The Curse of Bigness

 

TIMEMagazine19Oct1925
A portrait of Louis Brandeis on the cover of Time magazine on October 19, 1925.

Before he was an associate justice on the Supreme Court of the United States from 1916 to 1939, Louis Brandeis was a progressive lawyer fighting the big monopolies, or trusts, of Gilded Age America. He termed the corrosive effect on democracy of unrestrained business practices “The Curse of Bigness”, and after he joined the Supreme Court he maintained his interest in restraining business interests from trampling the rights of ordinary citizens.

Now President Biden has appointed Lina Khan to the chair of the Federal Trade Commission, and her appointment signals a return to the principles of Louis Brandeis. Lina Khan is an antitrust lawyer and legal scholar who, as a student at Yale Law School in 2017, wrote an article called Amazon’s Antitrust Paradox. The article drew widespread attention for her ideas about how the conventional wisdom of the past 50 or so years regarding regulation of the marketplace based on consumer prices no longer applied in the age of Amazon, a company willing to engage in predatory pricing and use vertical integration in order to stifle competition and monopolize the marketplace.

A profile of Lina Khan in Time from October 17, 2019.

 

Prior to Ms. Khan’s appointment, another antitrust lawyer and legal scholar, Tim Wu, joined the Biden administration as a Special Assistant to the President for Technology and Competition Policy on the National Economic Council. Mr. Wu is known for helping to write the first network neutrality rules in work for the Federal Communications Commission in 2006. In 2018, he wrote The Curse of Bigness: Antitrust in the New Gilded Age, a book which paid homage to Louis Brandeis and his antitrust work of the Progressive Era.

Climate strike (49534187193)
A Climate Strike protester with an anti Bezos sign in London on February 14, 2020. Photo by Flickr user Socialist Appeal.

With these two people now in key positions in the federal government, perhaps efforts to rein in, or even bust up, big technology companies such as Amazon, Google, Apple, Facebook, and Microsoft, will finally be undertaken seriously and with persistence. In the past, these Big Five technology companies have largely escaped with slaps on the wrist after fitful investigations into their practices.


Supreme Court Justice Ruth Bader Ginsburg answered questions from Brandeis University students at an event in January 2016 commemorating the 100th anniversary of Louis Brandeis being nominated to the Supreme Court by President Woodrow Wilson.

 

As Louis Brandeis understood, and as is apparent from the writings of both Lina Khan and Tim Wu, setting regulatory boundaries for these behemoth businesses not only ensures they act fairly in the marketplace, but protects democracy from their tendency to squash individual liberties when they conflict with their self-interest. And the bigger and less competitive these companies become, the more their self-interest consumes everything in their vicinity, like a beast that can’t stop growing and must swallow anything in its way.
โ€” Techly


An unofficial remix of the 2021 songs “Bezos I” and “Bezos II”, written and performed by Bo Burnham for his album and Netflix special, Bo Burnham:Inside. Warning: foul language.

 

You Don’t Have to Do This

 

Shop for a new smartphone and the choice of operating system appears limited to Apple’s iOS or Google’s Android. The choice of wireless carrier network for the new smartphone is limited to five or six companies, and while there are more than a dozen smaller carriers, they all lease their networks from the larger carriers. Mergers of technology companies and globalization of supply chains have made it difficult for consumers to entertain enough options to simultaneously suit their desires for reasonable prices, efficient service, and in the best case scenario, ethical marketplace behavior.

 

To be a large player in the technology industry, as in many other industries, it seems engaging in horrible practices is simply a necessary cost of doing business. It’s as if economies of scale and ethical behavior are mutually exclusive. Apple iPhones are manufactured under terrible labor conditions in China, and the cobalt required for manufacture of those iPhones is mined using child labor in the Democratic Republic of Congo. Google, Facebook, and Twitter all sell their users’ information to advertisers while double-dipping by generating enormous ad revenues from the wide use of their services. That’s the cost of “free” to the users. As an online retailer, Amazon’s reputation for egregious labor practices is as bad or worse than that of its major brick and mortar competitor, Walmart.

