Quotulatiousness

June 18, 2010

EFF introduces “Encrypt the Web” Firefox plugin

Filed under: Liberty, Technology — Tags: , , — Nicholas @ 12:13

A very interesting new project from Electronic Frontier Foundation:

Today EFF and the Tor Project are launching a public beta of a new Firefox extension called HTTPS Everywhere.

This Firefox extension was inspired by the launch of Google’s encrypted search option. We wanted a way to ensure that every search our browsers sent was encrypted.

H/T to BoingBoing for the link.

June 16, 2010

The irritating part of “mobile computing”

Filed under: Books, Economics, Technology — Tags: , , , , , — Nicholas @ 08:52

Cory Doctorow just got back from a book tour, but unlike all the other ones, he found this tour was both pleasant and productive, thanks to mobile computing:

I “rooted” my Nexus One, breaking into the OS so that I could easily “tether” it to my laptop, using it as a 3G modem between tour stops (we didn’t have to root my wife’s matching phone, as Google supplied us with an unlocked developer handset). My typical tour day started at 5am with breakfast and work on the novel, then a 6am interview with someone in Europe, then pickup, two to four school visits with a short lunch break, three or four interviews, then a bookstore signing or a plane (or both). As busy as that sounds, there’s actually a fair bit of dead time in it while sitting in the escort’s car, trying to find the next stop.

This time round, I plugged the laptop into the cigarette lighter and the phone into the laptop — this gave the phone a battery charge and the laptop internet access. And best of all, it meant that I could harvest those dead minutes to answer emails, keep on blogging, and generally stay abreast of things.

Which meant that I got lots more of the touring author’s most precious commodity: sleep. On previous tours, returning to the hotel meant sitting down for three to four hours’ worth of emails before bed, which cut my sleep time to less than four hours some nights.

So all is sweetness and light with modern mobile computing, yes? Not quite:

. . . the fundamental paradox of mobile — so long as the mobile carriers remain a part of mobile computing, it will only work for so long as you don’t go anywhere.

One of the more frustrating parts of travelling with my iPhone has been that I have to basically lobotomize it before crossing the border, reducing it from really powerful smart phone to a PDA with a phone line: the data and “roaming” charges are so high that it’s not economical to use them for anything other than an emergency. Just when being able to get driving directions or hotel or restaurant recommendations would be most useful — on the road or in an unfamiliar city — the cost is usually too high to justify turning on the damned feature.

Yes, you can hunt down wifi connections (and I did, on my last few trips to the US), but it hardly counts as convenient. The phone companies still assume anyone travelling with a smart phone is going to be spending their employers’ money and therefore won’t notice or care about the up-front costs.

June 14, 2010

I can haz bizness empire?

Filed under: Humour, Technology — Tags: , , — Nicholas @ 07:18

The New York Times discovers LOLcats:

Three years ago Ben Huh visited a blog devoted to silly cat pictures — and saw vast potential.

Mr. Huh, a 32-year-old entrepreneur, first became aware of I Can Has Cheezburger, which pairs photos of cats with quirky captions, after it linked to his own pet blog. His site immediately crumbled under the resulting wave of visitors.

Sensing an Internet phenomenon, Mr. Huh solicited financing from investors and forked over $10,000 of his own savings to buy the Web site from the two Hawaiian bloggers who started it.

June 11, 2010

It’s not really about market share: that’s just keeping score

Filed under: Technology — Tags: , , , , , , — Nicholas @ 16:45

Eric Raymond thinks a lot of people are missing the point on the ongoing iPhone-Android battle:

It’s not about whether or not Apple will be crushed. It’s not about who makes the “best” products, where “best” is measured by some interaction between the product and the speaker’s evaluation of the relative importance of various features and costs. It’s about what the next generation of personal computing platforms will be. Down one fork they’ll be open, hackable, and user-controlled. Down the other they’ll be closed, locked down, and vendor-controlled. Though there are others on each side of this struggle, in 2010 it comes down to whether Apple or Android wins the race to over 50% smartphone market share; after that point, network effects will become self-reinforcing until the next technology disruption.

