Terence Eden

From Wikitia
Jump to navigation Jump to search
Terence Eden
Add a Photo
NationalityBritish
Occupation
  • CyberSecurity Researcher
  • Civil Servant

Terence Eden (often known as @EdenT) is a British CyberSecurity researcher[1] employed by the UK Civil Service. He is known for his work as a computer scientist[2], hacker[3], creating the QRpedia[4] and for open sourcing the UKs COVID-19 app[5]. He regularly contributes to the BBC on the subject of solar panels[6][7][8].

Civil Servant

In 2020 st NHSX he was involved in the production of the UK's Covid19 contact tracking app[5], helping to open source the beta and live versions[9]. He promoted the use of open standards within the NHS[10] and caused controversy by suggesting healthcare workers might quit over IT issues.[11]

He was previous the head of Open Standards for the UK Government where he implement the OpenDocument Format for official documents[12][13].

Cyber Security

Edent is a Ethical hacker who has received bug bounties from Google[14][15][16], Samsung[17][18][19], Twitter[20][21], and others[22].

As part of his security work he investigated large-scale spam on Twitter[23][24][25], security of Bluetooth OBD protocols[26][27][28], how attackers could misuse HTML's feature[29], the security of various IoT devices[30], and whether BMW's in-car APIs was secure[31]. In 2014, he disclosed security flaws in the websites of the UK Parliament[32], the NHS[33][34], and the Department of Education[35].

In 2014, he disclosed security flaws in the websites of the UK Parliament[36], the NHS[37][38], and the Department of Education[39].

Mona Lisa on the Blockchain

In a self-described ''prank'', Edent used the Verisart Blockchain to claim that he painted the Mona Lisa[40][41]. As has been noted by several academics publications, this undermines tackling art theft using BlockChain[42], demonstrates that it is impossible to trust the provenance of NFTs[43], makes it difficult to assess the usefulness of digital certificates[44], and weakens the arguments for other uses of IP on the Blockchain[45].

In Computing

  • 2011 - Built the QRpedia Project for Wikimedia UK[46][47]. In 2012 it was nominated at Mobile World Congress[48]
  • 2012 - Created a proposal for a new HTTP Code - this come to be known as 451[49][50]
  • 2014 - Added power symbols to the Miscellaneous Technical block of Unicode[51]
  • 2015 - Produced the first piece of Interactive Fiction to make use of multiple Twitter accounts.[52] The game got several positive reviews[53][54] with The Guardian comparing it favorably to "Call of Duty"[55]
  • 2017 - Editor of the HTML5.3 standard[56]
  • 2018 - After singing an open letter against Google's AMP project[57], EdenT was invited to join it's advisory board[58], a position he held for several years [59]. He would later resign from having expressed dissatisfaction with Google's position[60]
  • 2020 - Published the source code for the NHS's Covid-19 Contact tracking app[61]

Published works

  • 2014 - Unicode Proposal 14.009[51]
  • 2016 - HTTP 451
  • 2021 - HTML 5.3[62]
  • 2023 - Exploring the visualization of hierarchical cybersecurity data within the Metaverse

Recognition

Terence both is a Member of the Institution of Engineering and Technology and has been recognized as a Chartered IT Professional by the British Computer Society.[63]

He was appointed to the board of OpenUK[64] and elected to the Chair of the BCS Open Source Special Interest Group[65].

