I’d just sent an email to Jon, my former virtual landlord, thanking him for sending me the last item I posted when my email client UI was replaced with this:

So, if you are expecting me to respond to an email, it may be a while before I can do that…

I’d just sent an email to Jon, my former virtual landlord, thanking him for sending me the last item I posted when my email client UI was replaced with this:

So, if you are expecting me to respond to an email, it may be a while before I can do that…
A new report says that the Chinese are hacking American computer networks at an alarming rate. This is hardly news. I’ve been including the phrase “早安,我抱歉有沒有在這封電子郵件中的商業秘密或加拿大色情。請停止殺害酷動物啄木鳥醫學。剛剛買了一些偉哥了” at the bottom of every e-mail for months (I put it just above where it says “Hello Mr. Holder!”). It means, according to Google translate: “Good Morning, I’m sorry there’s no trade secrets or Canadian porn in this e-mail. Please stop killing cool animals for pecker medicine. Just buy some Viagra already.”
What is new is the scope of the problem the report lays out. This is a thorny issue and I think the U.S. needs to be much, much more aggressive in combating it. Why it’s not a bigger issue for the WTO, for instance, is baffling to me. They are stealing our stuff, which strikes me as a bigger deal than taxing it at the border.
Explaining to the Chinese leadership that they shouldn’t be doing this because it’s wrong is like explaining to a dog licking its nethers that what he’s doing is bad manners: To the extent they understand at all, they couldn’t care less. They respect power. They understand when you put a price on bad behavior. So we need to put a price on Chinese hacking. It’s really that simple. The hard thing to figure out is how.
Jonah Goldberg, “Chiiiiiicoms in (Cyber) Spaaaaaaaaaaaace!”, The Goldberg File, 2013-05-31
Colby Cosh on the fascinating attempt by former Toronto Maple Leafs general manager Brian Burke to sue his alleged defamers on the internet:
Question: if you can defame someone on the internet, should they be able to sue you over the internet? Grouchy former Leafs GM Brian Burke intends to find out. His lawyers are set to appear in B.C. Supreme Court in Vancouver today, where they will argue that Burke should be able to serve notice of his defamation lawsuit against pseudonymous members of various internet forums by means of those forums themselves. “Ding! You’ve… got… mail.”
Early commentary on Burke’s lawsuit over claims he had an affair with a broadcaster was focused on the difficulty of tracking down internet anonymice and serving them with the right papers. The established pathway is to go through internet service providers to get them to disclose the identities behind IP addresses — but privacy-conscious tech firms don’t like to give up that info without a court order, and if Johnny Flapgums did not happen to post from home or work, a plaintiff is more or less out of luck anyway. In an unforeseen development, Burke is now asking the court to let him sue internet usernames as usernames, notifying the users of the action through the personal-messaging apparatus of the sites on which they posted their allegedly scurrilous comments.
If Burke succeeds with today’s motion, defendants such as “CamBarkerFan” and “Slobberface” will be forced into a tricky choice between fighting the lawsuit, and thus exposing themselves to a verdict, or laying low and allowing a default judgment to be entered against them, thus exposing themselves to the risk of being identified and penalized later without any chance of a defence.
Yahoo is spending $1.1 billion to acquire Tumblr:
Despite the breadth and diversity of life online, there are relatively few opportunities to make the kind of acquisitions that make the industry stop and take stock. Yahoo’s $1.1bn deal to buy Tumblr is one of those moments: a bold acquisition that says chief executive Marissa Meyer means business.
Comparisons to Yahoo’s 1999 $3.6bn acquisition of Geocities are too simplistic. In internet years, 1999 is more like two centuries ago and Yahoo is in a completely different place, led by a woman with all the zeal of a convert. Repeatedly passed over for promotion during her previous (another internet lifetime) 13 years at Google, she has an opportunity to do something impressive with Yahoo, which seemed in terminal decline. One venture capital executive told me that during the tenure of Carol Bartz, Mayer’s predecessor once removed, the investors were expecting Yahoo to ditch all but essential staff, focus on core revenue-building products and then rinse the company hard for maximum profit until it ran into the ground.
[. . .]
Yahoo was easy to write off in the tech community because it lacks the cool factor and developer kudos of Facebook and Google. But Yahoo’s power has always been in its more mainstream (though ageing) user base and its powerful display advertising business. Herein lies the key to its Tumblr acquisition. Though the fit with this hipster lite-blogging, photo-heavy platform could seem a little awkward, it makes sense in the context of Yahoo’s ad strategy.
