Categories
Writing

A Civil Rights Company?

Photo by Youssef Sarhan on Unsplash

Much has been made of Tim Cook’s advocacy on issues of privacy and gay rights. The most recent iteration of Safari that was unveiled at WWDC will incorporate techniques that hinder, though won’t entirely stop, advertisers and websites from tracking users across the Internet. And Apple continues to support and promote gay rights; the most evident manifestations of this is Apple selling pride-inspired Apple Watch bands and a matching pride-based watch facealong with company’s CEO being an openly gay man.

It’s great that Apple is supporting these issues. But it’s equally important to reflect on Apple’s less rights-promoting activities. The company operates around the world and chooses to pursue profits to the detriment of the privacy of its China-based users. It clearly has challenges — along with all other smartphone companies — in acquiring natural mineral resources that are conflict-free; the purchase of conflict minerals raises fundamental human rights issues. And the company’s ongoing efforts to minimize its taxation obligations have direct impacts on the abilities of governments to provide essential services to those who are often the worst off in society.

Each of the above examples are easily, and quickly, reduced to assertions that Apple is a public company in a capitalist society. It has obligations to shareholders and, thus, can only do so much to advance basic rights while simultaneously pursuing profits. Apple is, on some accounts, actively attempting to enhance certain rights and promote certain causes and mitigate certain harms while simultaneously acting in the interests of its shareholders.

Those are all entirely fair, and reasonable, arguments. I understand them all. But I think that we’d likely all be well advised to consider Apple’s broader activities before declaring that Apple has ‘our’ backs, on the basis that ‘our’ backs are often privileged, wealthy, and able to externalize a range of harms associated with Apple’s international activities.

Categories
Links Photography Roundup Writing

The Roundup for May 19-June 1, 2018 Edition

(Remnants by Christopher Parsons)

We get to make decisions about how we react to unpleasant or unfortunate news. For some, that means getting angry and holding onto that emotion in order to focus the anger into ‘productive’ work energy. For others, it can lead to deep frustrations and a sense of being incapacitated. And in yet other cases it might involve both of those reactions — anger and frustration — that is quickly followed by letting go and appreciating the positive aspects of often difficult situation.

Letting go is strangely both easier and harder than either of the other emotional reactions, largely because it entails confronting why those emotions are being felt in the first place. Anger and frustration tend to represent outward manifestations of our own fears, concerns, worries, or other personal traumas. Engaging with them internally means dealing with those demons, whereas using them as energy or letting them consume ourselves externalizes such emotions in ways that prevent us from dealing with our own traumas.

At least one challenge is that social norms often inform us that it’s ok to just be angry. Just be frustrated. And that such emotions are normal and needn’t necessarily be ‘moved on’ from. It’s those situations, where those you’re encouraged to return to that trauma zone after it’s been dealt with, that can be the most challenging; those are cases where the puerile desire to experience our worse is often most challenging to rise above. Rising above it, however, is a kind of active work that promotes self-reflection and self-revelation. It’s not easy, but it’s perhaps some of the most important emotional labour that we can undertake.


Inspiring Quotation of the Week

“Concern yourself more with accepting responsibility than with assigning blame. Let the possibilities inspire you more than the obstacles discourage you.”

– Ralph Marston

Great Photography Shots

The idea of routinely capturing the same location, and tracing change, is something that is incredibly attractive to me. I often find myself pulled back to the same locations to see them at different times, with different light, and different natural coloration. And, so, I was incredibly impressed with Jani Ylinampa’s photos of a Finnish island through the seasons.

Music I’m Digging

Neat Podcast Episodes

Good Reads for the Week

Cool Things

Categories
Writing

Limits of Data Access Requests

rawpixel-378006-unsplash
Photo by rawpixel on Unsplash

A data access request involves you contacting a private company and requesting a copy of your personal information, as well as the ways in which that data is processed, disclosed, and the periods of time for which data is retained.

I’ve conducted research over the past decade which has repeatedly shown that companies are often very poor at comprehensively responding to data access requests. Sometimes this is because of divides between technical teams that collect and use the data, policy teams that determine what is and isn’t appropriate to do with data, and legal teams that ascertain whether collections and uses of data comport with the law. In other situations companies simply refuse to respond because they adopt a confused-nationalist understanding of law: if the company doesn’t have an office somewhere in a requesting party’s country then that jurisdiction’s laws aren’t seen as applying to the company, even if the company does business in the jurisdiction.

