Quotulatiousness

April 2, 2014

Enigma’s 21st century open sourced descendent

Filed under: History, Military, Technology, WW2 — Tags: , , — Nicholas @ 09:51

The Enigma device was used by the German military in World War 2 to encrypt and decrypt communication between units and headquarters on land and at sea. Original Enigma units — the few that are on the market at any time — sell for tens of thousands of dollars. You may not be able to afford an original, but you might be interested in a modern implementation of Enigma using Arduino-based open-source hardware and software:

Actual hand-crafted Final design

Actual hand-crafted Final design

Enigma machines have captivated everyone from legendary code breaker Alan Turing and the dedicated cryptographers from England’s Bletchley Park to historians and collectors the world over.

But while many history buffs would surely love to get their hands on an authentic Enigma machine used during WWII, the devices aren’t exactly affordable (last year, a 1944 German Enigma machine was available for auction at Bonhams with an estimated worth of up to $82,000). Enter the Open Enigma Project, a kit for building one from scratch.

The idea came to Marc Tessier and James Sanderson from S&T Geotronics by accident.

“We were working on designing and building intelligent Arduino-based open-source geocaching devices to produce a unique interactive challenge at an upcoming Geocaching Mega Event,” Tessier told Crave. “A friend of ours suggested we use an Enigma type encrypting/decrypting machine as the ultimate stage of the challenge and pointed us to an Instructables tutorial that used a kid’s toy to provide some Enigma encoding. We looked all over to buy a real Enigma machine even if we had to assemble it ourselves and realized that there was nothing available at the moment. So we decided to build our own.”

[…]

“Our version is an electronic microprocessor-based machine that is running software which is a mathematical expression of how the historical mechanical machine behaved,” Sanderson told Crave. “Having never touched a real Enigma M4, we built our open version based on what we read online. From what we understand, the real electro-mechanical devices are much heavier and a little bigger.”

They took some design liberties — replacing the physical rotors with LED units and replacing the light bulbs with white LEDs. The replica can be modified by changing the Arduino code and can communicate to any computer via USB. Future versions may include Wi-Fi and/or Bluetooth.

People are less inclined to shop or bank online after NSA surveillance reports

Filed under: Business, Government, Technology — Tags: , , , , , — Nicholas @ 08:46

Among the side-effects of government surveillance revelations, ordinary people are deciding to be a bit less involved in online activities, according to a new Harris Poll:

Online banking and shopping in America are being negatively impacted by ongoing revelations about the National Security Agency’s digital surveillance activities. That is the clear implication of a recent ESET-commissioned Harris poll which asked more than 2,000 U.S. adults ages 18 and older whether or not, given the news about the NSA’s activities, they have changed their approach to online activity.

Almost half of respondents (47%) said that they have changed their online behavior and think more carefully about where they go, what they say, and what they do online.

When it comes to specific Internet activities, such as email or online banking, this change in behavior translates into a worrying trend for the online economy: over one quarter of respondents (26%) said that, based on what they have learned about secret government surveillance, they are now doing less banking online and less online shopping. This shift in behavior is not good news for companies that rely on sustained or increased use of the Internet for their business model.

[…]

Whether or not we have seen the full extent of the public’s reaction to state-sponsored mass surveillance is hard to predict, but based on this survey and the one we did last year, I would say that, if the NSA revelations continue – and I am sure they will – and if government reassurances fail to impress the public, then it is possible that the trends in behavior we are seeing right now will continue. For example, I do not see many people finding reassurance in President Obama’s recently announced plan to transfer the storage of millions of telephone records from the government to private phone companies. As we will document in our next installment of survey findings, data gathering by companies is even more of a privacy concern for some Americans than government surveillance.

And in case anyone is tempted to think that this is a narrow issue of concern only to news junkies and security geeks, let me be clear: according to this latest survey, 85% of adult Americans are now at least somewhat familiar with the news about secret government surveillance of private citizens’ phone calls, emails, online activity, and so on.

March 26, 2014

Minimum-wage jobs becoming more likely to be replaced by robots

Filed under: Economics, Technology — Tags: , , — Nicholas @ 07:44

Everyone seems to want to raise the minimum wage right now (well, everyone in the media certainly), but it might backfire spectacularly on the very people it’s supposed to help:

It’s become commonplace for computers to replace American workers — think about those on an assembly line and in toll booths — but two University of Oxford professors have come to a surprising conclusion: Waitresses, fast-food workers and others earning at or near the minimum wage should also be on alert.

