Open Sesame

 

The latest crisis in computer security comes from news of the Meltdown and Spectre Central Processing Unit (CPU) exploits. Nearly all desktop and laptop computers are affected, and most tablets, smartphones, and other small devices are also affected.* The difference is on account of the types of CPUs used for the various computers and devices. Since home users usually access password protected accounts like email and online banking from smaller devices as well as larger computers, they could see their privacy and online security compromised across platforms. In other words, hackers can exploit a hardware flaw in the CPUs of home computers, and then hackers could use that vulnerability to access private email and banking passwords in software that crosses platforms.

 

עלי באבא מתחבא על העץ
In the story “Ali Baba and the Forty Thieves”, Ali Baba overhears one of the thieves say “Open Sesame” to open the entrance of the cave where they store their loot. Illustration by Rena Xiaxiu.

CPU makers like Intel† are racing to fix the problem, which was first discovered by Google security researchers last June, and internet browser makers, where many users store passwords, are hurrying to tighten security on their end. In the meantime, people need to be vigilant about email and banking security themselves, starting with changing their passwords if they suspect unusual activity in their accounts and running a full suite of anti-virus, anti-spyware, and anti-malware programs on their computers. Those are routine security measures that people ought to be taking already, but unfortunately some folks don’t even do that much. When their computers are compromised by hackers, those home users are often as not completely unaware they are being used as part of a rogue network, called a botnet, to spread spam and other nasties throughout the internet. When everything is linked as with the internet, the weakest links are the easiest targets of hackers.

Even after tightening up individual computer security by using strong passwords and storing them securely, by not clicking on links in untrusted emails, by surfing the web safely using the anti-phishing feature built into most browsers, by regularly updating a security suite and running scans with it, even after all that a careful home user can still have difficulties, whether it’s because of something completely out of their control in the so-called cloud, such as when credit reporting agencies got hacked, or simply because their Internet Service Provider (ISP) momentarily gives them the Internet Protocol (IP) address of a blacklisted spammer, causing their email provider to block their account.

Since the majority of IP addresses are dynamic rather than static, meaning that each time a computer user connects to the internet the device that user is on, or possibly a larger network it is part of, is assigned a different IP address rather than keeping the same IP address from session to session. Because dynamic IP addresses are recycled, it’s a wonder that the unfortunate coincidence of being assigned a blacklisted address does not happen more often than it does. It’s impractical to remove a bad address from the rotation entirely because spammers can jump from address to address so quickly that soon all of them would be blacklisted, or the addresses would have to be prohibitively long.

Alfred Hitchcock’s 1956 film The Wrong Man explores the nightmare of mistaken identity.

The other way to get blacklisted as a spammer is to get hacked as described earlier, either through negligence or bad luck, and end up an unknowing part of a botnet distributing spam to friends and strangers alike. The use of biometrics like fingerprint and iris scans are no better a solution to account security than passwords since hackers have been at work on spoofing mechanisms for biometrics. Police can also compel people to grant access to their computers and other devices when they are locked by biometric measures, whereas they cannot compel people to divulge their passwords. There is no single, simple solution to keeping private data entirely secure on any computer or device as long as it is connected to the internet. It’s like the locks on doors and windows, which ultimately will keep out only honest people. Dishonest people will find a way in if they are determined enough, but it’s better for everyone else if it’s not too easy for them, and if they get caught sooner rather than later.
― Techly

*Post updated to enlarge number of devices affected.

†In November, long after he had learned of the vulnerability in his company’s products, but of course before the flaw had become general knowledge last week, Intel CEO Brian Krzanich sold almost all of his stock in the company for $39 million.

 

Your Bitcoin or Your Files

 

The WannaCry, or WannaCrypt, ransomware that attacked mostly networked computers running unpatched Windows operating systems last month did not affect many non-networked home computer users, but that doesn’t mean those users will avoid future attacks. The computers of home users are often just as vulnerable as those used by banks, hospitals, and other large institutions. They are less likely to be attacked only because they aren’t generally tied into a larger network and because loss of their data is not critical. Home users also have less money, or access to Bitcoin, than large institutions, making an attack on them not as worthwhile for hackers.

