The durability of Etymotic ER6i headphones

Recently, my second pair of Etymotic ER6i headphones failed. Once again, it seems that a wire broke in the connector, causing sound to be cut off in one ear. The first time it happened, the headphones were still under their one-year warranty and Etymotic cheerfully replaced them. This time, it is a question of buying a third set or switching to another style or brand that seems likely to be more durable.

The headphones are excellent in terms of sound quality, but somewhat lacking in terms of toughness. In fairness, they only weigh a couple of grams and I did use them virtually every day, including sometimes while cycling. There were a fair number of cases when the wire got caught on something and yanked rather violently. The headphones are a pricy US$149.00 if you buy them directly from Etymotic, but a far more reasonable $80.48 on Amazon.com (of course, buying them from Amazon requires paying customs duties or the song-and-dance of having them sent to a US address and then shipped to Canada). $7 or so per month actually strikes me as a tolerable price for excellent headphones, though I rather dislike the notion of treating them like a disposable commodity. I would be willing to spend more money on headphones that are more likely to last, or those with a three-year rather than a one-year warranty.

The competition in terms of high quality earbuds seems to be the Shure E2C or SE110s. Does anyone have experience with those, or recommendations for other brands to consider?

[Update: 27 December 2008] I am now on to my third pair of ER6i headphones. In the end, they sound great, but cannot be expected to be durable. My advice to potential buyers is this: expect them to last for between one or two years. If that length of high quality, highly portable sound is worth their price to you, go ahead and buy them.

[Update: 23 June 2010] That third pair of ERis suffered the same fate as those before – a wire failed, causing them to cut out in one ear. Despite having had them since December 2008, I called Etymotic and they told me to send them in. Much to my pleasure, Etymotic then replaced them, despite the warranty being over. As such, I now have my fourth pair of ER6is.

NIST hash competition

Several times, the American government has held open competitions to create new cryptographic standards. Important examples include the Data Encryption Standard (DES) selected in 1976 and the Advanced Encryption Standard (AES) chosen in 2001. As mentioned before, the hunt is now on for a new hash function. These are one-way forms of encryption that play a number of vital roles, such as making it possible to save only encrypted versions of passwords in password databases that might be compromised.

Bruce Schneier, who made an unsuccessful bid for his TwoFish cipher to be accepted as the AES, is now part of the team that has created the Skein Hash Function for the ongoing National Institute of Standards and Technology competition. The function is based around a successor to TwoFish called, unsurprisingly, Threefish. All entries must be submitted by tomorrow and will be publicly scrutinized over the next four years or so. The result should be a more secure successor to the SHA hash functions.

Contemplating netbooks

Having played around a bit with Tristan’s EEE PC, I am considering getting a netbook computer myself. My old iBook is not very portable and, while the big screen and keyboard it offers have advantages, there is considerable appeal in a machine that could be a default content of my backpack.

Do any readers have experience with particular netbooks? I would be looking for something that is tolerable for writing emails and blog posts on, and good for surfing the web. Long battery life would be an advantage, as would an operating system that does the most common tasks well.

I won’t be buying anything for a couple of months, at least, due to a bit of a financial crunch, so machines that look promising and have not yet been released are also worth mentioning.

The Code-Breakers

For those with a serious interest in the history and practice of cryptography, David Khan’s The Code-Breakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet provides an enormous mass of knowledge. The scope of the 1200 page book is vast: covering everything from the earliest ciphers to the origins of public key cryptography in detail. It is probably fair to say that the period best covered is that between the Middle Ages and the Second World War, though the sections covering the decoding of Egyptian hieroglyphics and Linear B are also detailed and skilfully written. Those interested primarily in the contemporary practice of cryptography – or those seeking a more concise text – would be well advised to consider the books by Simon Singh and Bruce Schneier on the topic.

Khan’s book excels in actually describing how various cryptographic systems work, as well as how they were broken. For the most part, his analysis is factual and dispassionate. The sole exception is in the period covering the Cold War, in which his ire against the Soviet Union and those Americans who turned into traitors for it are acute. At times, the book gets into an excessive amount of detail about the bureaucratic organization of different cipher bureaus: including lengthy sections about how various wartime bodies were reorganized. In most cases, the book does not provide much biography on the men and women involved, though exceptions exist in the case of some of the most eminent or interesting cryptographers. The book does provide an interesting discussion of the history of writing on cryptography, including the impact that major publications had on the development of the field and its comprehension within society at large. Kahn also does a good job of debunking some of the many spurious claims that have been made about ‘revolutionary’ and ‘unbreakable’ cryptosystems that people have invented: stressing how the making of cryptographic systems is a realm of abstract mathematics, while the breaking of such systems is a gritty and practical exercise.

In addition to covering the techniques of cryptography and cryptanalysis themselves, the book covers many related security issues: including physical security, invisible inks, elements of spycraft, decisions about how to use information gleaned through cryptanalysis, and the use of broken cryptographic systems to transmit fake or confusing information. The book also covers the relationships between cryptographic work and the activities it is supporting. An especially intriguing section details the efforts of the American navy to combat rum smuggling during the prohibition era. Ships with floating cryptoanalytical laboratories provided vital intelligence to interception vessels, just as other cryptanalysis had helped re-direct U-boats away from German submarines during the Second World War. The book covers an enormous variety of code systems, ranging in use and sophistication. These include diplomatic and commercial systems, high level military systems used between major installations, systems for vehicles, trench codes for those on the front lines, and more. The most abstract section of the book contemplates communication between human beings and extraterrestrials, covering questions about how we could recognize alien communication, as well as mathematical steps through which a comprehensible discourse could potentially be established.

