information-security
The threat of complete data destruction prompts urgent measures to preserve critical information, emphasizing the fragility of digital records.
2 chapters across 2 books
Speaker for the Dead (1986)Orson Scott Card
In this chapter, Mayor Bosquinha reveals to the religious and political leaders of Lusitania Colony that their data files are under systematic and destructive surveillance and copying by Starways Congress, threatening the colony's autonomy and security. She has developed a program to monitor these intrusions and discovered that only the Speaker for the Dead's files remain untouched because they are stored offworld, leading to a controversial proposal to transfer the colony's most vital files to the Speaker for safekeeping. The chapter explores the tension between colonial governance, surveillance, trust, and the precariousness of information security in an authoritarian context.
Cyteen (1988)C.J. Cherryh
In this chapter, Ari faces a hostile press conference where she is questioned about her legitimacy and the legal and ethical implications of her majority status. She skillfully navigates accusations that she was artificially created and primed to serve her relatives' interests, asserting her independence and control over sensitive information related to Gehenna. Despite intense scrutiny and skepticism, Ari maintains composure and strategically withholds certain details until she can testify under oath, emphasizing the importance of legal and procedural integrity.