President Obama’s proposal to increase the federal minimum wage from $7.25 to $10.10 per hour could make it worthwhile for employers to adopt emerging technologies to do the work of their low-wage workers. But can a robot really do a janitor’s job? Can software fully replace a fast-food worker? Economists have long considered these low-skilled, non-routine jobs as less vulnerable to technological replacement, but until now, quantitative estimates of a job’s vulnerability have been missing from the debate.

Based on a 2013 paper by Carl Benedikt Frey and Michael A. Osborne of Oxford [PDF], occupations in the U.S. that pay at or near the minimum wage — that’s about one of every six workers in the U.S. — are much more susceptible to “computerization,” or as defined by the authors, “job automation by means of computer-controlled equipment.” The researchers considered a time frame of 20 years, and they measured whether such jobs could be computerized, not whether these jobs will be computerized. The latter involves assumptions about economic feasibility and social acceptance that go beyond mere technology.

The minimum-wage occupations that Frey and Osborne think are most vulnerable include, not surprisingly, telemarketers, sales clerks and cashiers. But also included are occupations that employ a large share of the low-wage workforce, such as waiters and waitresses, food-preparation workers and cooks. If the computerization of these low-wage jobs becomes feasible, and if employers find it economical to invest in such labor-saving technology, there will be huge implications for the U.S. labor force.

H/T to Colby Cosh, who said “McDonald’s is going to turn into vending machines. Can’t say this enough. McDonald’s…vending machines.”

Oculus in the news

Filed under: Business, Media, Technology — Tags: , , , — Nicholas @ 07:33

Raph Koster reflects on the promise of Oculus:

Metaverse RoadmapRendering was never the point.

Oh, it’s hard. But it’s rapidly becoming commodity hardware. That was in fact the basic premise of the Oculus Rift: that the mass market commodity solution for a very old dream was finally approaching a price point where it made sense. The patents were expiring; the panels were cheap and getting better by the month. The rest was plumbing. Hard plumbing, the sort that calls for a Carmack, maybe, but plumbing.

[…]

Look, there are a few big visions for the future of computing doing battle.

There’s a wearable camp, full of glasses and watches. It’s still nascent, but its doom is already waiting in the wings; biocomputing of various sorts (first contacts, then implants, nano, who knows) will unquestionably win out over time, just because glasses and watches are what tech has been removing from us, not getting us to put back on. Google has its bets down here.

There’s a beacon-y camp, one where mesh networks and constant broadcasts label and dissect everything around us, blaring ads and enticing us with sales coupons as we walk through malls. In this world, everything is annotated and shouting at a digital level, passing messages back and forth. It’s an ubicomp environment where everything is “smart.” Apple has its bets down here.

These two things are going to get married. One is the mouth, the other the ears. One is the poke, the other the skin. And then we’re in a cyberpunk dream of ads that float next to us as we walk, getting between us and the other people, our every movement mined for Big Data.

[…]

The virtue of Oculus lies in presence. A startling, unusual sort of presence. Immersion is nice, but presence is something else again. Presence is what makes Facebook feel like a conversation. Presence is what makes you hang out on World of Warcraft. Presence is what makes offices persist in the face of more than enough capability for remote work. Presence is why a video series can out-draw a text-based MOOC and presence is why live concerts can make more money than album sales.

Facebook is laying its bet on people, instead of smart objects. It’s banking on the idea that doing things with one another online — the thing that has fueled it all this time — is going to keep being important. This is a play to own walking through Machu Picchu without leaving home, a play to own every classroom and every museum. This is a play to own what you do with other people.

Update: Apparently some of the folks who backed the original Kickstarter campaign have their panties in a bunch now that there’s big money involved.


Attendees wear Oculus Rift HD virtual reality head-mounted displays as they play EVE: Valkyrie, a multiplayer virtual reality dogfighting shooter game, at the Intel booth at the 2014 International CES, January 9, 2014 in Las Vegas, Nevada. ROBYN BECK/AFP/Getty Images

Facebook’s purchase of virtual reality company Oculus for $2bn in stocks and shares is big news for a third company: Kickstarter, which today celebrates the first billion-dollar exit of a company formed through the crowdfunding platform.

