Quotulatiousness

December 19, 2012

Exiting gracefully from Instagram

Filed under: Business, Media — Tags: , , , , , — Nicholas @ 00:02

Lots of folks are furious about Instagram’s recently announced changes to their terms of service. If you’re an Instagram user and don’t want to sign up for the changed TOS, here’s Roberto Baldwin‘s recent Wired How-To on rescuing your Instagram photos and closing your account:

First you’ll want to download all of your photos. Instaport will download your entire Instagram photo library in just a few minutes. Currently the service only offers a zip file download of your photos, although direct export to Flickr and Facebook are in the works.

Once the photos are downloaded, you can upload them to another photo service. Some of the Gadget Lab staff is fond of the new Flickr app and service.

After you’ve removed your photos from Instagram, you can quickly delete your account and pretend you’ve never even heard of Lo-Fi filter.

But once you delete your account, that’s it. Instagram cannot reactivate deactivated accounts and you will not be able to sign up for Instagram later with the same account name.

H/T to Nick Packwood for the link.

Update: Charles Cooper at CNET News:

From the outset, let’s note a couple of points that ought to be abundantly clear to anyone watching the unfolding controversy about the upcoming changes to Instagram’s terms of use.

A) Instagram — and thus by definition, Facebook, the site’s corporate parent — is entirely within its rights to change the terms of use governing how photos uploaded by people using the service get used.

B) Facebook’s management is comprised of incredibly smart folks.

Given that A and B are true, the powers that be who are running the company must either be amazingly tone deaf or crazy as loons.

It’s obviously not the latter, so we’re left with the conclusion that the people at the top, so impressed by the sound of their own voices, have lost touch with the people who helped turn them into gazillionaires — in other words, the users.

The “digital divide” didn’t play out quite the way they thought

Filed under: Economics, Education, Media, Technology, USA — Tags: , , , , — Nicholas @ 00:01

In Gregg Easterbrook‘s weekly NFL column, he often discusses non-football topics like this one:

A decade ago — perhaps as recently as five years ago — analysts and educators feared a “digital divide” in which the affluent have access to advancing electronics and the disadvantaged do not, granting the affluent yet another edge in life’s contest. But what if the reverse has happened?

[. . .]

That made this article striking, with research showing children from disadvantaged families now waste more time with video games and on the Internet than do children from affluent homes. Publicly subsidized programs to provide computers and Internet to the disadvantaged were rationalized as tools for education. How are they actually used? The article quotes Vicky Rideout, author of a study on the subject, saying, “Despite the educational potential of computers, the reality is that their use for education or meaningful content creation is minuscule compared to their use for pure entertainment.”

Video games are a really tempting way to avoid studying. If they had been around when I was a teen, there’s no way I would have read so many books or spent three or four hours after school each day at the high school, doing extracurriculars and sports. I might instead have wasted my time with electronics.

Girls and women are taking over college admissions; 57 percent of undergraduate students at four-year colleges are female. There are many reasons, and surely one is that teen girls waste less time on video games than teen boys do. If disadvantaged teen boys are wasting more time than affluent teen boys, that makes the picture worse.

Conservative commentators often “harrumph” about rising living standards for the disadvantaged, many of whom now have air conditioning, laptops and other items once associated with affluence. It’s good that living standards are rising, and it’s good that the digital divide is disappearing. The spread of computers and Internet service into disadvantaged homes creates equity in access to the information and services available on the Web. But society needs to be aware of the downsides of electronics. Those computer and software gifts being opened this holiday season might, especially for teen boys, backfire.

December 17, 2012

Kim Jong-Un is Time man of the year (with help from 4chan)

Filed under: Asia, Humour, Media — Tags: , , , , — Nicholas @ 11:03

Tim Cushing on 4chan’s latest use of Time as a comedic sidekick:

4chan has returned to the limelight once again to torment reluctant sidekick TIME by voting early and often in its own particular idiom (read: bots, prolly) for Person of the Year. And the winner is none other than North Korean dictator and poster boy for evil, nepotism and ill-fitting grey smocks, Kim Jong-un. Here’s a portion of Time‘s statement on the poll results, which is good naturedly resigned, much in the way parents raising child 7+ are more concerned with keeping the cleaning products, bandages and fire extinguisher close at hand than preventing the feat of daredevilry that is currently being performed using Sharpies, a purloined Zippo and the second floor bannister.

