Pros and cons of Google’s advanced protection

I see enormous appeal in Google’s new advanced protection system for accounts. It requires a physical token to access your account, adds further screening of attachments, and has a much tougher account recovery process for anybody who legitimately loses access to their own account. It augments the security provided by their two-factor smartphone app by reducing the risk of someone using an attack against your phone as a way to steal the second factor.

Two problems are keeping me from signing up right away. First, it requires that you buy a Bluetooth token as well as a USB token. I much prefer to avoid wireless communications if possible, and I don’t want a delicate device that needs regular battery charging to carry around. The two tokens together cost about $50, and as an extra pain the Bluetooth token seems to be a pair to order via Amazon in Canada. Second, it forces you to access your account through Google’s Chrome browser, which seems unnecessarily restrictive and monopolistic.

Communications anxiety

I suppose it’s at least as old as the letter, but communications anxiety (COMANX) has some notable features. Whenever one feels it is possible that a psychologically difficult message will arrive via any medium — whether it’s by mail, telephone, email, text, or Facebook — it sets up the mind to be constantly apprehensive. Every moment of time that passes is either one where such a message is received, or where you’re still waiting.

One option, which I think is frequently healthy, is to limit the time periods in which electronic messages can become known to you, especially when it comes to asynchronous forms of communication like email and Facebook. There is still anxiety associated with the knowledge of being disconnected and the apprehension of the waiting message queue, but to my mind it’s way less stressful than trying to do other things when a message could literally make itself known to you in a fraction of any passing second. (This is one reason why the ‘phone’ part of an iPhone is very stressful, and airplane mode is a blessing for the anxious.)

In the end, even going to live in the Burmese jungle (“You most likely know it as Myanmar, but it will always be Burma to me.”) is only a partial remedy to living in fear of the message that could come: the rejection, the admonishment, the confirmation of bad news, the doomed appeal for help.

As is so often the case in modern life, each of us is left with Margaret Atwood’s six options for dealing with the apocalypse: Protect Yourself, Give Up and Party, Help Others, Blame, Bear Witness, and Go About Your Life.

When you decide to protect yourself, please ask: “At what cost to others?”

We can all destroy ourselves by abandoning self-care activities, but check mentally that your “partying” activities are mitigating rather than multiplying your stressors.

Blame can be important in two ways. One is for the historian, and it’s the eventual recognition that something which was done was a great evil. The other has the power to avert the evil if it is applied with speedy effectiveness. Using blame to control people is complicated and risky, you may harm them for no reason, and you may not make them behave as you wish.

Helping others is a universal good as far as I’m concerned, but you must be mindful about what is help and what isn’t and the limits of your understanding. The other night, I saw a raccoon up in a tree in the park north of Ontario’s legislature. A bunch of gawkers with lights and cameras were watching this raccoon and discussing what they ought to do to help it. This is a creature that lives on garbage, dodging terrifying bright-eyed fast-moving lethal monsters (cars), but which is nonetheless in no need of human help in a tree. Short version: don’t assume that what would seem like “help” to you in your imagined version of another being’s situation as definitely being the thing that should be done. Humility is important, especially in the apocalypse.

Bearing witness is inevitable, at least if you are emotionally sensitive enough to have any understanding of what I mean by communications anxiety. The day you start to catalog forms of anxiety is a bit of a watershed moment. Anything in your life that has led you to develop a sophisticated catalog system is probably something that will be important to you for as long as your consciousness holds together.

Go About Your Life: but how?

COMANX is a form of fear of the future, of what’s still in the darkness ahead of you. Trying to stay awake, eyes peeled, looking ahead will unmetaphorically and entirely really kill you until you die and very quickly. If anxiety is something present enough for you to categorize and you live in the modern world, you already have strategies for dealing with the challenges of constant connectivity through multiple means.

Aside to people currently worried about me: a flipside of our society’s attraction to what is happening right now can be an inability to have appropriate compassion for people describing events long-past. It seems urgent and pressing to you because it’s new information, but you shouldn’t necessarily dramatically reinterpret how you see a person or dramatically change your behaviour. It would be much better to find someone currently in distress and give them loving, compassionate, nurturing attention. (Not me please! I would prefer to have some space for a while.)

