Marc Wilson posted this to the Lois McMaster Bujold mailing list (off-topic, obviously):
Apparently the inventor of predictive text has died.
His funfair will be on Sundial.
Marc Wilson posted this to the Lois McMaster Bujold mailing list (off-topic, obviously):
Apparently the inventor of predictive text has died.
His funfair will be on Sundial.
Scott Adams relates his quasi-religious experience with the latest iPhone:
The experience of getting the iPhone 6 Plus was like getting a puppy. From my first touch of the sleek, sexy miracle of technology I was hooked. I loved it before I even charged it up.
It was large in my hand, and slippery to hold, but I didn’t mind. That would be like complaining that my newborn baby was too heavy. This phone is pure art and emotion frozen in a design genius so subtle that competitors probably can’t even duplicate it. It was pure beauty. Sometimes I found myself just staring at it on the desk because I loved it so. Oh, and it works well too.
But I needed a case. I tried to imagine my anguish if I accidentally dropped this new member of my family and cracked it. I needed protection.
So I went to the Verizon store and bought the only cover they had left that doesn’t look like a six-year old girl’s bedroom wall. The color of my new case could best be described as Colonoscopy Brown. It is deeply disturbing. But because I love my iPhone 6 Plus, and want to keep it safe, I put it on.
Now my phone is not so much a marvel of modern design. Nor would I say it is nourishing my soul with beauty and truth the way it did when naked.
Now it just looks like a Picasso that three hundred homeless people pooped on. You know there’s something good under there but it is hard to care. Now when I see my hideous phone on my desk I sometimes think I can hear Siri beg me “Look away! Look away!”
Beauty needs to be temporary to be appreciated. I think those magnificent bastards at Apple know that. I think they made the case slippery by design. They want you to know that if you keep your phone selfishly naked, and try to hoard the beauty that is designed to be temporary, that phone will respond by slipping out of your hand and flying to its crackly death on a sidewalk.
… but not necessarily in a good way:
Here is what they never tell you — Apple has devised a very clever way to make leaving the iOS world really, really painful. Specifically, when you send a text message on an iPhone, unless you fiddled with the default settings, it gets sent through iMessage and the Apple servers. If it is going to another iPhone, it can actually bypass the carrier text messaging system altogether, a nice perk back when texts were not unlimited but useful today mainly for international travel.
But here is the rub — when you switch you phone line away from an iPhone to an Android device, the Apple servers refuse to recognize this. They will think you still have an iPhone and will still try to send you messages via the iMessage servers. What this means in practice is that you can send messages from the new phone to other iPhones, but their texts back to you will not reach you. They just sort of disappear into the ether, and will try forever to be delivered to your now non-existent iPhone.
What is it, in terms of physical goods and services, that we wish to provide for the poor that they do not already have? Their lives often may not be very happy or stable, but the poor do have a great deal of stuff. Conservatives can be a little yahoo-ish on the subject, but do consider for a moment the inventory of the typical poor household in the United States: at least one car, often two or more, air conditioning, a couple of televisions with cable, DVD player, clothes washer and dryer, cellphones, etc. As Robert Rector and Rachel Sheffield report: “The home of the typical poor family was not overcrowded and was in good repair. In fact, the typical poor American had more living space than the average European. The typical poor American family was also able to obtain medical care when needed. By its own report, the typical family was not hungry and had sufficient funds during the past year to meet all essential needs. Poor families certainly struggle to make ends meet, but in most cases, they are struggling to pay for air conditioning and the cable-TV bill as well as to put food on the table.” They also point out that there’s a strong correlation between having boys in the home and having an Xbox or another gaming system.
In terms of physical goods, what is it that we want the poor to have that they do not? A third or fourth television?
