• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechCyber Saturday

Cyber Saturday—Would You Buy Cybersecurity From a Witch Doctor?

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
May 19, 2018, 7:59 PM ET
Nobel Prize Winning Physicist Richard Feynman
Nobel Prize winning physicist Richard Feynman stands in front of a blackboard strewn with notation in his lab in Los Angeles, Californina. (Photo by Kevin Fleming/Corbis via Getty Images)Kevin Fleming—Corbis via Getty Images

Happy weekend, Cyber Saturday readers.

It has been busy here at HQ between a Fortune 500 issue close and New York City’s “blockchain week,” so I’m passing my weekend column duties onto a pinch hitter. Today’s essay comes to you courtesy of Oren Falkowitz, a cybersecurity entrepreneur, NSA alum, and regular reader of this newsletter. His contribution is timely, you’ll discover as you read on, given that it was the 100th birthday of the late scientist Richard Feynman last week. Hope you enjoy.

:::

When the Nobel Prize-winning physicist Richard Feynman delivered the 1974 commencement speech at Caltech, he warned against “cargo cult science,” in which people arrive at erroneous conclusions by misinterpreting the causality of results. The phrase derives from religious movements on isolated islands in the South Pacific that received airdrops of vital supplies during World War II. There, witch doctors pronounced that building new airstrips and bamboo headphones would make the supply-laden airplanes reappear.

Unfortunately, this sort of deluded thinking is just as prevalent in our modern world; nowhere more so than in cybersecurity.

We witness this cargo cultism when people ascribe insurmountable superpowers to cyber actors, simply because we struggle to stop them. We encounter it in the industry’s xenophobic biases, which treat software developed in Russia or emails from Nigerian internet addresses as suspect, even when we can’t actually pinpoint maliciousness. And the phenomenon manifests itself in a persistent belief that, if we just try harder, we can train people to spot phishing attacks that are, in fact, designed to fool them.

Despite the billions of dollars spent on cybersecurity, damages from cyberattacks continue to mount, and the underlying economics of being a bad guy on the internet remain a really good business. Hackers are moving on a frightening trajectory from data theft and data ransom, to data manipulation, to physical destruction. Now they are threatening the very stability of society.

Products that return disastrous results, as the current crop of cybersecurity solutions do, usually don’t survive the ruthless equilibrium of the marketplace. But in cybersecurity, accountability is essentially nonexistent. We should demand that vendors offer guarantees, or price products based on performance. You wouldn’t pay for a car if it broke down as soon as you took it off the lot and onto the highway, and you shouldn’t pay for cybersecurity that doesn’t work.

The witch doctors of cybersecurity have offered sham remedies. Trends in business like the transition to cloud computing, through Amazon Web Services and Microsoft Azure, are conditioning customers to pay only for what they use. Cybersecurity should be no different: Pay for performance, rather than pay-for-misses. Quite simply, does it protect you or not?

Until cybersecurity companies produce solutions that actually stop cyberattacks—provably, transparently, and repeatedly—we’ll continue dutifully making faux radar towers in palm trees. Humans are capable of accomplishing amazing feats, and our history of accomplishments as a species should give us the confidence that solutions in cybersecurity are just as surely within our grasp.

:::

Mr. Falkowitz is a co-founder and the Chief Executive Officer of Area 1 Security, you can follow him on Twitter @orenfalkowitz

Robert Hackett

@rhhackett

robert.hackett@fortune.com

Welcome to the Cyber Saturday edition of Data Sheet, Fortune’sdaily tech newsletter. Fortune reporter Robert Hackett here. You may reach Robert Hackett via Twitter, Cryptocat, Jabber (see OTR fingerprint on my about.me), PGP encrypted email (see public key on my Keybase.io), Wickr, Signal, or however you (securely) prefer. Feedback welcome.

THREATS

Encryption corruption. Researchers discovered vulnerabilities, dubbed “eFail,” that affect PGP, an encryption software program, and S/MIME, an encryption protocol. Attackers can exploit the flaws to expose the plaintext of email messages encrypted with these tools. The Electronic Frontier Foundation has recommended uninstalling or disabling PGP email plug-ins as a result, and instead using the encrypted chat app Signal for discreet communications. (It’s worth noting that other researchers found a since-fixed flaw in the desktop client for Signal that allowed attackers to execute malicious code in messages.)

Sell, sell, cell. Firms that buy people's location data from cell service providers like AT&T, Sprint, T-Mobile, and Verizon, and then sell it for marketing and other purposes, are facing scrutiny after a series of incidents drew attention to their operations. This week, for instance, Vice Motherboard reported that a hacker stole login information for thousands of customers of Securus, a company that sells call-tracking services to prisons so wardens can keep tabs on prisoners’ outgoing calls. Also this week, a researcher discovered that a buggy phone-tracking tool on the website of LocationSmart, a geo-data aggregator employed by marketers and corporations, has been leaking the whereabouts of just about everyone in the U.S. The company took its demo offline for now.

To the vault. Joshua Schulte, a 29-year-old former CIA and Bloomberg software engineer, is the prime suspect in a recent leak of secret documents relating to CIA hacking tools, the New York Times reports. He is believed to have given an archive of intelligence documents to the whistleblowing website WikiLeaks, which branded the haul “Vault 7” when it published the cache last year. Prosecutors have so far charged Schulte for possessing child pornography—it remains unclear why they have not as yet pressed charges in connection to the leak.

