Author: Sten Sjöberg (page 1 of 3)

An Ode to Crisis

It’s great when you don’t even have to try to create a nice narrative for a blog post. For example, this time around, life has offered me a great circular composition for this very post. You see, I came up with this post when I was sitting in my quad last week. No special event at all, but it was completely empty for the first time in months (aside from my packed suitcase on the bed opposite mine). Specifically, last time the quad looked like that was eight months ago, when I spent my first night on campus. I had just arrived in the US and I was sitting in the exact same way but with a feeling of skräckblandad förtjusning, best translated into English as equal parts fright and delight. It was a crisis; it was a beautiful crisis.

When I graduated High School a few months before that, I had a feeling of crisis too and now that I get to celebrate a bunch of my friends’ graduations this year (both here in Sweden and in New Jersey), I feel it might be timely to write about how I try to deal with it, and taking leaps in life that really matter. While I don’t pretend to know all the answers, I think I’ve created a little theory that at least fits “well-enough” to be useful for me and perhaps others as well. So, allow me to present the Sten Sjöberg Certified Four-Step Leap-Taking Process™ (if nothing else, I think the fourth step is actually worth reading): Continue reading

Staying Safe Online: The Bare Minimum

You probably spend around the same amount of time on the internet as you do outside, if not more. Outside, you of course know what you are doing. For one, you know to be afraid of moving cars, not to walk on thin ice and maybe even what neighborhoods are safe and which are not. These things hopefully seem dreadfully obvious, but the digital analogs of these habits are anything but common which is why more than half of the US’ population was exploited last year and why the average cost of said hacks was $142 and a big headache. In this post I will outline the bare minimum you can do to protect yourself online and avoid becoming one of these victims.

Being safe on the internet is not as simple as installing a handful of programs and then going about your business. That said, if you are really here for the very bare minimum, these following programs make for a good start. As your browser will almost definitely be the mediator through which you access the internet the most, it is important that it is as safe as possible. To this end I will first recommend a browser and then two extensions. Secondly, I will outline proper account and password management, perhaps even more vital.

Continue reading

Internet hubris among Millennials proves costly

You will probably recognize Symantec as the company behind the rather awful anti-virus program Norton. Nevertheless, each year the company published a very interesting report detailing the cost of digital exploitation on consumers. This year’s compilation reported a total cost of 5 billion US dollars greater than the GDP of Iraq. I will admit that is rather an arbitrary comparison, but a colorful one. A more tangible number is instead the average cost of a single hack: $142 and nearly three full work days of ‘clean-up’ work for the victim. That might not seem all that bad but with more than half of the United States’ population affected, the numbers add up.

To me though, the demographics is the most interesting part of Symantec’s report and it is these numbers that this post concerns. Before reading the report, I assumed that my sweet great aunt to be at a substantially higher risk of being exploited on the internet than one of my Millennial (technically Generation Z) peers. However, according to Symantec’s report, it is entirely the opposite. 60% of Millennials experienced cyber crime last year while baby boomers and seniors were in fact the safest age groups.

Continue reading

You can now trust me (or at least my website)

This post was originally written for my Freshman Seminar ‘Big Brother is Watching: Internet Security and Privacy’ with Prof. Brian Kernighan. It’s written to be very accessible, but still caters to a somewhat technical audience. I recommend you check it out – you might just learn something!

This page that you are currently viewing was supplied to you by one of the most commonly used protocols on the Internet: HTTP. More specifically, HTTPS which is the real topic of this post, but more on this later. The HyperText Transfer Protocol is indeed rather amazing, facilitating nearly all information as viewed by visitors of my website and most other websites like it. However, HTTP is far from perfect and I will argue that it has become completely obsolete due to security risks. Anyone intercepting the information sent back and forth to my server hosted in Sweden can not only read it but also change it without the server nor the user knowing; let me explain.

HTTP was first developed at CERN in 1989 and since the standard has been altered and upgraded several times. The protocol is based on requests and responses between clients and servers; in this case that would be your browser and the software hosting my website on a computer somewhere in Sweden, respectively. The protocol facilitates the sending of a request by the browser asking for some information from the server. The server would then return a response consisting of general information and whatever was requested. Of course, all of this information is sent in clear text, meaning it is legible by any one of the possibly dozens of computers facilitating the transfer of the information between the server and the client. Furthermore, as these computers are relaying the information they can also alter it. This is generally referred to as a man-in-the-middle (MitM) attack.