    Kim Jong Un is having a good year. After taking over the leadership of North Korea from his late father Kim Jong Il, at the end of 2011, he’s solidified his control over the country, appeared on TIME‘s cover and he was even named “Sexiest Man Alive.” (OK, that honor was actually bestowed as a spoof in the satirical newspaper, The Onion, but a Chinese news service mistook the Onion piece for real news and the story went global.)

    Now, he’s gotten the most votes in TIME‘s completely unscientific reader Person of the Year Poll with 5.6 million votes. Not bad for a man who didn’t make an official public appearance until 2010.

December 13, 2012

The ITU’s latest attempt to hijack the internet

Filed under: Bureaucracy, Liberty, Media, Technology — Tags: , , , — Nicholas @ 14:09

David Gewirtz has the details:

According to The Weekly Standard, the chairman of the International Telecommunication Union (ITU) decided to try an end-run around the U.S., Europe, and most freedom-loving nations by conducting a survey of nations and putting forth a resolution that gives governments control over Internet policy, which includes everything you and I send across the pipes.

Apparently, this wasn’t a binding policy, but it’s a political gambit designed to get the UN to continue the process of trying to wrest control of the Internet from those interested in freedom to those interested in control of freedoms.

I’m a strong believer in a global Internet, but I’m starting to think countries like China and Russia and Cuba and the various regressive Middle Eastern states are more trouble than they’re worth. Maybe it’s just time we pulled the Internet plug on them*.

December 6, 2012

NZ court allows Kim Dotcom to sue for illegal spying

Filed under: Business, Law, Liberty, USA — Tags: , , , , — Nicholas @ 10:01

This could get interesting quickly:

Details of the top secret international spy agency ring known as Echelon will have to be produced after a new judgment in the Kim Dotcom case.

The internet tycoon was also cleared to pursue a case for damages against the police and the Government Communications Security Bureau in a judgment which has opened the Government’s handling of the criminal copyright case for its harshest criticism yet.

[. . .]

Chief high court judge Helen Winkelmann said the GCSB would have to “confirm all entities” to which it gave information sourced through its illegal interception of Dotcom’s communications.

She said her order included “members of Echelon/Five Eyes, including any United States authority”. The Echelon network is an international intelligence network to which New Zealand and the United States are members, along with Australia, Canada and the United Kingdom.

The judgment also recorded Dotcom’s suspicions he had been spied on at least six weeks before the GCSB admitted to doing so, and sought details as to whether others had been swept up in the illegal operation.

Update: Moved the video below the fold to stop it auto-playing any time someone visited the blog main page.

(more…)

December 4, 2012

ITU approves Deep Packet Inspection requirement to enable government snooping of internet traffic

Filed under: Bureaucracy, Liberty, Media, Technology — Tags: , , , — Nicholas @ 10:59

The UN’s International Telecommunications Union continues its in-camera campaign to wrest control of the internet from all other organizations with a new policy designed to please intrusive and authoritarian governments worldwide:

The telecommunications standards arm of the U.N. has quietly endorsed the standardization of technologies that could give governments and companies the ability to sift through all of an Internet user’s traffic – including emails, banking transactions, and voice calls – without adequate privacy safeguards. The move suggests that some governments hope for a world where even encrypted communications may not be safe from prying eyes.

At the core of this development is the adoption of a proposed international standard that outlines requirements for a technology known as “Deep Packet Inspection” (DPI). As we’ve noted several times before, depending on how it is used, DPI has the potential to be extremely privacy-invasive, to defy user expectations, and to facilitate wiretapping.

[. . .]

The ITU-T DPI standard holds very little in reserve when it comes to privacy invasion. For example, the document optionally requires DPI systems to support inspection of encrypted traffic “in case of a local availability of the used encryption key(s).” It’s not entirely clear under what circumstances ISPs might have access to such keys, but in any event the very notion of decrypting the users’ traffic (quite possibly against their will) is antithetical to most norms, policies, and laws concerning privacy of communications. In discussing IPSec, an end-to-end encryption technology that obscures all traffic content, the document notes that “aspects related to application identification are for further study” – as if some future work may be dedicated to somehow breaking or circumventing IPSec.

