Fourth rule of the internet

A somewhat obvious rule of internet security to add to the first three:

  1. Against a sophisticated attacker, nothing connected to the internet is secure.
  2. Everything is internet now.
  3. You should probably worry more about being attacked online by your own government than by any other organization.
  4. Sensitive data about you is largely on the computers of other people who care little about your security.

Equifax is getting lots of attention right now, but consider also Deloitte, Adobe, Stratfor, Blizzard, LinkedIn, DropBox, Ashley Madison, last.fm, Snapchat, Adult Friend Finder, Patreon, Forbes, Yahoo, and countless others.

As Bruce Schneier points out, the only plausible path to reduce such breaches is for governments to make them far more painful and costly for corporations.

Major Apple purchases

It’s crazy how demanding web browsers have become.

Both my main computers are somewhat old, but they can run modern 3D games at low graphics settings and perform computationally-intensive tasks like converting RAW files to JPG. Nonetheless, I find both my iMac and my MacBook Pro routinely struggling to run GMail in Safari, Firefox, or Chrome.

If I wasn’t a PhD student, I would probably have replaced both computers years ago.

Tracking back through my archives, I have some records of major Apple purchases:

  • My 20 GB 4th gen iPod was $389 in 2004;
  • my 14″ 1.33 GHz G4 iBook was $1990 in 2005 (that was the computer I brought to England and used exclusively in Oxford) (iBook SN: 4H50911AS88);
  • my top-of-the-line 24″ iMac was $2,249 in 2008 (a gift to self for being gainfully employed, and the computer I am typing on now);
  • In May 2010 I paid $35 for Mac OS X 10.6.3 Snow Leopard!
  • I got one of many 160 GB iPod Classics for $279 in 2010 (still the best MP3 player ever; I need to replace the hard drive in my current one); and
  • I got my 13″ MacBook Pro for $1649 in 2011

I am pretty tied into the OS X universe. That’s how all my projects (academic, photographic, activist) are organized, including encrypted archives and backups.

I would love to get a Mac Pro (though apparently those available now are outdated and expensive) or an iMac Pro (not out yet, first-of-a-kind Apple products tend to have big problems, and crazy expensive at $5000+).

All told, I would prefer to avoid the all-in-one design. My current iMac has a great screen, but inadequate processing power for current applications. It cannot be used as a display for a faster computer.

Open thread: Chinese censorship

One mechanism of control used by the Chinese government is censorship of the media and the internet. Reportedly, this has been so comprehensive and successful that young people in China are unlikely to know about the Tiananmen Square protests of 1989.

This is an important example of how governments are often the biggest threat to internet users.

The Economist recently reported on government manipulation of Chinese television, as well as on academic publishing.

All this is relevant in part because of how China is a rising power but not a free society, as well as because of what it reveals about how the Chinese Communist Party maintains popular legitimacy and control.

The ‘right to be forgotten’

In Argentina and the European Union, people can assert a “right to be forgotten“, in which internet companies are obligated to delete content which those complaining are unhappy to have online.

There is also a Canadian connection:

In June Canada’s Supreme Court ordered Google to stop its search engine returning a result advertising a product that infringed on a firm’s intellectual property… The Canadian ruling against Google, which applies worldwide, could be just the start. Later this year the European Court of Justice will decide whether the EU’s much-contested “right to be forgotten” applies not just to Google’s European sites, but to all of them. This would mean that links to information about people that is deemed “inadequate, irrelevant or no longer relevant” in the EU will no longer be returned in response to any Google search anywhere. If the firm does not comply, it may face stiff fines.

The Economist raises the risk that allowing such censorship by governments could “create a ‘splinternet’, with national borders reproduced in cyberspace”.

I am fairly skeptical about rights-based approaches to ethics to start with, in part because they aren’t very useful as soon as one person is asserting Right A against someone else’s Right B. In this case, the other relevant rights are freedom of speech and what might be termed the freedom to record history.

I think all this is particularly risky when it comes to photography. In many places, the fact that a statement is true is a defence against allegations of slander or libel. Unedited photographs are in some sense always truthful historical records, but there are nonetheless many reasons why people aside from the photographer or the media source using them might want to see them purged. Letting people use a supposed extension of their right to privacy as a mechanism for censorship risks stifling artistic and creative expression, as well as depriving the world of information about what really happened in various times and places.

It’s not surprising that people want unflattering things about themselves removed from the internet, from criminal records and critical news stories to photos they dislike and things they wrote themselves but came to regret. At the same time, the people who post media online have an interest in keeping it up, and the world as a whole has an interest in knowing what has happened in the past. Granting people the power to use the courts to manipulate the historical record seems worrisome to me, as well as a substantial burden for all the platforms where such records are stored.

One downside to electronic media of all forms is the possibility of after-the-fact censorship, which would be impractical for things like printed books and newspapers.

Americanism and belief in the unbelievable

The Atlantic has an interesting article by Kurt Anderson about why so many Americans believe the crazy things they do. He argues that it’s both rooted in history and particular to the ideologies and self-understanding of the United States:

America was created by true believers and passionate dreamers, and by hucksters and their suckers, which made America successful—but also by a people uniquely susceptible to fantasy, as epitomized by everything from Salem’s hunting witches to Joseph Smith’s creating Mormonism, from P. T. Barnum to speaking in tongues, from Hollywood to Scientology to conspiracy theories, from Walt Disney to Billy Graham to Ronald Reagan to Oprah Winfrey to Trump. In other words: Mix epic individualism with extreme religion; mix show business with everything else; let all that ferment for a few centuries; then run it through the anything-goes ’60s and the internet age. The result is the America we inhabit today, with reality and fantasy weirdly and dangerously blurred and commingled.