If he’s right — and he very well might be — then Apple’s moderately disappointing upgrades in the newly announced iPhone 4 may have handed the long-term advantage to Google. This may be bad news for Apple shareholders, but it’ll be a long-term positive for mobile computing.

What could possibly go wrong?

Filed under: Government, Liberty, Politics, Technology, USA — Tags: , , , — Nicholas @ 09:30

The US Senate is considering a bill that would give the President an internet “kill switch”. Funny how the one area most open to the widest possible spectrum of opinion and belief might be shut down at will, leaving only the regular propaganda outlets uncontrolled:

Under PCNAA, the federal government’s power to force private companies to comply with emergency decrees would become unusually broad. Any company on a list created by Homeland Security that also “relies on” the Internet, the telephone system, or any other component of the U.S. “information infrastructure” would be subject to command by a new National Center for Cybersecurity and Communications (NCCC) that would be created inside Homeland Security.

The only obvious limitation on the NCCC’s emergency power is one paragraph in the Lieberman bill that appears to have grown out of the Bush-era flap over warrantless wiretapping. That limitation says that the NCCC cannot order broadband providers or other companies to “conduct surveillance” of Americans unless it’s otherwise legally authorized.

Lieberman said Thursday that enactment of his bill needed to be a top congressional priority. “For all of its ‘user-friendly’ allure, the Internet can also be a dangerous place with electronic pipelines that run directly into everything from our personal bank accounts to key infrastructure to government and industrial secrets,” he said. “Our economic security, national security and public safety are now all at risk from new kinds of enemies — cyber-warriors, cyber-spies, cyber-terrorists and cyber-criminals.”

For those of you who think this is a super-cool neat idea (because Obama wouldn’t ever abuse this new rule), just try the mental image of George Bush or Sarah Palin with this kind of power. Still seem like a good notion?

June 2, 2010

New copyright bill introduced

Filed under: Cancon, Law, Media, Technology — Tags: , , , , , , — Nicholas @ 16:21

It’s not yet online, so I haven’t read it myself (and, not being a lawyer, it might not be a good use of my time). Michael Geist has, however, and provides a useful summary of the good and the bad:

The bill contains some important extensions of fair dealing, including new exceptions for parody, satire, and (most notably) education. It also contains more sensible time shifting and format shifting provisions that still feature restrictions (they do not apply where there is a digital lock) but are more technology neutral than the C-61 model. There is also a “YouTube exception” that grants Canadians the right to create remixed user generated content for non-commercial purposes under certain circumstances. While still not as good as a flexible fair dealing provision, the compromise is a pretty good one. Throw in notice-and-notice for Internet providers, backup copying, and some important changes to the statutory damages regime for non-commercial infringement and there are some provisions worth fighting to keep.

Yet all the attempts at balance come with a giant caveat that has huge implications for millions of Canadians. The foundational principle of the new bill remains that anytime a digital lock is used — whether on books, movies, music, or electronic devices — the lock trumps virtually all other rights. In other words, in the battle between two sets of property rights — those of the intellectual property rights holder and those of the consumer who has purchased the tangible or intangible property — the IP rights holder always wins. This represents market intervention for a particular business model by a government supposedly committed to the free market and it means that the existing fair dealing rights (including research, private study, news reporting, criticism, and review) and the proposed new rights (parody, satire, education, time shifting, format shifting, backup copies) all cease to function effectively so long as the rights holder places a digital lock on their content or device.

It’s not quite the total surrender to the entertainment rights holders that many feared, but it’s certainly not the best deal for consumers. Bottom line:

For the glass half-full, the compromise positions on fair dealing, the new exceptions, and statutory damages are not bad — not perfect — but better than C-61. For the glass half-empty, the digital lock provisions are almost identical to C-61 and stand as among the most anti-consumer copyright provisions in Canadian history. Not only are they worse than the U.S. DMCA, but they undermine much of the positive change found in the rest of the bill. In the days and weeks ahead, Canadians must speak out to ensure that the compromise positions found in C-32 remain intact and that the digital lock provisions move from the no-compromise category to the compromise one.