Automated Data Export As Solution?

Some companies, such as Facebook and Google, have developed automated data download services. Ostensibly these services are designed so that you can download the data you’ve input into the companies, thus revealing precisely what is collected about you. In reality, these services don’t let you export all of the information that these respective companies collect. As a result when people tend to use these download services they end up with a false impression of just what information the companies collect and how its used.

A shining example of the kinds of information that are not revealed to users of these services has come to light. A leaked document from Facebook Australia revealed that:

Facebook’s algorithms can determine, and allow advertisers to pinpoint, “moments when young people need a confidence boost.” If that phrase isn’t clear enough, Facebook’s document offers a litany of teen emotional states that the company claims it can estimate based on how teens use the service, including “worthless,” “insecure,” “defeated,” “anxious,” “silly,” “useless,” “stupid,” “overwhelmed,” “stressed,” and “a failure.”

This targeting of emotions isn’t necessarily surprising: in a past exposé we learned that Facebook conducted experiments during an American presidential election to see if they could sway voters. Indeed, the company’s raison d’être is figure out how to pitch ads to customers, and figuring out when Facebook users are more or less likely to be affected by advertisements is just good business. If you use the self-download service provided by Facebook, or any other data broker, you will not receive data on how and why your data is exploited: without understanding how their algorithms act on the data they collect from you, you can never really understand how your personal information is processed.

But that raison d’être of pitching ads to people — which is why Facebook could internally justify the deliberate targeting of vulnerable youth — ignores baseline ethics of whether it is appropriate to exploit our psychology to sell us products. To be clear, this isn’t a company stalking you around the Internet with ads for a car or couch or jewelry that you were browsing about. This is a deliberate effort to mine your communications to sell products at times of psychological vulnerability. The difference is between somewhat stupid tracking versus deliberate exploitation of our emotional state.1

Solving for Bad Actors

There are laws around what you can do with the information provided by children. Whether Facebook’s actions run afoul of such law may never actually be tested in a court or privacy commissioner’s decision. In part, this is because mounting legal challenges is extremely challenging, expensive, and time consuming. These hurdles automatically tilt the balance towards activities such as this continuing.

But part of the challenge in stopping such exploitative activities are also linked to Australia’s historically weak privacy commissioner as well as the limitations of such offices around the world: Privacy Commissioners Offices are often understaffed, under resourced, and unable to chase every legally and ethically questionable practice undertaken by private companies. Companies know about these limitations and, as such, know they can get away with unethical and frankly illegal activities unless someone talks to the press about the activities in question.

So what’s the solution? The rote advice is to stop using Facebook. While that might be good advice for some, for a lot of other people leaving Facebook is very, very challenging. You might use it to sign into a lot of other services and so don’t think you can easily abandon Facebook. You might have stored years of photos or conversations and Facebook doesn’t give you a nice way to pull them out. It might be a place where all of your friends and family congregate to share information and so leaving would amount to being excised from your core communities. And depending on where you live you might rely on Facebook for finding jobs, community events, or other activities that are essential to your life.

In essence, solving for Facebook, Google, Uber, and all the other large data broker problems is a collective action problem. It’s not a problem that is best solved on an individualistic basis.

A more realistic kind of advice would be this: file complaints to your local politicians. File complaints to your domestic privacy commissioners. File complaints to every conference, academic association, and industry event that takes Facebook money.2 Make it very public and very clear that you and groups you are associated with are offended by the company in question that is profiting off the psychological exploitation of children and adults alike.3 Now, will your efforts to raise attention to the issue and draw negative attention to companies and groups profiting from Facebook and other data brokers stop unethical data exploitation tomorrow? No. But by consistently raising our concerns about how large data brokers collect and use personal information, and attributing some degree of negative publicity to all those who benefit from such practices, we can decrease the public stock of a company.

History is dotted with individuals who are seen as standing up to end bad practices by governments and private companies alike. But behind them tend to be a mass of citizens who are supportive of those individuals: while standing up en masse may mean that we don’t each get individual praise for stopping some tasteless and unethical practices, our collective standing up will make it more likely that such practices will be stopped. By each working a little we can do something that, individually, we’d be hard pressed to change as individuals.

(This article was previously published in a slightly different format on a now-defunct Medium account.)

Footnotes:

1 Other advertising companies adopt the same practices as Facebook. So I’m not suggesting that Facebook is worst-of-class and letting the others off the hook.

