
Pierre Nora, 93, Who Probed Role of Memory in Writing of History, Dies
Pierre Nora, a French scholar whose ideas about the role of memory and identity in the writing of history gained prominence both in France and abroad, and who became a kingpin in his country's intellectual community through his great influence over publishing, died on Monday in Paris. He was 93.
His death, in a hospital, was confirmed by his son, Elphège Nora, who said the cause was multiple organ failures.
Mr. Nora's major contribution to historiography was the concept of 'lieux de mémoire' ('sites of memory'), a term he coined to describe elements of the past that a community chooses to remember and which become symbolic of a shared identity. Examples would be Joan of Arc, the national anthem 'La Marseillaise' and the rooster — 'le coq gaulois' — as an unofficial icon of France.
This concept has been highly influential in the field of memory studies, shaping discussions elsewhere in Europe, the United States and Asia about how memory functions in societies, particularly in how nations remember and forget.
Mr. Nora wrote during a period when French scholars were increasingly interested in the roles of language, symbols and discourse in forging social realities. His approach to history seemed to complement then-current theories like Claude Lévi-Strauss's structuralism and Jacques Derrida's deconstructionism.
Mr. Nora's approach also sparked debate and criticism, particularly regarding the potential for 'sites of memory' to oversimplify or sanitize history, obscuring more complex or contentious aspects of the past.
Want all of The Times? Subscribe.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Bloomberg
22 minutes ago
- Bloomberg
ECB Cuts Cycle Coming to an End: Evening Briefing Europe
The European Central Bank cut rates by a quarter-point to 2% today – the eighth cut in a year – in line with forecasts from analysts surveyed by Bloomberg. On announcing the cut, ECB President Christine Lagarde said that the bank is coming to the end of its reductions cycle, with inflation currently below its 2% target for the first time in eight months and only the second since 2021. 'We are getting to the end of a monetary-policy cycle that was responding to compounded shocks — including Covid, the illegitimate war in Ukraine and the energy crisis,' Lagarde told reporters in Frankfurt. One unknown remains: US President Donald Trump's trade policy going forward, which still risks inflation shocks. Talks between the US and the European Union over tariffs are due to finish next week.


Bloomberg
27 minutes ago
- Bloomberg
Trump Seeks to Boost Energy Exports in Talks With Merz on Trade
US President Donald Trump said he would discuss a potential trade deal with the European Union with visiting German Chancellor Friedrich Merz, adding that he hoped to use an agreement to boost US energy exports. 'We'll have a good trade deal. I mean, I guess that will be mostly determined by the European Union, but you're a very big part of that,' Trump said as he welcomed the leader of Europe's largest economy to the White House on Thursday.


Forbes
33 minutes ago
- Forbes
American iPhones Maybe Targeted In Spyware Attacks
Were iPhones really attacked? A new report from the team at iVerify warns that a 'previously unknown' vulnerability in iOS maybe enabled a highly targeted attack on iPhones in the U.S. as well as Europe. This flaw was not in the core messaging architecture itself, but in its nickname feature. 'Any increase in the size of a codebase is going to introduce attack opportunities,' iVerify told me. And that's the case here. When a user updates their profile, 'nickname, photo, or wallpaper,' this triggers "a 'Nickname Update' on a recipient's device." Trivial though it might seem, that nickname update process is a data transmission from one device to another, it's implicitly trusted data and it's within the secure enclave. 'This vulnerability was present in iOS versions up to 18.1.1 and fixed in iOS 18.3.1.' While there's no doubting the flaw and the fix, there is no concrete proof it was exploited in the wild. 'We analyzed crash data from nearly 50,000 devices," iVerify says, "and found that the imagent crashes related to Nickname Updates are exceedingly rare, comprising less than 0.001% of all crash logs collected.' But those rare instances appeared only on 'devices belonging to individuals likely to be targeted by sophisticated threat actors.' Sometimes, Occam's Razor really does apply. Those high-risk individuals were affiliated with 'political campaigns, media organizations, tech companies, and governments in the EU and U.S.' Delete All Texts On Your Phone That Look Like This These are exactly the type of individuals Apple says should use its Lockdown Mode, which restricts a raft of iPhone features and is intended to shutdown attacks that might otherwise get through. It's unclear whether that would have mitigated this risk — and irrelevant now as it's patched. But it certainly makes an iPhone more secure. 'iOS remains a robust and secure operating system,' iVerify told me. 'iMessage is likely targeted not because it's insecure but instead because it's popular." That said, it's toeing a tricky line between feature-rich messenger and secure comms tool. Signal is better, iVerify says, if you want to really secure your comms with a COTS platform. That said, as we've seen before, iMessage is on all iPhones and is almost never disabled, and so if there is a working zero-click attack, it will likely get through. On that note, 'Signal is open source,' iVerify says, "which does have security advantages in the sense that it's transparent and therefore easier for researchers to examine. And it's a simple code base, which does reduce the potential attack surface.' Google Confirms Most Gmail Users Must Upgrade Accounts iVerify reports that forensic examination of one affected device "provided evidence suggesting exploitation: several directories related to SMS attachments and message metadata were modified and then emptied just 20 seconds after the imagent crash occurred. This pattern of deleting potential evidence mirrors techniques observed in confirmed spyware attacks where attackers 'clean up' after themselves." But again, this is speculation ands there's no confirmation or attribution, as Apple will be keen to emphasize. While there's 'no smoking gun,' iVerify says, 'definitively proving exploitation exists, when taken together, this body of evidence gives us moderate confidence these crashes indicate targeted exploitation attempts.' I have reached out to Apple for any comments on this report. iMessage has been exploited before and whether or not that's what has happened here, it will remain a target — as will WhatsApp and all other apps and platforms that run on most devices. Exploiting such a vulnerability is the easiest way to compromise an endpoint, as is especially relevant at the moment when it comes to encrypted data. For most users though, your biggest iMessage risks remains texts with malicious lures and crafty links that trick you into clicking. These highly targeted attacks — real or not — should not be a concern. Unpaid tolls and undelivered packages, though…