May 26, 2010

QotD: Facebook privacy follies

Filed under: Humour, Quotations, Technology — Tags: , , , — Nicholas @ 12:44

All 1,472 employees of Facebook, Inc. reportedly burst out in uncontrollable laughter Wednesday following Albuquerque resident Jason Herrick’s attempts to protect his personal information from exploitation on the social-networking site. “Look, he’s clicking ‘Friends Only’ for his e-mail address. Like that’s going to make a difference!” howled infrastructure manager Evan Hollingsworth, tears streaming down his face, to several of his doubled-over coworkers. “Oh, sure, by all means, Jason, ‘delete’ that photo. Man, this is so rich.”

“Entire Facebook Staff Laughs As Man Tightens Privacy Settings”, The Onion, 2010-05-26

May 22, 2010

Copyright suits . . . and profanity

Filed under: Humour, Law, Technology — Tags: , , — Nicholas @ 11:27

Cory Doctorow finds fulfilling both interests easy in this case:

You know what I’m interested in? Copyright lawsuits.

And profanity.

Lucky for me, Google and Viacom have provided both today, in the form of a series of emails released through the discovery process in Viacom’s billion-dollar lawsuit against YouTube. In these emails, the two companies take turns cussin’ and spittin’ and swearin’ about each other. Hilarity ensues. Ars Technica rounds up some of the highlights.

May 18, 2010

QotD: Time to kill the “information wants to be free” meme

Filed under: Economics, Media, Quotations, Technology — Tags: , , — Nicholas @ 12:06

“Information wants to be free” (IWTBF hereafter) is half of Stewart Brand’s famous aphorism, first uttered at the Hackers Conference in Marin County, California (where else?), in 1984: “On the one hand information wants to be expensive, because it’s so valuable. The right information in the right place just changes your life. On the other hand, information wants to be free, because the cost of getting it out is getting lower and lower all the time. So you have these two fighting against each other.”

This is a chunky, chewy little koan, and as these go, it’s an elegant statement of the main contradiction of life in the “information age”. It means, fundamentally, that the increase in information’s role as an accelerant and source of value is accompanied by a paradoxical increase in the cost of preventing the spread of information. That is, the more IT you have, the more IT generates value, and the more information becomes the centre of your world. But the more IT (and IT expertise) you have, the easier it is for information to spread and escape any proprietary barrier. As an oracular utterance predicting the next 40 years’ worth of policy, business and political fights, you can hardly do better.

But it’s time for it to die.

Cory Doctorow, “Saying information wants to be free does more harm than good”, The Guardian, 2010-05-18

May 8, 2010

Facebook’s business model

Filed under: Media, Technology — Tags: , , , — Nicholas @ 09:47

Ryan Singel looks at where Facebook started and why it’s changed its privacy protections:

Facebook used to be a place to share photos and thoughts with friends and family and maybe play a few stupid games that let you pretend you were a mafia don or a homesteader. It became a very useful way to connect with your friends, long-lost friends and family members. Even if you didn’t really want to keep up with them.

Soon everybody — including your uncle Louie and that guy you hated from your last job — had a profile.

And Facebook realized it owned the network.

Then Facebook decided to turn “your” profile page into your identity online — figuring, rightly, that there’s money and power in being the place where people define themselves. But to do that, the folks at Facebook had to make sure that the information you give it was public.

So in December, with the help of newly hired Beltway privacy experts, it reneged on its privacy promises and made much of your profile information public by default. That includes the city that you live in, your name, your photo, the names of your friends and the causes you’ve signed onto.

This spring Facebook took that even further. All the items you list as things you like must become public and linked to public profile pages. If you don’t want them linked and made public, then you don’t get them — though Facebook nicely hangs onto them in its database in order to let advertisers target you.