It also talks at length about the Esalen Institute in California.

It’s not clear if there is any route back from the aggravation of these relativist, paranoid, post-truth phenomena, as technology enables everyone with an outlandish view to find others who agree and consensus breaks down about which sources of information are credible and who can validate knowledge:

Before the web, cockamamy ideas and outright falsehoods could not spread nearly as fast or as widely, so it was much easier for reason and reasonableness to prevail. Before the web, institutionalizing any one alternate reality required the long, hard work of hundreds of full-time militants. In the digital age, however, every tribe and fiefdom and principality and region of Fantasyland—every screwball with a computer and an internet connection—suddenly had an unprecedented way to instruct and rile up and mobilize believers, and to recruit more. False beliefs were rendered both more real-seeming and more contagious, creating a kind of fantasy cascade in which millions of bedoozled Americans surfed and swam.

Any development which we might optimistically hope would drive us collectively back toward an objective and empirical view of reality grounded in evidence might just as well fuel the social and psychological forces supporting post-truth thinking.

Activism as being a catalyst

When we think about global trends, we tend to focus on their importance and how rapidly things are changing. China’s economic rise, along with massive economic development and urbanization around the world, all have unambiguous importance, though we will endlessly disagree about how they will interact and few of us will live long enough to feel confident we saw the final outcome (there are major limits to knowledge and prediction).

If one makes a sincere effort to understand what is happening in the world and feels compelled to try to encourage some of the best possible outcomes, given the state of the world right now, perhaps it makes sense to think in terms of which trends you hope to speed up and which you hope to inhibit.

The key question in effectiveness has to be: am I / are we making a difference in terms of an important objective.

So perhaps it makes sense to think about being a catalyst or accelerant (to choose a more obviously violent analogy) hoping to create as substantial a ∆ifference as possible in the final chemical equilibrium.

Sometimes working for the ACLU is fun

Step 1: British comedian John Oliver produces an absurd segment about coal CEO Bob Murray:

In it, Oliver acknowledges Murray’s history of litigiousness toward critics and challenges him to do his worst.

Step 2: Murray sues Oliver for defamation in West Virginia circuit court

Step 3: As reported in Slate, Jamie Lynn Crofts of the American Civil Liberties Union of West Virginia files one of the world’s funnier legal documents in the form of an amicus brief to the court

As John Stuart Mill said about freedom of speech in general: “Strange it is that men should admit the validity of the arguments for free speech but object to their being ‘pushed to an extreme’, not seeing that unless the reasons are good for an extreme case, they are not good for any case”.

Political speech, news reporting, and satire all deserve special protection in the public interest. Hopefully this whole back and forth will discourage those who face criticism in the future from seeking to suppress it through the courts of a free society.

Palantir and data analysis

Writing in The Guardian, Jacques Peretti has compiled an interesting summary of the technological capabilities and government-to-business relationships of Palantir, a secretive technology company focused on identifying patterns within large data sets and making them accessible to people without specialized training.

With sensors getting cheaper all the time, the tricky part of ubiquitous surveillance isn’t collecting the data. It’s making it intelligible and applicable. These kinds of powerful data linkage and analysis tools also undermine common-sense expectations and procedures for the protection of privacy. No human being might be able to look at a set of large supposedly-anonymized databases and pick out individuals, but it’s increasingly within the scope of what can be routinely done with computers.

Site performance issues

I am aware that site performance here is less than ideal in at least three ways:

  • Sometimes pages are simply slow to load
  • Pages that do exist sometimes fail to load entirely, producing a 404 error instead
  • Sometimes, pages load without images or CSS, showing only text

It’s much worse on the administrative side, with frequent page load errors and constant problems with image file uploads.

This site is WordPress-based, which means it uses PHP and a MySQL database. Instead of generating each page dynamically every time it is requested, it uses WP SuperCache, and I have tried experimenting with the plugins various settings, so far without fully resolving the problems.

The site is hosted on DreamHost’s standard, approximately $100/year unlimited storage / unlimited bandwidth shared hosting plan. It would be possible to upgrade to a virtual private server, but it’s significantly more expensive and offers rather limited storage (only 30GB for the cheapest plan).

I will work on trying to diagnose exactly what’s causing these speed and reliability problems. If WP-savvy people have any suggestions, I’d be happy to hear them.

Tactics of rebellion in Egypt

Accounts of the protests that brought down the Mubarak government stressed the role of new internet-based social media, which helped organisers and supporters plan the protests. The critical event in toppling the regime, however, was the initial seizure of Tahrir Square on 25 January – a development in which the social media functioned partly as a decoy. Knowing that the security forces would use violence to break up any attempt to occupy the square, the organizers used social media to plan protests at twenty sites in working-class districts of the city, hoping to strain the security forces by dispersing them to multiple locations, while drawing large crowds that would increase the chance of breaking through security cordons and linking up at Tahrir Square. They planned one additional gathering, in Bulaq al-Daqrur, a working-class neighbourhood close to the centre of the city, with an industrial workforce employed in a nearby cigarette factory and in railway yards. They avoided announcing this gathering over the internet, allowing a crowd of several hundred to gather without the presence of security forces. This was the group that marched to Tahrir, swelling to several thousand along the way, and seized the square, by which time the protest was too large for the armed police force to crush.*

* Footnote: Charles Levinson and Margaret Coker, ‘The Secret Rally that Sparked an Uprising‘, Wall Street Journal, 11 February 2011.

Mitchell, Timothy. Carbon Democracy: Political Power in the Age of Oil. Verso; London. 2013. p. 229