• Comment: Article currently reads more like a CV than an encyclopedia article - could do with a rewrite to be more encyclopedic before being accepted. Turnagra (talk) 23:17, 3 November 2023 (UTC)

Terence Eden
2023 photo by Tiana Lea
OccupationCivil Servant

Terence Eden (often known as @EdenT) is a British Cybersecurity researcher.[1] employed by the UK Civil Service[2]. He is known for his work as a computer scientist[3], hacker[4], creating QRpedia[5] and for open sourcing the UK's COVID-19 app[6]. He regularly contributes to the BBC on the subject of solar panels[7][8][9].

Civil Servant edit

In 2020 st NHSX he was involved in the production of the UK's COVID-19 contact tracing app[6], helping to open source the beta and live versions[10]. He promoted the use of open standards within the NHS[11] and caused controversy by suggesting healthcare workers might quit over IT issues.[12]

He was previous the head of Open Standards for the UK Government where he implement OpenDocument Format for official documents[13][14].

Cyber Security edit

Eden is an ethical hacker who has received bug bounties from Google[15][16][17], Samsung[18][19][20][21], Twitter[22][23], and others[24].

As part of his security work he investigated large-scale spam on Twitter[25][26][27], security of Bluetooth OBD protocols[28][29][30], how attackers could misuse HTML's feature[31], the security of various IoT devices[32], and whether BMW's in-car APIs was secure[33].

In 2014, he disclosed security flaws in the websites of the UK Parliament[34], the NHS[35], and the Department of Education[36].

In 2014, he disclosed security flaws in the websites of the UK Parliament[37], the NHS[38], and the Department of Education[39].

Mona Lisa on the blockchain edit

In a self-described ''prank'', Eden used the Verisart Blockchain to claim that he painted the Mona Lisa[40][41]. As has been noted by several academics publications, this undermines tackling art theft using a blockchain[42], demonstrates that it is impossible to trust the provenance of NFTs[43], makes it difficult to assess the usefulness of digital certificates[44], and weakens the arguments for other uses of IP on blockchains[45].

In Computing edit

  • 2018 - After signing an open letter against Google's AMP project[57], he was invited to join its advisory board[58], a position he held for several years [59]. He would later resign from having expressed dissatisfaction with Google's position[60]
  • 2020 - Published the source code for the NHS's COVID-19 Contact tracing app[61]

Published works edit

  • 2014 - Unicode Proposal 14.009[51]
  • 2016 - HTTP 451[62]
  • 2021 - HTML 5.3[63]
  • 2023 - Exploring the visualization of hierarchical cybersecurity data within the Metaverse[64]

Recognition edit

Terence both is a Member of the Institution of Engineering and Technology and has been recognized as a Chartered IT Professional by the British Computer Society.[65]

He was appointed to the board of OpenUK[66] and elected to the Chair of the BCS Open Source Special Interest Group[67]