2 Replace ‘Facebook’ with whatever company you think is behaving inappropriately, unethically, or perhaps illegally.

3 Surely you don’t think that Facebook is only targeting kids, right?

Categories
Links Photography Roundup Writing

The Roundup for May 12-18, 2018 Edition

Soar by Christopher Parsons

It’s become incredibly popular to attribute the activities undertaken by the Facebooks and Googles of the work to ‘surveillance capitalism’. This concept generally asserts that the current dominant mode of economics has become reliant on surveillance to drive economic growth. Surveillance, specifically, is defined as the act of watching or monitoring activity with the intent of using captured information to influence behaviour. In the world of the Internet, this information tends to be used to influence purchasing behaviours.

The issue that I have with the term surveillance capitalism is that I’m uncertain whether it comprehensively captures the activities associated with the data-driven economy. Surveillance Studies scholars tend to apply the same theories which are used to understand CCTV to practices such as machine learning; in both cases, the technologies are understood as establishing feedback loops to influence an individual or entire population. But, just as often, neither CCTV nor machine learning actually have a person- or community-related feedback loop. CCTV cameras are often not attended to, not functional, or don’t provide sufficient information to take action against those being recorded. Nor do individuals necessarily modify their own behaviours in the presence of such cameras. Similarly, machine learning algorithms may not be used to influence all persons: in some cases, they may be sufficiently outside the scope of whatever the algorithm is intended to do that they are not affected. Also, like CCTV, individuals may not modify their own behaviours when machine learning algorithms are working on the data those individuals are generating on the basis of being unaware of machine learning operating on their data.

So, where surveillance capitalism depends on a feedback loop that is directly applied towards individuals within a particular economic framework, there may be instances where data is collected and monetized without clear or necessary efforts to influence individuals. Such situations could include those where a machine learning algorithm is designed to improve a facial recognition system, or improve battery life based on the activities undertaken by a user, or to otherwise very quietly make tools more effective without a clear attempt to modify user behaviour. I think that such activities may be very clearly linked to monetization and, more broadly, an ideology backed by capitalism. But I’m not sure it’s surveillance as it’s rigorously defined by scholars.

So one of the things that I keep thinking about is whether we should shift away from the increasingly-broad use of ‘surveillance capitalism’ to, more broadly, talk about ‘data capitalism’. I’m not suggesting doing away with the term surveillance capitalism but, instead, that surveillance capitalism is a sub-genus of data capitalism. Data capitalism would, I believe, better capture the ways in which information is collected, analyzed, and used to effect socio-technical changes. Further, I think such a term might also capture times where those changes are arguably linked to capitalist aims (i.e. enhancing profitability) but may be less obviously linked to the feedback loops towards individuals that are associated with surveillance itself.


After approximately twenty months of work, my colleagues and myself have published an extensive report on encryption policies in Canada. It’s a major accomplishment for all of us to have finally concluded the work, and we’re excited by the positive feedback we’ve received about it.


Inspiring Quotation of the Week

“Ambition is a noble passion which may legitimately take many forms… but the noblest ambition is that of leaving behind something of permanent value.”

– G.H. Hardy

Great Photography Shots

Some of these storm chaser photos are practically otherworldly.

Music I’m Digging

Neat Podcast Episodes

Good Reads for the Week

Cool Things

Categories
Links Photography Roundup Writing

The Roundup for May 5-11, 2018 Edition

The Ride by Christopher Parsons

During my Master’s degree I was given the opportunity to provide feedback on early work being written by Jim Tully and Jurgen Habermas. Reading their work and thinking about it seriously and critically so as to suggest improvements taught me the importance of grace in feedback and, also, that even superstar scholars produce first drafts that leave significant room for improvement. Most importantly, it taught me that the finished material that I was reading in journals and books came from authors who’s draft writing was flawed, just like my first drafts.1

Engaging with drafts is probably one of the hardest things that you can do, because you want to be as helpful as possible and — at least in academia — that often means being incredibly critical of the work in question. The intent shouldn’t ever be to ‘kill’ the work; whatever criticism is provided ought to be nuanced with the view of improving it. A reviewer should indicate why a particular section, or paragraph, or sentence is a problem, provide ideas for resolving the tension if any come to mind, and even suggest alternate ways of thinking about the idea, concept, or text under review. At all points the goal should not be to edit and critique, not for the sake of editing and engaging in critique, but instead in the service of supporting the author so that their work communicates their ideas, descriptions, and conclusions in the most concise and illuminating ways possible.

