Jump to content
Toggle sidebar
Logos
Search
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Tools
What links here
Related changes
Special pages
Page information
Editing
Personas/The Cybersecurity Altruists
(section)
Page
Discussion
English
Read
Edit
View history
More
Read
Edit
View history
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
= The CompSec Community Persona = <span id="summary-3"></span> == Summary == The CompSec community on Reddit is a dynamic and engaged group focused on computer security. Members are both professionals and enthusiasts passionate about information security, privacy, and cryptography. The community is characterized by its interest in learning, sharing, and discussing various aspects of computer security, ranging from theoretical concepts to practical implementations. Members frequently engage in sharing news, tools, and resources that help improve personal and organizational security postures. They are motivated by the desire to stay ahead of potential threats and to protect themselves and others from cybercrime. The community is a mix of seasoned professionals, hobbyists, and those new to the field, all contributing to a rich and diverse discussion environment. <span id="what-are-the-related-subreddits-to-this-community-3"></span> == What are the related subreddits to this community? == * /r/netsec: Network security * /r/ComputerScience <span id="what-are-the-dominant-personality-types-in-the-community-3"></span> == What are the dominant personality types in the community? == The CompSec community is likely to be dominated by individuals who score high in openness to new ideas, as they are constantly exploring new security technologies and methodologies. They also tend to be conscientious, planning ahead and considering the security implications of their actions. While the community includes both extroverts and introverts, the latter may be more common due to the technical nature of the discussions, which often require deep focus. Members are generally agreeable, willing to collaborate and share knowledge but can also be skeptical and cautious. Emotional stability varies, with some members being highly stable and others more prone to anxiety due to the nature of the work involving constant threats and risks. <span id="subgroup-personalities-3"></span> == Subgroup Personalities == * '''Belongers''': 20% - Members who enjoy being part of a community with shared interests in security. * '''Emulators''': 10% - Aspiring security professionals who seek to emulate industry leaders. * '''Doomsdayers''': 15% - Highly vigilant members with strong opinions on worst-case scenarios. * '''Survivalists''': 10% - Practical members focused on cost-effective security measures. * '''Achievers''': 25% - Ambitious individuals striving to excel in the security field. * '''Saviors''': 10% - Members motivated by the desire to protect others and improve security for all. * '''Integrators''': 10% - Members who balance earning with contributions to security education and advocacy. <span id="what-are-the-goals-and-aspirations-of-the-community-3"></span> == What are the goals and aspirations of the community? == The CompSec community aims to continuously enhance their knowledge and skills in computer security. They aspire to stay ahead of emerging threats and vulnerabilities, contribute to the development of more secure systems, and promote security awareness among the general public. Many members aim to achieve professional certifications and career advancement in the field of cybersecurity. The community envisions a future where privacy and security are prioritized in technology development and policy-making. <span id="what-are-the-values-held-by-the-community-3"></span> == What are the values held by the community? == The community values knowledge sharing, continuous learning, and collaboration. Members prioritize privacy, ethical behavior, and transparency in security practices. They hold a strong belief in the importance of staying informed about the latest threats and advancements in security technologies. Many members value open-source tools and initiatives that promote security and privacy for all. <span id="what-are-the-motivations-of-the-community-3"></span> == What are the motivations of the community? == Members are motivated by a desire to protect themselves and others from cyber threats, to stay informed about the latest developments in the field, and to contribute to the collective knowledge of the community. They are driven by curiosity, a passion for problem-solving, and a commitment to ethical standards in security practices. <span id="what-are-the-pain-points-of-the-community-3"></span> == What are the pain points of the community? == The community faces challenges such as keeping up with the rapidly evolving threat landscape, the complexity of implementing effective security measures, and the often inadequate security practices of organizations and individuals. Members also express frustration with the lack of awareness and understanding of security issues among the general public and policymakers. <span id="what-are-the-anticipated-solutions-to-the-pain-points-of-the-community-3"></span> == What are the anticipated solutions to the pain points of the community? == The community seeks to address these challenges through continued education and advocacy for better security practices. They aim to develop and share tools and resources that simplify security implementation and to engage in discussions that raise awareness about the importance of cybersecurity. Collaboration with industry professionals and policymakers is also seen as a key strategy to drive improvements in security standards and practices. <span id="who-are-the-key-villains-3"></span> == Who are the key villains? == * Companies with poor security practices that expose user data. * Hackers