References

  1. Nast, Condé. "Italian Red Cross urges people to disable Wi-Fi passwords after devastating earthquake". Wired UK. ISSN 1357-0978. Retrieved 2023-08-24.
  2. "Night of Cyber - with Science Oxford". Pint of Science. Retrieved 2023-08-21.
  3. Cole, Samantha (2020-10-26). "Maybe the Internet Would Suck Less If It Was Really Slow". Vice. Retrieved 2023-08-21.
  4. Metro, Ross McGuinness for (2012-05-10). "QR Codes: Are they already losing their appeal to brighter ideas?". Metro. Retrieved 2023-08-23.
  5. 5.0 5.1 Christou, Theodora; Sacco, Maria Pia; Scheltema, Martijn; Bana, Anurag (2020). "Digital Contact Tracing for the COVID-19 Epidemic: A Business and Human Rights Perspective". SSRN Electronic Journal. doi:10.2139/ssrn.3618958. ISSN 1556-5068.
  6. "Why record heat doesn't mean record solar power". BBC News. 2022-07-19. Retrieved 2023-08-24.
  7. "BBC Radio 4 - You and Yours, Solar Power, Free-range Eggs and Mattress Recycling". BBC. Retrieved 2023-08-24.
  8. "BBC Radio 2 - Jeremy Vine, Whiplash and Life-Saving Toddlers". BBC. Retrieved 2023-08-24.
  9. "The code behind the NHS Covid-19 App". NHS Transformation Directorate. 2020-05-08. Retrieved 2023-08-21.
  10. "NHSX will not develop new standards, says senior tech advisor". Healthcare IT News. 2019-10-02. Retrieved 2023-08-21.
  11. Rapson, Jasmine (2019-10-18). "NHSX senior adviser: Slow IT at your trust? Quit". Health Service Journal. Retrieved 2023-08-21.
  12. "So long, Microsoft! UK government abandons Office, embraces free-to-use software". Expert Reviews. 23 July 2014. Retrieved 2023-08-22.
  13. "Open Document Format in government: an update - Technology in government". technology.blog.gov.uk. 2018-04-27. Retrieved 2023-08-22.
  14. "1242315 - chromium - An open-source project to help move the web forward. - Monorail". bugs.chromium.org. Retrieved 2023-08-21.
  15. "Google Bug Hunters Hall of Fame". Retrieved 2023-08-08.
  16. "Stable Channel Update for Desktop". Chrome Releases. Retrieved 2023-08-22.
  17. "New Samsung flaw allows 'total bypass' of Android lock screen". ZDNET. Retrieved 2023-08-21.
  18. Baig, Ahmed Fraz; Eskeland, Sigurd (2021-09-06). "Security, Privacy, and Usability in Continuous Authentication: A Survey". Sensors. 21 (17): 5967. doi:10.3390/s21175967. ISSN 1424-8220. PMC 8434648. PMID 34502865.
  19. "Samsung Lockscreen Hacked in Under Three Minutes, Fast Fingers Required". PCMAG. Retrieved 2023-08-21.
  20. "Twitter Fixes Bugs That Expose Data". threatpost.com. 2018-12-17. Retrieved 2023-08-21.
  21. "HackerOne profile - edent". HackerOne. Retrieved 2023-08-21.
  22. "Security Researcher edent | Open Bug Bounty". www.openbugbounty.org. Retrieved 2023-08-21.
  23. Simon, Nitin T; Elias, Susan (2017-08-01). Detection of fake followers using feature ratio in self-organizing maps. IEEE. pp. 1–5. doi:10.1109/UIC-ATC.2017.8397471. ISBN 978-1-5386-0435-9.
  24. Fathi, Ramian; Brixy, Anne-Marie; Fiedrich, Frank (2019), Lange, Hans-Jürgen; Wendekamm, Michaela (eds.), "Desinformationen und Fake-News in der Lage: Virtual Operations Support Team (VOST) und Digital Volunteers im Einsatz: Chancen und Risiken für den Bevölkerungsschutz", Postfaktische Sicherheitspolitik (in Deutsch), Wiesbaden: Springer Fachmedien Wiesbaden, pp. 211–235, doi:10.1007/978-3-658-27281-4_11, ISBN 978-3-658-27280-7, retrieved 2023-08-21