WPA2 vulnerable

It seems the WPA2 encryption system used by most WiFi networks is badly broken:

This follows recent breaks in core security technologies like SSLStrip and Heartbleed.

People with good security practices like defence in depth and compartmentalization of sensitive information might not be too threatened by this. Those relying exclusively on the integrity of WPA2 may be in big trouble.

What are you sharing on your wireless network? Any file servers, cameras, or other sensitive systems?

Do you run your internet traffic through a second layer of encryption like a VPN and stick to HTTPS/TLS for sensitive websites?

Fourth rule of the internet

A somewhat obvious rule of internet security to add to the first three:

  1. Against a sophisticated attacker, nothing connected to the internet is secure.
  2. Everything is internet now.
  3. You should probably worry more about being attacked online by your own government than by any other organization.
  4. Sensitive data about you is largely on the computers of other people who care little about your security.

Equifax is getting lots of attention right now, but consider also Deloitte, Adobe, Stratfor, Blizzard, LinkedIn, DropBox, Ashley Madison, last.fm, Snapchat, Adult Friend Finder, Patreon, Forbes, Yahoo, and countless others.

As Bruce Schneier points out, the only plausible path to reduce such breaches is for governments to make them far more painful and costly for corporations.

Major Apple purchases

It’s crazy how demanding web browsers have become.

Both my main computers are somewhat old, but they can run modern 3D games at low graphics settings and perform computationally-intensive tasks like converting RAW files to JPG. Nonetheless, I find both my iMac and my MacBook Pro routinely struggling to run GMail in Safari, Firefox, or Chrome.

If I wasn’t a PhD student, I would probably have replaced both computers years ago.

Tracking back through my archives, I have some records of major Apple purchases:

  • My 20 GB 4th gen iPod was $389 in 2004;
  • my 14″ 1.33 GHz G4 iBook was $1990 in 2005 (that was the computer I brought to England and used exclusively in Oxford) (iBook SN: 4H50911AS88);
  • my top-of-the-line 24″ iMac was $2,249 in 2008 (a gift to self for being gainfully employed, and the computer I am typing on now);
  • In May 2010 I paid $35 for Mac OS X 10.6.3 Snow Leopard!
  • I got one of many 160 GB iPod Classics for $279 in 2010 (still the best MP3 player ever; I need to replace the hard drive in my current one); and
  • I got my 13″ MacBook Pro for $1649 in 2011

I am pretty tied into the OS X universe. That’s how all my projects (academic, photographic, activist) are organized, including encrypted archives and backups.

I would love to get a Mac Pro (though apparently those available now are outdated and expensive) or an iMac Pro (not out yet, first-of-a-kind Apple products tend to have big problems, and crazy expensive at $5000+).

All told, I would prefer to avoid the all-in-one design. My current iMac has a great screen, but inadequate processing power for current applications. It cannot be used as a display for a faster computer.

Open thread: Chinese censorship

One mechanism of control used by the Chinese government is censorship of the media and the internet. Reportedly, this has been so comprehensive and successful that young people in China are unlikely to know about the Tiananmen Square protests of 1989.

This is an important example of how governments are often the biggest threat to internet users.

The Economist recently reported on government manipulation of Chinese television, as well as on academic publishing.

All this is relevant in part because of how China is a rising power but not a free society, as well as because of what it reveals about how the Chinese Communist Party maintains popular legitimacy and control.

The ‘right to be forgotten’

In Argentina and the European Union, people can assert a “right to be forgotten“, in which internet companies are obligated to delete content which those complaining are unhappy to have online.

There is also a Canadian connection:

In June Canada’s Supreme Court ordered Google to stop its search engine returning a result advertising a product that infringed on a firm’s intellectual property… The Canadian ruling against Google, which applies worldwide, could be just the start. Later this year the European Court of Justice will decide whether the EU’s much-contested “right to be forgotten” applies not just to Google’s European sites, but to all of them. This would mean that links to information about people that is deemed “inadequate, irrelevant or no longer relevant” in the EU will no longer be returned in response to any Google search anywhere. If the firm does not comply, it may face stiff fines.

