Notes

  • Qualcomm wants all derivative work to require a royalty payment payment
  • closed source: can not just get anywhere
  • open source: can be open to the public
  • open source idea is for the community, use, support
  • GPL is about the community
  • closed source is about capitalisim making money
  • Qualcome made money off of hardware and they sold phone chips using open source (their type of buisness model)

Collaboration 5.5

  • Software Licenses/Options : There are different License options, some companies may have a pay wall to their code or they only allow their company workers to access the code. While some code can be accessed to the public, many advanced code is blocked
  • Digital Rights : Many companies use digital rights and the "Red Hat" company although they had an advanced software they had released it for free, even though this happened they were the first to do it so they gained a good reputation
  • Legal and Ethical thoughts:
    • Many of the code is ok that they are protected by a paywall or a company because it may be harmful if put in the wrong hands
    • This can limit the amount of people who are able to access said code and can be the digital divide

Collaboration 5.6

  • PII : personal identifyable information, examples like linkin where people show off their information to inform others about their accomplishments. These are simple types of information

5.5 Reflection

  1. When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in your personal blog.
  • MIT: The community has access to the code however when they use it they must credit the owner of the code in their "readme" file
  • OPEN SOURCE: The community has access to the code and is able to use the code freely
  • CLOSED SOURCE: Only people who have access to the code are able to use it, it is not opened to the public hence the names "closed" and "open" source
  1. Make a license for your personal (blog) and Team repositories for the CPT project. Be sure to have a license for both Team GitHub repositories (frontend/backend). Document license(s) you picked and why. FYI, frontend, since it is built on GitHub pages may come with a license and restrictions. Document in blog how team made license choice and process of update.

As a team we decided that the MIT licence was the best to use since we will be able to be cited in the code others use. We want others to use our website freely especially since we learned about the digital divide and some might want to use parts that others use.

5.6 Reflection

  1. Describe PII you have seen on project in CompSci Principles.

Many of the PII used in the Computer Science projects seen in the class projects are like student emails, names, and date of birth. Many of these types of information found in the class databases are simple and not as personal like a social security password .

  1. What are your feelings about PII and your personal exposure?

PII helps websites and companies to localize users, for example I think cookies are something like PII because they collect the user data in a way and by collecting that data they make the user's experience much better.

  1. Describe good and bad passwords? What is another step that is used to assist in authentication.

Good passwords must contain capital and lowercase letters, any type of symbol, and numbers that are NOT the user's birthday! Many people try to reuse their passwords mny times as a way of just remembering one password but if their data is given away in a data leak then almost all of the other accounts with the same password will also be leaked. If you are trying to protect really important data it is crucially important to protect it with a secure one time password. Another step that can be used is to make a security question consisting of simple questions only the user would know.

  1. Try to describe Symmetric and Asymmetric encryption.
  • Symmetric encryption is a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
  • Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys one public key and one private key – to encrypt and decrypt a message and protect it from unauthorized access or use.
  1. Provide an example of encryption we used in AWS deployment.

An example of encryption that we used in the AWS deployment is the different ports and how we only specifically used a secure user and password. And Mort had only activated the ones and shut down the other things.

  1. Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.

ALWAYS USE A VPN WHEN ON NEFARIOUS / ILLEGAL WEBSITES