Submission declined on 3 November 2023 by Turnagra (talk). This submission does not appear to be written in the formal tone expected of an encyclopedia article. Entries should be written from a neutral point of view, and should refer to a range of independent, reliable, published sources. Please rewrite your submission in a more encyclopedic format. Please make sure to avoid peacock terms that promote the subject.
Where to get help
How to improve a draft
You can also browse Wikipedia:Featured articles and Wikipedia:Good articles to find examples of Wikipedia's best writing on topics similar to your proposed article. Improving your odds of a speedy review To improve your odds of a faster review, tag your draft with relevant WikiProject tags using the button below. This will let reviewers know a new draft has been submitted in their area of interest. For instance, if you wrote about a female astronomer, you would want to add the Biography, Astronomy, and Women scientists tags. Editor resources
|
- Comment: Article currently reads more like a CV than an encyclopedia article - could do with a rewrite to be more encyclopedic before being accepted. Turnagra (talk) 23:17, 3 November 2023 (UTC)
Terence Eden | |
---|---|
Occupation | Civil Servant |
Terence Eden (often known as @EdenT) is a British Cybersecurity researcher.[1] employed by the UK Civil Service[2]. He is known for his work as a computer scientist[3], hacker[4], creating QRpedia[5] and for open sourcing the UK's COVID-19 app[6]. He regularly contributes to the BBC on the subject of solar panels[7][8][9].
Civil Servant edit
In 2020 st NHSX he was involved in the production of the UK's COVID-19 contact tracing app[6], helping to open source the beta and live versions[10]. He promoted the use of open standards within the NHS[11] and caused controversy by suggesting healthcare workers might quit over IT issues.[12]
He was previous the head of Open Standards for the UK Government where he implement OpenDocument Format for official documents[13][14].
Cyber Security edit
Eden is an ethical hacker who has received bug bounties from Google[15][16][17], Samsung[18][19][20][21], Twitter[22][23], and others[24].
As part of his security work he investigated large-scale spam on Twitter[25][26][27], security of Bluetooth OBD protocols[28][29][30], how attackers could misuse HTML's feature[31], the security of various IoT devices[32], and whether BMW's in-car APIs was secure[33].
In 2014, he disclosed security flaws in the websites of the UK Parliament[34], the NHS[35], and the Department of Education[36].
In 2014, he disclosed security flaws in the websites of the UK Parliament[37], the NHS[38], and the Department of Education[39].
Mona Lisa on the blockchain edit
In a self-described ''prank'', Eden used the Verisart Blockchain to claim that he painted the Mona Lisa[40][41]. As has been noted by several academics publications, this undermines tackling art theft using a blockchain[42], demonstrates that it is impossible to trust the provenance of NFTs[43], makes it difficult to assess the usefulness of digital certificates[44], and weakens the arguments for other uses of IP on blockchains[45].
In Computing edit
- 2011 - Built the QRpedia Project for Wikimedia UK[46][47]. In 2012 it was nominated for a prize at Mobile World Congress[48]
- 2012 - Created a proposal for a new HTTP Code - this came to be known as 451[49][50]
- 2014 - Added power symbols to the Miscellaneous Technical block of Unicode[51]
- 2015 - Produced the first piece of Interactive Fiction to make use of multiple Twitter accounts.[52] The game received several positive reviews[53][54] with The Guardian comparing it favorably to "Call of Duty"[55]
- 2017 - Editor of the HTML5.3 standard[56]
- 2018 - After signing an open letter against Google's AMP project[57], he was invited to join its advisory board[58], a position he held for several years [59]. He would later resign from having expressed dissatisfaction with Google's position[60]
- 2020 - Published the source code for the NHS's COVID-19 Contact tracing app[61]
Published works edit
Recognition edit
Terence both is a Member of the Institution of Engineering and Technology and has been recognized as a Chartered IT Professional by the British Computer Society.[65]
He was appointed to the board of OpenUK[66] and elected to the Chair of the BCS Open Source Special Interest Group[67]
See also edit
References edit
- ^ Nast, Condé. "Italian Red Cross urges people to disable Wi-Fi passwords after devastating earthquake". Wired UK. ISSN 1357-0978. Retrieved 2023-08-24.
- ^ "The promise of the blockchain technology". The Economist. ISSN 0013-0613. Retrieved 2023-09-03.
- ^ "Night of Cyber - with Science Oxford". Pint of Science. Retrieved 2023-08-21.
