Wikileaks and whistleblowers

My cousin Tamara and her SO

Wikileaks is a website that allows anonymous whistleblowers to disseminate sensitive or embarrassing documents online. These could be anything from evidence of corruption and bribery in government to corporate wrongdoings to secret military interrogation manuals. While the ability to publish anonymously does have potential for abuse, it is also a valuable public service. There are plenty of barriers that prevent people from becoming whistleblowers, even when there is massive evidence of wrongdoing. Having technological mechanisms to aid the process – and reduce the dangers of retribution – thus serves the public interest. Particularly in places where governments are undermining traditional forms of public and legal oversight, such as in the treatment of terrorist suspects, there is extra value in whatever sources of information remain accessible.

As of today, the site is suffering from a California court decision that required Dynadot – the domain name registry that associates the URL ‘Wikileaks.org’ with an IP address – to “prevent the domain name from resolving to the wikileaks.org Web site or any other Web site or server other than a blank park page until further notice.” This doesn’t make the site inaccessible, since the server can be accessed directly at http://88.80.13.160/, but it will prevent a good number of people from finding it. The ruling arose from proceedings involving Julius Baer – a Swiss bank that leaks have implicated in tax evasion and money laundering in the Cayman Islands. In addition to the DNS restriction, the site is apparently suffering from a denial of service attack, probably orchestrated by one or more organizations the site has embarrassed.

The final result of this will be an interesting development in the ongoing battle to control what kind of information can be distributed online, whether that can be done anonymously or not, and which jurisdictions are most accommodating towards such activities.

Comprehensive storage

Your average active computer user has more and more data. The first computer I effectively administered had 170 megabytes of hard disk space. Difficult choices had to be made about the relative merits of Doom versus Simcity. Now, just my primary email account has 1500 megabytes of data in it. I have 15 gigabytes worth of photos I have taken (all since 2005) and 20 gigabytes of music.

All this has been made possible by dramatically falling storage prices, combined with the spread of broadband internet. Soon, I expect that this combination will reach its logical conclusion. Right now, people are constrained by the size of their smallest hard drive, as well as by the difficulty of accessing larger remote drives. Eventually, I expect that most people will have a multi-terabyte disk connected to the internet at high speed and securely accessible from virtually any device in the world over the internet. The biggest question is whether this will be an ‘answering machine’ or a ‘voicemail’ solution.

The answering machine option is a big disk purchased by an individual consumer (perhaps a rack of disks, so that cheaper bigger ones can be added to the array as they become available). A company that made three things easy would have a license to print money. The first is integrated ease of use. iTunes music on the big disk should be immediately accessible from a person’s laptop or iPhone, provided they have internet access. The same should be true for saved television shows, photos, etc. The second is effortless backup. It is perfectly feasible to have a disk that is big enough to ensure that the failure of any one component does not lead to any loss of data. The third is security. The big disk should be secure enough against outside attack for use in storing commercially sensitive materials; likewise, the connection between outside devices and the disks should be secure. Probably, this means different levels of access for different sorts of devices, managed through a good user interface.

The voicemail option is to leave all the kit to someone else and just buy a service. Lots of companies are moving towards this model. In many ways, it’s a lot more efficient. Maintaining adequate but not excessive space for a million users is easier than doing the same thing for one; there are also economies of scale, since you can have specialists do all the technical work. The downsides of this model are mostly security related. You need to trust the service provider to keep your data safe. You also need to trust them not to apply arbitrary constraints on how you can use it, as Apple has sometimes done.

I predict that most people will use the second model exclusively, and will pay little or nothing to do so. More technically savvy people will run their own drives, but will probably use external services for (free) unencrypted or (subscription based) encrypted backup. Personally, I can’t wait. External hard drives have the feel of a 1980s solution, rather than one that is aware of the potential of the internet.

Seeking USB stick crypto

A piece of software that does the following would be very helpful to me:

  1. Creates an encrypted archive on a USB key
  2. Does so using a credible open-source algorithm, such as AES
  3. Ideally, is open source and well scrutinized by competent members of the security community
  4. This archive can be read using software on the key, on either a Mac OS X machine or a Windows XP box
  5. The software that does the encryption and decryption does not require administrator priveleges to run.

Do any such utilities exist? TrueCrypt is cool, but requires an admin account. SanDisk’s CruzerLock is Windows only, and has a really awkward interface. The disk encryption feature of PGP cannot be run off a flash drive. The encrypted disk images created by Mac OS cannot be read using a Windows machine.

Facebook and the expectation of privacy

Graffiti on a bench

Another privacy spat has erupted in relation to Facebook, the social networking site. It all began when the site began actively advertising everything you did you all of your friends: every time a photo was updated or a relationship status changed, everyone could see it by default, rather than having to go looking. After that, it emerged that Facebook was selling information to third parties. Now, it seems that the applications people can install are getting access to more of their information than is required for them to operate, allowing the writers of such applications to collect and sell information such as the stated hometown and sexual orientation of anyone using them.

Normally, I am in favour of mechanisms to protect privacy and sympathetic to the fact that technology makes that harder to achieve. Facebook, I think, is different. As with a personal site, everything being posted is being intentionally put into the public domain. Those who think they have privacy on Facebook are being deluded and those who act as though information posted there is private are being foolish. The company should be more open about both facts, but I think they are within their rights to sell the information they are collecting.