and cybercriminals who exploit vulnerabilities for malicious purposes. * Government agencies or organizations that undermine privacy through surveillance. <span id="who-are-the-key-heroes-3"></span> == Who are the key heroes? == * Security researchers and professionals who develop new defenses and tools. * Influencers like Bruce Schneier and Troy Hunt, who advocate for better security practices. * Organizations like the Electronic Frontier Foundation (EFF) that protect digital rights. <span id="shared-experiences-3"></span> == Shared Experiences? == Members often share experiences of dealing with security breaches, participating in capture the flag (CTF) competitions, and attending security conferences like DEF CON. These experiences shape their understanding of security challenges and foster a sense of community. <span id="barriers-to-entry-3"></span> == Barriers to Entry == New members may face barriers such as the steep learning curve of technical concepts and the need for a foundational understanding of security principles. These barriers can affect community dynamics by creating a divide between experienced members and newcomers. <span id="aio-activities-interests-and-opinions-3"></span> == AIO (activities, interests and opinions) == Members engage in activities such as ethical hacking, threat analysis, and tool development. They are interested in cryptography, network security, and privacy technologies. Opinions vary, but there is a strong consensus on the importance of ethical conduct and continuous learning in security. <span id="community-rituals-3"></span> == Community Rituals == Community rituals include regular participation in online discussions, sharing security tools and resources, and contributing to collaborative projects like open-source software development. Members also engage in periodic security challenges and competitions. <span id="in-group-jokes-common-phrases-and-memes-3"></span> == In-Group Jokes, Common Phrases and Memes == * “There is no cloud, just someone else’s computer.” * “Trust, but verify.” * Memes about security breaches and password practices. <span id="glossary-of-community-specific-jargon-3"></span> == Glossary of Community-specific Jargon == * “Infosec”: Information security. * “OPSEC”: Operational security. * “CTF”: Capture the flag, a type of security competition. * “Zero-day”: A previously unknown vulnerability. <span id="cultural-influences-3"></span> == Cultural Influences == The culture of the subreddit fosters a collaborative and educational environment. Members are encouraged to share knowledge, learn from one another, and approach security challenges with curiosity and critical thinking. <span id="communication-style-3"></span> == Communication style == Communication is often technical and detail-oriented, with an emphasis on accuracy and clarity. Members value respectful discourse and are open to constructive criticism. Quotes like “Security through obscurity is no security at all” illustrate the community’s focus on transparency and robust practices. <span id="conflict-and-resolution-3"></span> == Conflict and Resolution == Conflicts are typically resolved through discussion and evidence-based arguments. The community values respectful disagreements and encourages members to back up their claims with data and research. <span id="how-to-communicate-with-them-on-an-emotional-level-3"></span> == How to communicate with them on an emotional level? == To communicate effectively, emphasize shared values such as the importance of security and privacy. Use examples and stories that highlight the impact of security practices on real-world scenarios. Emotional triggers include the fear of data breaches and the satisfaction of solving complex security problems. <span id="how-to-communicate-with-them-on-a-material-level-3"></span> == How to communicate with them on a material level? == Focus on practical solutions and tools that address common security challenges. Highlight the benefits of adopting specific security measures and provide clear, actionable guidance. Material needs include up-to-date information on threats and access to reliable security resources. <span id="external-perception-3"></span> == External Perception: == Outsiders may perceive the community as overly technical or paranoid, but those familiar with the field understand the necessity of their vigilance. This perception can lead to a sense of camaraderie among members who are passionate about security. <span id="additional-notes-insights-3"></span> == Additional Notes & Insights == The CompSec community is a valuable resource for anyone interested in improving their security knowledge and practices. Members are eager to help newcomers and to foster a culture of continuous learning and improvement in the field of computer security. ----- <span id="rcrypto"></span> === r/crypto === <span id="the-cryptographic-enthusiast-guardians-of-privacy-and-security"></span> == The Cryptographic Enthusiast: Guardians of Privacy and Security == <span id="summary-4"></span> == Summary == The /r/crypto community is characterized by a group of highly knowledgeable and passionate individuals dedicated to the study and advancement of cryptography. This community is focused on the theoretical and practical aspects of cryptography, including the development and security of algorithms, cryptographic systems, and their implementations. Members are driven by a commitment to privacy, security, and the protection of data against unauthorized access. They value clear, evidence-based discussions and often engage in debates about the latest cryptographic research, vulnerabilities, and innovations. The community is technically oriented, with discussions often involving complex mathematical concepts and technical details. Members are also vigilant about misinformation, particularly in relation to the