Quotulatiousness

April 12, 2013

The nasty phenomenon of “revenge porn” websites

Filed under: Business, Law, Liberty, Technology — Tags: , , — Nicholas @ 11:19

In the Guardian, Adam Steinbaugh looks at the legal side of fighting against “revenge porn”:

A jilted ex-paramour seeks vengeance on a former lover. His trump card is a nude photo he acquired in happier times. In the dark corners of the internet, revenge porn sites are happy to help out, posting these photos alongside the subject’s full name, address and even phone number. The result for the victim can be anything from terrible embarrassment to potential job loss, and all accompanied by threats and harassment from people whose greatest contribution to society is usually surpassed by the average YouTube comment.

While ex-lovers act out of malice, the site operators act with sociopathic greed. With embarrassing photos often featuring prominently in Google results, the sites often advertise “independent” takedown services charging upwards of $300 (£195) to quickly remove photos — cheaper and faster than hiring a lawyer. Those extortionate services usually turn out to be fronts run by the site owners themselves. One even concocted a fake lawyer (“David Blade III, Esq”) to give his business a more legitimate face.

While the people who upload the photos can almost certainly risk significant civil liability, revenge porn sites are protected in the United States by the Communications Decency Act. The CDA requires that responsibility for tortious acts online (like defamation or invasion of privacy) lie with whoever created the content, not those who facilitate its dissemination.

The Economist explains how Bitcoins work

Filed under: Economics, Technology — Tags: , , , , — Nicholas @ 09:28

A brief overview of the much-talked-about digital currency:

BITCOIN, the world’s “first decentralised digital currency”, was launched in 2009 by a mysterious person (or persons) known only by the pseudonym Satoshi Nakamoto. It has been in the news this week as the value of an individual Bitcoin, which was just $20 at the beginning of February, hit record highs above $250, before falling abruptly to below $150 on April 11th. What exactly is Bitcoin, and how does it work?

Unlike traditional currencies, which are issued by central banks, Bitcoin has no central monetary authority. Instead it is underpinned by a peer-to-peer computer network made up of its users’ machines, akin to the networks that underpin BitTorrent, a file-sharing system, and Skype, an audio, video and chat service. Bitcoins are mathematically generated as the computers in this network execute difficult number-crunching tasks, a procedure known as Bitcoin “mining”. The mathematics of the Bitcoin system were set up so that it becomes progressively more difficult to “mine” Bitcoins over time, and the total number that can ever be mined is limited to around 21m. There is therefore no way for a central bank to issue a flood of new Bitcoins and devalue those already in circulation.

And a bit more technical detail:

All transactions are secured using public-key encryption, a technique which underpins many online dealings. It works by generating two mathematically related keys in such a way that the encrypting key cannot be used to decrypt a message and vice versa. One of these, the private key, is retained by a single individual. The other key is made public. In the case of Bitcoin transactions, the intended recipient’s public key is used to encode payments, which can then only be retrieved with the help of the associated private key. The payer, meanwhile, uses his own private key to approve any transfers to a recipient’s account.

This provides a degree of security against theft. But it does not prevent an owner of Bitcoins from spending his Bitcoins twice—the virtual analogue of counterfeiting. In a centralised system, this is done by clearing all transactions through a single database. A transaction in which the same user tries to spend the same money a second time (without having first got it back through another transaction) can then be rejected as invalid.

The whole premise of Bitcoin is to do away with a centralised system. But tracking transactions in a sprawling, dispersed network is tricky. Indeed, many software developers long thought it was impossible. It is the problem that plagued earlier attempts to establish virtual currencies; the only way to prevent double spending was to create a central authority. And if that is needed, people might as well stick with the government devil they know.

To get around this problem, Bitcoins do not resemble banknotes with unique serial numbers. There are no virtual banknote files with an immutable digital identity flitting around the system. Instead, there is a list of all transactions approved to date. These transactions come in two varieties. In some, currency is created; in others, nominal amounts of currency are transferred between parties.