  25. Biagioli, Mario; Lippman, Alexandra, eds. (2020). Gaming the metrics: misconduct and manipulation in academic research. Infrastructures series. Cambridge, Massachusetts: The MIT Press. ISBN 978-0-262-53793-3.
  26. Elmaghraby, Adel S.; Losavio, Michael M. (2014-07-01). "Cyber security challenges in Smart Cities: Safety, security and privacy". Journal of Advanced Research. 5 (4): 491–497. doi:10.1016/j.jare.2014.02.006. PMC 4294750. PMID 25685517.
  27. Losavio, Michael M.; Chow, K. P.; Koltay, Andras; James, Joshua (2018-05-01). "The Internet of Things and the Smart City: Legal challenges with digital forensics, privacy, and security". Security and Privacy. 1 (3): e23. doi:10.1002/spy2.23.
  28. Bouzeraib, Wayoud; Ghenai, Afifa; Zeghib, Nadia (2020-12-01). A Multi-Objective Genetic GAN Oversampling: Application to Intelligent Transport Anomaly Detection\. IEEE. pp. 1142–1149. doi:10.1109/HPCC-SmartCity-DSS50907.2020.00148. ISBN 978-1-7281-7649-9.
  29. Yoon, Soojin; Jung, Jonghun; Kim, HwanKuk (2015-03-01). "Study on Attack Scenarios with HTML5" (PDF). International Journal of Multimedia and Image Processing. 5 (1/2): 266–273. doi:10.20533/ijmip.2042.4647.2015.0033.
  30. Stellios, Ioannis; Kotzanikolaou, Panayiotis; Psarakis, Mihalis; Alcaraz, Cristina; Lopez, Javier (2018). "A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services". IEEE Communications Surveys & Tutorials. 20 (4): 3453–3495. doi:10.1109/COMST.2018.2855563. ISSN 1553-877X.
  31. Cho, Kyong-Tak; Shin, Kang; Kim, Yu Seung; Cha, Byung-Ho (2020-06-01). Off is Not Off: On the Security of Parked Vehicles. IEEE. pp. 1–9. doi:10.1109/CNS48642.2020.9162167. ISBN 978-1-7281-4760-4.
  32. "Revealed: key UK websites vulnerable to hackers". www.telegraph.co.uk. Retrieved 2023-08-21.
  33. Hayward, Stephen (2015-06-23). "Criminals are selling Viagra and diet pills from hacked NHS websites". mirror. Retrieved 2023-08-21.
  34. Temperton, James (2014-03-05). "Could the NHS give you a COMPUTER virus?". Mail Online. Retrieved 2023-08-21.
  35. "Spoof Michael Gove article on 'hacked' Government website". The Independent. 2014-03-07. Retrieved 2023-08-21.
  36. "Revealed: key UK websites vulnerable to hackers". www.telegraph.co.uk. Retrieved 2023-08-21.
  37. Hayward, Stephen (2015-06-23). "Criminals are selling Viagra and diet pills from hacked NHS websites". mirror. Retrieved 2023-08-21.
  38. Temperton, James (2014-03-05). "Could the NHS give you a COMPUTER virus?". Mail Online. Retrieved 2023-08-21.
  39. "Spoof Michael Gove article on 'hacked' Government website". The Independent. 2014-03-07. Retrieved 2023-08-21.
  40. Dodds, Io (2021-03-15). "The crypto-art market is being infiltrated by fakes, thieves and scammers". The Telegraph. ISSN 0307-1235. Retrieved 2023-08-21.
  41. Whitaker, Amy (2019-10-18). "Art and Blockchain: A Primer, History, and Taxonomy of Blockchain Use Cases in the Arts". Artivate: A Journal of Entrepreneurship in the Arts. 8 (2). doi:10.34053/artivate.8.2.2. ISSN 2164-7747.
  42. European Commission. Directorate General for Education, Youth, Sport and Culture.; Trafficking Culture.; ECORYS. (2019). Illicit trade in cultural goods in Europe: characteristics, criminal justice responses and an analysis of the applicability of technologies in the combat against the trade : final report. LU: Publications Office. doi:10.2766/183649. ISBN 9789279993596.{{cite book}}: CS1 maint: multiple names: authors list (link)
