Strava, Sweat, Security

Wearable tech, the ability to share your fitness stats, suggest routes, follow them, and so on have been a growing feature of (certain) everyday lifestyles. This ability to share how the body moves, performs, and expresses itself gives many people much satisfaction. One of the popular methods is through Strava which is primarily used by runners

New Year, New Me

So, this year will hopefully be the one where I gain a driving licence, pass the DPhil, and at least have a clear idea of what I intend to do in 2019 (if not already doing it). One of my resolutions is to start writing blog posts alongside the writing of my thesis chapters, as

Read More


This week I attended the #NATOtalk16 conference held at the (infamous) Hotel Adlon, along with a pre-session discussion with the youth arm of the German Atlantic Association (YATA). This was a great few days with a dedicated ‘cyber security’ group which was great. There are recommendations which were written by all participants (available here), where

Read More

AAG2017 – Curating (in)security

I am thoroughly looking forward to the AAG with a session Pip Thornton and I have put together on ‘Curating (in)security: Unsettling Geographies of Cyberspace’. The programme is above, along with the original session outline below. Curating (in)security: Unsettling Geographies of Cyberspace In calling for the unsettling of current theorisation and practice, this session intends

Do cybersecurity objects matter?

For anyone who has been following my twitter will realise I have been writing about malware as objects. This seems like a fundamentally weird and albeit useless thing to do (and one I have wondered myself). Yet thinking of objects as something that matter in cybersecurity is essential. This is a question I posed myself: can

Evernote – Data Protection Woes…

Unfortunately, Evernote cannot be used for any personal or confidential information it seems if you’re from the EU. As I was wading through the required confidentiality and data protection required for my DPhil fieldwork, I had to really dig around to find out what the University’s (that is Oxford’s) policy on cloud storage. It appears

CDT Open Day

I wish I could have attended my centre’s open day, from which I hear was a major success! It’s great to be part of a group of individuals pursuing some very different areas of cyber security across computer science, international relations, law, philosophy, and geography (well, only me, so far). Below is the poster that

Read More