Tumblr founder David Karp has always said its advertising model is based on Twitter’s “the tweet is the ad” principle. That is, that being embedded in a customised, personal flow of information, being relevant to an influential and proactive community is the most valuable and meaningful way of presenting display advertising right now. That makes Tumblr, integrated with Yahoo’s enormous expertise in display advertising, a diverse and demographically important platform for Yahoo that is mobile-heavy and social-focused.
A market I have to admit I was almost completely ignorant about, but it’s poised to become a very busy, competitive market if it can overcome a few hurdles:
There’s been a digital explosion in the market for pre-owned fashion. In the past year, we’ve seen a veritable land grab in the online consignment and resale space with the number of “re-commerce” sites now exceeding 50 — and many more, no doubt, incubating in Silicon Valley, New York, London and beyond. Several market levels are being addressed: mall/high street (Threadflip, Tradesy), thrift (LikeTwice, NiftyThrifty), upmarket (TheRealReal), haute vintage (Byronesque) and boutique (ReFashioner, my own company).
It may seem like these sites are dealing in a mere by-product of the fashion industry. But no, this is the product. Everything that’s bought becomes pre-owned. A tidal wave is building and it has the power to undermine or even destroy. Indeed, the stockpile of merchandise is overwhelmingly vast. I did the math in 2009 for ReFashioner’s beta, a luxury fashion swap site: $880 billion trapped in closets. And that’s just high-end womenswear in the US.
[. . .]
As with flash sales, this inventory is delimited by the retail market. And it’s wayward. The ROI sucks when every SKU is singular and inventory is locked up — literally — in houses. And there’s something of a standoff between buyer and seller: the non-professional seller, accustomed to seeing 100 percent mark-ups in the real world, wants top dollar for her career basics and contemporary designer wear, while the buyer wants Zappos-like service, Etsy pricing and Net-a-Porter merchandising. There are other issues too: resistance to higher ticket items without fittings, sketchy return policies, knock-off trading.
But there’s more. This merchandise is personal. It’s not just a numbers game, it’s about everything fashion means to us. It’s about honouring the past of the clothes and their place in our lives. If this is going to work, we need to add content and context. Idealistic, maybe. But idealism is how things get changed and idealism can work to the advantage of this category.
H/T to Virginia Postrel for the link.
In The Register, Lewis Page points out that the 3D printed “Liberator” isn’t actually much of a gun at all:
People are missing one important point about the “Liberator” 3D-printed “plastic gun”: it isn’t any more a gun than any other very short piece of plastic pipe is a “gun”.
You can take my Liberator … and shove it
Seriously. That’s all a Liberator is: a particularly crappy pipe, because it is made of lots of laminated layers in a 3D printer. Attached to the back of the pipe is a needlessly bulky and complicated mechanism allowing you to bang a lump of plastic with a nail in it against the end of the pipe.
An actual gun barrel is a strong, high quality pipe — almost always made of steel or something equally good — capable of containing high pressure gas. It has rifling down the inside, making it narrow enough that the hard, tough lands actually cut into the soft bullet jacket (too small for the bullet to actually move along, unless it is rammed with massive force). At the back end there is a smooth-walled section, slightly larger, into which a cartridge can be easily slipped.
It’s not much of a gun at all. But as with the old saying about the dancing bear, it’s not how well it dances but that it dances at all. After some 100,000 downloads, the company was requested to take the files offline on Thursday:
#DEFCAD has gone dark at the request of the Department of Defense Trade Controls. Take it up with the Secretary of State.
— Defense Distributed (@DefDist) May 9, 2013
Wired‘s Kim Zetter on how the NSA recommends its own analysts get the best intelligence use out of Google and other online tools:
There’s so much data available on the internet that even government cyberspies need a little help now and then to sift through it all. So to assist them, the National Security Agency produced a book to help its spies uncover intelligence hiding on the web.
The 643-page tome, called Untangling the Web: A Guide to Internet Research (.pdf), was just released by the NSA following a FOIA request filed in April by MuckRock, a site that charges fees to process public records for activists and others.
The book was published by the Center for Digital Content of the National Security Agency, and is filled with advice for using search engines, the Internet Archive and other online tools. But the most interesting is the chapter titled “Google Hacking.”
[. . .]
Stealing intelligence on the internet that others don’t want you to have might not be illegal, but it does come with other risks, the authors note: “It is critical that you handle all Microsoft file types on the internet with extreme care. Never open a Microsoft file type on the internet. Instead, use one of the techniques described here,” they write in a footnote. The word “here” is hyperlinked, but since the document is a PDF the link is inaccessible. No word about the dangers that Adobe PDFs pose. But the version of the manual the NSA released was last updated in 2007, so let’s hope later versions cover it.