  43. Ross, Dian; Cretu, Edmond; Lemieux, Victoria (2021-12-15). NFTs: Tulip Mania or Digital Renaissance?. IEEE. pp. 2262–2272. doi:10.1109/BigData52589.2021.9671707. ISBN 978-1-6654-3902-2.
  44. Pu, Shuyi; Lam, Jasmine Siu Lee (2023-02-01). "The benefits of blockchain for digital certificates: A multiple case study analysis". Technology in Society. 72: 102176. doi:10.1016/j.techsoc.2022.102176.
  45. Mendis, Dinusha (2021-11-24). "Copyright and NFTs: new wine in old bottles?". World Intellectual Property Review (24 November 2021).
  46. "Derby's Silk Mill gets visit from Wikipedia volunteers". BBC News. 2011-04-11. Retrieved 2023-08-22.
  47. Youngs, Gillian, ed. (2013-06-26). Digital World (0 ed.). Routledge. doi:10.4324/9780203767061. ISBN 978-1-135-02199-3.
  48. "Mobile World Congress: The UK firms hitting Barcelona". BBC News. 2012-02-23. Retrieved 2023-08-24.
  49. Boyette, Chris. "Error 451: A proposed Internet status code for censorship". CNNMoney. Retrieved 2023-08-21.
  50. Harcourt, Alison; Christou, George; Simpson, Seamus (2020-01-31). Global Standard Setting in Internet Governance. Oxford University Press. ISBN 978-0-19-257859-4.
  51. 51.0 51.1 "Proposal to Include IEC Power Symbols" (PDF). Unicode Consortium. 2014. {{cite journal}}: Cite journal requires |journal= (help)
  52. Thomas, Bronwen (2016-10-01). "Tales from the Timeline: Experiments with Narrative on Twitter". Comparative Critical Studies. 13 (3): 353–369. doi:10.3366/ccs.2016.0210. ISSN 1744-1854.
  53. "Will you run or hide? Choose your own adventure story on Twitter". www.telegraph.co.uk. Retrieved 2023-08-21.
  54. "Play A Creepy Choose Your Own Adventure Game On Twitter And Enjoy Dying". Gizmodo. 2015-01-13. Retrieved 2023-08-21.
  55. Hern, Alex (2015-01-14). "'Choose your own adventure' Twitter game - review". The Guardian. ISSN 0261-3077. Retrieved 2023-08-21.
  56. "HTML 5.3". www.w3.org. Retrieved 2023-08-21.
  57. Jun, Byungjin; Bustamante, Fabián E.; Whang, Sung Yoon; Bischof, Zachary S. (2019-08-05). AMP up your Mobile Web Experience: Characterizing the Impact of Google's Accelerated Mobile Project. ACM. pp. 1–14. doi:10.1145/3300061.3300137. ISBN 978-1-4503-6169-9.
  58. amphtml (2018-11-30). "AMP Project's new governance model now in effect". Accelerated Mobile Pages Project. Retrieved 2023-08-21.
  59. "AMP Advisory Committee 2020 election results". The AMP Blog. 2020-12-14. Retrieved 2023-08-21.
  60. Claburn, Thomas. "Google AMP gets a shock to its system as advisor quits, lawsuit claims foul play". www.theregister.com. Retrieved 2023-08-21.
  61. Sonar Co-Locate for Android, ukhsa-collaboration, 2023-07-31, retrieved 2023-08-22
  62. "HTML 5.3". www.w3.org. Retrieved 2023-08-21.
  63. "Open source is good for AI but, is AI good for open source? | BCS". www.bcs.org. Retrieved 2023-08-21.
  64. "OpenUK Board". OpenUK. Retrieved 2023-08-22.
  65. Worthington, Simon (2022-11-23). "New OSSG committee". Open Source Specialist Group. Retrieved 2023-08-21.

External links

Add External links

This article "Terence Eden" is from Wikipedia. The list of its authors can be seen in its historical. Articles taken from Draft Namespace on Wikipedia could be accessed on Wikipedia's Draft Namespace.