Say for example that I wanted to start a fund-raising campaign by encouraging people to send Bitcoins to the Tor Project. Perhaps then I would post their Wallet Address on this website, to which you could then send your Bitcoin donations.


Until very recently, before I updated to HTTPS on this site, you should not have sent money to the address above, not because The Tor Project is not in need of support but because the wallet address above was supplied to you by way of HTTP – meaning it is subject to a MitM attack. If someone on your network decided they could make better use of your kind donation they could just intercept the page and replace the address with theirs, and you would have no way of knowing, nor would I.

This is where HTTPS (notice the S for Secure) comes in as an excellent solution. HTTPS uses either TLS or SSL for encrypting the data traveling between the server and the client – hindering any reading or altering of the information by any man, as it were, in the middle. The encryption works through the surprisingly straight-forward idea of a handshake. In turn, a handshake builds of the concept of asymmetrical cryptography. In its simplest form, it consists of a pair of keys, one private and one public. The public key belongs to the server and is shared with the client who uses it to encrypt data to be sent to the server. This data can then only be decrypted through the use of the private key in the safe hands of the server and the server only. After some technical negotiation between the server and the client, the latter sends a pre-cursor to a so called shared secret, encrypted with the server’s public key. The shared secret, in contrast to the private/public key pair can be used to both encrypt and decrypt information. As such a secure connection is established: the client generated the pre-cursor and sent it in encrypted form to the server, making them the only two entities who can calculate the shared secret. This key can now be used for however long they want to securely transmit information back and forth.

Of course, there is one last issue: how do you, the client, know that the public key that you received from the server was not compromised and replaced with someone else’s key? This would mean the secret you sent was received by someone else entirely, and that you were never communicating with the intended server at all. This is where certificates come into play. Instead of using any old public key, the server buys an authenticated certificate from a so-called Certificate Authority, clients can then consult the trusted authority on whether or not the server they are attempting to connect to are what they make themselves out to be.

Until recently, these certificates were rather costly as they were targeted toward large corporations. Furthermore, they required extensive legal work to supply authentication, again due to the fact that the services were targeted toward corporations with the required resources. Nowadays however, most anyone can find a cheap yet secure service, which in extension means there is no excuse for me, nor for anyone else, not to use HTTPS. Still I (until recently), and 38 of the top 100 websites on the Internet, do not use HTTPS – at least not correctly. Why is this?

Looks like it was worth it.

Looks like it was worth it. (s:

I will not pretend to be able to answer this question conclusively but I believe it comes down to two issues: lack of education and good old laziness. Before taking a Freshman Seminar on the subject of Internet Security and Privacy I simply did not realize the risks of not using HTTPS. I thought that since I did not have any login service there was no reason for me to worry about secure communications. Of course, there is more to be protected than just login credentials. The Bitcoin wallet example above is certainly a scary one. Another thing worth mentioning is the fact that HTTPS limits meta-data as well. No one would be able to see exactly what post you are viewing right now, only that you are on my website, had I been using HTTPS. This is useful for big sites like Wikipedia, a tracked user could read most anything on there, and someone monitoring the connection would not know, because the only unencrypted information would be ‘’.

I just got HTTPS up and running last week. It was ridiculously easy now that my host implemented a quick way to migrate. It was literally as simple as the click of a button.

Shabbat, the Bible and amazing people at Princeton

America, I was told, is very different from Sweden. “How?” I would ask and as a response I would usually get “I don’t know exactly, but it is.” Back then, several months before I made the move to the United States, I found that terribly annoying. If it is different, obviously there are specific things that are different… right? Well, as I have now lived on the Princeton campus for three months, I very much understand the struggle that is explaining the US. When I am there, I communicate differently, meet strange customs and experience things I never would have in Europe. That is all well, but now that I actually sit down to write what exactly is different, how exactly I behave differently and what these strange customs are – I find it terribly hard. Of course, I will still give it an earnest attempt. That is why I will be writing a few posts this semester about the culture here at Princeton, but also America in a broader sense; this first post will be about one of the most specific things I can think of: namely, religion.