- ^ Cole, Samantha (2020-10-26). "Maybe the Internet Would Suck Less If It Was Really Slow". Vice. Retrieved 2023-08-21.
- ^ Metro, Ross McGuinness for (2012-05-10). "QR Codes: Are they already losing their appeal to brighter ideas?". Metro. Retrieved 2023-08-23.
- ^ a b Christou, Theodora; Sacco, Maria Pia; Scheltema, Martijn; Bana, Anurag (2020). "Digital Contact Tracing for the COVID-19 Epidemic: A Business and Human Rights Perspective". SSRN Electronic Journal. doi:10.2139/ssrn.3618958. ISSN 1556-5068. S2CID 225759710.
- ^ "Why record heat doesn't mean record solar power". BBC News. 2022-07-19. Retrieved 2023-08-24.
- ^ "BBC Radio 4 - You and Yours, Solar Power, Free-range Eggs and Mattress Recycling". BBC. Retrieved 2023-08-24.
- ^ "BBC Radio 2 - Jeremy Vine, Whiplash and Life-Saving Toddlers". BBC. Retrieved 2023-08-24.
- ^ "The code behind the NHS Covid-19 App". NHS Transformation Directorate. 2020-05-08. Retrieved 2023-08-21.
- ^ "NHSX will not develop new standards, says senior tech advisor". Healthcare IT News. 2019-10-02. Retrieved 2023-08-21.
- ^ Rapson, Jasmine (2019-10-18). "NHSX senior adviser: Slow IT at your trust? Quit". Health Service Journal. Retrieved 2023-08-21.
- ^ "So long, Microsoft! UK government abandons Office, embraces free-to-use software". Expert Reviews. 23 July 2014. Retrieved 2023-08-22.
- ^ "Open Document Format in government: an update - Technology in government". technology.blog.gov.uk. 2018-04-27. Retrieved 2023-08-22.
- ^ "1242315 - chromium - An open-source project to help move the web forward. - Monorail". bugs.chromium.org. Retrieved 2023-08-21.
- ^ "Google Bug Hunters Hall of Fame". Retrieved 2023-08-08.
- ^ "Stable Channel Update for Desktop". Chrome Releases. Retrieved 2023-08-22.
- ^ "New Samsung flaw allows 'total bypass' of Android lock screen". ZDNET. Retrieved 2023-08-21.
- ^ Baig, Ahmed Fraz; Eskeland, Sigurd (2021-09-06). "Security, Privacy, and Usability in Continuous Authentication: A Survey". Sensors. 21 (17): 5967. Bibcode:2021Senso..21.5967B. doi:10.3390/s21175967. ISSN 1424-8220. PMC 8434648. PMID 34502865.
- ^ "Samsung Lockscreen Hacked in Under Three Minutes, Fast Fingers Required". PCMAG. Retrieved 2023-08-21.
- ^ Simon, Laurent (2017). Exploring new attack vectors for the exploitation of smartphones (Report). University of Cambridge, Computer Laboratory.
- ^ "Twitter Fixes Bugs That Expose Data". threatpost.com. 2018-12-17. Retrieved 2023-08-21.
- ^ "HackerOne profile - edent". HackerOne. Retrieved 2023-08-21.
- ^ "Security Researcher edent | Open Bug Bounty". www.openbugbounty.org. Retrieved 2023-08-21.
- ^ Simon, Nitin T; Elias, Susan (2017-08-01). "Detection of fake followers using feature ratio in self-organizing maps". 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE. pp. 1–5. doi:10.1109/UIC-ATC.2017.8397471. ISBN 978-1-5386-0435-9. S2CID 49535690.
- ^ Fathi, Ramian; Brixy, Anne-Marie; Fiedrich, Frank (2019), Lange, Hans-Jürgen; Wendekamm, Michaela (eds.), "Desinformationen und Fake-News in der Lage: Virtual Operations Support Team (VOST) und Digital Volunteers im Einsatz: Chancen und Risiken für den Bevölkerungsschutz", Postfaktische Sicherheitspolitik (in German), Wiesbaden: Springer Fachmedien Wiesbaden, pp. 211–235, doi:10.1007/978-3-658-27281-4_11, ISBN 978-3-658-27280-7, S2CID 211399412, retrieved 2023-08-21
- ^ Biagioli, Mario; Lippman, Alexandra, eds. (2020). Gaming the metrics: misconduct and manipulation in academic research. Infrastructures series. Cambridge, Massachusetts: The MIT Press. ISBN 978-0-262-53793-3.