Partly, what elites want is for the poor to have lives and manners more like their own: less Seven-Layer Burrito, more Whole Foods; less screaming at their kids in the Walmart parking lot and more giving them hideous and crippling fits of anxiety about getting into the right pre-kindergarten. Elites want for the poor to behave themselves, to stop being unruly and bumptious, to get over their distasteful enthusiasms, their bitter clinging to God and guns. Progressive elites in particular live in horror of the fact that poor people tend to suffer disproportionately from such health problems as obesity and diabetes, and that they do not take their social views from Chris Hayes — and these two phenomena are essentially the same thing in their minds. Consider how much commentary from the Left about the Tea Party has consisted of variations on: “Poor people are gross.”
A second Xbox is not going to change that very much.
Kevin D. Williamson, “Welcome to the Paradise of the Real: How to refute progressive fantasies — or, a red-pill economics”, National Review, 2014-04-24
Philip N. Cohen casts a skeptical eye at the frequently cited statistic on the dangers of texting, especially to teenage drivers. It’s another “epidemic” of bad statistics and panic-mongering headlines:
Recently, [author and journalist Matt] Richtel tweeted a link to this old news article that claims texting causes more fatal accidents for teenagers than alcohol. The article says some researcher estimates “more than 3,000 annual teen deaths from texting,” but there is no reference to a study or any source for the data used to make the estimate. As I previously noted, that’s not plausible.
In fact, 2,823 teens teens died in motor vehicle accidents in 2012 (only 2,228 of whom were vehicle occupants). So, my math gets me 7.7 teens per day dying in motor vehicle accidents, regardless of the cause. I’m no Pulitzer Prize-winning New York Times journalist, but I reckon that makes this giant factoid on Richtel’s website wrong, which doesn’t bode well for the book.
In fact, I suspect the 11-per-day meme comes from Mother Jones (or whoever someone there got it from) doing the math wrong on that Newsday number of 3,000 per year and calling it “nearly a dozen” (3,000 is 8.2 per day). And if you Google around looking for this 11-per-day statistic, you find sites like textinganddrivingsafety.com, which, like Richtel does in his website video, attributes the statistic to the “Institute for Highway Safety.” I think they mean the Insurance Institute for Highway Safety, which is the source I used for the 2,823 number above. (The fact that he gets the name wrong suggests he got the statistic second-hand.) IIHS has an extensive page of facts on distracted driving, which doesn’t have any fact like this (they actually express skepticism about inflated claims of cell phone effects).
I generally oppose scare-mongering manipulations of data that take advantage of common ignorance. The people selling mobile-phone panic don’t dwell on the fact that the roads are getting safer and safer, and just let you go on assuming they’re getting more and more dangerous. I reviewed all that here, showing the increase in mobile phone subscriptions relative to the decline in traffic accidents, injuries, and deaths.
That doesn’t mean texting and driving isn’t dangerous. I’m sure it is. Cell phone bans may be a good idea, although the evidence that they save lives is mixed. But the overall situation is surely more complicated than the TEXTING-WHILE-DRIVING EPIDEMIC suggests. The whole story doesn’t seem right — how can phones be so dangerous, and growing more and more pervasive, while accidents and injuries fall? At the very least, a powerful part of the explanation is being left out. (I wonder if phones displace other distractions, like eating and putting on make-up; or if some people drive more cautiously while they’re using their phones, to compensate for their distraction; or if distracted phone users were simply the worst drivers already.)
People who were charged with a crime in England used to be told by the police that they did not have to say anything, but that anything they did say might be taken down and used as evidence against them. I think we should all be given this warning whenever we use a mobile telephone.
Theodore Dalrymple, “Nowhere to Hide”, Taki’s Magazine, 2014-02-23
I recently cancelled a contract with a different provider after some gizmo broke. The company first told me the whole thing was my problem, then at the last moment offered me hundreds of pounds to stay. When your phone company starts using the playbook of an emotionally abusive spouse, this is not a market in good working order.
Tim Cushing wonders why we don’t seem to sympathize with the plight of poor, overworked law enforcement officials who find the crushing burden of getting a warrant for accessing your cell phone data to be too hard:
You’d think approved warrants must be like albino unicorns for all the arguing the government does to avoid having to run one by a judge. It continually acts as though there aren’t statistics out there that show obtaining a warrant is about as difficult as obeying the laws of thermodynamics. Wiretap warrants have been approved 99.969% of the time over the last decade. And that’s for something far more intrusive than cell site location data.