Oculus raised $2.4m for its Rift headset in September 2012, exceeding its initial fundraising goal by 10 times. It remains one of the largest ever Kickstarter campaigns.

But as news of the acquisition broke Tuesday night, some of the 9,500 people who backed the project for sums of up to $5,000 a piece (the most popular package, containing an early prototype of the Rift, was backed by 5,600 for a more reasonable $300) were rethinking their support.

[…]

For Kickstarter itself, the purchase raises awkward questions. The company has always maintained that it should not be viewed as a storefront for pre-ordering products; instead, a backer should be aware that they are giving money to a struggling artist or designer, and view the reward as a thanks rather than a purchase.

Kickstarter Is Not a Store” is how the New York-based company put it in 2012, shortly after the Oculus Rift campaign closed. Instead, the company explained: “It’s a new way for creators and audiences to work together to make things.”

But if Kickstarter isn’t a store, and if backers also aren’t getting equity in the company which uses their money to build a $2bn business, then what are they actually paying for?

“Structurally I have an issue with it,” explains Buckenham, “in that the backer takes on a great deal of risk for relatively little upside and that the energy towards exciting things is formalised into a necessarily cash-based relationship in a way that enforces and extends capitalism into places where it previously didn’t have total dominion.”

March 25, 2014

Tech culture and ageism

Filed under: Business, Technology, USA — Tags: , , , , — Nicholas @ 07:56

Noam Scheiber examines the fanatic devotion to youth in (some parts of) the high tech culture:

Silicon Valley has become one of the most ageist places in America. Tech luminaries who otherwise pride themselves on their dedication to meritocracy don’t think twice about deriding the not-actually-old. “Young people are just smarter,” Facebook CEO Mark Zuckerberg told an audience at Stanford back in 2007. As I write, the website of ServiceNow, a large Santa Clara–based I.T. services company, features the following advisory in large letters atop its “careers” page: “We Want People Who Have Their Best Work Ahead of Them, Not Behind Them.”

And that’s just what gets said in public. An engineer in his forties recently told me about meeting a tech CEO who was trying to acquire his company. “You must be the token graybeard,” said the CEO, who was in his late twenties or early thirties. “I looked at him and said, ‘No, I’m the token grown-up.’”

Investors have also become addicted to the youth movement:

The economics of the V.C. industry help explain why. Investing in new companies is fantastically risky, and even the best V.C.s fail a large majority of the time. That makes it essential for the returns on successes to be enormous. Whereas a 500 percent return on a $2 million investment (or “5x,” as it’s known) would be considered remarkable in any other line of work, the investments that sustain a large V.C. fund are the “unicorns” and “super-unicorns” that return 100x or 1,000x — the Googles and the Facebooks.

And this is where finance meets what might charitably be called sociology but is really just Silicon Valley mysticism. Finding themselves in the position of chasing 100x or 1,000x returns, V.C.s invariably tell themselves a story about youngsters. “One of the reasons they collectively prefer youth is because youth has the potential for the black swan,” one V.C. told me of his competitors. “It hasn’t been marked down to reality yet. If I was at Google for five years, what’s the chance I would be a black swan? A lot lower than if you never heard of me. That’s the collective mentality.”

Some of the corporate cultures sound more like playgroups than workgroups:

Whatever the case, the veneration of youth in Silicon Valley now seems way out of proportion to its usefulness. Take Dropbox, which an MIT alumnus named Drew Houston co-founded in 2007, after he got tired of losing access to his files whenever he forgot a thumb drive. Dropbox quickly caught on among users and began to vacuum up piles of venture capital. But the company has never quite outgrown its dorm-room vibe, even now that it houses hundreds of employees in an 85,000-square-foot space. Dropbox has a full-service jamming studio and observes a weekly ritual known as whiskey Fridays. Job candidates have complained about being interviewed in conference rooms with names like “The Break-up Room” and the “Bromance Chamber.” (A spokesman says the names were recently changed.)

Once a year, Houston, who still wears his chunky MIT class ring, presides over “Hack Week,” during which Dropbox headquarters turns into the world’s best-capitalized rumpus room. Employees ride around on skateboards and scooters, play with Legos at all hours, and generally tool around with whatever happens to interest them, other than work, which they are encouraged to set aside. “I’ve been up for about forty hours working on Dropbox Jeopardy,” one engineer told a documentarian who filmed a recent Hack Week. “It’s close to nearing insanity, but it feels worth it.”