See also edit

References edit

  1. ^ Nast, Condé. "Italian Red Cross urges people to disable Wi-Fi passwords after devastating earthquake". Wired UK. ISSN 1357-0978. Retrieved 2023-08-24.
  2. ^ "The promise of the blockchain technology". The Economist. ISSN 0013-0613. Retrieved 2023-09-03.
  3. ^ "Night of Cyber - with Science Oxford". Pint of Science. Retrieved 2023-08-21.
  4. ^ Cole, Samantha (2020-10-26). "Maybe the Internet Would Suck Less If It Was Really Slow". Vice. Retrieved 2023-08-21.
  5. ^ Metro, Ross McGuinness for (2012-05-10). "QR Codes: Are they already losing their appeal to brighter ideas?". Metro. Retrieved 2023-08-23.
  6. ^ a b Christou, Theodora; Sacco, Maria Pia; Scheltema, Martijn; Bana, Anurag (2020). "Digital Contact Tracing for the COVID-19 Epidemic: A Business and Human Rights Perspective". SSRN Electronic Journal. doi:10.2139/ssrn.3618958. ISSN 1556-5068. S2CID 225759710.
  7. ^ "Why record heat doesn't mean record solar power". BBC News. 2022-07-19. Retrieved 2023-08-24.
  8. ^ "BBC Radio 4 - You and Yours, Solar Power, Free-range Eggs and Mattress Recycling". BBC. Retrieved 2023-08-24.
  9. ^ "BBC Radio 2 - Jeremy Vine, Whiplash and Life-Saving Toddlers". BBC. Retrieved 2023-08-24.
  10. ^ "The code behind the NHS Covid-19 App". NHS Transformation Directorate. 2020-05-08. Retrieved 2023-08-21.
  11. ^ "NHSX will not develop new standards, says senior tech advisor". Healthcare IT News. 2019-10-02. Retrieved 2023-08-21.
  12. ^ Rapson, Jasmine (2019-10-18). "NHSX senior adviser: Slow IT at your trust? Quit". Health Service Journal. Retrieved 2023-08-21.
  13. ^ "So long, Microsoft! UK government abandons Office, embraces free-to-use software". Expert Reviews. 23 July 2014. Retrieved 2023-08-22.
  14. ^ "Open Document Format in government: an update - Technology in government". technology.blog.gov.uk. 2018-04-27. Retrieved 2023-08-22.
  15. ^ "1242315 - chromium - An open-source project to help move the web forward. - Monorail". bugs.chromium.org. Retrieved 2023-08-21.
  16. ^ "Google Bug Hunters Hall of Fame". Retrieved 2023-08-08.
  17. ^ "Stable Channel Update for Desktop". Chrome Releases. Retrieved 2023-08-22.
  18. ^ "New Samsung flaw allows 'total bypass' of Android lock screen". ZDNET. Retrieved 2023-08-21.
  19. ^ Baig, Ahmed Fraz; Eskeland, Sigurd (2021-09-06). "Security, Privacy, and Usability in Continuous Authentication: A Survey". Sensors. 21 (17): 5967. Bibcode:2021Senso..21.5967B. doi:10.3390/s21175967. ISSN 1424-8220. PMC 8434648. PMID 34502865.
  20. ^ "Samsung Lockscreen Hacked in Under Three Minutes, Fast Fingers Required". PCMAG. Retrieved 2023-08-21.
  21. ^ Simon, Laurent (2017). Exploring new attack vectors for the exploitation of smartphones (Report). University of Cambridge, Computer Laboratory.
  22. ^ "Twitter Fixes Bugs That Expose Data". threatpost.com. 2018-12-17. Retrieved 2023-08-21.
  23. ^ "HackerOne profile - edent". HackerOne. Retrieved 2023-08-21.
  24. ^ "Security Researcher edent | Open Bug Bounty". www.openbugbounty.org. Retrieved 2023-08-21.
  25. ^ Simon, Nitin T; Elias, Susan (2017-08-01). "Detection of fake followers using feature ratio in self-organizing maps". 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE. pp. 1–5. doi:10.1109/UIC-ATC.2017.8397471. ISBN 978-1-5386-0435-9. S2CID 49535690.
  26. ^ Fathi, Ramian; Brixy, Anne-Marie; Fiedrich, Frank (2019), Lange, Hans-Jürgen; Wendekamm, Michaela (eds.), "Desinformationen und Fake-News in der Lage: Virtual Operations Support Team (VOST) und Digital Volunteers im Einsatz: Chancen und Risiken für den Bevölkerungsschutz", Postfaktische Sicherheitspolitik (in German), Wiesbaden: Springer Fachmedien Wiesbaden, pp. 211–235, doi:10.1007/978-3-658-27281-4_11, ISBN 978-3-658-27280-7, S2CID 211399412, retrieved 2023-08-21