But still, the government continues to argue that location data, while possibly intrusive, is simply Just Another Business Record — records it is entitled to have thanks to the Third Party Doctrine. Any legal decision that suggests even the slightest expectation of privacy might have arisen over the past several years as the public’s relationship with cell phones has shifted from “luxury item/business tool” to “even grandma has a smartphone” is greeted with reams of paper from the government, all of it metaphorically pounding on the table and shouting “BUSINESS RECORDS!”
When that fails, it pushes for the lower bar of the Stored Communications Act [PDF] to be applied to its request, dropping it from “probable cause” to “specific and articulable facts.” The Stored Communications Act is the lowest bar, seeing as it allows government agencies and law enforcement to access electronic communications older than 180 days without a warrant. It’s interesting that the government would invoke this to defend the warrantless access to location metadata, seeing as the term “communications” is part of the law’s title. This would seem to imply what’s being sought is actual content — something that normally requires a higher bar to obtain.
Update: Ken White at Popehat says warrants are not particularly strong devices to protect your liberty and lists a few distressing cases where warrants have been issued recently.
We’re faced all the time with the ridiculous warrants judges will sign if they’re asked. Judges will sign a warrant to give a teenager an injection to induce an erection so that the police can photograph it to fight sexting. Judges will, based on flimsy evidence, sign a warrant allowing doctors to medicate and anally penetrate a man because he might have a small amount of drugs concealed in his rectum. Judges will sign a warrant to dig up a yard based on a tip from a psychic. Judges will kowtow to an oversensitive politician by signing a warrant to search the home of the author of a patently satirical Twitter account. Judges will give police a warrant to search your home based on a criminal libel statute if your satirical newspaper offended a delicate professor. And you’d better believe judges will oblige cops by giving them a search warrant when someone makes satirical cartoons about them.
I’m not saying that warrants are completely useless. Warrants create a written record of the government’s asserted basis for an action, limiting cops’ ability to make up post-hoc justifications. Occasionally some prosecutors turn down weak warrant applications. The mere process of seeking a warrant may regulate law enforcement behavior soomewhat.
Rather, I’m saying that requiring the government to get a warrant isn’t the victory you might hope. The numbers — and the experience of criminal justice practitioners — suggests that judges in the United States provide only marginal oversight over what is requested of them. Calling it a rubber stamp is unfair; sometimes actual rubber stamps run out of ink. The problem is deeper than court decisions that excuse the government from seeking warrants because of the War on Drugs or OMG 9/11 or the like. The problem is one of the culture of the criminal justice system and the judiciary, a culture steeped in the notion that “law and order” and “tough on crime” are principled legal positions rather than political ones. The problem is that even if we’d like to see the warrant requirement as interposing neutral judges between our rights and law enforcement, there’s no indication that the judges see it that way.
The “internet of things” is coming: more and more of your surroundings are going to be connected in a vastly expanded internet. A lot of attention needs to be paid to security in this new world, as Dan Goodin explains:
In the latest cautionary tale involving the so-called Internet of things, white-hat hackers have devised an attack against network-connected lightbulbs that exposes Wi-Fi passwords to anyone in proximity to one of the LED devices.
The attack works against LIFX smart lightbulbs, which can be turned on and off and adjusted using iOS- and Android-based devices. Ars Senior Reviews Editor Lee Hutchinson gave a good overview here of the Philips Hue lights, which are programmable, controllable LED-powered bulbs that compete with LIFX. The bulbs are part of a growing trend in which manufacturers add computing and networking capabilities to appliances so people can manipulate them remotely using smartphones, computers, and other network-connected devices. A 2012 Kickstarter campaign raised more than $1.3 million for LIFX, more than 13 times the original goal of $100,000.