April 10, 2013

If there’s a “Bitcoin bubble”, it doesn’t predict long term success or failure for the currency

Filed under: Economics, History, Technology — Tags: , , , , , — Nicholas @ 12:55

In Forbes, Tim Worstall explains that calling the current rise in Bitcoin value a bubble does not actually pass a judgement on whether Bitcoin will be a long term success:

And yes, I’m still of the opinion that Bitcoin is in a bubble. You know the walks like a duck, quacks like a duck idea? If it does those then it’s a duck. And the price changes that we’re seeing in Bitcoin make me and many other observers think that Bitcoin really is in a bubble. Indeed, there’s some nice work here showing that many of the Bitcoins in existence are being hoarded and that in itself is bubble behaviour.

However, do let me make one more thing clear: whether or not Bitcoin is in a bubble or not doesn’t mean that Bitcoin will succeed or not. They are entirely different questions, as different as is your wife Welsh or is your dog female? They really have no connection with each other at all.

Let us take the standard bubble example always used, the Dutch tulipmania. We could use others, the South Sea Bubble, the dot com boom, or we could even use an entirely different set of examples, say the introduction of the automobile. That last being when a new technology arrived without a speculative bubble around it.

The point of the first three, and let’s stick with tulips, is that there really was a quite obvious bubble in the prices of them. Most of the participants in the bubble (as with the other two) knew quite well that it was a bubble too. Prices were way out of line with any sort of “true value”. However, do note this very well: the tulip did indeed go on to become an important part of the Dutch economy. Indeed, it’s still there right now. Vast fields of tulips are grown there every year to supply cut flowers and bulbs for replanting that are shipped all over Europe. It’s actually become so important that other flowers, grown outside Europe, are still marketed through Holland as that’s where all the skill and infrastructure is.

April 9, 2013

Bitcoins as Tulips or viable virtual gold?

Filed under: Economics, Law, Liberty — Tags: , , , , — Nicholas @ 10:27

In the New Yorker, Maria Bustillos reviews the history of bitcoins:

In many ways, bitcoins function essentially like any other currency, and are accepted as payment by a growing number of merchants, both online and in the real world. But they are generated at a predetermined rate by an open-source computer program, which was set in motion in January of 2009. This program produced each one of the nearly eleven million bitcoins in circulation (with a total value just over a billion dollars at the current rate of exchange), and it runs on a massive peer-to-peer network of some twenty thousand independent nodes, which are generally very powerful (and expensive) G.P.U. or ASIC computer systems optimized to compete for new bitcoins. (Standards vary, but there seems to be a consensus forming around Bitcoin, capitalized, for the system, the software, and the network it runs on, and bitcoin, lowercase, for the currency itself.)

[. . .]

There is an upper limit of twenty-one million new coins built into the software; the last one is projected to be mined in 2140. After that, it is presumed that there will be enough traffic to keep rewards flowing in the form of transaction fees rather than mining new coins. For now, the bitcoins are initially issued to the miners, but are distributed when miners buy things with them or sell them to non-miners (such as jumpy Spanish bank depositors) who desire an alternative currency. The chain of ownership of every bitcoin in circulation is verified and registered with a timestamp on all twenty thousand network nodes. This prevents double spending, since no coin can be exchanged without the authentication of some twenty thousand independent cyber-witnesses. In order to hack the network, you would have to deceive over half of these computers at the same time, a progressively more difficult task and, even today, a very formidable one.

[. . .]

A casual review of Nakamoto’s various blog posts and bulletin-board comments also confirms that, from the first, Bitcoin was devised as a system for removing the possibility of corruption from the issuance and exchange of currency. Or, to put it another way: rather than trusting in governments, central banks, or other third-party institutions to secure the value of the currency and guarantee transactions, Bitcoin would place its trust in mathematics. At the P2P Foundation, Nakamoto wrote a blog post describing the difference between bitcoin and fiat currency:

    [Bitcoin is] completely decentralized, with no central server or trusted parties, because everything is based on crypto proof instead of trust. The root problem with conventional currency is all the trust that’s required to make it work. The central bank must be trusted not to debase the currency, but the history of fiat currencies is full of breaches of that trust. Banks must be trusted to hold our money and transfer it electronically, but they lend it out in waves of credit bubbles with barely a fraction in reserve. We have to trust them with our privacy, trust them not to let identity thieves drain our accounts… With e-currency based on cryptographic proof, without the need to trust a third party middleman, money can be secure and transactions effortless.