misuse of cryptographic terms by the cryptocurrency industry. <span id="what-are-the-related-subreddits-to-this-community-4"></span> == What are the related subreddits to this community? == * /r/math * /r/compsci * /r/cryptocurrency (not directly related but often confused due to the name) * /r/algorithms * /r/netsec * /r/RNG * /r/compsec * /r/websec * /r/security * /r/privacy * /r/ComputerScience * /r/codes * /r/breakmycode * /r/gpgpractice * /r/primitiveplayground * /r/stanfordcrypto * /r/privacypatriots * /r/NSAleaks * /r/restorethefourth * /r/cryptography * /r/encryption * /r/weboftrust * /r/capabilities * /r/Intelligence * /r/shittycrypto <span id="what-are-the-dominant-personality-types-in-the-community-4"></span> == What are the dominant personality types in the community? == The community is predominantly composed of individuals with high Openness, as they are imaginative, curious, and eager to explore new ideas and technologies in cryptography. They exhibit Conscientiousness, as they focus on accuracy, reliability, and the ethical implications of cryptographic systems. Members tend to be Introverted, preferring deep technical discussions and problem-solving over social interactions. They demonstrate Agreeableness by collaborating on open-source projects and sharing knowledge, although they can be critical when it comes to inaccuracies or misinformation. The community generally exhibits low Neuroticism, remaining calm and analytical even when discussing potentially alarming security vulnerabilities. <span id="subgroup-personalities-4"></span> == Subgroup Personalities == '''Belongers''': 15% - Those who seek to be part of a community that values privacy and security as fundamental rights. They often participate in discussions to align with the community’s values. '''Emulators''': 10% - Individuals who admire renowned cryptographers and security experts and strive to emulate their success and expertise by engaging with their work. '''Doomsdayers''': 20% - Members who are highly skeptical of government and corporate surveillance efforts, often vocal about potential risks and vulnerabilities. '''Survivalists''': 15% - Cautious individuals who focus on practical cryptographic applications and the implementation of secure systems to protect personal and organizational data. '''Achievers''': 25% - Ambitious cryptographers and security professionals aiming to make significant contributions to the field, often through research and development. '''Saviors''': 10% - Socially conscious members who advocate for the ethical use of cryptography to protect human rights and privacy. '''Integrators''': 5% - Philanthropic individuals who leverage their cryptographic expertise to support non-profit organizations and initiatives focused on privacy and security. <span id="what-are-the-goals-and-aspirations-of-the-community-4"></span> == What are the goals and aspirations of the community? == The community aims to advance the field of cryptography by developing more secure and efficient algorithms and systems. They aspire to ensure the widespread adoption of strong encryption practices across industries to safeguard against data breaches and unauthorized surveillance. Members seek to educate the broader public on the importance of privacy and the role of cryptography in protecting civil liberties. Long-term aspirations include creating a technological environment where privacy is a fundamental right and cryptographic tools are accessible and user-friendly for everyone. <span id="what-are-the-values-held-by-the-community-4"></span> == What are the values held by the community? == The community values privacy, security, transparency, and open discourse. They hold a strong belief in the ethical use of cryptography to protect personal and organizational data. There is a commitment to scientific rigor and evidence-based discussions, with an emphasis on open-source collaboration to foster innovation and trust. The community is also dedicated to the principle of Kerckhoffs’s law, which states that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge. <span id="what-are-the-motivations-of-the-community-4"></span> == What are the motivations of the community? == The primary motivation is to enhance data security and privacy in an increasingly digitized world. Members are driven by the desire to protect individuals and organizations from cyber threats and unauthorized surveillance. The intellectual challenge of solving complex cryptographic problems and the pursuit of innovation in the field also serve as strong motivators. Additionally, there is a collective commitment to advancing technology in a way that aligns with ethical standards and human rights. <span id="what-are-the-pain-points-of-the-community-4"></span> == What are the pain points of the community? == The community faces challenges such as the misuse of cryptographic terminology by the cryptocurrency industry, which leads to misunderstandings and misinformation. There is also frustration with government and corporate attempts to weaken encryption standards through legislation or backdoors. The complexity of cryptographic systems and the difficulty in educating the public on their importance pose additional obstacles. Members are concerned about the potential ethical implications of their work being used for surveillance or oppressive purposes. <span id="what-are-the-anticipated-solutions-to-the-pain-points-of-the-community-4"></span> == What are the anticipated solutions to the pain points of the community? == To address these challenges, the community advocates for clear communication and education efforts to demystify cryptography for the general public. They support open-source projects and collaborations to ensure transparency and innovation in cryptographic systems. The community also calls for stronger legal protections for encryption and