According to a blog post published over the weekend, LIFX has updated the firmware used to control the bulbs after researchers discovered a weakness that allowed hackers within about 30 meters to obtain the passwords used to secure the connected Wi-Fi network. The credentials are passed from one networked bulb to another over a mesh network powered by 6LoWPAN, a wireless specification built on top of the IEEE 802.15.4 standard. While the bulbs used the Advanced Encryption Standard (AES) to encrypt the passwords, the underlying pre-shared key never changed, making it easy for the attacker to decipher the payload.
The University of Toronto’s Munk School of Global Affairs looks at how the Canadian security establishment operates:
The issue of lawful access has repeatedly arisen on the Canadian federal agenda. Every time that the legislation has been introduced Canadians have opposed the notion of authorities gaining warrantless access to subscriber data, to the point where the most recent version of the lawful access legislation dropped this provision. It would seem, however, that the real motivation for dropping the provision may follow from the facts on the ground: Canadian authorities already routinely and massively collect subscriber data without significant pushback by Canada’s service providers. And whereas the prior iteration of the lawful access legislation (i.e. C–30) would have required authorities to report on their access to this data the current iteration of the legislation (i.e. C–13) lacks this accountability safeguard.
In March 2014, MP Charmaine Borg received responses from federal agencies (.pdf) concerning the agencies’ requests for subscriber-related information from telecommunications service providers (TSPs). Those responses demonstrate extensive and unaccountable federal government surveillance of Canadians. I begin this post by discussing the political significance of MP Borg’s questions and then proceed to granularly identify major findings from the federal agencies’ respective responses. After providing these empirical details and discussing their significance, I conclude by arguing that the ‘subscriber information loophole’ urgently needs to be closed and that federal agencies must be made accountable to their masters, the Canadian public.
The government’s responses to MP Borg’s questions were returned on March 24, 2014. In what follows I identify the major findings from these responses. I first discuss the Communications Security Establishment Canada (CSEC), Canadian Security Intelligence Service (CSIS), Royal Canadian Mounted Police (RCMP), and Canadian Border Service Agency (CBSA). These agencies provided particularly valuable information in response to MP Borg’s questions. I then move to discuss some of the ‘minor findings’ related to the Canadian Revenue Agency (CRA), Competition Bureau, Statistics Canada, and the Transportation Safety Board (TSB).
Classic FM has a collection of 10 videos which use Bach’s music in varied ways, including this rather charming forest xylophone performance as an ad for a Japanese mobile phone:
Uploaded on 4 May 2011
Very nice music from a very long xylophone in the forest.
No CG or tape-cut. Four days spent.
This is for a newly launched cell phone of NTT Docomo, the largest mobile service provider in Japan. Shell of the new phone is wood and their idea is to use domestic woods that are produced after preservative maintenance of Japanese forest.
Music: “Jesu, Joy of Man’s Desiring”, by Bach
Cannes Lion Award Winner 2010
H/T to Samizdata for the link.
Nick Gillespie loves the Millennials. No, he really does:
That discomfort you’re sensing all around you? It’s the American Establishment loading its Depends diapers over the prospect of a younger generation that is turning its back on political parties and other zombified artifacts of our glorious past.
On the heels of the Pew Research report titled “Millennials in Adulthood,” two leading New York Times columnists have penned anxious articles sweating it out over the “The Self(ie) Generation” and “The Age of Individualism.”
“Millennials (defined by Pew as Americans ages 18 to 33) are drifting away from traditional institutions — political, religious and cultural,” muses Charles M. Blow, who sees a “a generation in which institutions are subordinate to the individual… This is not only the generation of the self; it’s the generation of the selfie.” Oh noes! And it’s only gonna get worse: “In the future,” worries Ross Douthat, “there will be only one ‘ism’ — Individualism — and its rule will never end. As for religion, it shall decline; as for marriage, it shall be postponed; as for ideologies, they shall be rejected; as for patriotism, it shall be abandoned; as for strangers, they shall be distrusted. Only pot, selfies and Facebook will abide.”
Does it strike anyone else as odd that selfies — clearly less the product of rising narcissism and more the product of the same awesome technology that empowers citizens to capture cops beating the shit of innocent people — have emerged as this year’s droopy pants, backwards baseball caps, or visible piercings, as a shorthand for all that is wrong with today’s youth? Getting bent out of shape over selfies may just be the ultimate #firstworldproblem.
