The iPhone vision of the mobile Internet’s future omits controversy, sex, and freedom, but includes strict limits on who can know what and who can say what. It’s a sterile Disney-fied walled garden surrounded by sharp-toothed lawyers. The people who create the apps serve at the landlord’s pleasure and fear his anger.
I hate it.
I hate it even though the iPhone hardware and software are great, because freedom’s not just another word for anything, nor is it an optional ingredient.
The big thing about the Web isn’t the technology, it’s that it’s the first-ever platform without a vendor (credit for first pointing this out goes to Dave Winer). From that follows almost everything that matters, and it matters a lot now, to a huge number of people. It’s the only kind of platform I want to help build.
Apple apparently thinks you can have the benefits of the Internet while at the same time controlling what programs can be run and what parts of the stack can be accessed and what developers can say to each other.
I think they’re wrong and see this job as a chance to help prove it.
The tragedy is that Apple builds some great open platforms; I’ve been a happy buyer of their computing systems for some years now and, despite my current irritation, will probably go on using them.
Tim Bray, “Now a No-Evil Zone”, ongoing, 2010-03-15
March 16, 2010
QotD: The iPhone vision of the mobile internet
March 10, 2010
Some things never change
I was looking though some old postings and found this little gem, which is as true as ever:
It is a sad real-world fact that most legislators, when presented with something they do not understand, almost always attempt to ban it. This probably started with the first neolithic fire-tamer . . . who was probably beaten to death with sticks when the tribal shaman saw it. Senator Hatch is showing all the finely nuanced reactions of Ug the caveman here.
This was in reaction to Senator Orrin Hatch introducing a bill to make peer-to-peer file sharing illegal back in 2004.
Slight stylesheet change
A comment by “sm” let me know that not everyone was seeing the same formatting on the blog that I was seeing (the term he used was “spidery” to describe the text). As I’m not an expert at stylesheets, I consulted Jon, my former virtual landlord. He quickly diagnosed the problem as a stray lettering specification which affected most paragraphs, but which didn’t show up for visitors using ClearType. Each of the machines I’d been using to post on the blog had ClearType turned on, so I wasn’t seeing any issues.
So I’ve changed the stylesheet to remove the negative letter spacing, which should provide a better viewing experience for anyone not using Windows XP/Vista.
March 9, 2010
Opening the door to arbitrary punishment
Cory Doctorow talks about why the proposed “three strikes” internet ban is such a stupid idea:
March 2, 2010
QotD: The true nature of school
If you objected to high school students getting spied on in their homes by school district-issued webcams, maybe junior high students under nonstop cam surveillance on school grounds by a tubby administrator with a chinbeard (but no chin) will be the charm [. . .] I’m creeped out by the obvious glee with which Beardy McBeardsworth describes his prey at a Bronx junior high school in almost exactly the same tones you hear from Air Force flacks narrating thermal footage of hits on insurgents. But I must acknowledge that the concept of school as a place where the rights of students are severely curtailed dates back at least to my own schooling during King Philip’s War, was recently upheld by the Supreme Court in the Bong Hits 4 Jesus case, and seems to enjoy broad popular support. For the majority of Americans alive today, the function of school has always been to break you for a workplace where you will meet obstruction and indignity every day, be subject to every type of invasive surveillance, and generally, as even that greatest of working stiffs Jerry Langford put it, “have idiots plaguing your life.”
Tim Cavanaugh, “Junior High Lives of Others”, Hit and Run, 2010-03-01
January 21, 2010
And yet more on passwords
This is becoming a quarterly topic around here. Imperva has done some statistical analysis of the 32 million passwords which were exposed in the Rockyou.com security breach:
Key findings of the study include:
* The shortness and simplicity of passwords means many users select credentials that will make them susceptible to basic forms of cyber attacks known as “brute force attacks.”
* Nearly 50% of users used names, slang words, dictionary words or trivial passwords (consecutive digits, adjacent keyboard keys, and so on). The most common password is “123456”.
* Recommendations for users and administrators for choosing strong passwords.