Once more unto the breach. Tidal, the music-streaming service, said it is investigating a “potential data breach” with the help of an unidentified cybersecurity firm after a Norwegian newspaper accused the platform of having manipulated streaming and subscriber numbers. Also, Brinker International, owner of the restaurant chain Chili’s, said that some undisclosed number of Chili’s restaurants were “impacted by a data incident.” The company said it involved the possible compromise of customer payment card information between March and April of this year.

Electrical tape: the ultimate invisibility cloak.

Share today's Data Sheet with a friend:

http://fortune.com/newsletter/datasheet/

Looking for previous Data Sheets? Click here.

ACCESS GRANTED

Unnatural selection. Google produced an internal video that conceptualized a futuristic product called a "selfish ledger" in 2016. As The Verge reports, the idea involves total data collection from all of a person's devices—an unnerving, privacy-intrusive prospect. In Google's view, this "codified version of who we are" could be granted some AI-like autonomy to nudge people into changing their behaviors in positive ways. Per Verge:

Titled The Selfish Ledger, the 9-minute film starts off with a history of Lamarckian epigenetics, which are broadly concerned with the passing on of traits acquired during an organism’s lifetime. Narrating the video, Foster acknowledges that the theory may have been discredited when it comes to genetics but says it provides a useful metaphor for user data. (The title is an homage to Richard Dawkins’ 1976 book The Selfish Gene.) The way we use our phones creates “a constantly evolving representation of who we are,” which Foster terms a “ledger,” positing that these data profiles could be built up, used to modify behaviors, and transferred from one user to another.

FORTUNE RECON

Twitter Has a New Plan To Combat Trolls by Jonathan Vanian

Facebook Has Suspended 200 Apps That May Have Misused People's Data by David Meyer

Google Offers Free Protection to U.S. Political Websites by Jeff John Roberts

From Moscow to Zurich: Kaspersky Is Moving Customer Data Away From Russian Spies' Reach by David Meyer

Google and Internet Archive Are Top Choices For ISIS Propaganda by Jeff John Roberts

Keyless Cars Can Have Deadly Consequences by Sarah Gray

Tim Cook's Duke Commencement Speech Emphasizes Privacy by David Z. Morris

ONE MORE THING

Atomic bomb. Is nature continuous or discrete? The history of modern science has for centuries assumed the fundamental fabric of the universe to be particulate, rather than a continuum. This bias may be due, in part, to a misreading of a Roman poet, Lucretius, whose influential work De Rerum Natura helped kick off the scientific revolution after its rediscovery in 1417, says University of Denver philosophy professor Thomas Nail in a piece on Aeon.

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • World's Most Admired Companies
  • See All Rankings
  • Lists Calendar
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

Current price of Ethereum for May 31, 2026
Personal FinanceEthereum
Current price of Ethereum for May 31, 2026
By Joseph HostetlerMay 13, 2026
34 minutes ago
250
Commentary250 Years of Innovation
For 250 years, America didn’t just invent the future—it built it. That connection is breaking. Here’s how to restore it
By Eric Kutcher, Shubham Singhal, Olivia White and Scott BlackburnMay 13, 2026
1 hour ago
zach
CommentaryApps
I spent 8 years building Google Sheets. Now I think apps are on their way out
By Zach LloydMay 13, 2026
1 hour ago
Four ways to create a lasting cost advantage from AI
Future of WorkCommentary
Four ways to create a lasting cost advantage from AI
By Paul GoydanMay 13, 2026
1 hour ago
frazier
Commentaryaging
Your grandma should be using AI. really
By Kevin FrazierMay 13, 2026
2 hours ago
Kyle Rush, Martha Stewart, and Yin-Han Ma smiling
Startups & VentureVenture Capital
Exclusive: Martha Stewart’s new AI startup wants to manage your home before things break
By Lily Mae LazarusMay 13, 2026
2 hours ago

Most Popular

The Bezos family just donated $100 million to help achieve one of Mayor Zohran Mamdani’s top campaign promises
Politics
The Bezos family just donated $100 million to help achieve one of Mayor Zohran Mamdani’s top campaign promises
By Jake AngeloMay 12, 2026
18 hours ago
Nearly 50,000 Lake Tahoe residents have to find a new power source after their energy source looks to redirect lines to data centers
Travel & Leisure
Nearly 50,000 Lake Tahoe residents have to find a new power source after their energy source looks to redirect lines to data centers
By Catherina GioinoMay 12, 2026
21 hours ago
U.S. hotels are calling the World Cup a 'non-event' and 80% warn bookings are falling short of expectations, report finds
North America
U.S. hotels are calling the World Cup a 'non-event' and 80% warn bookings are falling short of expectations, report finds
By Sasha RogelbergMay 12, 2026
1 day ago
Forget U.S. debt, China's total borrowing is in 'a league of its own'—much worse and deteriorating faster, analyst says
Economy
Forget U.S. debt, China's total borrowing is in 'a league of its own'—much worse and deteriorating faster, analyst says
By Jason MaMay 11, 2026
2 days ago
It’s not just Canadian tourists snubbing U.S. cities. Business leaders are cancelling more trips to America as geopolitical tensions continue
North America
It’s not just Canadian tourists snubbing U.S. cities. Business leaders are cancelling more trips to America as geopolitical tensions continue
By Sasha RogelbergMay 12, 2026
18 hours ago
Anthropic’s Daniela Amodei says entrepreneurs should go on vacation to road test potential cofounders—if they’re a drain, they’re ‘the wrong choice’
Success
Anthropic’s Daniela Amodei says entrepreneurs should go on vacation to road test potential cofounders—if they’re a drain, they’re ‘the wrong choice’
By Emma BurleighMay 12, 2026
23 hours ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.