An 1899 illustration by Mikoláš Aleš (1852-1913) of the Golem with Rabbi Loew.
Artificial intelligence requires so much data to be effective that not even all the free data sneakily gleaned from internet users is enough, and therefore the technology companies have to pay some laborers, however poorly, to do the monotonous tasks necessary to train artificial intelligence for every imaginable scenario. The weakness of artificial intelligence, being nothing more than an extremely powerful computer, is its incapability of imagining scenarios outside of logic, or of imagining anything at all. Powerful as it is, it is still only a number cruncher.
Printer manufacturers appear interested mostly in configuring their drivers for the two biggest desktop and laptop operating systems, Windows and Mac, and Linux is generally an afterthought. Chrome can fend for itself, and to some extent Linux can as well, but not without having to resort to using Google services occasionally. Linux developers are volunteers, and they can’t keep up with the myriad of proprietary configurations for all the printer models hitting the market each year. Much of the proprietary nature of printer drivers has nothing to do with actually making the product perform its basic functions, but rather with marketing gimmicks like greeting card suites.
Al Pacino in The Godfather: Part III, a 1990 film directed by Francis Ford Coppola. Not that large technology companies are necessarily comparable to the Mafia, but to some people their grasp may feel similarly inescapable.
Now more than ever people need a reliable printer at home. About the only way left of obtaining tax forms is to download them from the internet and print them at home. Using the internet and printing out web pages has become a major factor in children’s schoolwork, and their parents need to print out receipts and coupons or run a home office. Getting along without a printer, or having to jump through hoops in order to get one to work properly, can no longer be part of how most people cope with the modern world. For most people, the 90 percent who use either Windows or Mac computers, compatibility problems are rare to nonexistent; for the 10 percent minority, and particularly those who wish to go against the flow with Linux, incompatibility between operating system and printer should no longer be an issue if manufacturers want to sell their wares to all consumers and ensure the same ease of use long enjoyed by the majority. It’s about time for proprietary drivers to go into the desktop trash can.
After some amount of pushing from internet users, Coinhive started offering an above board, opt-in type of cryptomining code so that website visitors knew what was being asked of them. Naturally that version has not proved popular with the website owners who partner with Coinhive because advising visitors of cryptomining activity only leads to the great majority of them declining to participate. People who are not computer savvy, when confronted with an option which will in all likelihood confuse and frighten them, will resort to the safest option and just say no. More computer savvy visitors will likely decide it’s not worth their while to have their computer slowed down to a crawl and their electricity bill hiked by a few dollars a month just to visit a website. Only the most indispensable websites could get away with it, and they are apt to have access to many other less complicated sources of revenue. Coinhive, meanwhile, continues offering the original, surreptitious version of its software.
Naturalist David Attenborough discusses brood parasitism among birds in this BBC wildlife segment.
The arms race between website owners and advertisers on one side, and website visitors on the other side, began when internet service was incredibly slow and most consumers had data caps. Ads, particularly Flash ads that jumped up and down to attract the visitor’s attention, slowed down internet service even more and sucked up the visitor’s limited data. Enter ad blockers. The thing about ad blockers, however, is that even though most of them offer users the ability to whitelist websites, most users are either unaware of that option or don’t bother to use it unless prompted by the website. Ad blockers often act effectively as blunt instruments then, punishing honest websites which display discreet, reputable ads in an above board manner, along with dishonest or careless websites which display gaudy ads that may or may not harbor malicious code. Like many other areas of life, on the internet a few bad actors can spoil the honest efforts of the majority of website owners. The answer to declining revenue from the arms race between advertisers and advertising blockers is not for website owners to get sneaky, however, which erodes trust, but to develop trust with their visitors and exercise restraint on their advertisers.
Since the majority of IP addresses are dynamic rather than static, meaning that each time a computer user connects to the internet the device that user is on, or possibly a larger network it is part of, is assigned a different IP address rather than keeping the same IP address from session to session. Because dynamic IP addresses are recycled, it’s a wonder that the unfortunate coincidence of being assigned a blacklisted address does not happen more often than it does. It’s impractical to remove a bad address from the rotation entirely because spammers can jump from address to address so quickly that soon all of them would be blacklisted, or the addresses would have to be prohibitively long.
Alfred Hitchcock’s 1956 film The Wrong Man explores the nightmare of mistaken identity.
The other way to get blacklisted as a spammer is to get hacked as described earlier, either through negligence or bad luck, and end up an unknowing part of a botnet distributing spam to friends and strangers alike. The use of biometrics like fingerprint and iris scans are no better a solution to account security than passwords since hackers have been at work on spoofing mechanisms for biometrics. Police can also compel people to grant access to their computers and other devices when they are locked by biometric measures, whereas they cannot compel people to divulge their passwords. There is no single, simple solution to keeping private data entirely secure on any computer or device as long as it is connected to the internet. It’s like the locks on doors and windows, which ultimately will keep out only honest people. Dishonest people will find a way in if they are determined enough, but it’s better for everyone else if it’s not too easy for them, and if they get caught sooner rather than later.
*Post updated to enlarge number of devices affected.
†In November, long after he had learned of the vulnerability in his company’s products, but of course before the flaw had become general knowledge last week, Intel CEO Brian Krzanich sold almost all of his stock in the company for $39 million.
From Woody Allen’s 1969 movie Take the Money and Run, a job interview presumably for an IT position, with a nod to the old TV quiz show, What’s My Line?
Here we have blame enough to go around for everyone: from the executives who, whether out of cheapness or reluctance to overhaul their company’s computer systems, failed to modernize; to the IT specialists who, whether from incompetence or overwork, failed to install vital patches to an outdated operating system; to the end users or user sitting at a computer who, whether out of ignorance or foolishness, clicked on a malicious link or fell for a phishing scam, and then passed it on to co-workers. What made the WannaCry ransomware especially vicious was its ability to exploit the very minimum of human error in order to replicate throughout a network. Computer experts are still not certain of the attack vector WannaCry used to gain initial access. The patch Microsoft issued months earlier should nevertheless have protected Windows XP computers, human error or no.