“Everyone needs to understand what the combination of poor passwords means in today’s world of automated cyber attacks: with only minimal effort, a hacker can gain access to one new account every second—or 1000 accounts every 17 minutes,” explained Imperva’s CTO Amichai Shulman.
The report identifies the most commonly used passwords:
1. 123456
2. 12345
3. 123456789
4. Password
5. iloveyou
6. princess
7. rockyou
8. 1234567
9. 12345678
10. abc123
So there you go — all the tools you need to be a world-class password cracker.
January 7, 2010
Tracking the effectiveness of bloggers by arrests
2009 was a tough year for journalists, with at least 76 killed and arrests and physical assaults increased over last year. In a back-handed way, the effectiveness of bloggers and other informal journalists could be measured by the ways in which they get harassed, intimidated, or otherwise interfered with as they tried to report on the news:
Meanwhile, the spotlight is increasingly falling on bloggers, as 2009 was the first year that more than 100 bloggers and cyber-dissidents were imprisoned.
In a number of countries online dissent is now a criminal offence: authorities have responded to the internet as pro-democracy tool with new laws and crackdowns. A pair of Azerbaijani bloggers were sentenced to two years in prison for making a film mocking the political elite.
China was still the leading Internet censor in 2009. However, Iran, Tunisia, Thailand, Saudi Arabia, Vietnam and Uzbekistan have all also made extensive use website blocking and online surveillance to monitor and control dissent. The Turkmen Internet remains under total state control. Egyptian blogger Kareem Amer remains in jail, while well-known Burmese comedian Zarganar has a further 34 years of his prison sentence to serve.
However, the Report also notes that democratic countries have not lagged far behind, instancing the various steps taken by European countries to control the internet under the guise of protection against child porn and illegal downloading. It also notes that Australia intends to put in place a compulsory filtering system that poses a threat to freedom of expression.
December 18, 2009
More on passwords
The Economist‘s Tech.view correspondent confesses to password laxity:
He admits to flouting the advice of security experts: his failings include using essentially the same logon and password for many similar sites, relying on easily remembered words—and, heaven forbid, writing them down on scraps of paper. So his new year’s resolution is to set up a proper software vault for the various passwords and ditch the dog-eared list.
Your correspondent’s one consolation is that he is not alone in using easily crackable words for most of his passwords. Indeed, the majority of online users have an understandable aversion to strong, but hard-to-remember, passwords. The most popular passwords in Britain are “123” followed by “password”. At least people in America have learned to combine letters and numbers. Their most popular ones are “password1” followed by “abc123”.
I’ve written some carefully considered advice on passwords, which is still as valid today as it was in those dark, distant days of October.
December 15, 2009
Nanny state now to come with pop-up warnings
Just in case you British internet users weren’t already aware, the government may start including pop-ups whenever you access an out-of-country social networking site. Nice of them to at least warn you that your internet usage will be monitored for quality and customer satisfaction (the customer in question is the government, BTW):
The ACPO document, obtained by The Register, suggests the government may “minimise or discourage or give ‘pop-up’ warnings as regards to communications services within the online environment where there is evidence, presented to a Circuit Judge or Secretary of State, that allowing the public access or use of specific communications services could make them vulnerable to fraud, the theft of personal information or other attack”.
ACPO does not explain the technical details of its plan, but points out that “measures already exist to minimise the availability of potentially illegal content”. However, it cites the Internet Watch Foundation’s blacklist of international URLs carrying indecent and abusive images of children, suggesting a parallel list of social networks, forums and real time messaging sites judged to be risky could be created.
The proposal was drawn up by ACPO’s Data Communications Group. The group is chaired by Jim Gamble, the chief executive of the Child Exploitation and Online Protection Centre, which is responsible for policing paedophiles on the internet.
December 5, 2009
Henry 8.0
H/T to Michael O’Connor Clarke, who said “Forget about the Tudors – BBC’s “Henry 8.0″ is much more historically accurate”.