- ^ Elmaghraby, Adel S.; Losavio, Michael M. (2014-07-01). "Cyber security challenges in Smart Cities: Safety, security and privacy". Journal of Advanced Research. 5 (4): 491–497. doi:10.1016/j.jare.2014.02.006. PMC 4294750. PMID 25685517.
- ^ Losavio, Michael M.; Chow, K. P.; Koltay, Andras; James, Joshua (2018-05-01). "The Internet of Things and the Smart City: Legal challenges with digital forensics, privacy, and security". Security and Privacy. 1 (3): e23. doi:10.1002/spy2.23. S2CID 169930929.
- ^ Bouzeraib, Wayoud; Ghenai, Afifa; Zeghib, Nadia (2020-12-01). "A Multi-Objective Genetic GAN Oversampling: Application to Intelligent Transport Anomaly Detection\". 2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE. pp. 1142–1149. doi:10.1109/HPCC-SmartCity-DSS50907.2020.00148. ISBN 978-1-7281-7649-9. S2CID 233435654.
- ^ Yoon, Soojin; Jung, Jonghun; Kim, HwanKuk (2015-03-01). "Study on Attack Scenarios with HTML5" (PDF). International Journal of Multimedia and Image Processing. 5 (1/2): 266–273. doi:10.20533/ijmip.2042.4647.2015.0033.
- ^ Stellios, Ioannis; Kotzanikolaou, Panayiotis; Psarakis, Mihalis; Alcaraz, Cristina; Lopez, Javier (2018). "A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services". IEEE Communications Surveys & Tutorials. 20 (4): 3453–3495. doi:10.1109/COMST.2018.2855563. ISSN 1553-877X. S2CID 53746146.
- ^ Cho, Kyong-Tak; Shin, Kang; Kim, Yu Seung; Cha, Byung-Ho (2020-06-01). "Off is Not off: On the Security of Parked Vehicles". 2020 IEEE Conference on Communications and Network Security (CNS). IEEE. pp. 1–9. doi:10.1109/CNS48642.2020.9162167. ISBN 978-1-7281-4760-4. S2CID 220422639.
- ^ "Revealed: key UK websites vulnerable to hackers". www.telegraph.co.uk. 3 March 2014. Retrieved 2023-08-21.
- ^ Hayward, Stephen (2015-06-23). "Criminals are selling Viagra and diet pills from hacked NHS websites". mirror. Retrieved 2023-08-21.
- ^ "Spoof Michael Gove article on 'hacked' Government website". The Independent. 2014-03-07. Retrieved 2023-08-21.
- ^ "Revealed: key UK websites vulnerable to hackers". www.telegraph.co.uk. 3 March 2014. Retrieved 2023-08-21.
- ^ Hayward, Stephen (2015-06-23). "Criminals are selling Viagra and diet pills from hacked NHS websites". mirror. Retrieved 2023-08-21.
- ^ "Spoof Michael Gove article on 'hacked' Government website". The Independent. 2014-03-07. Retrieved 2023-08-21.
- ^ Dodds, Io (2021-03-15). "The crypto-art market is being infiltrated by fakes, thieves and scammers". The Telegraph. ISSN 0307-1235. Retrieved 2023-08-21.
- ^ Whitaker, Amy (2019-10-18). "Art and Blockchain: A Primer, History, and Taxonomy of Blockchain Use Cases in the Arts". Artivate: A Journal of Entrepreneurship in the Arts. 8 (2). doi:10.34053/artivate.8.2.2. ISSN 2164-7747. S2CID 214014729.
- ^ European Commission. Directorate General for Education, Youth, Sport and Culture.; Trafficking Culture.; ECORYS. (2019). Illicit trade in cultural goods in Europe: characteristics, criminal justice responses and an analysis of the applicability of technologies in the combat against the trade : final report. LU: Publications Office. doi:10.2766/183649. ISBN 9789279993596.
{{cite book}}
: CS1 maint: multiple names: authors list (link) - ^ Ross, Dian; Cretu, Edmond; Lemieux, Victoria (2021-12-15). "NFTS: Tulip Mania or Digital Renaissance?". 2021 IEEE International Conference on Big Data (Big Data). IEEE. pp. 2262–2272. doi:10.1109/BigData52589.2021.9671707. ISBN 978-1-6654-3902-2. S2CID 245956102.