As you probably guessed, he’s against it:
David French, Senior Vice President of the National Retail Federation, the major industry group lobbying for the so-called “Marketplace Fairness Act,” (more aptly named the “National Internet Tax Mandate”) recently commented that “…the law [governing Internet sales] today is a 20th-century interpretation of an 18th-century document…” Mr. French’s comments are typical of those wishing to expand government power beyond the limits established by the United States Constitution.
[. . .]
The National Internet Tax Mandate overturns the Supreme Court’s 1992 Quill v. North Dakota decision that states can only force businesses to collect sales tax if the business has a “physical presence” in the state. Quill represented a rare instance where the Supreme Court properly interpreted the Commerce Clause. Thanks to the Quill decision, the Internet has remained a tax-free zone, though some states require consumers to later pay taxes on products they purchased online. This freedom has helped turn the Internet into a thriving and dynamic sector of the economy, to the benefit of entrepreneurs and consumers.
Now that status is threatened by an alliance of big business and tax-hungry state governments seeking new powers to force out-of-state business to collect state sales taxes. Far from updating the Constitution to fit the needs of the 21st century, the National Internet Tax Mandate is a throwback to 18th century mercantilism.
The National Internet Tax Mandate will raise the costs of doing business over the Internet. Large, established Internet companies, such as Amazon, can absorb these costs, whereas their smaller competitors cannot. More importantly, the Mandate’s increased costs and regulations could prevent the creation and growth of the next Amazon.
In Wired, Marcus Wohlsen theorizes that the inherent dork factor will be the biggest hurdle for Google Glass:
The Segway. The Bluetooth headset. The pocket protector.
What do these three technologies have in common? They all pretty much work as promised. They all seem like good ideas on paper. And they’re all too dorky to live.
Now, far be it from me to claim that nerdiness equals lack of popularity potential. But I contend that dorkiness and nerdiness are two different qualities. While nerdiness implies a certain social awkwardness that’s ultimately endearing, dorkiness connotes social obliviousness that opens you to deserved ridicule.
Guess which category Google Glass will fall under when it goes “mainstream?”
Forget about the privacy concerns for a second. I don’t think you have to get that serious to recognize the inherent antisocialness of Google Glass. All you have to do is look at the guy in the picture at the top of this post. Or any of the rest of the guys on White Men Wearing Google Glass, a new Tumblr that serves up the data needed to transform the hypothesis “Google Glass is too dorky to succeed” into a proven scientific theory.
Disagree? The floor is open for falsification. Start your own Tumblr: People Who Look Cool While Wearing Google Glass.
CNET‘s Declan McCullagh talks about an upcoming documentary release:
From Aaron Swartz’s struggles with an antihacking law to Hollywood’s lobbying to a raft of surveillance proposals, the Internet and its users’ rights are under attack as never before, according to the creators of a forthcoming documentary film.
The film, titled War for the Web, traces the physical infrastructure of the Internet, from fat underwater cables to living room routers, as a way to explain the story of what’s behind the high-volume politicking over proposals like CISPA, Net neutrality, and the Stop Online Piracy Act.
“People talk about security, people talk about privacy, they talk about regional duopolies like they’re independent issues,” Cameron Brueckner, the film’s director, told CNET yesterday. “What is particularly striking is that these issues aren’t really independent issues…. They’re all interconnected.”
The filmmakers have finished 17 lengthy interviews — including what they say is the last extensive one that Swartz, the Internet activist, gave before committing suicide in January — that have yielded about 24 hours of raw footage. They plan to have a rough cut finished by the end of the year, and have launched a fundraising campaign on Indiegogo that ends May 1. (Here’s a three-minute trailer.)
Swartz, who was charged under the Computer Fraud and Abuse Act, faced a criminal trial that would have begun this month and the possibility of anywhere from years to over a decade in federal prison for alleged illegal downloads of academic journal articles. He told the filmmakers last year, in an interview that took place after his indictment, that the U.S. government posed a more serious cybersecurity threat than hackers:
They cracked into other countries’ computers. They cracked into military installations. They have basically initiated cyberwar in a way that nobody is talking about because, you know, it’s not some kid in the basement somewhere — It’s President Obama. Because it’s distorted this way, because people talk about these fictional kids in the basement instead of government officials that have really been the problem, it ends up meaning that cybersecurity has been an excuse to do anything…
Now, cybersecurity is important. I think the government should be finding these vulnerabilities and helping to fix them. But they’re doing the opposite of that. They’re finding the vulnerabilities and keeping them secret so they can abuse them. So if we do care about cybersecurity, what we need to do is focus the debate not on these kids in a basement who aren’t doing any damage — but on the powerful people, the people paying lots of money to find these security holes who then are doing damage and refusing to fix them.