 

Computer Using Cat
Cat using computer; photo by EvanLovely.
Any computer running any operating system connected to the internet is vulnerable to ransomware, malware, viruses, and a host of other exploits. Macintosh and Linux operating systems are partially less vulnerable than Windows, but not invulnerable. The same goes for the Android and iOS mobile phone platforms. Frequently updating an operating system with patches downloaded from the operating system provider is key to maintaining security. An equally important best practice is to avoid human error in daily computing, such as being wary of web links or attachments in suspicious emails, and even being careful of clicking on ads from unknown providers on sketchy websites. The internet is a teeming public square where pickpockets mix with everyone else, and where some side streets and alleyways lead to unwholesome places, increasing the likelihood of something bad happening.

 

All this seems like common sense and fairly common knowledge, so why are large institutions with professional Information Technology (IT) staff on hand nonetheless vulnerable to cybercrime exploits that home computer users who are conscientious about updating their software and careful when visiting the internet can usually avoid? Are the IT departments incompetent? The answer is they apparently do their best most of the time, like anyone else with a job to do, but their efforts are many times hobbled by that second factor mentioned above – human error. And the larger the organization and the more computers tied into the network, the greater the chances for one small human error to multiply throughout the organization. IT specialists are also hobbled by the unwillingness of higher ups to let go of outdated operating systems like Windows XP. The WannaCry ransomware targeted unpatched, networked Windows XP computers.


From Woody Allen’s 1969 movie Take the Money and Run, a job interview presumably for an IT position, with a nod to the old TV quiz show, What’s My Line?

Here we have blame enough to go around for everyone: from the executives who, whether out of cheapness or reluctance to overhaul their company’s computer systems, failed to modernize; to the IT specialists who, whether from incompetence or overwork, failed to install vital patches to an outdated operating system; to the end users or user sitting at a computer who, whether out of ignorance or foolishness, clicked on a malicious link or fell for a phishing scam, and then passed it on to co-workers. What made the WannaCry ransomware especially vicious was its ability to exploit the very minimum of human error in order to replicate throughout a network. Computer experts are still not certain of the attack vector WannaCry used to gain initial access. The patch Microsoft issued months earlier should nevertheless have protected Windows XP computers, human error or no.

 

1940 Oldsmobile Station Wagon
1940 Oldsmobile Station Wagon advertisement. You rarely see Woodies like this on the road these days!
Windows XP was Microsoft’s most popular operating system ever, and it’s understandable many users are reluctant to let it go. There are a lot of reasons Microsoft has tried to move on from Windows XP, as popular as it remains, and at this stage those reasons, good or bad, believable or not, are beside the point. The fact is Microsoft is moving on. For computer users to cling to Windows XP at this point is like automobile fanciers who own vintage cars: Yes, having a fine old car can be engaging, but don’t expect there will be many qualified mechanics available to work on it, or driving it on interstate highways will be a safe and effective means of travel in the 21st century. Windows 10, the up to date model of Microsoft’s operating system, has plenty of faults, among them being a data hog that is far too chatty with its home base so that it can mine the user’s personal data for sale, a lesson Microsoft learned well from Google, but at least it’s safely built for travel on today’s internet, the information superhighway, as Al Gore called it. Drive safely.
― Techly

 

10 Reasons Your Mind Is Not a Waste

 

“When you take the UNCF model that, what a waste it is to lose one’s mind, or not to have a mind is being very wasteful. How true that is.”
― Vice President Dan Quayle, speaking at a luncheon for the United Negro College Fund on May 9, 1989, mangling the Fund’s slogan “A mind is a terrible thing to waste.”