- ^ Pu, Shuyi; Lam, Jasmine Siu Lee (2023-02-01). "The benefits of blockchain for digital certificates: A multiple case study analysis". Technology in Society. 72: 102176. doi:10.1016/j.techsoc.2022.102176. S2CID 253793907.
- ^ Mendis, Dinusha (2021-11-24). "Copyright and NFTs: new wine in old bottles?". World Intellectual Property Review (24 November 2021).
- ^ "Derby's Silk Mill gets visit from Wikipedia volunteers". BBC News. 2011-04-11. Retrieved 2023-08-22.
- ^ Youngs, Gillian, ed. (2013-06-26). Digital World (0 ed.). Routledge. doi:10.4324/9780203767061. ISBN 978-1-135-02199-3.
- ^ "Mobile World Congress: The UK firms hitting Barcelona". BBC News. 2012-02-23. Retrieved 2023-08-24.
- ^ Boyette, Chris. "Error 451: A proposed Internet status code for censorship". CNNMoney. Retrieved 2023-08-21.
- ^ Harcourt, Alison; Christou, George; Simpson, Seamus (2020-01-31). Global Standard Setting in Internet Governance. Oxford University Press. ISBN 978-0-19-257859-4.
- ^ a b "Proposal to Include IEC Power Symbols" (PDF). Unicode Consortium. 2014.
{{cite journal}}
: Cite journal requires|journal=
(help) - ^ Thomas, Bronwen (2016-10-01). "Tales from the Timeline: Experiments with Narrative on Twitter". Comparative Critical Studies. 13 (3): 353–369. doi:10.3366/ccs.2016.0210. ISSN 1744-1854.
- ^ "Will you run or hide? Choose your own adventure story on Twitter". www.telegraph.co.uk. 13 January 2015. Retrieved 2023-08-21.
- ^ "Play A Creepy Choose Your Own Adventure Game On Twitter And Enjoy Dying". Gizmodo. 2015-01-13. Retrieved 2023-08-21.
- ^ Hern, Alex (2015-01-14). "'Choose your own adventure' Twitter game - review". The Guardian. ISSN 0261-3077. Retrieved 2023-08-21.
- ^ "HTML 5.3". www.w3.org. Retrieved 2023-08-21.
- ^ Jun, Byungjin; Bustamante, Fabián E.; Whang, Sung Yoon; Bischof, Zachary S. (2019-08-05). "AMP up your Mobile Web Experience: Characterizing the Impact of Google's Accelerated Mobile Project". The 25th Annual International Conference on Mobile Computing and Networking. ACM. pp. 1–14. doi:10.1145/3300061.3300137. ISBN 978-1-4503-6169-9. S2CID 199448356.
- ^ amphtml (2018-11-30). "AMP Project's new governance model now in effect". Accelerated Mobile Pages Project. Retrieved 2023-08-21.
- ^ "AMP Advisory Committee 2020 election results". The AMP Blog. 2020-12-14. Retrieved 2023-08-21.
- ^ Claburn, Thomas. "Google AMP gets a shock to its system as advisor quits, lawsuit claims foul play". www.theregister.com. Retrieved 2023-08-21.
- ^ Sonar Co-Locate for Android, ukhsa-collaboration, 2023-07-31, retrieved 2023-08-22
- ^ Bray, Tim (2016-02-01). An HTTP Status Code to Report Legal Obstacles (Report). Internet Engineering Task Force.
- ^ "HTML 5.3". www.w3.org. Retrieved 2023-08-21.
- ^ Eden, Terence (2023). "Exploring the visualisation of hierarchical cybersecurity data within the Metaverse". arXiv:2304.10542 [cs.HC].
- ^ "Open source is good for AI but, is AI good for open source? | BCS". www.bcs.org. Retrieved 2023-08-21.
- ^ "OpenUK Board". OpenUK. Retrieved 2023-08-22.
- ^ Worthington, Simon (2022-11-23). "New OSSG committee". Open Source Specialist Group. Retrieved 2023-08-21.
- ^ Mask, Deirdre (2020-04-02). The Address Book: What Street Addresses Reveal about Identity, Race, Wealth and Power. Profile. ISBN 978-1-78283-378-9.
- ^ Arthur, Rudy (2023). "A Critical Analysis of the What3Words Geocoding Algorithm". PLOS ONE. 18 (10): e0292491. arXiv:2308.16025. Bibcode:2023PLoSO..1892491A. doi:10.1371/journal.pone.0292491. PMC 10599581. PMID 37878572.