Because the first authors I provided serious feedback to were paragons in my field at the time I had to be careful, nuanced, and generous in my comments. I had to really engage with the work and not give it a quick read and spit out half-baked analyses and critiques. Unfortunately, not enough reviewers of academic texts provide this kind of thoughtful response, likely because most reviewers are rushing to read and review the piece so they can get to their own commitments. As a result, comments and feedback can be abrupt, not engage with core arguments, and be overly brief to the point of being unhelpful to the author.

Reviewing is one of the most thankless jobs in academia, and more broadly in the literary community. Authors know the importance of strong reviewers. But this reviewing element of the writing process is entirely invisible to people who just read the finished work and, by extension, leads to conclusions that authors somehow produce brilliant prose out of nowhere. Lost is the fact that all manuscripts are really multi-authored; it’s just that the ‘lesser’ secondary authors who engage with the author at the earliest stages to course correct the text, to provide suggestions, and to suggest different phrasings, are left off. And that’s perfectly fine. But I think that it’d be a lot less scary for people to start writing if they realized that the process writing almost always involves a large number of non-authors who help to evolve a work from first to final draft, and how significantly ideas and intentions behind a work’s publication can change from inception to conclusion. In effect, I think it’d be useful to know that the ‘stars’ in any given literary field stand at the forefront of a small army of helpers, assistants, and supporters, as opposed to heroically on their lonesome with their finished manuscripts.


The Paywall Craze

Paul Om wrote,

… I think the paywall craze which is sweeping the media herd will be a big reality check for the news and magazine publishers. So many of them are drinking their own spiked kool -aid. They will soon realize the size of their “real audience” and will soon realize that they don’t pass the “value for money” threshold. There are very few publications that have a feeling of must-reads and must-haves.

This feels pretty dead on; the issue, today, is that there is so much content that the act of choosing is the hard part. I think that the only content that is going to be subscribed to is either that which is regarded as essential to someone’s life or that they spend money on in order to focus their time and attention on it. Sure, there’s some popular media that will survive a shift to paywalls but I suspect a lot of organizations will realize just how little their readers actually value what was being produced. And that’s going to hurt for the media organizations and for the writers working there.


Inspiring Quotation of the Week

In many ways, fame is the industrial disease of creativity. It’s a sludgy byproduct of making things.

—Mike Myers

Great Art

I really love these illustration by Jenn Woodall

May banner by Jenn Woodall
Know Your Enemy by Jenn Woodall
Painting for ‘GIRLS GIRLS GIRLS’ who at Northern Contemporary Gallery by Jenn Woodall

Music I’m Digging

Neat Podcast Episodes

Good Reads for the Week

  1. I mean, their work was more complex and nuanced that my work at the time. But in all our cases the first draft was the first stab at explaining and arguing instead of being the first and final word(s).
Categories
Links Photography Roundup Writing

The Roundup for April 28-May 4, 2018 Edition

OLYMPUS DIGITAL CAMERA
Hoop Dreams by Christopher Parsons

In the wake of the Toronto attack any number of journalists are trying to become experts on the ‘incel’ community, which defines itself as a community of men who are involuntarily celibate and as deserving intercourse with women. It’s led to some suggestions that maybe it’s appropriate to think about policy solutions to the ‘problem’. At issue, of course, is that some persons have failed to recognize the problem itself. Consider Ross Douthat, who links Amia Srinivasan’s ruminations on the links between desire and politics with incels, effectively conjoining a misogynistic subculture with “the overweight and disabled, minority groups treated as unattractive by the majority, trans women unable to find partners and other victims … of a society that still makes us prisoners of patriarchal and also racist-sexist-homophobic rules of sexual desire.” Douthat continues to ultimately argue that a combination of commerce, technology, and efforts to destigmatize sex work will lead to “at a certain point, without anyone formally debating the idea of a right to sex, right-thinking people will simply come to agree that some such right exists, and that it makes sense to look to some combination of changed laws, new technologies and evolved mores to fulfill it.”