Ilhan Omar speaking at worker protest against Amazon (45406484475)
U.S. Representative Ilhan Omar (D-MN) speaking in December 2018 to about 200 workers protesting conditions at an Amazon workplace in Shakopee, Minnesota. Photo by Fibonacci Blue. Protests by workers in this country against unfair labor practices by giant companies like Amazon would get a slingshot-like boost if lawmakers would repeal the anti-union legislation passed in the last 50 years at the behest of corporations.

That is by no means a comprehensive list of all the technology companies with reputations for treating customers, workers, suppliers, or the environment badly. Just as Americans are becoming more concerned with what is in their food and how it’s produced, they can devote some time and attention to how their technology products are produced and how companies are using the personal information they hand over in the course of using their services. It may seem like there are few to no alternatives to some technology products and services, but there are alternatives, and it may require effort put into research to find out about them, and then some sacrifices as it turns out they don’t offer absolutely everything consumers are used to getting from Microsoft’s Windows operating system, for instance, or Facebook’s one-stop social media and news sharing platform.

Some people simply won’t care, of course, and will remain interested only in what’s easiest and most convenient for them. This is not for them. Others who are concerned about voting with their dollars, however, should know there are ways to find alternatives to signing on with the big technology companies, and that informing themselves doesn’t have to suck up an inordinate amount of their time and energy. Currently there is almost no labeling on technology products and services such as there is on food for sale in supermarkets, informing consumers of organic and non-GMO options, and of nutritional content. There should be similarly easily apparent labels for technology, listing ratings from an impartial source, if such is possible, on a company’s treatment of workers, suppliers, and the environment. The companies are now required by law to enumerate the ways they use customer information, but that is for the most part buried in fine print legalese that few consumers bother to read.

In episode #1938, “Theresa Syndrome”, from the radio show Car Talk, the portion of the show relevant to this post starts at the 10:45 mark with a call from Brian in Harrisonville, Kentucky. Questions of ethics come up every day in everyone’s lives, and in this case as in many others, arguments of efficiency that mask motives of self-interest are all too common.

Until the technology industry catches up with at least the halting steps the food industry has taken to inform consumers about what they are buying and what kind of ethical or unethical behavior they in turn support with their purchases, it will remain up to individual consumers to inform themselves. Globalization has made it easy to hide the ugly details of technology manufacturing halfway around the world. Out of sight, out of mind. It’s not as if things were far better 100 years ago, though, because at that time for most Americans a sweatshop on New York City’s Lower East Side was as much on the other side of the world as a sweatshop in Bangladesh is today. Speed of travel and communications have changed the seeming size of the world, but sadly not the willingness of businesses and governments to exploit the less fortunate, and of the more fortunate to turn a blind eye.
โ€” Techly

Editor’s note: Bonus points to readers who note advertising on this site for the products of one of the companies criticized in this post. It’s hard, maybe impossible, to exist in the modern world without some compromises, and like everybody else, writers have to eat. With a little effort and attentiveness, people do what they can to make the world a better place, but no one is without faults, and as Joe E. Brown said at the end of the movie Some Like It Hot, “Well, nobody’s perfect.”

 

We Gotcha

 

Anyone who uses the internet regularly has likely encountered a CAPTCHA or reCAPTCHA gatekeeper at a website requiring a login, and the puzzles they present to the user are meant to distinguish human visitors from bots, which is a good idea. Another good idea from the standpoint of Google, or Alphabet or whatever they’re calling themselves these days, is the use of unpaid labor from solvers of the puzzles to train artificial intelligence for tasks such as digitizing books or driving cars.

Waymo self-driving car side view.gk
A Waymo self-driving car on the road in Mountain View, California, headquarters of Google, or Alphabet or whatever they’re calling themselves these days. Waymo is a division within the technology behemoth, and logically it would be filed under “W”. Photo by Grendelkhan.