Several global standards bodies, including the IETF and W3C, have launched initiatives to incorporate privacy considerations into their work. In fact, the IETF has long had a policy of not considering technical requirements for wiretapping in its work, taking the seemingly opposite approach to the ITU-T DPI document, as Germany pointed out in voicing its opposition to the ITU-T standard earlier this year. The ITU-T standard barely acknowledges that DPI has privacy implications, let alone does it provide a thorough analysis of how the potential privacy threats associated with the technology might be mitigated.

These aspects of the ITU-T Recommendation are troubling in light of calls from Russia and a number of Middle Eastern countries to make ITU-T Recommendations mandatory for Internet technology companies and network operators to build into their products. Mandatory standards are a bad idea even when they are well designed. Forcing the world’s technology companies to adopt standards developed in a body that fails to conduct rigorous privacy analysis could have dire global consequences for online trust and users’ rights.

December 3, 2012

The feudal technopeasant internet

Filed under: History, Liberty, Technology — Tags: , , , , , , — Nicholas @ 11:20

Bruce Schneier on the less-than-appealing state of user security in today’s internet:

It’s a feudal world out there.

Some of us have pledged our allegiance to Google: We have Gmail accounts, we use Google Calendar and Google Docs, and we have Android phones. Others have pledged allegiance to Apple: We have Macintosh laptops, iPhones, and iPads; and we let iCloud automatically synchronize and back up everything. Still others of us let Microsoft do it all. Or we buy our music and e-books from Amazon, which keeps records of what we own and allows downloading to a Kindle, computer, or phone. Some of us have pretty much abandoned e-mail altogether … for Facebook.

These vendors are becoming our feudal lords, and we are becoming their vassals. We might refuse to pledge allegiance to all of them — or to a particular one we don’t like. Or we can spread our allegiance around. But either way, it’s becoming increasingly difficult to not pledge allegiance to at least one of them.

Feudalism provides security. Classical medieval feudalism depended on overlapping, complex, hierarchical relationships. There were oaths and obligations: a series of rights and privileges. A critical aspect of this system was protection: vassals would pledge their allegiance to a lord, and in return, that lord would protect them from harm.

Of course, I’m romanticizing here; European history was never this simple, and the description is based on stories of that time, but that’s the general model.

And it’s this model that’s starting to permeate computer security today.

We’re from the ITU and we’re here to “fix” your internet

Filed under: Bureaucracy, Liberty, Media, Technology — Tags: , , , , , — Nicholas @ 10:32

At Techdirt, Nick Masnick recounts some of the wonderful things the International Telecommunications Union would like to “help” regarding that pesky “internet” thing:

We’ve been talking about the ITU’s upcoming World Conference on International Telecommunications (WCIT) for a while now, and it’s no longer “upcoming.” Earlier today, the week and a half session kicked off in Dubai with plenty of expected controversy. The US, the EU and now Australia have all come out strongly against the ITU’s efforts to undermine the existing internet setup to favor authoritarian countries or state-controlled (or formerly state-controlled) telcos who want money for internet things they had nothing to do with. The BBC article above has a pretty good rundown of some of the scarier proposals being pitched behind closed doors at WCIT. Having the US, EU and Australia against these things is good, but the ITU works on a one-vote-per-country system, and plenty of other countries see this as a way to exert more control over the internet, in part to divert funds from elsewhere into their own coffers.

Hamadoun Toure, secretary-general of the ITU, keeps trying to claim that this is all about increasing internet access, but that’s difficult to square with reality:

    “The brutal truth is that the internet remains largely [the] rich world’s privilege, ” said Dr Hamadoun Toure, secretary-general of the UN’s International Telecommunications Union, ahead of the meeting.

    “ITU wants to change that.”

Of course, internet access has already been spreading to the far corners of the planet without any “help” from the ITU. Over two billion people are already online, representing about a third of the planet. And, yes, spreading that access further is a good goal, but the ITU is not the player to do it. The reason that the internet has been so successful and has already spread as far as it has, as fast as it has, is that it hasn’t been controlled by a bureaucratic government body in which only other governments could vote. Instead, it was built as an open interoperable system that anyone could help build out. It was built in a bottom up manner, mainly by engineers, not bureaucrats. Changing that now makes very little sense.