 

Is the internet making us dumber? stupider? how about less bright? Listicles like this one could be one reason why we might not be that smart anymore. Maybe they’ve helped make us smarter than we used to be. Did listicles ever exist outside the internet, meaning a long, long time ago? Maybe in magazines, most of which were not meant for serious people, the way newspapers were, way back when.


Mel Brooks shows us an alternative past involving lists and tablets in his 1981 movie History of the World – Part 1.

Anyway, enough history. Here we go ―

  1. Before the internet, you needed to know and remember stuff, because you couldn’t just look it up online at the drop of a hat. You maybe could find out from a book, if you knew where to find one.
  2. Because you can look up practically anything now on the internet, some people think it’s making us smarter, especially about what our favorite celebrities have been up to lately.
  3. Without the internet, we couldn’t check on what our friends had for dinner and all the cool places they’ve been out to eat, unless we called them, which we don’t want to bother with, just text. Everything would have to be texts, which is probably okay.
  4. Spending lots of time playing computer games is good because it trains you for a good job with the military remotely piloting drones to drop bombs on terrorists over in their country from an undisclosed location somewhere else, and that’s really smart because otherwise they’d be over here blowing themselves up.
  5. Knowing a lot of internet and computer stuff is also a smart way to get a job with the National Security Agency (NSA) looking into everybody’s business.
  6. There’s no need to develop social skills when there are social media networks like Facebook and Twitter around.
  7. The internet is also good for getting things off your chest by commenting online, and you don’t have to worry about being nice about it, because on the internet no one knows who you are, unless they’re with the NSA.
  8. It used to be that before the internet you could be bored a lot. Now with smartphones and tablets that you always have with you, you don’t ever have to be bored and think about stuff, because you can do other things online, like Facebook or Twitter again.
  9. According to Hebb’s Law, which you can look up online, when your brain spends a lot of time doing something, it gets smarter doing that thing. Even though the brain is mostly fat, it’s like a muscle that way.
  10. Your brain is wired just like the internet. Well, actually, since your brain was here first, especially if you were born a generation or more ago, the internet is wired like your brain. Not that any central authority planned it that way, it just happened. If you’re an old person, that’s probably why you might not understand everything about the internet, because you have to think about it, instead of being wired up ready to go from early on.


Mike Judge shows us a possible future in his 2006 movie Idiocracy. Okay, it might be more than just a possible future and might be closer to now than is comfortable. Warning: foul language.

Okay, that pretty much wraps it up. It was fun. Now you know the internet isn’t necessarily making us any dumber, just different, but don’t think about it too hard or your brain’ll seize up and crash like you drank something really cold really fast. You can’t email Microsoft tech support about that.
― Techly

 

Who Ya Gonna Call?

 

Few things are more frustrating than dealing with poor or indifferent customer service. Calling a company’s customer service number – if you can track it down – usually involves navigating a phone tree of options that may or may not result in discussing your problem with a human being, and then only after waiting on hold. When you do get to talk to a person, that person may be based at a call center in India, and while they are almost always polite and professional people honestly trying to do a good job, there can be language and cultural barriers getting in the way of resolving your problem. Some companies have reacted to customers’ frustrations by touting that their customer service representatives are based in the United States, and to avoid long hold times they offer to call customers back.

 

Email is a somewhat better route for dealing with a company’s bureaucracy if you don’t mind delays of a day or two in getting a response. If you have follow up questions, the back and forth can stretch to a week or more and can feel like dancing with an elephant. Even though you might think there is an advantage to having your questions and their answers in writing, it has come to be more of a stumbling block than it used to be as reading comprehension deteriorates in the population. Consider how many times you have written an email to a company’s technical support only to find out after the usual one or two day delay in getting a response that they obviously misunderstood your question. They read the first sentence, and whatever followed made their eyes glaze over, because after years of exposure to television and the internet, they no longer have the attention span to comprehend anything longer than a snippet or a sound bite.
Callcenter03
MÁV train reservations call center in Hungary; photo by MÁV Zrt.