 

Ten years ago, internet users mostly encountered CAPTCHAs, which stands for Completely Automated Public Turing test to tell Computers and Humans Apart. CAPTCHAs were text-based puzzles, and Google put people to work solving them in the interests of both internet security and of training artificial intelligence to recognize letters and numbers in all sorts of peculiar configurations, such as might be found in all the books Google was digitizing. Now reCAPTCHAs are more common, and they are handy for training self-driving cars because they are image-based, and the images are most often of street scenes.

No doubt the engineers and executives at Google count themselves as quite clever for employing digital security puzzles to help amass the enormous amount of data necessary to train artificial intelligence without spending a penny, at least for labor. It’s a good bet most internet users are unaware of their exploitation at the hands of that technology behemoth or of other ones, like Facebook, which uses photographs uploaded by its users to train facial recognition software. Of those who are aware of what’s going on, some may not care. The technology companies, in that case, have little concern for the possibility of a public outcry over their exploitative practices; people are so eager to hand over their personal data for purposes they perceive as benefiting themselves that they don’t notice or don’t care how the companies are using the mountains of freely given information.

Artificial intelligence requires so much data to be effective that not even all the free data sneakily gleaned from internet users is enough, and therefore the technology companies have to pay some laborers, however poorly, to do the monotonous tasks necessary to train artificial intelligence for every imaginable scenario. The weakness of artificial intelligence, being nothing more than an extremely powerful computer, is its incapability of imagining scenarios outside of logic, or of imagining anything at all. Powerful as it is, it is still only a number cruncher.



John Cleese in conversation with Appian CEO Matt Calkins at a technology conference in 2018. In another video, John Cleese demonstrates the leaps of imagination and intuition that set the human brain apart from artificial intelligence.

 

Google’s reCAPTCHA sometimes gets the wrong message from its images, for example by insisting a diagonally striped no parking zone is a pedestrian crosswalk. There is no arguing with it. All the internet user can do in order to move on then is play along with the error or try reloading a different image. One has to wonder if training one’s replacement for free is not enough of an indignity without also suffering the insult of having to humor an insufficiently intelligent automaton that is nonetheless a humorless and dully unimaginative know-it-all.
โ€” Techly

 

Leave It to Google

 

People go out of their way to use the Linux operating system on their desktop and laptop computers for all sorts of reasons, and it’s a fair guess that among them is the desire to stay clear of the tentacles of major technology companies like Microsoft, Apple, and Google. Microsoft has never made any pretense of being anything but evil, while Apple has pretended to be above the fray, and perhaps the least trustworthy of the three is Google, which tipped everyone off to their evil intentions by sanctimoniously proclaiming at one time “Don’t be evil”. Any individual or organization professing to abide by moral certainties that should not even be in question is not to be trusted.

 

It’s ironic then that because of some holes in Linux development such as lack of drivers for some peripherals, usually printers, Linux users may find themselves forced to rely on Google services as workarounds. In the case of printers, incompatibility with Linux has become less of a problem over the past 20 years as Linux has climbed in market share to around five percent. Microsoft’s Windows is around 75 percent, with Apple’s Mac operating system at about 15 percent, although it seems no one can agree on the exact numbers. Google’s Chrome operating system makes up most of the remaining percentage in use for desktops and laptops, and because it has access to all Google services built in, including Google Cloud Print, printing from Chrome OS is never a problem even if proprietary drivers are not available from the printer manufacturer.

 

MagpieOS infofetch
Magpie OS is an Arch-based Linux distribution, developed by Rukunuzzaman, a Bangladeshi developer. Screenshot by Kabirnayeem.99. There are hundreds, perhaps thousands, of different Linux distributions, enough to suit anyone’s preference.