Canada is also on the record as being against the expansion of the ITU’s role.

Canada will look to prevent governments from taking more power over the Internet when governments sit down for 12 days of negotiations on the future of the Internet next week, but the government didn’t say Thursday where it stands on a contentious proposal that could see users pay more for online content.

Canada’s position going into the World Conference on International Telecommunications (WCIT) mirrors a number of Western allies in opposing having governments control how the Internet functions, leaving it to the current mix of public and private sector actors, according to documents released to Postmedia News under access to information laws. That stance is in contrast to proposals from some of the 193 members of the International Telecommunications Union, such as Russia, that want greater control over the Internet — more so than they already have in some cases — including more powers to track user identities online.

The meeting in Dubai will determine whether the ITU, an arm of the United Nations, will receive broad regulatory powers to set rules of road in cyberspace. The potential to centralize control over the Internet into the hands of governments has some users and hacktivists concerned that freedoms online would be crushed should a new binding international treaty change the status quo for how telecommunications companies interact across borders.

November 16, 2012

SEC employee stress levels must be down because they’re not surfing for porn during “98% of the workday”

Filed under: Bureaucracy, Government, USA — Tags: , , , — Nicholas @ 09:49

Ah, the hard life of the SEC employee must have gotten a bit less stressful recently. Tim Cushing has the, um, sordid details:

An internal investigative report of the SEC’s Trading and Markets division has been recently been reviewed by Reuters. After reading its rundown of the misdeeds and abuses uncovered, I’m left with the urge to laugh maniacally in the manner of someone having just cleared the tipping point and now sliding irretrievably into insanity. The sheer irresponsibility on display here springs from the sort of irredeemable carelessness that comes with spending other people’s money (taxes) and operating without any credible oversight or accountability (a large percentage of government entities).

Bess Levin at Dealbreaker points out that while the SEC’s internal investigation may have turned up several misdeeds, ranging from the merely stupid to the positively horrendous, it is quite a step up from the insatiable pornhounds that used to populate the Commission:

    If you had asked us two years or two months or two days ago if we thought that there would be a time in the near future when Securities and Exchange employees would not be regularly reprimanded for watching porn on their work-issued computers for 98 percent of the workday, we would have said absolutely not. No judgment, but in our professional opinion, people do not go from, among other things:

    * Receiving “over 16,000 access denials for Internet websites classified by the Commission’s Internet filter as either “Sex” or “Pornography” in a one-month period”

    * Accessing “Internet pornography and downloading pornographic images to his SEC computer during work hours so frequently that, on some days, he spent eight hours accessing Internet pornography…downloading so much pornography to his government computer that he exhausted the available space on the computer hard drive and downloaded pornography to CDs or DVDs that he accumulated in boxes in his office.”

    …to living a porn-free existence at l’office.

Truly a mind-boggling set of employees. One regional staff accountant ran into the “no-porn” wall 1,800 times in a two week period, yet remained undeterred. Those caught accessing porn with ridiculous frequency cited the “stress” of their jobs as the underlying reason for the nearly uninterrupted pornathons.

November 13, 2012

Online education is the future of universities (if they have one)

Filed under: Education, Media — Tags: , — Nicholas @ 11:08

Alex Tabarrok explains why 15 minutes of his time has outweighed the rest of his teaching career:

In 2009, I gave a TED talk on the economics of growth. Since then my 15 minute talk has been watched nearly 700,000 times. That is far fewer views than the most-watched TED talk, Ken Robinson’s 2006 talk on how schools kill creativity, which has been watched some 26 million times. Nonetheless, the 15 minutes of teaching I did at TED dominates my entire teaching career: 700,000 views at 15 minutes each is equivalent to 175,000 student-hours of teaching, more than I have taught in my entire offline career.[1] Moreover, the ratio is likely to grow because my online views are increasing at a faster rate than my offline students.