The Economist raises the risk that allowing such censorship by governments could “create a ‘splinternet’, with national borders reproduced in cyberspace”.

I am fairly skeptical about rights-based approaches to ethics to start with, in part because they aren’t very useful as soon as one person is asserting Right A against someone else’s Right B. In this case, the other relevant rights are freedom of speech and what might be termed the freedom to record history.

I think all this is particularly risky when it comes to photography. In many places, the fact that a statement is true is a defence against allegations of slander or libel. Unedited photographs are in some sense always truthful historical records, but there are nonetheless many reasons why people aside from the photographer or the media source using them might want to see them purged. Letting people use a supposed extension of their right to privacy as a mechanism for censorship risks stifling artistic and creative expression, as well as depriving the world of information about what really happened in various times and places.

It’s not surprising that people want unflattering things about themselves removed from the internet, from criminal records and critical news stories to photos they dislike and things they wrote themselves but came to regret. At the same time, the people who post media online have an interest in keeping it up, and the world as a whole has an interest in knowing what has happened in the past. Granting people the power to use the courts to manipulate the historical record seems worrisome to me, as well as a substantial burden for all the platforms where such records are stored.

One downside to electronic media of all forms is the possibility of after-the-fact censorship, which would be impractical for things like printed books and newspapers.

Americanism and belief in the unbelievable

The Atlantic has an interesting article by Kurt Anderson about why so many Americans believe the crazy things they do. He argues that it’s both rooted in history and particular to the ideologies and self-understanding of the United States:

America was created by true believers and passionate dreamers, and by hucksters and their suckers, which made America successful—but also by a people uniquely susceptible to fantasy, as epitomized by everything from Salem’s hunting witches to Joseph Smith’s creating Mormonism, from P. T. Barnum to speaking in tongues, from Hollywood to Scientology to conspiracy theories, from Walt Disney to Billy Graham to Ronald Reagan to Oprah Winfrey to Trump. In other words: Mix epic individualism with extreme religion; mix show business with everything else; let all that ferment for a few centuries; then run it through the anything-goes ’60s and the internet age. The result is the America we inhabit today, with reality and fantasy weirdly and dangerously blurred and commingled.

It also talks at length about the Esalen Institute in California.

It’s not clear if there is any route back from the aggravation of these relativist, paranoid, post-truth phenomena, as technology enables everyone with an outlandish view to find others who agree and consensus breaks down about which sources of information are credible and who can validate knowledge:

Before the web, cockamamy ideas and outright falsehoods could not spread nearly as fast or as widely, so it was much easier for reason and reasonableness to prevail. Before the web, institutionalizing any one alternate reality required the long, hard work of hundreds of full-time militants. In the digital age, however, every tribe and fiefdom and principality and region of Fantasyland—every screwball with a computer and an internet connection—suddenly had an unprecedented way to instruct and rile up and mobilize believers, and to recruit more. False beliefs were rendered both more real-seeming and more contagious, creating a kind of fantasy cascade in which millions of bedoozled Americans surfed and swam.

Any development which we might optimistically hope would drive us collectively back toward an objective and empirical view of reality grounded in evidence might just as well fuel the social and psychological forces supporting post-truth thinking.

Activism as being a catalyst

When we think about global trends, we tend to focus on their importance and how rapidly things are changing. China’s economic rise, along with massive economic development and urbanization around the world, all have unambiguous importance, though we will endlessly disagree about how they will interact and few of us will live long enough to feel confident we saw the final outcome (there are major limits to knowledge and prediction).

If one makes a sincere effort to understand what is happening in the world and feels compelled to try to encourage some of the best possible outcomes, given the state of the world right now, perhaps it makes sense to think in terms of which trends you hope to speed up and which you hope to inhibit.

The key question in effectiveness has to be: am I / are we making a difference in terms of an important objective.

So perhaps it makes sense to think about being a catalyst or accelerant (to choose a more obviously violent analogy) hoping to create as substantial a ∆ifference as possible in the final chemical equilibrium.