The best advice for Facebook users is to keep the information posted trivial, and maintain the awareness that whatever finds its way online is likely to remain in someone’s records forever.

[Update: 12 February 2008] Canada’s Privacy Comissioner has a blog. It might be interesting reading for people concerned with such matters.

Cut cables in the Middle East

Something strange is happening to undersea fiber optic cables in the Middle East: they are being cut. At least four, and possibly five, of the communications links have failed in the last twelve days. The first two were allegedly damaged by a ship’s anchor; subsequent failures are more mysterious. Serious disruptions are being experienced in Egypt and India, along with lesser problems in Bahrain, Bangladesh, Kuwait, the Maldives, Pakistan, Qatar, Saudi Arabia and the United Arab Emirates. The fifth cable cut seems to have disabled internet access in Iran.

It’s tempting to ascribe some nefarious motive to all of this. That said, it is sensible to recall how past hysterias proved unjustified. After much hoopla in the media, it turned out that the ‘cyberwar’ against Estonia was the work of a twenty year old subsequently fined $1,620 for his misdeeds.

The cable problems are being widely discussed:

[Update: 16 February 2008] According to The Economist, all this was just hysteria.

Improving energy efficiency through very smart metering

Milan Ilnyckyj

With existing technology, it is entirely possible to build houses that allow their owners to be dramatically more energy aware. For instance, it would be relatively easy to build electrical sockets connected to a house network. It could then be possible to see graphically or numerically how much power is being drawn by each socket. It would also be easy to isolate the energy use of major appliances – furnaces, dish washers, refrigerators – thus allowing people to make more intelligent choices about the use and possible replacement of such devices. In an extreme case, you could have a constantly updating spreadsheet identifying every use of power, the level being drawn, the cost associated, and historical patterns of usage.

Being able to manage electrical usage through a web interface could also be very helpful. People could transfer some of their use of power to low-demand times of the day. They could also lower the temperature in houses and have it rise in time to be comfortable by the time they got home. Such controls would also be very useful to people who have some sort of home generating capacity, such as an array of solar panels. A web interface could provide real-time information on the level of energy being produced and the quantity stored.

While all of these things are entirely possible, there do seem to be two big barriers to implementation. The first is in convincing people to install such systems in new houses or while retrofitting houses. The second is to make the systems intuitive enough that non-technical people can use them pretty well. The first of those obstacles would be partially overcome through building codes and carbon pricing. The second is mostly a matter of designing good interfaces. Perhaps an Apple iHome is in order.

Foregoing WEP and WPA

Bruce Schneier, the security guru and internet sensation, has been suggesting that people unlock their wireless networks. Given the constant and well-justified anxiety that exists about computer security, it is unconventional advice. That said, he argues effectively that the risks are fairly limited and that it is a neighbourly thing to do. Who hasn’t benefitted once or twice from the availability of an open wireless network? They were invaluable during my early weeks in Ottawa: allowing me to access Craiglist, Google Maps, and other vital apartment-hunting data while I was out there searching.

I am going to try leaving my wireless network open for a couple of weeks. If it doesn’t seem likely to burst my 200GB monthly bandwidth cap, I will leave it that way indefinitely. Hopefully, it will transpire that others have done the same when I start hunting around for a quieter flat in a more interesting neighbourhood this spring.

1024 by 768 does not a pretty 4 x 6 make

Partly because of concerns about archiving digital files in the long term, I am hoping to make prints from some of my digital files. Unfortunately, there is an issue of aspect ratios. My digital photos all have an aspect ratio of 4:3 – different from those used for 4 x 6″, 5 x 7″, and 8 x 10″ photographic prints. I don’t especially want black bands on two sides of each image, and I definitely don’t want them arbitrarily cropped.

Is there anywhere online where I can order digital prints on photographic paper in native digital resolution? Albums capable of holding prints with that aspect ratio would also be required. The alternative – manually cropping hundreds of photos to minimize the unwanted aesthetic effects of switching to the 4 x 6″ format – is something I only want to do as a last resort.

Leguminous illustration

A comic in which Emily’s artistic talents have been combined with my egregious printing is now on her beanhead site. It is also mentioned on her blog. Tristan has produced a video about the whole beanhead phenomenon, featuring exclusive footage of Emily and I walking around in Vancouver’s Chinatown and inventing silly answers to silly questions.

Fibre jam

Jonathan Morissette and Oleh Ilnyckyj on Grouse Mountain

Some people are predicting that 2008 will be the year when the internet slows down. The cause is expected to be massive amounts of video traffic, partially driven by social networking sites. All those voice-over-internet phone calls will naturally add to the flow of packets that need to be routed around the world.

All this makes me wonder whether it might be better to allow a bit more discrimination in routing. Sending and receiving video is fun, but rarely essential. Having the more prosaic uses of the internet suffer unduly because of such things seems improper. I could probably surf text all day using the bandwidth required to watch a few minutes of television online.

I don’t really know enough about internet architecture to be able to say whether such filtering could be accomplished, whether it would be cheated very easily, or whether it would cause additional problems. That said, you can certainly expect such questions to get asked more often if predictions of slowly loading websites and jerky video calls prove correct.