Teaching students 30 at a time is expensive and becoming relatively more expensive. Teaching is becoming relatively more expensive for the same reason that butlers have become relatively more expensive–butler productivity increased more slowly than productivity in other fields, so wages for butlers rose even as their output stagnated; as a result, the opportunity cost of butlers increased. The productivity of teaching, measured in, say, kilobytes transmitted from teacher to student per unit of time, hasn’t increased much. As a result, the opportunity cost of teaching has increased, an example of what’s known as Baumol’s cost disease. Teaching has remained economic only because the value of each kilobyte transmitted has increased due to discoveries in (some) other fields. Online education, however, dramatically increases the productivity of teaching. As my experience with TED indicates, it’s now possible for a single professor to teach more students in an afternoon than was previously possible in a lifetime.

The counter-argument is that there is an ineffable quality of the classroom experience that raises its value well above the same material taught online. Even after many years of teaching, however, what exactly this quality might be remains ineffable to me. Actually, that is not quite fair. Bringing the most advanced students in any field up to the cutting edge of knowledge and beyond has always required a kind of apprenticeship rather than a more straightforward communication of data/knowledge. Fields with greater physicality, not just sports and dance, but also experimental biology, physics, and chemistry will also require more in-classroom teaching with greater attention from a human being. Even recognizing these exceptions, however, still leaves the vast majority of teaching open to massive productivity increases. Until late college, physics is mostly teaching knowledge known since Newton. Most of the mathematics known or needed by most people has not advanced much beyond Euclid and Pythagoras, let alone Euler. No one expects online education to substitute for apprenticing to a master, but much education at the college level is already mass education taught not by a master but by an adjunct.

Protecting children from online pornography – the impossible dream

Filed under: Britain, Media, Technology — Tags: , , , — Nicholas @ 10:46

In the Guardian, Cory Doctorow talks about the actual scale of effort the British government is attempting to mandate to “protect the children from pr0n”:

In order to filter out adult content on the internet, a company has to either look at all the pages on the internet and find the bad ones, or write a piece of software that can examine a page on the wire and decide, algorithmically, whether it is inappropriate for children.

Neither of these strategies are even remotely feasible. To filter content automatically and accurately would require software capable of making human judgments — working artificial intelligence, the province of science fiction.

As for human filtering: there simply aren’t enough people of sound judgment in all the world to examine all the web pages that have been created and continue to be created around the clock, and determine whether they are good pages or bad pages. Even if you could marshal such a vast army of censors, they would have to attain an inhuman degree of precision and accuracy, or would be responsible for a system of censorship on a scale never before seen in the world, because they would be sitting in judgment on a medium whose scale was beyond any in human history.

Think, for a moment, of what it means to have a 99% accuracy rate when it comes to judging a medium that carries billions of publications.

Consider a hypothetical internet of a mere 20bn documents that is comprised one half “adult” content, and one half “child-safe” content. A 1% misclassification rate applied to 20bn documents means 200m documents will be misclassified. That’s 100m legitimate documents that would be blocked by the government because of human error, and 100m adult documents that the filter does not touch and that any schoolkid can find.

In practice, the misclassification rate is much, much worse. It’s hard to get a sense of the total scale of misclassification by censorware because these companies treat their blacklists as trade secrets, so it’s impossible to scrutinise their work and discover whether they’re exercising due care.

November 12, 2012

Firefox users more likely to stay on old version longer than other browser users

Filed under: Technology — Tags: , , — Nicholas @ 08:47

John Leyden summarizes the recent findings about how quickly users update their web browsers after a new release:

Nearly one in four netizens are using outdated web browsers and are therefore easy pickings for viruses and exploit-wielding crooks.

The average home user upgrades his or her browser to the latest version one month after it is released, according to a survey of 10 million punters. Two thirds of those using old browser software are simply stuck on the version prior to the latest release — the remaining third are using even older code.

Internet Explorer is the most popular browser (used by 37.8 per cent of consumers), closely followed by Google Chrome (36.5 per cent). Firefox is in third place with 19.5 per cent.

Firefox users tend to be the worst for keeping up to date with new software releases, according to the survey by security biz Kaspersky Lab. The proportion of users with the most recent version installed was 80.2 per cent for Internet Explorer and 79.2 per cent for Chrome, but just 66.1 per cent for Firefox.

Old-codgers Internet Explorer 6 and 7, with a combined share of 3.9 per cent, are still used by hundreds of thousands of punters worldwide.