Continue reading

I am a feminist

I know what you are thinking. Yet another white guy hoping aboard the feminism train to look good. Well, be that as it may, I take a firm stance as a feminist and in this post, I will detail the story of how I came to consider myself a feminist. Most of it concerns my great friend Erik and how he convinced me in a conversation we had just shy of a year ago.

Growing up in Sweden I have always had very liberal opinions, especially when it comes to all types of social issues. Naturally, I have always held equality as a core value in all of its shapes and sizes. To me, it is preposterous to think that people should be treated differently because of their stature, gender, beliefs or ethnicity. Although I have always thought of myself as an egalitarian, for the longest time I failed to identify as a feminist because of semantics, fear and non-understanding.

This all changed as a result of a single, somewhat heated, argument with my friend Erik, and two other friends of mine, in last year’s spring. As we tackled a different problem entirely, we made the age-old mistake of shifting focus in the middle of an argument to something only tangentially related. Generally, I try not to do this since I believe it facilitates the transfer of animosity from one issue to another; instead I find it better to solve one conflict first before going on to discuss the next. That tangent aside though, I am eternally grateful that we did go into the issue of feminism that afternoon, Erik, a feminist, and I, everything but just that.

Continue reading

Voltaire, Gardens and Making Ripples

“Cela est bien, repondit Candide, mais il faut cultiver notre jardin”
– Monsieur de Voltaire

Above is the final line of Voltaire’s Candide, a book I read just before coming to Princeton at the start of this academic year. Responding to the book’s optimistic philosopher Pangloss as he raves about how “this world is indeed the best of all possible worlds,” Candide responds that “this is well put, but we must cultivate our garden.” Although its meaning may well be nothing more than its literal meaning per se, I believe that by the end of the book Candide comes to the insight that the world does not progress just the way it is meant, nor that it is the best of all possible worlds. In this realization I believe that Candide refers to the garden as an analogue for his own life and destiny, meaning we are the harbingers of our own destiny. We must tend to ourselves and our life in order to flourish like a well kept garden.

Continue reading

Get my new game Boller!

Note: if you lose instantly when you start playing it’s because you aren’t holding the phone perfectly straight. When you tilt the phone it pushes your ball to the direction in which you’re tilting.

What is Boller?

Boller is a simple game where you tilt your phone to steer a ball to keep it from hitting the borders of the screen by jumping on scrolling platforms. Although I have hopes to add more diverse gameplay in the future I can assure you that the game is already intriguingly frustrating, rewarding and addictive.

Get the app here!

Continue reading

#7 – Semi-semesterly evaluation

“A goal without a plan is just a wish.” – Antoine de Saint-Exupéry

Below are the five goals I set up for myself seven days before coming to the US for the first time. However, as Antoine de Saint-Exupéry there is no point in goals lest there is a plan to go along with them. As such, I have instated a plan. I will be doing semi-semesterly evaluations to see how well I am doing. These will be based around each of the goals by themselves and hopefully I will find ways to improve every time.

Continue reading

#6: The Fall Break Challenge

Right at this moment I should not be writing this post but instead the 800-word essay I need to hand in tonight for my freshmen seminar. Professor Kernighan, if you’re reading this; I am sorry. On a gladder note however the aforementioned essay (which I, by the way, am having a lot of fun writing) concludes my mid-term week. Considering it is my first time writing tests in English at Princeton I feel quite alright about my results, although I definitely aim to improve. I realize it is important for me to quickly get used to the tests here, as they are completely incomparable with the tests I have done so far in my academic career.

That is something I will consider more after one of the most important weeks of the year: the well-deserved much-needed post-midterm fall break. Most people waste no time, leaving campus to go home as soon as they can, and as a result of this there is a very high risk of my being supremely bored during this week. Of course, that is something I simply cannot have that and as such I have conceived The Sten Sjöberg Fall Break Challenge to keep me occupied.

The Challenge consists of five different sub-challenges based primarily in physical and mental health. Indeed, the reason I write that the fall break is one of the most important weeks of the year is not only to be funny (although let’s be honest I totally am) but also because it is an opportunity for us students to slow down and let the soul catch up. Here are the five sub-challenges:

Continue reading

Older posts

© 2018 Sten Sjöberg

Theme by Anders NorenUp ↑