  27. ^ Biagioli, Mario; Lippman, Alexandra, eds. (2020). Gaming the metrics: misconduct and manipulation in academic research. Infrastructures series. Cambridge, Massachusetts: The MIT Press. ISBN 978-0-262-53793-3.
  28. ^ Elmaghraby, Adel S.; Losavio, Michael M. (2014-07-01). "Cyber security challenges in Smart Cities: Safety, security and privacy". Journal of Advanced Research. 5 (4): 491–497. doi:10.1016/j.jare.2014.02.006. PMC 4294750. PMID 25685517.
  29. ^ Losavio, Michael M.; Chow, K. P.; Koltay, Andras; James, Joshua (2018-05-01). "The Internet of Things and the Smart City: Legal challenges with digital forensics, privacy, and security". Security and Privacy. 1 (3): e23. doi:10.1002/spy2.23. S2CID 169930929.
  30. ^ Bouzeraib, Wayoud; Ghenai, Afifa; Zeghib, Nadia (2020-12-01). "A Multi-Objective Genetic GAN Oversampling: Application to Intelligent Transport Anomaly Detection\". 2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE. pp. 1142–1149. doi:10.1109/HPCC-SmartCity-DSS50907.2020.00148. ISBN 978-1-7281-7649-9. S2CID 233435654.
  31. ^ Yoon, Soojin; Jung, Jonghun; Kim, HwanKuk (2015-03-01). "Study on Attack Scenarios with HTML5" (PDF). International Journal of Multimedia and Image Processing. 5 (1/2): 266–273. doi:10.20533/ijmip.2042.4647.2015.0033.
  32. ^ Stellios, Ioannis; Kotzanikolaou, Panayiotis; Psarakis, Mihalis; Alcaraz, Cristina; Lopez, Javier (2018). "A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services". IEEE Communications Surveys & Tutorials. 20 (4): 3453–3495. doi:10.1109/COMST.2018.2855563. ISSN 1553-877X. S2CID 53746146.
  33. ^ Cho, Kyong-Tak; Shin, Kang; Kim, Yu Seung; Cha, Byung-Ho (2020-06-01). "Off is Not off: On the Security of Parked Vehicles". 2020 IEEE Conference on Communications and Network Security (CNS). IEEE. pp. 1–9. doi:10.1109/CNS48642.2020.9162167. ISBN 978-1-7281-4760-4. S2CID 220422639.
  34. ^ "Revealed: key UK websites vulnerable to hackers". www.telegraph.co.uk. 3 March 2014. Retrieved 2023-08-21.
  35. ^ Hayward, Stephen (2015-06-23). "Criminals are selling Viagra and diet pills from hacked NHS websites". mirror. Retrieved 2023-08-21.
  36. ^ "Spoof Michael Gove article on 'hacked' Government website". The Independent. 2014-03-07. Retrieved 2023-08-21.
  37. ^ "Revealed: key UK websites vulnerable to hackers". www.telegraph.co.uk. 3 March 2014. Retrieved 2023-08-21.
  38. ^ Hayward, Stephen (2015-06-23). "Criminals are selling Viagra and diet pills from hacked NHS websites". mirror. Retrieved 2023-08-21.
  39. ^ "Spoof Michael Gove article on 'hacked' Government website". The Independent. 2014-03-07. Retrieved 2023-08-21.
  40. ^ Dodds, Io (2021-03-15). "The crypto-art market is being infiltrated by fakes, thieves and scammers". The Telegraph. ISSN 0307-1235. Retrieved 2023-08-21.
  41. ^ Whitaker, Amy (2019-10-18). "Art and Blockchain: A Primer, History, and Taxonomy of Blockchain Use Cases in the Arts". Artivate: A Journal of Entrepreneurship in the Arts. 8 (2). doi:10.34053/artivate.8.2.2. ISSN 2164-7747. S2CID 214014729.
  42. ^ European Commission. Directorate General for Education, Youth, Sport and Culture.; Trafficking Culture.; ECORYS. (2019). Illicit trade in cultural goods in Europe: characteristics, criminal justice responses and an analysis of the applicability of technologies in the combat against the trade : final report. LU: Publications Office. doi:10.2766/183649. ISBN 9789279993596.{{cite book}}: CS1 maint: multiple names: authors list (link)
  43. ^ Ross, Dian; Cretu, Edmond; Lemieux, Victoria (2021-12-15). "NFTS: Tulip Mania or Digital Renaissance?". 2021 IEEE International Conference on Big Data (Big Data). IEEE. pp. 2262–2272. doi:10.1109/BigData52589.2021.9671707. ISBN 978-1-6654-3902-2. S2CID 245956102.