* * *

Much of what has been written so far about bitcoins has centered on the perceived dangers of their relative anonymity, the irreversibility of transactions, and on the fact that they can be used for money laundering and for criminal dealings, such as buying drugs on the encrypted Web site Silk Road. This fearmongering is a red herring, and has so far prevented the rational evaluation of the potential benefits and shortcomings of crypto-currency.

Cash is also anonymous; it is also used in money laundering and illegal transactions. Like bitcoins, stolen cash is difficult to recover, and a cash transaction can’t readily be traced back to the source. Nor is there immediate recourse for the reversal of transactions, as with credit-card chargebacks or bank refunds when one’s identity has been stolen. However, I find it difficult to believe that anyone who has written critically of the dangers of bitcoin would prefer an economy where private cash transactions are illegal.

Update: Meet the $2 Million Bitcoin Pizza.

Floridian Laszlo Hanyecz thought it would be “interesting” to be able to say he paid for a pizza in bitcoins. He worked out a deal where he transferred 10,000 of his bitcoins to a guy in England, who ordered him two pizzas from Papa Johns.

Today, one Redditor notes, those 10,000 bitcoins would be worth about $2.3 million, thanks (in part) to folks fleeing unstable and politically risky state currencies in Cyprus and elsewhere.

Some news outlets are covering this as a “doh!” story. But these pizzas were a huge publicity boon for Bitcoin, contributing to the success of the currency today. If Lazslo had been a hoarder, perhaps his bitcoins would be worth very little now. Cashing in bitcoins for pizza when they were worth a fraction of a cent each is not obviously smarter or stupider than selling now would be, with bitcoins trading at $234. It’s a bet on which way the market is headed, that’s all.

March 29, 2013

If cable company ads were honest, we’d see something very similar to this

Filed under: Business, Cancon, Media — Tags: , , , , — Nicholas @ 10:10

H/T to Joey “Accordion Guy” deVilla for the link.

If North American cable-and-internet providers were honest, they’d produce an ad that went like this. Note that there’s some swearing involved, as is often the case with cable-and-internet providers.

March 27, 2013

MI5 and GCHQ will include assistance from the IT industry in the fight against online crime

Filed under: Britain, Government, Technology — Tags: , , , , — Nicholas @ 08:42

Two of the British government’s top intelligence agencies will team up with specialists from the IT field in a new initiative to counter online “cyber” crime:

Cyber-security experts from industry are to operate alongside the intelligence agencies for the first time in an attempt to combat the growing online threat to British firms.

The government is creating a so-called fusion cell where analysts from MI5 and GCHQ, the domestic eavesdropping agency, will work with private sector counterparts.

The cell is part of the Cyber Security Information Sharing Partnership (Cisp), launched on Wednesday, to provide industry with a forum to share details of techniques used by hackers as well as methods of countering them.

At any one time there will be about 12 to 15 analysts working at the cell, based at an undisclosed location in London.

“What the fusion cell will be doing is pulling together a single, richer intelligence picture of what is going on in cyberspace and the threats attacking the UK,” a senior official said.

John Leyden at The Register has more:

The programme, which follows a successful pilot scheme in 2011, is designed to support the wider aims of the UK’s cyber security strategy: such as making Britain the best country in the world to do e-business and protecting critical components of the national infrastructure (ie banks, utilities, telecoms and power grid).

Eighty companies from five key sectors of the economy — finance, defence, energy, telecommunications and pharmaceuticals — were encouraged to share information as part of the pilot scheme. The wider programme (involving a reported 160 organisations, at least initially) will allow access to a secure web-portal to gain access to shared threat intelligence information in real time, the BBC reports.

[. . .]

Terry Greer-King, UK MD for internet security firm Check Point, commented:

“This is a key step forward for both Governments and business in fighting web attacks, and reducing their impact. It’s essential that organisations collaborate and share intelligence with each other to track emerging threats, mitigate their severity or block them before they cause damage. Fighting threats together is much more effective than fighting alone.”

“In 2012, our research found that 63 per cent of organisations were infected with bots, and 54 per cent infected with malware that they didn’t know about. Any move which helps to reduce these figures is very welcome,” he added.