Every time Facebook changes their privacy policies, well-meaning folks try to explain how to retain as much of your previous settings as possible . . . and every time, Facebook’s defaults have changed further towards exposing everything. There’s money in that information, money that Facebook is determined to obtain. Privacy? The inevitability of zero-privacy is Facebook’s unspoken motto.

May 5, 2010

Three reasons not to remove the Downfall parodies

Filed under: History, Law, Media, WW2 — Tags: , , , , — Nicholas @ 12:50

3 Reasons YouTube Shouldn’t Censor Downfall Parodies

[. . .]

It’s understandable why Downfall’s production company, Constantin Film, might be upset that such a serious movie is being burlesqued, but pushing YouTube to ban the parodies is a terrible idea for at least three reasons:

1. It’s fair use! The parodies, which transform a few minutes of a three-hour movie, are clearly legit under existing copyright laws. Because they clearly transform the original and have no possibility of confusing viewers, the parodies are clearly protected speech.

2. This is free promotion! As George Lucas could tell the filmmakers, fan-generated videos help keep the original source material vital and relevant. Lucas used to try to police all Star Wars knock-offs, until he realized that his audience was promoting his films more effectively than he ever could. More people have surely seen Downfall due to the popularity of the parodies.

3. Let’s keep the Internet creative! The greatest cultural development over the past 20 or so years has been technologies that allow producers and consumers to create and enjoy an ever-increasing array of creative expression in an ever-increasing array of circumstances. This development is nowhere more powerful than on the Internet, which has unleashed a whole new universe of writing, music, video, and more. Indeed, YouTube is itself one of the great conduits of cyberspace. Pulling down the Downfall parodies may be within YouTube’s rights, but it nonetheless strikes a blow to the heart of what is totally awesome about the Internet.

Facebook obliterates the entire notion of “privacy settings”

Filed under: Technology — Tags: , , , , — Nicholas @ 09:03

As someone noted the other day, when it comes to Facebook and their constant twiddling with privacy settings, you can just copy-and-paste the last outraged story you did and change the date. That being said, the latest Facebook changes are pretty bad:

“Connections.” It’s an innocent-sounding word. But it’s at the heart of some of the worst of Facebook’s recent changes.

Facebook first announced Connections a few weeks ago, and EFF quickly wrote at length about the problems they created. Basically, Facebook has transformed substantial personal information — including your hometown, education, work history, interests, and activities — into “Connections.” This allows far more people than ever before to see this information, regardless of whether you want them to.

Since then, our email inbox has been flooded with confused questions and reports about these changes. We’ve learned lots more about everyone’s concerns and experiences. Drawing from this, here are six things you need to know about Connections:

  1. Facebook will not let you share any of this information without using Connections. [. . .]
  2. Facebook will not respect your old privacy settings in this transition. [. . .]
  3. Facebook has removed your ability to restrict its use of this information. [. . .]
  4. Facebook will continue to store and use your Connections even after you delete them. [. . .]
  5. Facebook sometimes creates a Connection when you “Like” something. [. . .]
  6. Facebook sometimes creates a Connection when you post to your wall. [. . .]

Overall, you’d have to assume that nobody in the Facebook architecture group has ever needed or even wanted to keep certain information private. Every change they make seems to make it harder and harder to restrict where your personal information will be accessible, and it’s not as though there haven’t been complaints: Facebook just carries on as if nobody cared.

I’ve still got a Facebook account, although I find I’m using it less and less (ironically, many of you reading this will have come here because of a link from Facebook . . .). Lack of ability to fine-tune the privacy settings is certainly one of the reasons I don’t use Facebook as much as I once did.