Douthat’s entire argumentative structure — that the ‘problem’ to solve in an inability to engage in sexual, if not romantic, relationships — is predicated on the notion that there is such a thing as a legitimate right to intercourse. There is not. There is a legitimate right to safe, respectful, and destigmatized sexual relationships and activities. There is a right to sexual education, to sexual health and wellbeing, but there is no right to intercourse: such a right would imply that the act of penetrating another person is necessary and appropriate. That is clearly not the case.

Instead, the problem with the incel community is linked with misogyny. Specifically, as Jessica Valenti writes, the problem is with misogynist terrorism, a situation where certain men’s disdain towards women drives mass murders. Part of solving this particular problem is linked with addressing the underlying culture in America, and the world more generally. Specifically, she writes:

Part of the problem is that American culture still largely sees men’s sexism as something innate rather than deviant. And in a world where sexism is deemed natural, the misogynist tendencies of mass shooters become afterthoughts rather than predictable and stark warnings.

The truth is that in addition to not protecting women, we are failing boys: failing to raise them to believe they can be men without inflicting pain on others, failing to teach them that they are not entitled to women’s sexual attention and failing to allow them an outlet for understandable human fear and foibles that will not label them “weak” or unworthy.

It’s essential that men, and boys, learn about how to engage with other humans in non-destructive ways. Such a process is borderline revolutionary because it entails reshaping how cultural, social, legal, and economic relationships are structured, and any such restructuring must be motivated by a rebalancing of power relationships across genders and races (and, ultimately, geographies). The outcome will be that the privilege that straight white men have enjoyed for centuries will be diminished and, correspondingly, restrict the social and economic opportunities that some men have enjoyed solely because of their gender and race. But those changes are essential if we’re to actually confront the misogyny and racism that underlies not just incel culture, but that of mainstream society and politics as well.


Inspiring Quotation of the Week

Writing—I can really only speak to writing here—always, always only starts out as shit: an infant of monstrous aspect; bawling, ugly, terrible, and it stays terrible for a long, long time (sometimes forever). Unlike cooking, for example, where largely edible, if raw, ingredients are assembled, cut, heated, and otherwise manipulated into something both digestible and palatable, writing is closer to having to reverse-engineer a meal out of rotten food.

  • David Rokoff

New Apps

Great Photography Shots

I’d never seen x-ray photos of flowers before. It’s an absolutely breathtaking form of image making.

Photo manipulation by Edmanep

Music I’m Digging

Neat Podcast Episodes

Good Reads for the Week

Cool Things

Categories
Links Photography Roundup Writing

The Roundup for April 23-27, 2018 Edition

Hidden Point by Christopher Parsons

I shifted over to this domain name, and WordPress environment, a little over eight months ago. In addition to moving multiple years of content I also committed to at least one post a week though, ideally, would post many more than that!

I’ve been largely successful with meeting those goals. As such, I’ve been able to maintain a regular personal writing habit. It’s also meant I’ve locked down some of my ruminations and thoughts so that I can reflect on them later on down the line.

However, there are some things that I’m not entirely happy with. First, I’ve been privately writing small ‘reviews’ of books and movies but haven’t gotten around to posting them here. Part of that is wanting to do them ‘well’ and the other reason is that I’m trying to decide if I should have posts and then a master page that links to the posts, or just posts, or just a page. But expect that to be figured out pretty soon.1 I also really like the idea of putting up a gear/software list of things that I routinely use, and want to steal an idea from a friend of mine who posts the podcasts that she’s really into at any given time. And I want to put some thought into developing a public blogroll, likely based on the RSS feeds that I consume, though I admit that I’m not entirely sure of the utility of blogrolls in this day and age.

The reason for contemplating these changes to some of the content and structure? Mostly because I think I can move more of my writing to this location; there’ve only been a few times that I thought I was getting too ‘close’ to mimicking the work on my professional web presence or private journal, and even then the tone was sufficiently different that it belonged here as opposed to those other locations. But I’m also motivated to modify some of the content here because I want what I write to be interesting and useful for other people; I often find that bloggers’ reviews and insights about the things they use are the only way that I discover the existence of certain tools, products, workflows, and cultural items. So I want to give back to others, just as they have freely given to me and everyone else who visits (or has visited) their sites.


I spent some time this week writing about a recent proposal to significantly weaken the security of the devices we carry with us on a daily basis. In short, I think that the proposal:

doesn’t address the real technical or policy problems associated with developing a global backdoor system to our most personal electronic devices. Specifically the architect of the solution overestimates the existent security characteristics of contemporary devices, overestimates the ability of companies to successfully manage a sophisticated and globe-spanning key management system, fails to address international policy issues about why other governments couldn’t or wouldn’t demand similar kinds of access (think Russia, China, Iran, etc), fails to contemplate an adequate key revocation system, and fails to adequately explain why why the exceptional access system he envisions is genuinely needed.