March 26, 2013

Tunisians troll their own government with memestorm

Filed under: Africa, Government, Media — Tags: , , , , , — Nicholas @ 08:38

Timothy Geigner on the Tunisian response to a government that fails to comprehend YouTube:

You will remember the nation of Tunisia for being a flash point of the Arab Spring revolution, in which social media and the internet played a massive role, as well as for the post-revolution government’s subsequent crackdown on those tools that brought them into power. There seems to be something of an ongoing problem within Middle East governments, in that they simply don’t recognize how to handle popular dissent, often taking on the very characteristics of the dissenter’s complaints to an almost caricature level. In that respect, while it may sound silly, any government learning to deal with the open communication system of the net is going to have to come to terms with memes and the manner in which they spread.

Which brings us back to Tunisia. They seem to have a problem with this Gangnam Style, Harlem Shake combo-video produced by some apparently fun-loving Tunisian students (the original was taken down due to a highly questionable copyright claim, by the way, because while even the Tunisian government wasn’t evil enough to block the video, a bogus DMCA claim had no such qualms).

You can guess how the Tunisians reacted…

March 19, 2013

New British press control rules to apply to the internet … the whole internet

Filed under: Britain, Law, Liberty, Media — Tags: , , , — Nicholas @ 12:37

In Forbes Tim Worstall explains why the British government’s new Ministry of Truth press censorship body will have effective reach across the entire internet:

This isn’t what they think they’ve done, this is true. And it’s also not what they intended to do (or at least I hope they didn’t mean to do this) but it is still what they’ve done. They’ve passed a law which effectively censors the entire world’s media. And they’ve done this simply because they are ignorant of the very laws they’re trying to change. Which is, I think you’ll agree, a little disturbing, that politicians would casually negate press freedom just because they don’t know what they’re doing.

[. . .]

It’s a standard Common Law assumption that publication does not take place where the printing presses (or servers etc) are. Publication takes place where something is made available to be read or seen. We’ve even had two recent cases that show this. Rachel Ehrenfeld published a book in the US and yet was still sued for libel in London. For a few copies of that book had made it over to England and thus it was deemed that publication had taken place where English libel law prevailed. Just in case you think that this is some English peculiarity there was a very similar case with Dow Jones in Australia. Something was published in New York. But it was read in Australia (remarkably, by the man the piece was about, he downloaded it) and this was sufficient for the Australian courts to agree that therefore the potential libel had occurred in Oz and should be tried under Oz law.

This is even clearer with reference to child pornography laws. “Production” of child pornography includes the act of downloading such. For before it was downloaded there was one copy, on the server. Once downloaded, there are two, one on the server, the other in the browser. Thus the downloading is in itself the production of that pornography. This very point is drawn from the standard Common Law principles about publication.

Therefore, it doesn’t matter where your servers are. For that’s not what defines publication. It also doesn’t matter who the material is aimed at: nor even what language it is in. Publication happens if someone in the UK downloads whatever it is. That, in itself, is the act of publication.

March 17, 2013

Proposed British press regulation will apply to bloggers as well

Filed under: Britain, Law, Liberty, Media — Tags: , , , , , — Nicholas @ 11:55

Guido Fawkes offers a warning to those bloggers cheerleading for the British government to impose controls on the tabloid press:

One thing that surprises Guido is that his comrades in the liberal, progressive blogosphere have seemingly not noticed that the proposed Royal Charter aims to control and regulate them as well as the tabloids.

Schedule 4, Point 1 of both the government and the opposition’s versions of the Royal Charter will bring blogs under the regulator’s control:

    “relevant publisher” means a person (other than a broadcaster) who publishes in the United Kingdom: a. a newspaper or magazine containing news-related material, or b. a website containing news-related material (whether or not related to a newspaper or magazine)”

[. . .]

To all those bloggers who support this press control Charter because they hate Murdoch and Dacre, Guido offers this cautionary counsel, remember that the new regulator will cover you as well. You will have all the expense and bureaucracy of compliance as Murdoch and Dacre face, without the means. Unless like Guido and the Spectator you plan to become media outlaws too…

March 15, 2013

Will the death of Google Reader also be the death of RSS?

Filed under: Business, Media, Technology — Tags: , , , — Nicholas @ 10:14

Felix Salmon on the knock-on ramifications of Google’s announcement that it is killing Google Reader:

But whether or not Reader was ever going to be a good business for Google, it was from day one a fantastic public service for its users. Google started as a public service — a way to find what you were looking for on the internet — and didn’t stop there. Google would also do things like buy the entire Usenet archives, or scan millions of out-of-print books, or put thousands of people to work making maps, all in order to be able to get all sorts of information to anybody who wants it. [. . .]