Despite (legal) danger, teens still hot for sexting
In another example of the state’s threat of legal punishment being hugely disproportional to the perceived or actual damage of the ‘crime’, so-called sexting can carry a life-long legal penalty for an act with little or no actual danger to the parties involved. In a case of “well, duh”, kids are still eager to send one another pictures of themselves nude or partially clothed, in spite of (or in ignorance of) the legal threats:
The latest figures come from a poll organised by the Associated Press and MTV, which questioned around 1200 youths and semi-youths aged from 14 to 24. What they discovered, among other things, is that boys think naked pictures are “hot” while girls consider them “slutty”.
We’ll go out on a limb here and say that boys and girls feel much the same ways about thigh-high boots and micro-skirts — one boy’s hot is another girl’s slutty, but that’s another issue. Young people do seem peculiarly blind to the long-term risks of naked photographs, though perhaps they should be admired for having such confidence in their own bodies.
About half of those surveyed thought the risks were overplayed — the rest were suitably wary, but did it anyway. Greater education about the risks doesn’t seem to be the answer: it’s almost as though young people aren’t listening to the advice provided by their elders and betters.
The risks they run include both sender and receiver being charged with various sex crimes, resulting in potentially being added to the sex offender registry for their state(s) of residence, which pretty much ends any possibility of them being able to go to university, hold a job, or lead a normal life.
December 4, 2009
Debunking the porn-violence link
After giving up all hope of finding “uncontaminated” study subjects, a Quebec researcher concludes that the long standing claim that viewing pornography leads to violence and sexual crimes doesn’t appear to be true:
Lajeunesse, unable to find any smut-free young chaps, carried out a detailed study on 20 students who admitted having a fondness for filth. It seems that 90 per cent of all porn is viewed on the internet nowadays, at least in French Canada. Unsurprisingly single chaps watch spend about four times as much time looking at porn as those in committed relationships.
“Not one subject had a pathological sexuality. In fact, all of their sexual practices were quite conventional,” reports Lajeunesse.
“Pornography hasn’t changed their perception of women or their relationship … Those who could not live out their fantasy in real life with their partner simply set aside the fantasy … men don’t want their partner to look like a porn star,” he adds.
The study was funded by Canada’s Centre de Recherche Interdisciplinaire sur la Violence Familiale et la Violence Faite aux Femmes (CRI-VIFF, or the Interdisciplinary Research Center on Family Violence and Violence Against Women). However Lajeunesse firmly rejected the idea that goggling over naughty pics, vids etc leads men to mistreat the ladies they encounter in real life.
Amusingly, while putting this post up, my iTunes playlist offered up Rough Trade’s “Crimes of Passion”.
December 1, 2009
QotD: Nomenclature, 2.0
Paused over lunch to roll through the Deadpool on TechCrunch, reading about expired internet companies. Been a while. Most had to do with “social media,” and most got millions of dollars to produce a novel way where X could connect Y with P using Z, and then: profit! The names of these companies makes me weep:
Zopo, Lefora, Meetro, Ning, Sinopio, CapaZoo, Joox, Foonz.
These are not businesses. These are characters in a pre-school TV show. I have a tough time imagining a hard-nosed venture capitalist saying Well, it’s an interesting idea you have, and on behalf of my group, we’re willing to invest $12 million in Shagafumoo.
James Lileks, Bleat, 2009-12-01
November 25, 2009
Rule 34, Stross version
I can hardly wait until 2011:
If you’re wondering what this week’s excuse for scanty blog updates could possibly be, it might have something to do with me being 40,000 words into the (projected) 100,000 word first draft of 2011’s novel, “Rule 34”. It’s a sequel to “Halting State”, set some five years after the earlier novel, and focusing on the way our definitions of crime and morality (not to mention the practice of policing) change over time. (Yes, the title is an explicit call-out to you-know-what. The term “Hitler Yaoi” has been used with intent … but only after I googled, rubbed my eyes, and concluded that rule 34 was in effect.)
For the three of you who don’t know what Rule 34 is . . . don’t Google Image search for it. It’s a very short rule, but I suspect it’s true for most values of “true”: If it exists, there’s a porn version of it.