoiding Cloud computing. The problem with some Cloud providers has to do with a conflict of interest between serving customers and how they generate revenue. It\\u2019s important for the customer to have control of their computer and their data in the Cloud. But what about their security and privacy?Today, we\\u2019re talking to Kyle Rankin, chief security officer at Purism and writer for Linux Journal. He is a Linux expert who decided to work at Purism because of the company\\u2019s belief in free software and the Linux community.Some of the highlights of the show include:\\n\\nCloud providers have faced challenges when it comes to data privacy and who owns what. \\nThe word \\u201cCloud\\u201d is overloaded, and it is unclear who is in control. \\nCloud providers can sabotage efforts to make programs work together.\\nCloud providers may not troll through data and exploit it. Yet, they develop tools for customers to be able to do that. \\xa0\\nEven though Linux Journal stopped being printed and went digital, and was going under, it\\u2019s now back and taking a new approach.\\nWhat matters to new readers and Linux users is now different than what was important to original readers. \\nThe more time you can spend to understand what\\u2019s happening behind the scenes will make you much more marketable and adaptable. \\nKyle explains whether Amazon Linux is becoming a viable concern and if distribution matters anymore. Now, it\\u2019s about running an application, not thinking about what it\\u2019s running on.\\nAre there gangs of Cloud users? Do people look down on Azure users? The target is always moving and changing. \\xa0\\nCheck out Kyle\\u2019s book, Linux Hardening in Hostile Networks: Server Security from TLS to Tor.\\n\\nLinks:\\n\\nKyle Rankin on Twitter\\nPurism\\nKyle Rankin\\u2019s book - Linux Hardening in Hostile Networks: Server Security from TLS to Tor\\nLinux Journal 2.0 FAQ\\nGorillaStack (use \\u201cscreaming\\u201d for discount)'