May 4, 2010

Spear phishing (test) attack on US Air Force

Filed under: Military, Technology — Tags: , , , , , — Nicholas @ 07:43

I’d heard the term “phishing” before, and I’ve reported at least a dozen various attempts to the appropriate parties (companies and organizations who are used in phishing attempts often have a reporting address set up so you can just forward the message to them). “Spear phishing” was new to me, and apparently it was also new to a large number of US Air Force personnel:

Offers to hire American airmen, stationed at an airbase on the Central Pacific island of Guam, as extras in the Transformers 3 movie, turned out to be an unexpectedly scary training exercise. First, keep in mind that there is no Transformers 3 filming scheduled for Guam. The email was a fake, used to test how well airmen could detect a hacker attempts to deceive military Internet users to give up valuable information.

The Transformers 3 email was a test to see how many airmen would fall for a “spear phishing” offensive. “Phishing” (pronounced “fishing”) is when a hacker sends out thousands, or millions, of emails that look like warnings from banks, eBay or PayPal, asking for you to log in (thus revealing your password to the hackers, who have set up a false website for this purpose) to take care of some administrative matter. The hacker then uses your password to loot your account. “Spear phishing” is when the emails are prepared with specific individuals in mind. The purpose here is to get specific information from, say, a bank manager, or someone known to be working on a secret project. In the Guam case, the targets of the spear phishing test were asked to go to a web site and fill out an application form to be eligible to be an extra. That form asked for information that would have enabled hostile hackers to gain more access to air force networks. A lot of the airmen who received the Transformers 3 email, responded. The air force won’t say how many, but it was more than expected. A lot more.

I doubt that many readers need to be told this, but no legitimate bank or financial institution should ever be sending you an email requesting you to follow an embedded link and log in to your account. If you get such an email, forward it to the bank’s security folks. If it’s legitimate, they can confirm it for you, but in 2010, no sensible bank should be communicating with you in this way.

April 30, 2010

The revolution is almost complete . . . hold on tight

Filed under: Economics, Technology — Tags: , , , , , — Nicholas @ 16:25

Charles Stross thinks he understands why Steve Jobs won’t allow Adobe Flash on to the iPhone and iPad:

Steve Jobs believes he’s gambling Apple’s future — the future of a corporation with a market cap well over US $200Bn — on an all-or-nothing push into a new market. HP have woken up and smelled the forest fire, two or three years late; Microsoft are mired in a tar pit, unable to grasp that the inferno heading towards them is going to burn down the entire ecosystem in which they exist. There is the smell of panic in the air, and here’s why . . .

We have known since the mid-1990s that the internet was the future of computing. With increasing bandwidth, data doesn’t need to be trapped in the hard drives of our desktop computers: data and interaction can follow us out into the world we live in. Modem uptake drove dot-com 1.0; broadband uptake drove dot-com 2.0. Now everyone is anticipating what you might call dot-com 3.0, driven by a combination of 4G mobile telephony (LTE or WiMax, depending on which horse you back) and wifi everywhere. Wifi and 4G protocols will shortly be delivering 50-150mbps to whatever gizmo is in your pocket, over the air. (3G is already good for 6mbps, which is where broadband was around the turn of the millennium. And there are ISPs in Tokyo who are already selling home broadband delivered via WiMax. It’s about as fast as my cable modem connection was in 2005.)

[. . .]

This is why there’s a stench of panic hanging over silicon valley. this is why Apple have turned into paranoid security Nazis, why HP have just ditched Microsoft from a forthcoming major platform and splurged a billion-plus on buying up a near-failure; it’s why everyone is terrified of Google:

The PC revolution is almost coming to an end, and everyone’s trying to work out a strategy for surviving the aftermath.

Read the whole thing. I don’t see any obvious flaw in his line of thought. It may not happen the way he predicts, but it is consistent with what we know, and it should frighten the heck out of Apple’s competitors.

April 29, 2010

Back to 1996

Filed under: Randomness, Technology — Tags: , — Nicholas @ 08:07

BoingBoing linked to this online time machine, which shows you what your website would look like (and sound like) back in 1996:

Presenting Geocities-izer!

« Newer PostsOlder Posts »

Powered by WordPress