It’s safe to say that the reigning sensibility at Dropbox has conquered more or less every corner of the tech world. The ping-pong playing can be ceaseless. The sexual mores are imported from college—“They’ll say something like, ‘This has been such a long day. I have to go out and meet some girls, hook up tonight,’ ” says one fortysomething consultant to several start-ups. And the vernacular is steroidally bro-ish. Another engineer in his forties who recently worked at a crowdsourcing company would steel himself anytime he reviewed a colleague’s work. “In programming, you need a throw-away variable,” the engineer explained to me. “So you come up with something quick.” With his co-workers “it would always be ‘dong’ this, ‘dick’ that, ‘balls’ this.”

There’s also the blind spot about having too many youth-focussed firms in the same market:

The most common advice V.C.s give entrepreneurs is to solve a problem they encounter in their daily lives. Unfortunately, the problems the average 22-year-old male programmer has experienced are all about being an affluent single guy in Northern California. That’s how we’ve ended up with so many games (Angry Birds, Flappy Bird, Crappy Bird) and all those apps for what one start-up founder described to me as cooler ways to hang out with friends on a Saturday night.

H/T to Kathy Shaidle for the link.

March 23, 2014

The march of technology and the future of work

Filed under: Business, Technology — Tags: , , , — Nicholas @ 10:28

Matt Ridley on the perpetual fretting that technological change will eliminate jobs and leave many permanently without work:

Bill Gates voiced a thought in a speech last week that is increasingly troubling America’s technical elite — that technology is about to make many, many people redundant. Advances in software, he said, will reduce demand for jobs, substituting robots for drivers, waiters or nurses.

The last time that I was in Silicon Valley I found the tech-heads fretting about this in direct proportion to their optimism about technology. That is to say, the more excited they are that the “singularity” is near — the moment when computers become so clever at making themselves even cleverer that the process accelerates to infinity — the more worried they are that there will be mass unemployment as a result.

This is by no means a new worry:

In the 1700s four in every five workers were employed on a farm. Thanks to tractors and combine harvesters, only one in fifty still works in farming, yet more people are at work than ever before. By 1850 the majority of jobs were in manufacturing. Today fewer than one in seven is. Yet Britain manufactures twice as much stuff by value as it did 60 years ago. In 1900 vast numbers of women worked in domestic service and were about to see their mangles and dusters mechanised. Yet more women have jobs than ever before.

Again and again technology has disrupted old work patterns and produced more, not less, work — usually at higher wages in more pleasant surroundings.

The followers of figures such as Ned Ludd, who smashed weaving looms, and Captain Swing, who smashed threshing machines (and, for that matter, Arthur Scargill) suffered unemployment and hardship in the short term but looked back later, or their children did, with horror at the sort of drudgery from which technology had delivered them.

Why should this next wave of technology be different? It’s partly that it is closer to home for the intelligentsia. Unkind jibe — there’s a sort of frisson running through the chatterati now that people they actually know might lose their jobs to machines, rather than the working class. Indeed, the jobs that look safest from robots are probably at the bottom of the educational heap: cooks, gardeners, maids. After many years’ work, Berkeley researchers have built a robot that can fold a towel — it takes 24 minutes.

March 16, 2014

Defining hackers and hacker culture

Filed under: History, Technology — Tags: , , , — Nicholas @ 09:49

ESR put this together as a backgrounder for a documentary film maker:

In its original and still most correct sense, the word “hacker” describes a member of a tribe of expert and playful programmers with roots in 1960s and 1970s computer-science academia, the early microcomputer experimenters, and several other contributory cultures including science-fiction fandom.

Through a historical process I could explain in as much detail as you like, this hacker culture became the architects of today’s Internet and evolved into the open-source software movement. (I had a significant role in this process as historian and activist, which is why my friends recommended that you talk to me.)

People outside this culture sometimes refer to it as “old-school hackers” or “white-hat hackers” (the latter term also has some more specific shades of meaning). People inside it (including me) insist that we are just “hackers” and using that term for anyone else is misleading and disrespectful.

Within this culture, “hacker” applied to an individual is understood to be a title of honor which it is arrogant to claim for yourself. It has to be conferred by people who are already insiders. You earn it by building things, by a combination of work and cleverness and the right attitude. Nowadays “building things” centers on open-source software and hardware, and on the support services for open-source projects.