Device security, and especially efforts to weaken it, fundamentally raises technical and policy issues. Neither type of issue can be entirely divorced from the other, and it’s important to recognize that the policy issues are both domestic and international; failing to address them both, at the same time, means that any proposal will almost certainly have terminal weaknesses.


Inspiring Quotation of the Week

“Do not let anything that happens in life be important enough that you’re willing to close your heart over it.”

— Michael A. Singer

Great Photography Shots

The shots from this year’s Sony 2018 World Photography Awards are stunning. Here are some of my favourites:

“Untitled” from the series “Ex-Voto” © Alys Tomlinson, United Kingdom, Photographer of the Year, Professional, Discovery, 2018 Sony World Photography Awards
“Letter of departure” © Edgar Martins, Portugal, 1st Place, Professional, Still Life (Professional competition), 2018 Sony World Photography Awards

Music I’m Digging

Neat Podcast Episodes

Good Reads for the Week

Footnotes

  1. I suspect I’ll opt to a post-per-review, with them aggregated on a distinct page.
Categories
Links Writing

Another Bad Proposal to Globally Weaken Security

federica-galli-449563-unsplash
Photo by Federica Galli on Unsplash

Steven Levy has an article out in Wired this week in which he, vis-a-vis the persons he interviewed, proclaims that the ‘going dark’ solution has been solved to the satisfaction of (American) government agencies and (unnamed and not quoted) ‘privacy purists’.1 Per the advocates of the so-called-solution, should the proposed technical standard be advanced and developed then (American) government agencies could access encrypted materials and (American) users will enjoy the same degrees of strong encryption as they do today. This would ‘solve’ the problem of (American) agencies’ investigations being stymied by suspects’ adoption of encrypted communications systems and personal devices.

Unfortunately Levy got played: the proposal he dedicates his article to is just another attempt to advance a ‘solution’ that doesn’t address the real technical or policy problems associated with developing a global backdoor system to our most personal electronic devices. Specifically the architect of the solution overestimates the existent security characteristics of contemporary devices,2 overestimates the ability of companies to successfully manage a sophisticated and globe-spanning key management system,3 fails to address international policy issues about why other governments couldn’t or wouldn’t demand similar kinds of access (think Russia, China, Iran, etc),4 fails to contemplate an adequate key revocation system, and fails to adequately explain why why the exceptional access system he envisions is genuinely needed. With regards to that last point, government agencies have access to more data than ever before in history and, yet, because they don’t have access to all of the data in existence the agencies are claiming they are somehow being ‘blinded’.

As I’ve written in a draft book chapter, for inclusion in a book published later this year or early next, the idea that government agencies are somehow worse off than in the past is pure nonsense. Consider that,

[a]s we have embraced the digital era in our personal and professional lives, [Law Enforcement and Security Agencies] LESAs have also developed new techniques and gained additional powers in order to keep pace as our memories have shifted from personal journals and filing cabinets to blogs, social media, and cloud hosting providers. LESAs now subscribe to services designed to monitor social media services for intelligence purposes, they collect bulk data from telecommunications providers in so-called ‘tower dumps’ of all the information stored by cellular towers, establish their own fake cellular towers to collect data from all parties proximate to such devices, use malware to intrude into either personal endpoint devices (e.g. mobile phones or laptops) or networking equipment (e.g. routers), and can even retroactively re-create our daily online activities with assistance from Canada’s signals intelligence agency. In the past, each of these kinds of activities would have required dozens or hundreds or thousands of government officials to painstakingly follow persons — many of whom might not be specifically suspected of engaging in a criminal activity or activity detrimental to the national security of Canada — and gain lawful entry to their personal safes, install cameras in their homes and offices, access and copy the contents of filing cabinets, and listen in on conversations that would otherwise have been private. So much of our lives have become digital that entirely new investigative opportunities have arisen which were previously restricted to the imaginations of science fiction authors both insofar as it is easier to access information but, also, because we generate and leave behind more information about our activities vis-a-vis our digital exhaust than was even possible in a world dominated by analog technologies.