For those interested in actually breaking codes and ciphers themselves, the book provides detailed information on techniques including frequency analysis, factorization attacks of the kind used against polyalphabetic substitution ciphers, and the index of coincidence. It also provides a lot of information on the weak ways in which cryptography is often used and the kinds of errors that have allowed for key breaks into previously unreadable cryptosystems. While it would not be especially useful for attacking modern computerized cryptographic systems, it would provide some guidance for those seeking to break into amateur or puzzle-type cryptographic challenges.

The Code-Breakers may well be the most comprehensive cryptographic history available, though it is far less detailed in its description of post-Cold War cryptosystems than some of its more concise recent contemporaries. For those wishing to gain an appreciation for how cryptography emerged, the role it played for most of human history, and the techniques that have been employed to guard and attack messages, this is an ideal place to turn.

Mycelium Running

Paul Stamets’ Mycelium Running: How Mushrooms Can Help Save the World is an informative text, written by a true believer. While it contains a lot of practical information, the author’s unbridled enthusiasm sometimes makes you doubt how valid the more fantastic claims are. That being said, it certainly provides some concrete and believable examples of situations where the strategic use of fungi can have beneficial health and environmental effects.

After providing some basic information about the biology of fungi, Stamets covers four different kinds of ‘mycorestoration.’ He shows how patches of mycelium (the tangled, stringy mass that makes up the bulk of fungi) can be used to filter water flowing through – an application that might have particular value downslope from farm animals. The section on mycoforestry shows how mushrooms can accelerate the breakdown of debris from logging, allowing nutrients to return to the soil. It also addresses the ways in which mycorrhizal fungi on the roots of plants can enhance their growth and health. In a section on mycoremediation, Stamets highlights the ability of different fungi to digest or absorb toxic materials ranging from crude oil to nerve gas to radioactive strontium. Finally, a section on mycopesticides describes ways in which insect-attacking fungi can be used to prevent and cure insect infestations.

In addition to the sections outlining the potential of fungi in general, the book includes a lot of practical information about different types of mushrooms, their uses, and how to grow them. It covers different ways of going from spores to a mushroom patch, at scales ranging from a small garden installation to the very large scale. The last hundred pages is a species-by-species catalogue of different mushrooms: how they look, how to grow them, nutritional information, etc. The assertions about mushrooms having intelligence (partly on the basis of mycelium looking like neurons in a brain), I definitely have my doubts about. The step-by-step instructions on producing mushroom patches, I have no doubt could be invaluable to someone wishing to put fungal theory into practice.

Fungi are probably the class of organisms least well understood by most people, and it is rewarding to gain a deeper understanding of the roles they play in ecosystems. More information can be found on Stamets’ website, which also sells various types of mushroom kit and spawn.

Distributed tremor detection

Jesse Lawrence is an Assistant Professor at Stanford University, primarily interested in earthquake seismology and distributed computing. One idea has now merged the two fields: using the accelerometers increasingly commonly built into laptops and phones to make a distributed system for earthquake measurement. By having lots of sensors, it is possible to distinguish earthquakes from other forms of motion. The distributed approach also has advantages: it can provide more detailed information about extreme vibrations than delicate seismometers. It can also provide data collected at many more points, increasing understanding of the earthquake as an effect across a large area. Apparently, with appropriate signal processing, it would be possible to use the system to warn people in surrounding areas not yet affected by the quake, since the data could move more quickly than the seismic waves themselves.

Those wishing to join the Quake-Catcher Network can get the Mac or PC software online. Presumably, people in California are especially encouraged to enroll.

The biomass of humans

Sightline Daily has some interesting numbers up on the relative biomass of human beings, domesticated animals, and wild animals. Apparently, just humans have eight times as much mass as all the wild vertebrates on land. Our mass approximately equals that of all the fish and whales in the ocean. Things are even more dramatic when you factor in domesticated animals. They contain 100 megatonnes of carbon – 20 times as much as there is in all the wild vertebrates on land.

The figures certainly make you think about ecological footprints in a more direct way. They also say something about energy. It seems fair to say that one major factor affecting the total biomass of wild animals is the amount of energy they are able to access. To what extent does our inflated biomass result from unsustainable energy use? Will we be able to maintain it when we can no longer count on ever-increasing production of fossil fuels?

Keeping track of discussion threads

One of the major reasons for which I keep writing here is because of how it forces me to engage with and clarify my own thinking on important issues. One of the most important mechanisms through which that occurs is the discussions that often accompany posts.

I realize that it is awkward to keep re-visiting the same post over and over, looking to see if anyone has responded to your comment. To make it easier, there are two alternative options for seeing new comments:

  1. You can subscribe to an RSS feed of the comments. If you don’t know what that means, this guide provides an introduction.
  2. You can sign up to receive the comments daily by email.

Either way, you can keep track of discussions (as well as links to news items relating to posts) more easily.

Snails and ‘love darts’

The oddest thing I learned from Wikipedia recently is that when snails mate, they attempt to shoot one another in the head with a calcium ‘love dart.’ Snails are hermaphroditic, exchanging sperm with one another and later using it to fertilize their own eggs. In Helix aspersa, the darts are coated with chemicals that cause the ducts in the other snail to contract, possibly suppressing the function of sperm-digesting enzymes.

The whole process sounds rather perilous:

The darting can sometimes be so forceful that the dart ends up buried in the internal organs. Sometimes the darts pierce the body or head entirely, and protrude on the other side…

The dart is shot with some variation in force, and with considerable inaccuracy, such that one-third of the darts that are fired in Helix aspersa either fail to penetrate the skin, or miss the target altogether.

A photo accompanying the article shows edible snails (Helix pomatia) engaging in weird but surprisingly photogenic mollusc courtship.