There are — seriously — people in the hacker culture who refuse to describe themselves individually as hackers because they think they haven’t earned the title yet — they haven’t built enough stuff. One of the social functions of tribal elders like myself is to be seen to be conferring the title, a certification that is taken quite seriously; it’s like being knighted.

[…]

There is a cluster of geek subcultures within which the term “hacker” has very high prestige. If you think about my earlier description it should be clear why. Building stuff is cool, it’s an achievement.

There is a tendency for members of those other subcultures to try to appropriate hacker status for themselves, and to emulate various hacker behaviors — sometimes superficially, sometimes deeply and genuinely.

Imitative behavior creates a sort of gray zone around the hacker culture proper. Some people in that zone are mere posers. Some are genuinely trying to act out hacker values as they (incompletely) understand them. Some are ‘hacktivists’ with Internet-related political agendas but who don’t write code. Some are outright criminals exploiting journalistic confusion about what “hacker” means. Some are ambiguous mixtures of several of these types.

March 13, 2014

It’s amazing how much data can be derived from “mere” metadata

Filed under: Liberty, Media, Technology — Tags: , , , , — Nicholas @ 08:25

Two Stanford grad students conducted a research project to find out what kind of actual data can be derived from mobile phone metadata:

Two Stanford computer science students were able to acquire detailed information about people’s lives just from telephone metadata — the phone number of the caller and recipient, the particular serial number of the phones involved, the time and duration of calls and possibly the location of each person when the call occurred.

The researchers did not do any illegal snooping — they worked with the phone records of 546 volunteers, matching phone numbers against the public Yelp and Google Places directories to see who was being called.

From the phone numbers, it was possible to determine that 57 percent of the volunteers made at least one medical call. Forty percent made a call related to financial services.

The volunteers called 33,688 unique numbers; 6,107 of those numbers, or 18 percent, were isolated to a particular identity.

[…]

They crowdsourced the data using an Android application and conducted an analysis of individual calls made by the volunteers to sensitive numbers, connecting the patterns of calls to emphasize the detail available in telephone metadata, Mayer said.

“A pattern of calls will, of course, reveal more than individual call records,” he said. “In our analysis, we identified a number of patterns that were highly indicative of sensitive activities or traits.”

For example, one participant called several local neurology groups, a specialty pharmacy, a rare-condition management service, and a pharmaceutical hotline used for multiple sclerosis.

Another contacted a home improvement store, locksmiths, a hydroponics dealer and a head shop.

The researchers initially shared the same hypothesis as their computer science colleagues, Mayer said. They did not anticipate finding much evidence one way or the other.

“We were wrong. Phone metadata is unambiguously sensitive, even over a small sample and short time window. We were able to infer medical conditions, firearm ownership and more, using solely phone metadata,” he said.

March 12, 2014

A short history of the web

Filed under: History, Technology — Tags: — Nicholas @ 09:05

At the Guardian, an amusing way to present the short-but-fascinating history of the World Wide Web (when did we stop calling it by its formal name?):

A partial history of the open web, in snakes and ladders form

It was 25 years ago today that Tim Berners-Lee suggested the creation of the world wide web. As the creator speaks to the Guardian about his hopes for its future, we look at the triumphs of accessibility and challenges to openness that mark the history of the web

A short history of the web

However, pay attention to the claims in many headlines, as Kelly Fiveash suggests:

Top 5 headlines that claim Tim Berners Lee ‘INVENTED the INTERNET’. Whoops!
You’ll never guess what happened next

Newspapers are quite rightly back-slapping Brit inventor Tim Berners-Lee today — the man who brought the world wide web to the, er, world 25 years ago today.

It’s a pity, then, that mainstream publications continue to stumble over the concept by lazily and wrongly saying that Berners-Lee birthed the internet.

Sub-editors across the land are scrambling to correct copy that was carelessly slapped online with headlines stupidly claiming that TBL was the god-like creature who came up with the network of networks idea.

March 10, 2014

When we do it, it’s “intelligence gathering”, when they do it, it’s “cyberwar”

Filed under: China, Technology, USA — Tags: , , , , — Nicholas @ 10:48

Bruce Schneier on the odd linguistic tic of how we describe an act depending on who the actor is:

Back when we first started getting reports of the Chinese breaking into U.S. computer networks for espionage purposes, we described it in some very strong language. We called the Chinese actions cyberattacks. We sometimes even invoked the word cyberwar, and declared that a cyber-attack was an act of war.