The problem with the death of Reader is that it was the architecture underpinning lots of other services — the connective tissue of just about all RSS readers and services, from Summify to Reeder to Flipboard. You didn’t even need to use Google Reader; it was just the master central repository of your master OPML list, all the different feeds that you were subscribed to. Google spent real money to provide that public service, and it’s going to be sorely missed. As Marco Arment says, “every major iOS RSS client is still dependent on Google Reader for feed crawling and sync.”

Arment sees a silver lining in the cloud, saying that with Google gone, “we’re finally likely to see substantial innovation and competition in RSS desktop apps and sync platforms for the first time in almost a decade.” I’m less sanguine. Building an RSS sync platform is a hard and pretty thankless task, it costs real money, and it might not work at all — especially in a world where less and less content is actually available in RSS format. (You can subscribe to my Tumblr feed in RSS format, but there’s no such feed for my posts on Twitter or Facebook or Instagram or Path or even Google+.)

RSS has been dying for years — that’s why Google killed Reader. It was a lovely open format; it has sadly been replaced with proprietary feeds like the ones we get from Twitter and Facebook. That’s not an improvement, but it is reality. Google, with Reader, was really providing the life-support mechanism for RSS. Once Reader is gone, I fear that RSS won’t last much longer.

March 11, 2013

Best comment on the EU move to penalize Microsoft over web browser choice

Filed under: Europe, Humour, Law, Technology — Tags: , , , — Nicholas @ 09:06

From “Purp” at Ace of Spades H.Q.:

In other news, the EU plans to fine Microsoft $700M dollars because European users are apparently too stupid to figure out they can download other browsers for free. Porn and bootleg software? Mad skilz baby, mad skilz. Browsers? Not so much…huh? what? where am I? what is this thing, why does it beep? Help, I’ve fallen down and can’t get up.

The fine works out to around $50 for each machine in violation that was shipped by OEM’s. The EU says they’re cutting Microsoft a bargain cuz they could have been fined $7B, or $500/machine. Either way, its a pretty harsh shakedown caused by Euro-users (apparently) being lemming like incompetent imbeciles who are unaware other stuff exists. Its truly a wonder they manage to find the power switch…or maybe the EU sends out specially trained techs to turn on computers for people?

March 9, 2013

More on EU proposal to ban all forms of pornography

Filed under: Europe, Liberty, Media, Politics — Tags: , , , — Nicholas @ 10:37

In the Telegraph, Bruno Waterfield follows up on yesterday’s story (linked here):

Controversy has erupted over next Tuesday’s European Parliament resolution “on eliminating gender stereotypes in the EU”, meant to mark international women’s day, after libertarian Swedish MEPs from the Pirate Party spotted the call for a ban in the small print.

While not legally binding, the vote could be the first step towards European legislation as the EU’s assembly increasingly flexes its political muscle within Europe’s institutions.

The proposal “calls on the EU and its member states to take concrete action on discrimination against women in advertising… [with] a ban on all forms of pornography in the media”.

Kartika Liotard, a Dutch left-wing feminist MEP, is seeking “statutory measures to prevent any form of pornography in the media and in advertising and for a ban on advertising for pornographic products and sex tourism”, including measures in the “digital field”.

The MEPs are also demanding the establishment of state sex censors with “a mandate to impose effective sanctions on companies and individuals promoting the sexualisation of girls”.

March 8, 2013

EU politicians perform modern day King Canute act

Filed under: Europe, Liberty, Media, Politics — Tags: , , , , — Nicholas @ 09:55

Yup. They’re standing up for equality on the internet by calling for a ban on online porn:

MEPs are being urged to back a non-binding resolution that calls on the European Parliament to, in effect, ban pornography from the internet. A group of Euro politicos hope the web filth block will bring about a “genuine culture of equality” online.

A motion was tabled this week by the EU’s committee on women’s rights and gender equality. A report titled Eliminating Gender Stereotypes in the EU urged all members of the European Parliament to support the draft resolution.

The panel stated that a policy to put an end to stereotypes portrayed in the media would “of necessity involve action in the digital field”. The committee added that the EU would be required to coordinate action to develop a “genuine culture of equality on the internet”.

