Google’s AdWords suck for internet security AND content generators

Having ads on this site is pretty awful for several reasons.

The site is plugged into Google via both analytics and advertising. For people not running an ad blocking plugin, this often leads to ads which are unappealing and often offensive.

If you don’t want Google to know everything you (or everyone with access to your machine) do online, you’re going to need to make a big effort and do a lot of research into, like, cryptographic and technical means of confounding state surveillance.

If you would pay one cent a year or more to support an ad-free site, please leave a comment.

Cyber warfare between the US, Israel, and Iran

I recently saw the documentary Zero Days about state-sponsored cyber warfare in general and the Stuxnet attack against Iran’s enrichment facility at Natanz in particular.

The documentary doesn’t really contain any new information for people who follow the news in this field, but it’s well put together and has some compelling interviews.

A couple of New York Times articles cover much of the same ground: Obama Order Sped Up Wave of Cyberattacks Against Iran and U.S. Had Cyberattack Plan if Iran Nuclear Dispute Led to Conflict. These, respectively, cover ‘Olympic Games’ (the Stuxnet operation) and ‘Nitro Zeus’, a much broader plan for an across-the-board cyber attack against Iranian civilian and military systems in the event of war between Iran and the US.

An interesting discussion in the film concerns US-Israeli relations. It alleges that US support for Stuxnet was motivated in part by a desire to prevent attempted airstrikes against Iranian nuclear facilities by Israel. In part, this was allegedly motivated by the thinking that Israel would initiate such attacks not to destroy Iranian capabilities themselves (since that would be beyond Israel’s military means), but to force the US into a war with Iran.

The film also discusses alleged Iranian retaliation for Olympic Games, including attacks against Saudi Armaco and American banks. There’s also some interesting material about the Abdul Qadeer Khan proliferation network.

The instant messaging ghost town

Between when my family first got internet access (I got my first taste at the Science Al!ve daycamp at SFU, using a primitive form of Netscape) and sometime between my M.Phil / working in Ottawa / starting my PhD, I spent thousands of hours talking with all sorts of friends over ICQ, MSN Messenger, and Google Talk.

Now, even though there are other options like WhatsApp and Skype, the instant messaging world seems essentially dead (or maybe all shifted to the dreaded Facebook). A whole host of people are always online, which I guess is because of being logged into email on some computer or having an account linked to a phone, but there is no real activity.

It’s probably impossible to disentangle the extent to which this is the result of people who I know growing up and no longer having time for instant messaging versus a general decline in IM use versus people shifting to platforms which I don’t use.

Black Code

Written by Ron Diebert, the director of the Citizen Lab at U of T, Black Code: Inside the Battle for Cyberspace contains some very interesting information, of importance to anyone concerned with the future of the internet and communication. He discusses the major discoveries made by the lab, including massive criminal malware enterprises, government surveillance and censorship, and the use of cyberweapons like Stuxnet.

The first few chapters may seem basic if you actively follow the news on IT security and surveillance, but the material in the later parts is undeniably novel and interesting. The book is a bit of a lament for the death of the idealistic open internet, and the emergence of control by governments, particularly after the 2001 terrorist attacks in the United States.

The stakes here are high: the internet is a critical tool for maintaining democracy in open societies, confronting autocratic regimes, and dealing with global threats. The network is now in real danger of being suffocated by governments fixated on terrorism or maintaining domestic control, or who see it as a promising avenue for attacking their enemies.

Diebert proposes a distributed model for both securing and protecting the internet, while repeatedly underlining how governments are now the major threat to online freedom and political participation. Governments have rebuilt the backbone of the internet in order to achieve their censorship and surveillance objectives. It’s not a problem with a technical solution, from the perspective of citizens, but rather one which requires ongoing political agitation.

SSL glitches

I recently updated the SSL certificate used to provide encrypted access to this site via HTTPS. Chances are, nothing sensitive is passing between my server and your computer. Running the site this way by default does, however, increase the overall volume of encrypted traffic on the web, which may hamper some ubiquitous surveillance efforts.