When Edward Snowden revealed that the NSA has been doing exactly the same thing as the Chinese to computer networks around the world, we used much more moderate language to describe U.S. actions: words like espionage, or intelligence gathering, or spying. We stressed that it’s a peacetime activity, and that everyone does it.

The reality is somewhere in the middle, and the problem is that our intuitions are based on history.

Electronic espionage is different today than it was in the pre-Internet days of the Cold War. Eavesdropping isn’t passive anymore. It’s not the electronic equivalent of sitting close to someone and overhearing a conversation. It’s not passively monitoring a communications circuit. It’s more likely to involve actively breaking into an adversary’s computer network — be it Chinese, Brazilian, or Belgian — and installing malicious software designed to take over that network.

In other words, it’s hacking. Cyber-espionage is a form of cyber-attack. It’s an offensive action. It violates the sovereignty of another country, and we’re doing it with far too little consideration of its diplomatic and geopolitical costs.

March 3, 2014

The origins of hacking and the myth of a lost Eden of open source code

Filed under: History, Technology — Tags: , , , — Nicholas @ 09:40

Gather round you kids, ’cause Uncle Eric is going to tell you about the dim, distant days of hacking before open source:

I was a historian before I was an activist, and I’ve been reminded recently that a lot of younger hackers have a simplified and somewhat mythologized view of how our culture evolved, one which tends to back-project today’s conditions onto the past.

In particular, many of us never knew – or are in the process of forgetting – how dependent we used to be on proprietary software. I think by failing to remember that past we are risking that we will misunderstand the present and mispredict the future, so I’m going to do what I can to set the record straight.

[…]

Without the Unix-spawned framework of concepts and technologies, having source code simply didn’t help very much. This is hard for younger hackers to realize, because they have no experience of the software world before retargetable compilers and code portability became relatively common. It’s hard for a lot of older hackers to remember because we mostly cut our teeth on Unix environments that were a few crucial years ahead of the curve.

But we shouldn’t forget. One very good reason is that believing a myth of the fall obscures the remarkable rise that we actually accomplished, bootstrapping ourselves up through a series of technological and social inventions to where open source on everyone’s desk and in everyone’s phone and ubiquitous in the Internet infrastructure is now taken for granted.

We didn’t get here because we failed in our duty to protect a prelapsarian software commons, but because we succeeded in creating one. That is worth remembering.

Update: In a follow-up post, ESR talks about closed source “sharecroppers” and Unix “nomads”.

Like the communities around SHARE (IBM mainframe users) and DECUS (DEC minicomputers) in the 1960s and 1970s, whatever community existed around ESPOL was radically limited by its utter dependence on the permissions and APIs that a single vendor was willing to provide. The ESPOL compiler was not retargetable. Whatever community developed around it could neither develop any autonomy nor survive the death of its hardware platform; the contributors had no place to retreat to in the event of predictable single-point failures.

I’ll call this sort of community “sharecroppers”. That term is a reference to SHARE, the oldest such user group. It also roughly expresses the relationship between these user groups and contributors, on the one hand, and the vendor on the other. The implied power relationship was pretty totally asymmetrical.

Contrast this with early Unix development. The key difference is that Unix-hosted code could survive the death of not just original hardware platforms but entire product lines and vendors, and contributors could develop a portable skillset and toolkits. The enabling technology – retargetable C compilers – made them not sharecroppers but nomads, able to evade vendor control by leaving for platforms that were less locked down and taking their tools with them.

I understand that it’s sentimentally appealing to retrospectively sweep all the early sharecropper communities into “open source”. But I think it’s a mistake, because it blurs the importance of retargetability, the ability to resist or evade vendor lock-in, and portable tools that you can take away with you.

Without those things you cannot have anything like the individual mental habits or collective scale of contributions that I think is required before saying “an open-source culture” is really meaningful.

February 21, 2014

Online bounty hunting

Filed under: Business, Gaming, Law, Technology — Tags: , , — Nicholas @ 09:10

BBC News on a bounty being offered to track down and prosecute those involved in the DDoS attack on the game Wurm:

A bounty of 10,000 euros (£8,200) is being offered to catch the people who took the online multiplayer game Wurm offline.

