Categories
Aside Humour

American Surveillance Catch-22

Categories
Quotations

2013.3.4

The traditionally advocated uses for NFC have been to replace RFID chips in travel cards, such as the Oyster card in the UK, and RFID chips in credit cards, such as MasterCard’s PayPass.

The problem with these replacements is a simple one, however. Smartphone batteries run out. They do so with alarming regularity, and they do so at inopportune moments. I don’t care what phone you say you have, and I don’t care if you say it doesn’t happen to you, because it does. You end up staying out late, or you leave your charger at home by accident, or you just plain use the phone too much during the day, and then when you need the phone to work, it doesn’t because it’s out of juice.

The phone running out of power is bad enough when it means you don’t have maps and directions. That’s annoying. But even worse is the battery going flat when you need the phone for mass transit or paying for stuff.

And yet that’s precisely the value proposition that NFC offers: go out for a night on the town and get stranded with no money, no subway ride home. The only way to be safe is to take your credit card and travel card with you anyway, and if you’re doing that? Well you don’t exactly need NFC then, do you?

Peter Bright, “Mobile World Congress is Mean Girls, and NFC isn’t going to happen”
Categories
Aside Humour

Facebook Is So Over!

laughingsquid:

Facebook is so over!

Ah….so *that’s* the kind of thing Quora is for!

Categories
Quotations

2013.3.3

Being crass should not be a crime, but that’s essentially what Andrew Auernheimer was convicted of. This was the case where AT&T accidentally published the emails and device ideas of the first iPad customers. Andrew downloaded them and published proof of the problem to Gawker. His “coconspirator” pled guilty, testified against Andrew, and provided private emails to prosecutors that “proved” Andrew’s bad intentions. These emails disclose things like Andrew talking about stealing the information and wanting to profit from the event. That made his simple actions look very nefarious.

But that’s how we in the cybersec community always talk. When we find cybersec problems, we dream of the worst ways we can be horrible people and exploit them. If you listened to any of our private conversations, you’d be convinced that we were all secretly one step away from triggering World War III.

I’m pretty sure had I been in Andrew’s place, the prosecutors would’ve found much worse to hang me by. Indeed, you’ll find much in my public Twitter feed and blog posts to convict me of. When the Mars Curiosity Rover landed last August, and the first pictures arrived from the planet, I was about to tweet the URL to view those pictures. But the site was already failing under the load of all the nerds worldwide getting those pictures. Therefore, I changed my tweet to comment on the fact that this was essentially a DDoS attack – the sort of attack that activists do against large corporations they don’t like. I therefore made the humorous tweet “Join our DDoS against NASA and click” on their website.

Of course, I’m not against NASA, nor do I think anybody else is. I can’t imagine why anybody would want to DDoS them. It should be obvious that my tweet is humor. But, prosecutors taking this out of context might use it to try to convict me, to prove to jurors of my evil intent.

Robert Graham, “Context matters: we only appear to be blackhats
Categories
Aside Humour

Canada or Child Pornographers?

SFU OpenMedia.ca, Facebook timeline photos

Categories
Links Quotations

2013.3.2

At least Britain sort of got it half right. There, to make life easier for stores selling age-restricted items there’s a “Challenge 21″ programme, so anyone looking 21 or under is asked for ID, even if the products are restricted to over-18s. Tesco and other large chain stores championed a “Challenge 25″ programme just in case someone slipped through the net. Finally some idiot in the seaside resort of Blackpool came up with the idea of “Challenge 30″, which is roundly lambasted across Britain.

But at least these outlets demand high-integrity forms of ID such as driving licences. In the US you can show a picture of your dog pasted on the back of a chocolate biscuit and they’re likely to accept it.

That’s because no-one really knows why they are asking for ID in the first place, and no-one up the chain tells them – mainly because they don’t know either. Everyone just goes through the motions. There’s no way to verify the validity of ID, so everyone just plods along with the security theatre.

Simon Davis, “How a dog and some chocolate biscuits reveal an identity crisis in America
Categories
Links Quotations

2013.3.2

In Jewel, the Obama administration has already twice invoked the “state secrets” privilege, a mechanism left behind from the McCarthy-era persecution of Communist sympathizers which effectively lets the government ‘turn off’ the Constitution and the justice system whenever they feel that a case might jeopardize national security. The administration has promised to limit its use of the privilege to situations which present the potential for “significant harm” to the country. But that promise obviously hasn’t stopped them from deflecting recent challenges to warrantless wiretapping and other government counterterrorism initiatives — like indefinite detention provisions, or the secret program for targeted killings carried out by drones — nor will it necessarily restrain future administrations from doing the same.

Jewel may be the last chance for meaningful judicial review of the wiretapping programs in the foreseeable future. Failing that, the only remaining response for journalists and others dealing in sensitive overseas communications may be exactly what digital activists have been advocating for decades: widespread personal encryption. But aside from being somewhat impractical, the necessity of encrypted communications would more broadly underscore just how thoroughly the legal system has failed to protect citizens from unnecessary intrusion.

Joshua Kopstein, “Denied in the Supreme Court, warrantless wiretap opponents are losing ground fast: Does secret surveillance violate the Constitution? Sorry, that’s a secret
Categories
Humour Links

Compare Office For Business Plans – Office.com

parislemon:

soxiam:

  • hosted email for small business
  • office 365 small business
  • office 365 small business premium
  • office 365 enterprise e1
  • office 365 midsize business
  • office 365 enterprise e3
  • office 365 proplus
  • office 365 enterprise (plan e4)
  • education plan a2
  • education plan a3
  • education plan a4
  • exchange online (plan 1)
  • exchange online (plan 2)
  • office 365 suite (plan e1)
  • office 365 suite (plan e3)
  • kiosk plan 1
  • office 365 home premium
  • office home & student 2013
  • office home & business 2013
  • office professional 2013

Focus.

I thought that this was a joke. Someone exaggerating Microsoft’s actual product offerings.

I was wrong.

Categories
Quotations

2013.3.1

I meet up with my friend Dan Pashman, who hosts the Sporkful podcast and whom you hear sometimes on Weekend Edition Sunday. He believes poutine would be better if it were served with the gravy on the side, so you could mete out perfect bites and avoid sogginess. I tell him you could also ask for a bunch of cans of paint instead of Starry Night, but I’ll trust van Gogh on it.

Ianan Chillag, “Dispatch From Poutine Fest, Chicago’s ‘Love Letter’ To Canada
Categories
Quotations

The report finds plenty of blame to go around. The ultimate cause of the fiasco, it says, was the fact the grant implementers did not conduct a capacity or use study before spending $24 million. They also used a “legally unauthorized purchasing process” to buy the routers, which resulted in only modest competition for the bid. Finally, Cisco is accused of knowingly selling the state larger routers than it needed and of showing a “wanton indifference to the interests of the public.”

Getting any of the money back seems unlikely at this point, but the legislative auditor does have one solid recommendation to make. The State Purchasing division should determine whether Cisco’s actions in this matter fall afoul of section 5A-3-33d of the West Virginia Code, and whether the company should be barred from bidding on future projects.

Cisco tells Ars “the criticism of the State is misplaced and fails to recognize the forward-looking nature of their vision. The positive impact of broadband infrastructure on education, job creation, and economic development is well established, and we are committed to working with the State to realize these benefits for the people of West Virginia now and into the future.”

As for that $5+ million the state could have saved—it would have paid for 104 additional miles of fiber.

Nate Anderson, “Why a one-room West Virginia library runs a $20,000 Cisco router: Cisco, West Virginia wasted $5M on enterprise-class routers