February 28, 2013

Cybersecurity … can it be anything more than fear + handwaving = “we must have a law!”

Filed under: Business, Government, Law, Technology — Tags: , , , , , — Nicholas @ 00:01

At Techdirt, Mike Masnick fisks “the worst article you might ever read about ‘Cybersecurity'”:

There has been a lot of discussion lately about “cybersecurity” “cyberwar” “cyberattacks” and all sorts of related subjects which really really (really!) could do without the outdated and undeniably lame “cyber-” prefix. This is, in large part, due to the return of CISPA along with the White House’s cybersecurity executive order. Of course, the unfortunate part is that we’re still dealing in a massive amount of hype about the “threats” these initiatives are trying to face. They’re always couched in vague and scary terms, like something out of a movie. There are rarely any specifics, and the few times there are, there is no indication how things like CISPA would actually help. The formula is straightforward: fear + handwaving = “we must have a law!”

However, I think we may now have come across what I believe may top the list of the worst articles ever written about cybersecurity. If it’s not at the top, it’s close. It is by lawyer Michael Volkov, and kicks off with a title that shows us that Volkov is fully on board with new laws and ramping up the FUD: The Storm Has Arrived: Cybersecurity, Risks And Response. As with many of these types of articles, I went searching for the evidence of these risks, but came away, instead, scratching my head, wondering if Volkov actually understands this subject at all, with his confused thinking culminating in an amazing paragraph so full of wrong that almost makes me wonder if the whole thing is a parody.

[. . .]

There’s been plenty of talk about these Chinese hacks, which definitely do appear to be happening. But, what economic activity has been undermined? So far, the hacks may have been a nuisance, but it’s unclear that they’ve done any real damage. It is also unclear how CISPA helps stop such hacks, other than making Congress feel like it’s “done something.”

Are there issues with online security that need to be taken seriously? Yes, absolutely. Do we need legislation to deal with those problems? That’s debatable, and we’re still waiting for some evidence not just of scary sounding threats, but that this kind of legislation will actually help. Unfortunately, this article keeps us waiting. But, it did make us laugh. Unintentionally (we think).

February 13, 2013

US Cyber Command’s recruiting headache

Filed under: Bureaucracy, Military, Technology, USA — Tags: , , , — Nicholas @ 09:23

Strategy Page on the “who could possibly have seen this coming” problems that the new electronic warfare organization is having with staffing:

U.S. Cyber Command (USCYBERCOM) has been operational for two years now, and it is encountering some serious problems in recruiting people qualified to deal with the enemy (skilled hackers attacking American networks for whatever reason). People in the software and Internet security business have been telling Cyber Command leaders that they will have to change the way they recruit if they want to get qualified people. That means hiring hackers who lived on the dark side (criminal hacking) at one point or another. Such recruits would not pass the screening usually given to potential government employees who would be handling, and protecting, classified information and critical Internet systems. Few government officials are willing to bend the rules, mainly because no one wants to be responsible for some rogue hacker who got hired without the usual screening. It’s safer to go by the book and use that for your defense when the inadequate recruiting effort leads to a major Cyber War disaster.

Cyber Command is headquartered in Fort Meade (outside Washington, DC), most of the manpower, and capabilities, come from the Cyber War operations the military services have already established. Within Cyber Command there are some smaller organizations that coordinate Cyber War activities among the services, as well as with other branches of the government and commercial organizations that are involved in network security. At the moment Cyber Command wants to expand its core staff from 900 to 4,900 in the next five years. Twenty percent of those new people will be civilians, including a number of software specialists sufficiently skilled to quickly recognize skillful intrusions into American networks and quickly develop countermeasures. That kind of talent is not only expensive, but those who possess often have work histories that don’t pass the normal screening. These are the personnel Cyber Command is having a difficult time recruiting.

The big problems are not only recruiting hackers (technical personnel who can deal with the bad-guy hackers out there) but also managing them. The problem is one of culture, and economics. The military is a strict hierarchy that does not, at least in peacetime, reward creativity. Troops with good technical skills can make more money, and get hassled less, in a similar civilian job. The military is aware of these problems, but it is slow going trying to fix them.

« Newer PostsOlder Posts »

Powered by WordPress