The game’s servers were victim of a distributed denial of service (DDoS) attack this week and the game remains offline.

A DDoS attack forces a website offline by overloading the site’s servers with more data than it can process.

The bounty is being offered for any “tips leading to a conviction”.

Wurm is a massively multiplayer online role-playing game (MMORPG) that is played on personal computers.

The game takes place in virtual realms and everything in it is created by the players who are taking part. They can compete against each other or combine forces to defend a realm.

The attack happened just after an update to the game.

Writing on Wurm‘s website, one of its creators said it would be back online as soon as possible.

“We were the target of a DDoS attack and our hosting provider had to pull us off the grid for now.

“We will be back as soon as possible, but things are out of our hands since their other customers are affected.

“We can offer 10,000 euros for any tips or evidence leading to a conviction of the person responsible for this attack,” he wrote.

H/T to Hunter for the link.

February 20, 2014

Anti-tobacco campaigners – “a great bunch of puritanical Cnuts”

Filed under: Britain, Business, Health, Technology — Tags: , , , , — Nicholas @ 08:37

In sp!ked, Rob Lyons looks at the way e-cigarettes are being marketed in the UK and how it’s driving anti-tobacco campaigners absolutely insane:

For the tobacco-control lobby, an advert like Dorff’s is an absolute nightmare. It makes no health claims. It is clearly targeted at adults. It plays to the fact that even smokers dislike aspects of old-fashioned cigarettes, and are happy to compromise in order to get most of the pleasure of smoking without the hassle or the irritation to others. And then – God forbid – it even plays to the annoyance of smokers at the health fanatics. The last thing smoke dodgers want is for anyone to be able to take their freedom back. Even the existence of the sanitised offer from Vype’s say-nothing advert is anathema.

This was made abundantly clear in a report published by Cancer Research UK last year, The marketing of electronic cigarettes in the UK [PDF]. The authors are forced to admit that e-cigs ‘are accepted as being much safer than their conventional equivalents, so if smokers can be encouraged to switch there is the potential for significant public health gain’.

However, this message is quickly lost in a cloud of public-health cant. The threats, say the authors, include concerns that ‘hard-won tobacco-control policies (smokefree public places, the ad ban, age restricted sales, tobacco industry denormalisation, POS [point-of-sale] restrictions) are being undermined’ and that ‘there is evidence that young people, who have always been the key to the long-term viability of the tobacco industry, may be being pulled into the market’. The danger, say the authors, is that tobacco companies don’t want you to give up your addiction, just switch to a different delivery system. The problem with this argument is that the new delivery system is much, much safer. Why shouldn’t corporations try to sell us safe products?

[…]

In reality, what the anti-tobacco lobbyists (and their fans in Westminster and Whitehall) are really afraid of is the loss of their power and influence over our lives. They fear they will be helpless against the tide of e-cigs, like a great bunch of puritanical Cnuts. (Note to sub-editor: that’s definitely ‘Cnuts’, as in the Danish king who famously – probably apocryphally – tried to turn back the sea. Honest.)

E-cigs are a safe, practical alternative to smoking. For all the huffing and putting-a-stop-to-puffing, tobacco control has been an illiberal failure. E-cigs are encouraging smokers to switch, cut down or stop altogether far more successfully than all the bans, taxes, restrictions and useless nicotine-replacement therapies that have gone before. ‘Vaping’ is an unexpected but nonetheless happy success story.

February 17, 2014

Looking forward by looking backward – military evolution

Filed under: History, Military, Technology, Weapons — Tags: , , , — Nicholas @ 11:52

Strategy Page discusses the problems of predicting the future … which isn’t just a task for science fiction writers:

How will warfare change in the next 30 years? Military leaders, and the people they protect, are always trying to figure this out. There’s an easy way to get some good insight on the future. Simply go back 120 years (1894) and note the state of warfare and military technology at the time, then advance, 30 years at a time, until you reach 2014. At that point, making an educated guess at what 2044 will be like will like will be, if not easy, at least a lot less daunting.