In effect: the ‘solution’ covered by Levy doesn’t clearly articulate what problem must be solved and it would end up generating more problems than it solves by significantly diminishing the security properties of devices while, simultaneously, raising international policy issues of which countries’ authorities, and under what conditions, could lawfully obtain decryption keys. Furthermore, companies and their decryption keys will suddenly become even more targeted by advanced adversaries than they are today. Instead of even attempting to realistically account for these realities of developing and implementing secure systems, the proposed ‘solution’ depends on a magical pixie dust assumption that you can undermine the security of globally distributed products and have no bad things happen.5

The article as written by Levy (and the proposed solution at the root of the article) is exactly the kind of writing and proposal that gives law enforcement agencies the energy to drive a narrative that backdooring all secure systems is possible and that the academic, policy, and technical communities are merely ideologically opposed to doing so. As has become somewhat common to say, while we can land a person on the moon, that doesn’t mean we can also land a person on the sun; while we can build (somewhat) secure systems we cannot build (somewhat) secure systems that include deliberately inserted backdoors. Ultimately, it’s not the case that ‘privacy purists’ oppose such solutions to undermine the security of all devices on ideological grounds: they’re opposed based on decades of experience, training, and expertise that lets them recognize such solutions as the charades that they are.

Footnotes

  1. I am unaware of a single person in the American or international privacy advocacy space who was interviewed for the article, let alone espouses positions that would be pacified by the proposed solution.
  2. Consider that there is currently a way of bypassing the existing tamper-resistant chip in Apple’s iPhone, which is specifically designed to ‘short out’ the iPhone if someone attempts to enter an incorrect password too many times. A similar mechanism would ‘protect’ the master key that would be accessible to law enforcement and security agencies.
  3. Consider that Microsoft has, in the past, lost its master key that is used to validate copies of Windows as legitimate Microsoft-assured products and, also, that Apple managed to lose key parts of its iOS codebase and reportedly its signing key.
  4. Consider that foreign governments look at the laws promulgated by Western nations as justification for their own abusive and human rights-violating legislation and activities.
  5. Some of the more unhelpful security researchers just argue that if Apple et al. don’t want to help foreign governments open up locked devices they should just suspend all service into those jurisdictions. I’m not of the opinion that protectionism and nationalism are ways of advancing international human rights or of raising the qualities of life of all persons around the world; it’s not morally right to just cast the citizens of Russia, Ethiopia, China, India, Pakistan, or Mexico (and others!) to the wolves of their own oftentimes overzealous or rights abusing government agencies.
Categories
Links Photography Roundup Writing

The Roundup for April 14-20, 2018 Edition

Walkways by Christopher Parsons

Earlier this year, I suggested that the current concerns around Facebook data being accessed by unauthorized third parties wouldn’t result in users leaving the social network in droves. Not just because people would be disinclined to actually leave the social network but because so many services use Facebook.

Specifically, one of the points that I raised was:

3. Facebook is required to log into a lot of third party services. I’m thinking of services from my barber to Tinder. Deleting Facebook means it’s a lot harder to get a haircut and impossible to use something like Tinder.

At least one company, Bumble, is changing its profile confirmation methods: whereas previously all Bumble users linked their Facebook information to their Bumble account for account identification, the company is now developing their own verification system. Should a significant number of companies end up following Bumble’s model then this could have a significant impact on Facebook’s popularity, as some of the ‘stickiness’ of the service would be diminished.1

I think that people moving away from Facebook is a good thing. But it’s important to recognize that the company doesn’t just provide social connectivity: Facebook has also made it easier for businesses to secure login credential and (in others cases) ‘verify’ identity.2 In effect one of the trickiest parts of on boarding customers has been done by a third party that was well resourced to both collect and secure the data from formal data breaches. As smaller companies assume these responsibilities, without the equivalent to Facebook’s security staff, they are going to have to get very good, very fast, at protecting their customers’ information from data breaches. While it’s certainly not impossible for smaller companies to rise to the challenge, it won’t be a cost free endeavour, either.

It will be interesting to see if more companies move over to Bumble’s approach or if, instead, businesses and consumers alike merely shake their heads angrily at Facebook’s and continue to use the service despite its failings. For what it’s worth, I continue to think that people will just shake their heads angrily and little will actually come of the Cambridge Analytica story in terms of affecting the behaviours and desires of most Facebook users, unless there are continued rapid and sustained violations of Facebook users’ trust. But hope springs eternal and so I genuinely do hope that people shift away from Facebook and towards more open, self-owned, and interesting communications and networking platforms.