  44. ^ Pu, Shuyi; Lam, Jasmine Siu Lee (2023-02-01). "The benefits of blockchain for digital certificates: A multiple case study analysis". Technology in Society. 72: 102176. doi:10.1016/j.techsoc.2022.102176. S2CID 253793907.
  45. ^ Mendis, Dinusha (2021-11-24). "Copyright and NFTs: new wine in old bottles?". World Intellectual Property Review (24 November 2021).
  46. ^ "Derby's Silk Mill gets visit from Wikipedia volunteers". BBC News. 2011-04-11. Retrieved 2023-08-22.
  47. ^ Youngs, Gillian, ed. (2013-06-26). Digital World (0 ed.). Routledge. doi:10.4324/9780203767061. ISBN 978-1-135-02199-3.
  48. ^ "Mobile World Congress: The UK firms hitting Barcelona". BBC News. 2012-02-23. Retrieved 2023-08-24.
  49. ^ Boyette, Chris. "Error 451: A proposed Internet status code for censorship". CNNMoney. Retrieved 2023-08-21.
  50. ^ Harcourt, Alison; Christou, George; Simpson, Seamus (2020-01-31). Global Standard Setting in Internet Governance. Oxford University Press. ISBN 978-0-19-257859-4.
  51. ^ a b "Proposal to Include IEC Power Symbols" (PDF). Unicode Consortium. 2014. {{cite journal}}: Cite journal requires |journal= (help)
  52. ^ Thomas, Bronwen (2016-10-01). "Tales from the Timeline: Experiments with Narrative on Twitter". Comparative Critical Studies. 13 (3): 353–369. doi:10.3366/ccs.2016.0210. ISSN 1744-1854.
  53. ^ "Will you run or hide? Choose your own adventure story on Twitter". www.telegraph.co.uk. 13 January 2015. Retrieved 2023-08-21.
  54. ^ "Play A Creepy Choose Your Own Adventure Game On Twitter And Enjoy Dying". Gizmodo. 2015-01-13. Retrieved 2023-08-21.
  55. ^ Hern, Alex (2015-01-14). "'Choose your own adventure' Twitter game - review". The Guardian. ISSN 0261-3077. Retrieved 2023-08-21.
  56. ^ "HTML 5.3". www.w3.org. Retrieved 2023-08-21.
  57. ^ Jun, Byungjin; Bustamante, Fabián E.; Whang, Sung Yoon; Bischof, Zachary S. (2019-08-05). "AMP up your Mobile Web Experience: Characterizing the Impact of Google's Accelerated Mobile Project". The 25th Annual International Conference on Mobile Computing and Networking. ACM. pp. 1–14. doi:10.1145/3300061.3300137. ISBN 978-1-4503-6169-9. S2CID 199448356.
  58. ^ amphtml (2018-11-30). "AMP Project's new governance model now in effect". Accelerated Mobile Pages Project. Retrieved 2023-08-21.
  59. ^ "AMP Advisory Committee 2020 election results". The AMP Blog. 2020-12-14. Retrieved 2023-08-21.
  60. ^ Claburn, Thomas. "Google AMP gets a shock to its system as advisor quits, lawsuit claims foul play". www.theregister.com. Retrieved 2023-08-21.
  61. ^ Sonar Co-Locate for Android, ukhsa-collaboration, 2023-07-31, retrieved 2023-08-22
  62. ^ Bray, Tim (2016-02-01). An HTTP Status Code to Report Legal Obstacles (Report). Internet Engineering Task Force.
  63. ^ "HTML 5.3". www.w3.org. Retrieved 2023-08-21.
  64. ^ Eden, Terence (2023). "Exploring the visualisation of hierarchical cybersecurity data within the Metaverse". arXiv:2304.10542 [cs.HC].
  65. ^ "Open source is good for AI but, is AI good for open source? | BCS". www.bcs.org. Retrieved 2023-08-21.
  66. ^ "OpenUK Board". OpenUK. Retrieved 2023-08-22.
  67. ^ Worthington, Simon (2022-11-23). "New OSSG committee". Open Source Specialist Group. Retrieved 2023-08-21.
  68. ^ Mask, Deirdre (2020-04-02). The Address Book: What Street Addresses Reveal about Identity, Race, Wealth and Power. Profile. ISBN 978-1-78283-378-9.
  69. ^ Arthur, Rudy (2023). "A Critical Analysis of the What3Words Geocoding Algorithm". PLOS ONE. 18 (10): e0292491. arXiv:2308.16025. Bibcode:2023PLoSO..1892491A. doi:10.1371/journal.pone.0292491. PMC 10599581. PMID 37878572.