In any case, if you see warnings from your browser about this site’s encryption, let me know. I am hoping they will clear on their own as various caches update.

Concept for improving email: StampMail.com

Often, email feels like an impossible torrent of mostly-unwanted information.

For a while, I have felt like one way to improve it would be to require refundable stamps for messages. In order to send you an email, a person might pay $0.50 or $1.00 for a virtual ‘stamp’. When you receive the message, you get to choose whether to refund the sender (perhaps minus a set fee for the email provider), or keep the value of the stamp yourself (again, minus a $0.05 or $0.10 cut).

If emails cost $1 each to send, there would be a lot fewer trivial ones. I doubt many people would totally replace their normal email with StampMail, but a lot might set up a parallel account for higher-priority messages.

Some spam will be profitable enough to make sending emails with stamps worthwhile. There are two responses to this. First, StampMail could be a lot more aggressive than existing email providers about banning accounts that are sending spam. Second, any spam you receive is more tolerable when it comes with a $0.90 to $0.95 payment.

What if?

My copy of Randall Monroe’s What if? book arrived from Amazon today, and I spent a pleasant couple of hours in the Upper Library going through it. Right from the disclaimer it is quite entertaining:

The author of this book is an Internet cartoonist, not a health or safety expert. He likes it when things catch fire or explode, which means he does not have your best interests in mind.

Toronto friends are welcome to borrow the book and learn about bullet-sized pieces of material with neutron star density; the effects of draining Earth’s oceans; the plausibility of eradicating the common cold through global quarantine; and similarly practical matters.

These facts will not be on the exam

I was wrong a while ago when I said the QI podcast isn’t available through the iTunes Store. It simply doesn’t have a name that makes it obvious that it is the QI podcast: No Such Thing As A Fish.

One nice fact is that Lawrence Burst Sperry, the man who invented the aircraft autopilot, went flying in November 1916 with Mrs. Waldo Polk, whose husband was off driving an ambulance in France. They counted on the autopilot to keep them aloft, but ended up crashing naked into a bay and being found by duck hunters.

Also, if you get a zebrafish drunk and put it among sober companions, the sober ones will follow the drunk one:

Maybe something about the drunk fish’s one-on-one interactions with the other fish made the group as a whole move in the same direction. Or maybe the sober fish looked at their non-sober tankmate and saw a leader. “It is likely,” Porfiri says, that the drunk fish’s uninhibited behavior “is perceived as a boldness trait, thus imparting a high social status.” As they followed the drunk fish, the sober ones also sped up to keep pace, swimming roughly a third faster than they would have otherwise.

The very drunkest zebrafish, though, lost their leader status. Fish that had been exposed to the highest alcohol concentration began to lag behind the rest of the group, following instead of steering. Since higher alcohol doses have “sedative effects,” Porfiri says, the drunkest fish slow down and start to display “sluggishness in response to the rest of the group.”

I listed some fun facts from QI in a previous post.

Ghost in the Wires

A friend of mine recently lent me Kevin Mitnick‘s book Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker. It’s an entertaining story that highlights how the willingness of people to trust and help others who they assume to be co-workers is often the greatest weakness in security systems.

It also highlights some of the characteristics of obsessive behaviour. I had no idea how many separate times Mitnick was caught. It reminded me of Marc Lewis’ Memoirs of an Addicted Brain, in terms of how repeated contact with agents of authority was insufficient to interrupt a longstanding pattern of behaviour.

The book is also a reminder of what seems like a more innocent era of global interconnectivity – when phone phreaks with blue boxes were a cutting-edge threat, and when the FBI would have real trouble tracking you down if you assumed the identity of someone who died in childhood. Now, attacks against computer systems seem associated more with governments themselves than with curious amateurs, and it’s difficult to imagine someone like Mitnick evading the surveillance state for long.