privacy rights, opposing any legislative efforts that would weaken cryptographic standards. By fostering a culture of ethical responsibility, they aim to prevent the misuse of cryptographic technologies. <span id="who-are-the-key-villains-4"></span> == Who are the key villains? == * Government agencies advocating for encryption backdoors. * Companies that prioritize profit over user privacy and security. * Individuals spreading misinformation about cryptography. <span id="who-are-the-key-heroes-4"></span> == Who are the key heroes? == * Cryptography experts like Bruce Schneier, who advocate for strong encryption and privacy rights. * Organizations like the Electronic Frontier Foundation (EFF) that fight for digital rights and privacy. * Influential open-source contributors and researchers advancing cryptographic knowledge. <span id="shared-experiences-4"></span> == Shared Experiences? == The community’s identity has been shaped by events such as the Snowden revelations, which highlighted the importance of privacy and the risks of mass surveillance. The ongoing debate over encryption backdoors and government attempts to weaken encryption standards have also played a significant role in uniting the community around a common cause. The widespread adoption of HTTPS and the success of the Let’s Encrypt initiative are seen as significant achievements. <span id="barriers-to-entry-4"></span> == Barriers to Entry == New members must have a solid understanding of cryptographic principles and be willing to engage in technical discussions. The community’s focus on accuracy and evidence-based discourse can be intimidating for newcomers. However, once accepted, members find a supportive environment that encourages learning and collaboration. <span id="aio-activities-interests-and-opinions-4"></span> == AIO (activities, interests and opinions) == The community is actively involved in cryptographic research, development, and education. Members participate in discussions about the latest cryptographic papers, vulnerabilities, and best practices. They hold strong opinions on the ethical use of cryptography and the importance of privacy rights. There is a shared belief in the potential of cryptography to empower individuals and protect against authoritarianism. <span id="community-rituals-4"></span> == Community Rituals == * Regular discussions and debates on cryptographic breakthroughs and vulnerabilities. * Participation in open-source projects and code reviews. * Advocacy for privacy rights and opposition to anti-encryption legislation. <span id="in-group-jokes-common-phrases-and-memes-4"></span> == In-Group Jokes, Common Phrases and Memes == * “Crypto is not cryptocurrency.” * “Don’t roll your own crypto.” * “Kerckhoffs’s principle or bust.” <span id="glossary-of-community-specific-jargon-4"></span> == Glossary of Community-specific Jargon == * “Crypto” refers to cryptography, not cryptocurrency. * “Backdoor” is a secret method of bypassing normal authentication or encryption. * “Kerckhoffs’s principle” is the idea that a cryptosystem should be secure even if everything about the system, except the key, is public knowledge. <span id="cultural-influences-4"></span> == Cultural Influences == The community is heavily influenced by the broader tech and privacy movements, drawing inspiration from historical figures like Alan Turing and contemporary experts like Bruce Schneier. The culture of open-source collaboration and the pursuit of knowledge are central to the community’s ethos. <span id="communication-style-4"></span> == Communication style == The preferred communication style is clear, concise, and evidence-based. Members value technical accuracy and are quick to correct misinformation. They often use technical jargon and mathematical language to convey complex ideas. <span id="conflict-and-resolution-4"></span> == Conflict and Resolution == Conflicts are typically resolved through evidence-based discussions and peer review. The community values transparency and open discourse, and members are encouraged to engage in constructive criticism and debate. <span id="how-to-communicate-with-them-on-an-emotional-level-4"></span> == How to communicate with them on an emotional level? == To connect emotionally, emphasize the importance of privacy, security, and ethical responsibility in technology. Highlight the role of cryptography in protecting human rights and empowering individuals. Acknowledge the community’s contributions to advancing knowledge and innovation. <span id="how-to-communicate-with-them-on-a-material-level-4"></span> == How to communicate with them on a material level? == Discuss the practical applications of cryptography in enhancing security and privacy for individuals and organizations. Provide technical insights and data to support claims and engage in discussions about the latest research and developments in the field. <span id="external-perception-4"></span> == External Perception: == Outsiders may perceive the community as overly technical or insular, but those who take the time to engage with its members will find a group of passionate and knowledgeable individuals committed to advancing technology ethically. <span id="additional-notes-insights-4"></span> == Additional Notes & Insights == The community’s dedication to privacy and security is unwavering, and members are continually seeking new ways to advance the field and educate others. By fostering a culture of collaboration and transparency, the community aims to ensure that cryptographic technologies are used to protect and empower individuals worldwide. ----- <span id="rcryptography"></span> === r/cryptography === <span id="the-cryptography-enthusiast"></span>
Summary:
Please note that all contributions to Logos may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Logos:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)