 

Of the three major technological ways of interacting with customer service, that leaves chat, and it turns out to be the most satisfactory in many ways for both customers and companies. Unlike a phone call, chat leaves a customer freer to do other things while waiting for a representative to come online or even while the chat is taking place. Unlike email, chat response times from companies are far quicker, and in many cases quicker than phone call response times. And like a phone call or face to face interaction, chat allows for immediate clarifications of misunderstandings. There is back and forth between the customer and the representative as in a phone call, and at the end the customer can print a transcript. Companies prefer chat, too, because it is cheaper to run than a call center on account of the flexibility the representatives have in handling multiple customers at once, and because the experience leaves customers more satisfied than dilatory email responses.

 


Hotel owner Basil Fawlty, portrayed by John Cleese, was not one for tact or subtlety.

 

But what about older folks, who are often not as technologically savvy as the rest of the population, or what about people who simply don’t want to hassle with computers? These people prefer to contact customer service the old-fashioned way, either in person or by phone. They experience even more frustration than the rest of us because companies have mostly moved away from those older methods as being too costly, and even seem to actively discourage their use by making the experience unpleasant and time wasting. That can lead to serious consequences for the elderly especially, as their frustration with modern customer service options leads them to take foolish risks, like trying by themselves to dislodge a fallen branch from the power line service drop to their house after a storm rather than calling the power company to have them remove it, a service power companies perform for free because the hazard is serious and people should not be discouraged by a fee from having the problem resolved safely.

 

The 120 volt insulated line connecting to a house or apartment building can be every bit as dangerous as the higher voltage lines going from one utility pole to the next, and you have only to make one mistake with it and you’ll never make another. For safety reasons like this, it is vital that companies who deal in dangerous products like electricity and home generators and space heaters not hide their old school customer service contact points as some modern companies have done. We can gripe as much as we like about the cable company’s lousy customer service, but their product can’t kill us if we mess with it (physically, that is; mentally – that’s open to question). A power line is another matter entirely, even when the birds seem to tell us it’s okay.
― Techly
Pica pica gathering tree tops 1
Three magpies (Pica pica) gathering in the tree tops, United Kingdom; photo by Flickr user Peter Trimming. In a nursery rhyme featuring magpies, three together signifies a human girl will be born. That may be, but for purposes of this post it is important to note that birds can perch safely on a power line because they come into contact with it at only one point, and therefore do not provide a path to ground. An exception can be found in the case of large birds such as raptors, whose extensive wing span can bring them into contact with two lines at once, or with a line and another point, electrocuting them.

 

Nomophobic No More

 

Nomophobia is a term coined in 2010 by the United Kingdom Post Office, which commissioned research into the anxieties of mobile phone users. It stands for no-mobile-phone phobia, or the fear of not having access to a phone or phone service.

On February 3, 2017, New Orleans Saints head coach Sean Payton, responding in part to the antics of Pittsburgh Steelers wide receiver Antonio Brown, who streamed a post-game speech by his head coach, Mike Tomlin, on Facebook Live from his smartphone, vowed to “scramble” social media sites in the Saints’ locker room in the future. It was unclear what Payton meant exactly by “scramble,” but perhaps he was referring to using a filter on the locker room wi-fi service. Players could still access social media sites using the signal from their cellular service, however, making the overall effectiveness of Payton’s ban doubtful. A cell phone signal jammer would be an option if it were legal.

Payton’s proposed ban was his response to players’ increasing inattention as well, since they itched to check their phones for distractions instead of devoting their full attention to the business at hand in locker room meetings. These are men in their twenties and thirties, some of them making millions of dollars a year, and they cannot be relied upon to disregard their smartphones for more than forty minutes at a time while their head coach conducts a meeting. But then, considering the behavior some players exhibit during games, perhaps it should come as no surprise they are selfish and immature in other areas of their lives. We would more usefully order our priorities to not give the players and the game as much attention as we do.