Two Stanford grad students conducted a research project to find out what kind of actual data can be derived from mobile phone metadata:
Two Stanford computer science students were able to acquire detailed information about people’s lives just from telephone metadata — the phone number of the caller and recipient, the particular serial number of the phones involved, the time and duration of calls and possibly the location of each person when the call occurred.
The researchers did not do any illegal snooping — they worked with the phone records of 546 volunteers, matching phone numbers against the public Yelp and Google Places directories to see who was being called.
From the phone numbers, it was possible to determine that 57 percent of the volunteers made at least one medical call. Forty percent made a call related to financial services.
The volunteers called 33,688 unique numbers; 6,107 of those numbers, or 18 percent, were isolated to a particular identity.
They crowdsourced the data using an Android application and conducted an analysis of individual calls made by the volunteers to sensitive numbers, connecting the patterns of calls to emphasize the detail available in telephone metadata, Mayer said.
“A pattern of calls will, of course, reveal more than individual call records,” he said. “In our analysis, we identified a number of patterns that were highly indicative of sensitive activities or traits.”
For example, one participant called several local neurology groups, a specialty pharmacy, a rare-condition management service, and a pharmaceutical hotline used for multiple sclerosis.
Another contacted a home improvement store, locksmiths, a hydroponics dealer and a head shop.
The researchers initially shared the same hypothesis as their computer science colleagues, Mayer said. They did not anticipate finding much evidence one way or the other.
“We were wrong. Phone metadata is unambiguously sensitive, even over a small sample and short time window. We were able to infer medical conditions, firearm ownership and more, using solely phone metadata,” he said.
President Obama will issue new guidelines on Friday to curtail government surveillance, but will not embrace the most far-reaching proposals of his own advisers and will ask Congress to help decide some of the toughest issues, according to people briefed on his thinking.
Mr. Obama plans to increase limits on access to bulk telephone data, call for privacy safeguards for foreigners and propose the creation of a public advocate to represent privacy concerns at a secret intelligence court. But he will not endorse leaving bulk data in the custody of telecommunications firms, nor will he require court permission for all so-called national security letters seeking business records.
The emerging approach, described by current and former government officials who insisted on anonymity in advance of Mr. Obama’s widely anticipated speech, suggested a president trying to straddle a difficult line in hopes of placating foreign leaders and advocates of civil liberties without a backlash from national security agencies. The result seems to be a speech that leaves in place many current programs, but embraces the spirit of reform and keeps the door open to changes later.
If you haven’t heard of CSEC before, you’re certainly not alone. The signals intelligence service known as Communications Security Establishment Canada has been eager not to be in the public eye, but allegations are being made that CSEC has been spying on the Brazilian government’s mining and energy ministry:
The impact for Canada of these revelations could be equally grave: they come at a time when Brazil has become a top destination for Canadian exports, when a stream of delegations from the oil and gas industries are making pilgrimages to Rio de Janeiro to try to get a piece of the booming offshore oil industry, and when the Canadian government is eager to burnish ties with Brasilia. Foreign Affairs Minister John Baird visited Brazil in August, and spoke repeatedly about the country as a critical partner for Canadian business.
While CSEC’s role in conducting economic espionage has been alluded to before, how it does this job has not. The significance of the documents obtained by Globo in Brazil is that they speak to how “metadata” analysis by CSEC can be used to exploit a rival country’s computer systems.
The CSEC-labeled slides about the “Olympia” program describe the “Brazilian Ministry of Mines and Energy” as a “new target to develop” despite “limited access/target knowledge.”
The presentation goes on to map out how an individual’s smartphone — “target’s handset” — can be discerned by analysis, including by cross-referencing the smartphone’s Sim card with the network telephone number assigned to it and also to the handset’s unique number (IMEI).
The “top secret” presentation also refers to attacks on email servers.
“I have identified MX [email] servers which have been targeted to passive collection by the Intel analysts,” one slide says, without explaining who the speaker is.
Powered by WordPress