Thoughtful Quotation of the Week

The brands themselves aren’t the problem, though: we all need some stuff, so we rely on brands to create the things we need. The problem arises when we feel external pressure to acquire as if new trinkets are a shortcut to a more complete life. That external pressure shouldn’t be a sign to consume. If anything, it’s a sign to pause and ask, “Who am I buying this for?”

Great Photography Shots

I was really stunned by Zsolt Hlinka’s architectural photography, which was featured on My Modern MET.

Music I’m Digging

Neat Podcast Episodes

Good Reads for the Week

Cool Things

Footnotes

  1. I think that the other reasons I listed in my earlier post will still hold. Those points were:

    1. Few people vote. And so they aren’t going to care that some shady company was trying to affect voting patterns.
    2. Lots of people rely on Facebook to keep passive track of the people in their lives. Unless communities, not individuals, quit there will be immense pressure to remain part of the network.

  2. I’m aware that it’s easy to establish a fake Facebook account and that such activity is pretty common. Nevertheless, an awful lot of people use their ‘real’ Facebook accounts that has real verification information, such as email addresses and phone numbers.
Categories
Links Quotations Roundup Writing

The Roundup for April 7-13, 2018 Edition

Love, Locked by Christopher Parsons

In my ongoing efforts to better understand myself, I’ve been listening to some of the early episodes of Gary Dunn’s podcast, Bad With Money. These episodes tend to focus on the narratives around money that have guided how she lives her life, where she learned them from, and how to overcome them, and have entailed conversations between her and her parents, her boyfriend, and with a financial psychologist and her sister.

What she’s learned, and how information is presented, has often resonated with my own experiences growing up in a family that went from middle-class, of upper-lower class, and then has split along a series of different lines as I’ve grown older. A lot of the conversations focus on how what her parents did with money while she was growing up subtly informed how Gaby, herself, has approached money as a result. And it’s gotten me thinking about the money narratives that I learned from my dad (generally really bad) and my mom (not super-terrific).

Of course, listening to some podcasts isn’t going to correct the narratives that have built up in my own head over the past several decades (e.g. debt is normal to have and carry, retirement savings are almost impossible, you should enjoy the benefits of your work now instead of later) but they do help to make explicit some of the challenges I know I need to overcome. Some of the conversations she’s had with her guests have been more or less insightful but, in aggregate, they’re useful because she uses such natural language to approach financial questions and issues that pervade many people’s daily lives. This natural language matters because it makes very clear that the show isn’t about an expert from on high explaining reality but, instead, involves the self-discovery of Gaby (and through her some discovery of the precise questions I need to ask myself). Her narratives and my own are not the same but the questions, on their own, are sufficient to jumpstart internal introspection.

The interviews she conducts are also helpful because so few people talk about financial mindsets in public that it’s hard to hear, let alone understand, the money narratives that different people hold. Through that act of listening I can better identify and situate my own narratives and ascertain what is normal, abnormal, and what needs to be corrected or remain the same. Dunn’s podcast is definitely only an early starting point but, regardless, it’s super helpful for people who don’t want to invest money but, instead, want to invest in themselves and their personal development.


On the same track of ‘podcasts I’ve listened to’ over the course of the past week, Dear Sugars has had a really good (if hard) series of episodes on consent in sexual relationships. The women who are submitting the questions are incredibly brave for presenting their experiences, and the hosts of the show are incredibly kind and nuanced in their analyses of what has taken place in their own pasts and in the lives of their letter writers. I care deeply about ensuring that all relationships — sexual or not — are consensual and these podcasts have given me insights to the challenges facing women that I may never have fully appreciated before listening to this series of episodes.


Insightful Quotation

One of the defining things about the nature of ideas is just how fragile they are: when you’re not sure whether some-thing is going to work, the idea is vulnerable. Part of protecting the idea is to be careful about who you show it to; premature criticism can shut something down that perhaps deserves more of a chance.

Great Photography Shots

I was really impressed by the water-inspired smartphone photos posted to Mobiography.

Untitled‘ by Christine Mignon
Boundaries‘ by Laurence Bouchard
Hardy Falls – Mt Magazine – AR‘ by Becky Foster

Music I’m Digging

Neat Podcast Episodes

Good Reads for the Week

Cool Things