In the Globe and Mail, Tabatha Southey is uncomfortable with the way members of Anonymous, Reddit, 4chan, and other online quasi-organizations leaped into the fray:
The Internet is brimming with people who want to help. To help you prune an orchid, perfect the shape of your gnocchi. Shortly after the bombings this week, hundreds of Bostonians posted offers of accommodations, spare rooms and couches.
Most assistance is graciously received, yet I was surprised last week to see how many people embraced the announcement by the self-appointed public conscience Anonymous that it had investigated the unbearably sad Nova Scotia case of 17-year-old Rehtaeh Parsons, who killed herself after she was allegedly gang-raped at a summer party, then was tormented over the incident.
[. . .]
Anonymous as an organization doesn’t really exist. It’s more of a meme — a concept, or behaviour that spreads within a community — than an agency. Anyone who says they’re Anonymous is Anonymous, which makes the groundswell of support its actions received so understandable.
I think a lot of us, upon learning of Rehtaeh’s death, wanted to go to Nova Scotia and shake those kids until something that looked closer to truth came out. Anonymous’s motivations are much like ours, and it can be difficult to remember that the presumption of innocence should be given more weight, not less, the more heinous the crime; the part that is almost the best in us screams otherwise.
Anonymous is not composed of superheroes, nor is it evil. Anonymous is just your nephew, or your neighbour, or you. We cede our pursuit of justice to that highly distractable quarter to our peril.
One only had to see that massive game of Where’s Waldo? taking place on Reddit this week to witness both the good intention, the potential and the problems inherent in crowd-sourced jurisprudence.
Don’t bet on the decentralized currency Bitcoin as a retirement investment, says Mercatus Center policy analyst Jerry Brito, but go long on it as the payment system of the future. Reason‘s Nick Gillespie talks with Brito, the editor of the new anthology Copyright Unbalanced, about Bitcoin bubbles and why governments are so afraid of this virtual payment system.
At Marginal Revolution, Alex Tabarrok summarizes the findings from a recent large study:
In a large, randomized experiment Bowen et al. found that students enrolled in an online/hybrid statistics course learned just as much as those taking a traditional class (noted earlier by Tyler). Perhaps even more importantly, Bowen et al. found that the online model was significantly less costly than the traditional model, some 36% to 57% less costly to produce than a course using a traditional lecture format. In other words, since outcomes were the same, online education increased productivity by 56% to 133%! Online education trumps the cost disease!
Bowen et al. caution that their results on cost savings are speculative and it is true that they do not include the fixed costs of creating the course (either the online course or the traditional course) so these cost savings should be thought of as annual savings in steady-state equilibrium. The main reason these results are speculative, however, is that Bowen et al. only considered cost savings from faculty compensation. Long-run cost reductions from space savings may be even more significant, as the authors acknowledge.
The university model we’ve known for centuries is long overdue for change. However, remember that just about every new communication technology was touted as being “revolutionary” for education: the printing press, radio, movies, TV, and now online courses. The traditional university model has survived each new technological breakthrough relatively unscathed.
At The Verge, Joshua Kopstein outlines the state of play in 3D printing, guns, and the hacker subculture:
Cyberculture icon Stewart Brand’s famous notion that “information wants to be free” has been an almost ubiquitous refrain ever since utopian-minded hackers began populating computer networks in the 1980s. Today, 3D printing has given the phrase a whole new meaning, allowing raw data to become real world weapons with the click of a button. Cody R. Wilson, the antagonistic founder of Defense Distributed, is taking that idea to its logical — and hugely controversial — extreme.
Having recently obtained his federal manufacturing license, Wilson hopes to release files for the world’s first fully 3D-printable firearm by the end of this month. His past progress has already thrown a major wrench into America’s resurgent gun control debate, feeding doubts about the efficacy of renewed bans on undetectable firearms. But his reasoning, he claims, isn’t really about the Second Amendment at all — it’s about technological progress rendering the very concept of gun control meaningless.
“It’s more radical for us,” he told Motherboard in “Click Print Gun,” a recent mini-doc about the dark side of the 3D printing revolution. “There are people all over the world downloading our files and we say ‘good.’ We say you should have access to this. You simply should.”
If this all sounds very similar to the good gospel spread by Brand and advanced by progressives and activists like the late Aaron Swartz, you’re hearing it right. But even without the context of Wilson’s operation, firearms and freedom of information share a strangely similar history, an oft-overlooked ideological confluence between hackers and gun advocates that seems to be gaining momentum.
Powered by WordPress