In 1894, many infantry were still using single shot black powder rifles. Change was in the air though, and the United States had just begun to adopt the newfangled smokeless powder, a few years after it became widely available. In 1894 American troops were still replacing their black power rifles with a smokeless powder model (the Krag-Jorgensen). The modern machine-gun had been invented in 1883 but armies took about two decades before they began adopting them on a large scale. Most artillery was still short ranged, not very accurate, and could only fire at targets the crew could see. Horses pulled or carried stuff and the infantry marched a lot when they were not being moved long distances by railroad or steamships. But the modern, quick-firing artillery was recently introduced and still unproven in battle. Communications still relied on the telegraph, a half century old invention that revolutionized, in only a few decades, the way commanders could talk to each other over long distances. They could now do it in minutes. This was a big change for warfare. Very big. At this time telephones were all local and not portable. Cavalry was still important for scouting, although less useful for charging infantry (a trend that began when infantry got muskets with bayonets two centuries earlier).

[…]

So what does this portend for 2044? Faster and deadlier, for sure. Information war will be more than a buzzword by then because better sensors and data processing technology will make situational awareness (knowing where you and your enemy are, knowing it first, and acting on it before the other guy does) more decisive than ever.

If the expected breakthrough in batteries (fuel cells) evolves as reliably and cheaply as expected, the 2040s infantryman will be something of a cyborg. In addition to carrying several computers and sensor systems, he might wear body armor that also provides air conditioning. Satellite communications, of course, and two way video. Exoskeletons are already in the works and may mature by then. A lot depends on breakthroughs in battery tech although engineers are also finding to do more with just a little juice. Historians tend to constantly underestimate the cleverness of engineers and inventors in general.

But the big new development will be the continued evolution of robotic weapons. The World War II acoustic torpedo (used by the Germans and the allies, from subs as well as the air) was the first truly robotic weapon. You turned it lose and it would hunt down its prey and attack. There may be a lot of public uproar over land based systems that have sensors, can use them to hunt, and have weapons that can be used without human intervention. But those systems will be easy and cheap to build by 2044, and as soon as one nation builds them others will have to follow. By 2044, machines will be fighting other machines more often than they will be looking for the stray human on the battlefield.

But there will be other developments that are more difficult to anticipate. In 1894 most of the 1924 technologies were already known in a theoretical sense. Same with the 1954 technologies in 1924 and so on. What is most difficult to predict is exactly how new tech will be employed. There will be imagination and ingenuity involved there, and that sort of thing is, by its very nature, resistant to prediction.

February 15, 2014

South Korea’s high-speed broadband (censored) internet

Filed under: Asia, Technology — Tags: , , — Nicholas @ 10:43

The Economist looks at the gosh-wow technical specs of South Korean internet access, governed by the sensibilities of a restrictive, censorious regime:

Why South Korea is really an internet dinosaur

SOUTH KOREA likes to think of itself as a world leader when it comes to the internet. It boasts the world’s swiftest average broadband speeds (of around 22 megabits per second). Last month the government announced that it will upgrade the country’s wireless network to 5G by 2020, making downloads about 1,000 times speedier than they are now. Rates of internet penetration are among the highest in the world. There is a thriving startup community (Cyworld, rolled out five years before Mark Zuckerberg launched Facebook, was the most popular social network in South Korea for a decade) and the country leads the world in video games as spectator sports. Yet in other ways the futuristic country is stuck in the dark ages. Last year Freedom House, an American NGO, ranked South Korea’s internet as only “partly free”. Reporters without Borders has placed it on a list of countries “under surveillance”, alongside Egypt, Thailand and Russia, in its report on “Enemies of the Internet”. Is forward-looking South Korea actually rather backward?

Every week portions of the Korean web are taken down by government censors. Last year about 23,000 Korean webpages were deleted, and another 63,000 blocked, at the request of the Korea Communications Standards Commission (KCSC), a nominally independent (but mainly government-appointed) public body. In 2009 the KCSC had made just 4,500 requests for deletion. Its filtering chiefly targets pornography, prostitution and gambling, all of which are illegal in South Korea. But more wholesome pursuits are also restricted: online gaming is banned between midnight and 6am for under-16s (users must input their government-issued ID numbers to prove their age). Sites from North Korea, including its state newspaper, news agency and Twitter feed, are blocked, as are those of North Korea’s sympathisers. A law dating back to the Korean war forbids South Korean maps from being taken out of the country. Because North and South are technically still at war, the law has been expanded to include electronic mapping data—which means that Google, for instance, cannot process South Korean mapping data on its servers and therefore cannot offer driving directions inside the country. In 2010 the UN determined that the KCSC “essentially operates as a censorship body”.

« Newer PostsOlder Posts »

Powered by WordPress