October 27, 2012

Do you use a stupidly easy-to-guess password?

Filed under: Technology — Tags: , , , , — Nicholas @ 11:15

SplashData has released an updated list of the top 25 passwords gleaned by hackers from stolen password files:

# Password Change from 2011
1 password Unchanged
2 123456 Unchanged
3 12345678 Unchanged
4 abc123 Up 1
5 qwerty Down 1
6 monkey Unchanged
7 letmein Up 1
8 dragon Up 2
9 111111 Up 3
10 baseball Up 1
11 iloveyou Up 2
12 trustno1 Down 3
13 1234567 Down 6
14 sunshine Up 1
15 master Down 1
16 123123 Up 4
17 welcome New
18 shadow Up 1
19 ashley Down 3
20 football Up 5
21 jesus New
22 michael Up 2
23 ninja New
24 mustang New
25 password1 New

If you recognize any password on this list … do yourself a favour and change it to something not on the list, preferably using more characters (including upper and lower case letters, numbers, and symbols). And don’t use the same password on multiple sites! SplashData sells a password keeper application that is quite useful (I’ve been using it for years now), and is available for multiple platforms.

October 26, 2012

“Canada has effectively become the Digital Third World”

Filed under: Business, Cancon, Media, Technology — Tags: , , — Nicholas @ 09:21

In Forbes, Reuven Cohen looks at the state of internet access in Canada:

Before I get into what was discussed, I need to provide some context to the current state of Internet connectivity in Canada. To understand the Internet landscape in Canada is to endeavour into the realm of duopolies, bandwidth caps and mediocre Internet connections. As it stands today, Canada has effectively become the Digital Third World.

A recent video interview with The Globe and Mail’s Omar El Akkad and Netflix CEO Reed Hastings summaries the problems with cloud computing in Canada. Hastings’ specifically calls out capped Internet plans as compared to the rest of the world saying “Canada has the misfortune of being the country with the lowest internet caps maybe in the world but certainly in the developed world and in all of the Netflix world. In Mexico, Internet is largely uncapped; in the US it’s largely uncapped; in the UK it’s completely uncapped; in Canada there’s a number of providers with very low caps…I don’t quite understand it.”

Herein lies the problem, the widespread use of bandwidth caps in Canada is partially the result of a market defined by vast geographies and a limited population base. This has resulted in a highly concentrated market controlled by a small group of ISPs. Making things worse is a highly government controlled telecom industry that prevents foreign investments, particularly for wireless and broadband services. This combination of factors has led to one of the most restrictive markets for cloud computing as well as other internet related services found in any of the major industrialized nations today.

October 24, 2012

UN report says the internet is too vulnerable to terrorist use

Filed under: Liberty, Technology — Tags: , , , , — Nicholas @ 14:21

Mike Masnick views with alarm a new UN report that deserves to be viewed with alarm:

Ah, the UN. As highlighted by Declan McCullagh, a new report from the United Nations Counter-Terrorism Implementation Task Force, clocking in at an unwieldy 158 pages (pdf) warns that this old internet of ours is just too damn open, and that means terrorists can use it. Thus, it has to stop the openness. The report really is just about that bad: if terrorists might misuse it, it’s bad and must be stopped. The costs of locking up all this openness are brushed aside, if they’re even considered at all. Among the problems? How about open WiFi?

    ISPs may require users to provide identifying information prior to accessing Internet content and services. The collection and preservation of identifying information associated with Internet data, and the disclosure of such information, subject to the appropriate safeguards, could significantly assist investigative and prosecutorial proceedings. In particular, requiring registration for the use of Wi-Fi networks or cybercafes could provide an important data source for criminal investigations. While some countries, such as Egypt, have implemented legislation requiring ISPs to identify users before allowing them Internet access, similar measures may be undertaken by ISPs on a voluntary basis.

It seems like it should be a general rule that, if you’re supporting something that includes better surveillance tools by saying, “Hey, Egypt — the same country that recently had the people rise up to force out a dictator, who tried to shut down the internet — does it!” perhaps you don’t have a very good argument.

The report is basically one big “OMG! But… but… terrorists! Kill it!”

« Newer PostsOlder Posts »

Powered by WordPress