 

Arrecife - Iglesia de San Ginés in 18 ies
No cell phones sign at a church in the Canary Islands.
The message in English reads “Sacred Place – Silence Please”.
Iglesia de San Ginés in Arrecife, Lanzarote, Canary Islands;
photo by Frank Vincentz.

 

Whether it is a compulsion or an addiction that many people have to constantly check their smartphone for text messages, emails, or social media posts, is something they need to examine for themselves. The rest of us just wish they would stop checking, checking, and checking again, because it is costing us time and frustration, and in some cases our lives. Besides the everyday annoyances caused by compulsive smartphone users disrupting the enjoyment of theater-goers and patrons at restaurants and shops, there is the now nearly constant problem of being held up at a traffic light by the driver in front being too engrossed in their smartphone to realize the light has turned green. Such drivers build up road rage in others, and that’s minor considering the dangers they pose once they get their car moving.

A majority of drivers sensibly acknowledge that texting and driving is dangerous and are in favor of state laws prohibiting it, yet many of them continue to do it. You can see these drivers everywhere on the roads, bobbing their heads up and down like mechanical dipping birds as they look up and down from the smartphone they hold down just out of view of others – as if they’re fooling anyone – to the road and back again. The danger comes not only while they are looking down, but also for the first few seconds after they look up, because in that time their minds are elsewhere.

The Green Eggs and Ham Cafe - panoramio
The Green Eggs and Ham Cafe at the Seuss Landing attraction
of the Universal Islands of Adventure theme park in
Orlando, Florida; photo by Panoramio user BihnX.
Since some people can’t seem to stop themselves from texting and driving, and since enforcement is lax, it appears the only thing that will get at least some of them to stop is the kind of social disapproval that has built up around smoking in public over the past twenty years. It’s incredible now to recall that up until twenty or thirty years ago smoking in most public places was not only acceptable, it was the norm. People smoked in theaters, restaurants, and on planes and trains. Like enjoying green eggs and ham, people had a cigarette pretty much anywhere they liked. Speaking of green eggs and ham, now there’s an excellent idea: shut off that phone, smart or otherwise, and enjoy an attentive meal with friends or family, put the phone to sleep in the glove compartment while you drive to the theater, and then leave it in the car when you go in to relax and enjoy the show. Your dinner companions, the drivers you share the road with, and your fellow patrons at the theater will appreciate it, and it won’t kill you.
― Techly

 

Getting to Know You

 

Online Privacy and the Founding Fathers
“Online Privacy and the Founding Fathers” by Matt Shirk


The comedian George Carlin used to riff on oxymorons, phrases he found absurd such as “military intelligence” and “business ethics.” To that list we could add “online privacy.” The internet has always been a public place which gives people the illusion of private communication because of how they access it, from a handheld device or from their own computer. Recently in a ruling on a class-action lawsuit concerning Yahoo’s practice of scanning emails, a federal judge affirmed that online privacy is not for everybody.


In the lawsuit brought against Yahoo by email users who did not use Yahoo’s email service but corresponded with people who did, Judge Lucy Koh of the U.S. District Court for Northern California signed off on a settlement which allows Yahoo to continue scanning the emails of non-Yahoo users without their consent. The major change from Yahoo’s previous practice is that it must do so only while the emails are on its servers, rather than while they are in transit.

That satisfies the letter of the law while doing nothing to redress the grievances of non-Yahoo email users. The four plaintiffs in the lawsuit received $5,000 each. The Judge awarded the plaintiffs’ lawyers 4 million dollars in total. A  45 page PDF of the settlement is here, and the summary starts at page 40. Google is being sued in a similar class-action which is pending before Judge Koh.

Since most people don’t fully read the terms and conditions before signing up for online services, it’s doubtful whether many users of Yahoo, Google, or similar free webmail services are aware those companies are scanning their emails for the purpose of targeted advertising, as well as scanning the other half of the exchange coming from their correspondent. Other users who are aware of the scanning are resigned to accepting it as the price of free webmail. And the “price of free” is another oxymoron Mr. Carlin himself might have gleefully noted.

– Techly