Some printer makers still do not provide drivers for Linux, and in cases where generic drivers won’t work the Linux user is confronted with either turning their incompatible printer into a doorstop or falling back on workarounds like using Google Cloud Print. It’s an efficient service that comes in handy. It’s also free. Free often comes at a price, however, and in the case of Google, like many other technology companies, that means turning the user of the free service into a product sold to marketers. Google is perhaps no worse in this respect than companies like Facebook, only more pervasive by its utter ubiquity. It’s nearly impossible to escape Google entirely and still get along in today’s technological world. Google’s Chrome OS may bring up the rear among major desktop and laptop operating systems, but its Android OS for smartphones leads the next highest competitor, Apple’s iOS, by a huge margin at around 85 percent to 15 percent.

Printer manufacturers appear interested mostly in configuring their drivers for the two biggest desktop and laptop operating systems, Windows and Mac, and Linux is generally an afterthought. Chrome can fend for itself, and to some extent Linux can as well, but not without having to resort to using Google services occasionally. Linux developers are volunteers, and they can’t keep up with the myriad of proprietary configurations for all the printer models hitting the market each year. Much of the proprietary nature of printer drivers has nothing to do with actually making the product perform its basic functions, but rather with marketing gimmicks like greeting card suites.

Al Pacino in The Godfather: Part III, a 1990 film directed by Francis Ford Coppola. Not that large technology companies are necessarily comparable to the Mafia, but to some people their grasp may feel similarly inescapable.

Now more than ever people need a reliable printer at home. About the only way left of obtaining tax forms is to download them from the internet and print them at home. Using the internet and printing out web pages has become a major factor in children’s schoolwork, and their parents need to print out receipts and coupons or run a home office. Getting along without a printer, or having to jump through hoops in order to get one to work properly, can no longer be part of how most people cope with the modern world. For most people, the 90 percent who use either Windows or Mac computers, compatibility problems are rare to nonexistent; for the 10 percent minority, and particularly those who wish to go against the flow with Linux, incompatibility between operating system and printer should no longer be an issue if manufacturers want to sell their wares to all consumers and ensure the same ease of use long enjoyed by the majority. It’s about time for proprietary drivers to go into the desktop trash can.
โ€” Techly

 

This Just In

 

Website headline writers like to insert the word “just” in their copy for the sense of immediacy it conveys. They have room to insert the word because website headlines are usually sentence length descriptions rather than the terse summations newspaper copy editors used. Longer descriptions can be good teasers and also boost the rank of a website post in search engine results because that’s the way Google has decided sites and posts should be ranked, and Google sets the bar for search engines and for the internet generally. Ask them why.

 

Search engines don’t like the short headlines common in newspapers. The reason many headlines on the internet read the way they do is because writers are responding as much to what search engines like as they are to what they believe their readers like. It’s not easy keeping up with the Kardashians, and the only way websites can do it is to couch everything in terms of immediacy, as if it were all breaking news worthy of readers’ attention. To generate clicks on their posts and get them ranked highly in search engine results, website writers must tease about the content using descriptive headlines, and then make sure to give whatever they’re describing a sense of happening moments ago by tossing in “just” at least once.

War Ends
Residents of Oak Ridge, Tennessee, fill Jackson Square on August 14, 1945, to celebrate the surrender of Japan. Oak Ridge was one of three main sites of the Manhattan Project, and was responsible (though those working there did not know it) for refining uranium to be shipped to Los Alamos, New Mexico, to be fashioned into atomic bombs. Photo by Ed Westcott, working for the U.S. Army Corps of Engineers. The newspaper headline “War Ends” might not fly with today’s internet and social media news headline writers, who would be tempted to write “War Just Ends”, even though it would be open to multiple interpretations.

The tendency is to hype everything, even inconsequential matters. Add news sharing on social media, and the hype gets amplified to 11, as a member of the fictional heavy metal band Spinal Tap observed. Trust and references build credibility on social media, even if common sense and a little digging into sources reveals there are no grounds for credibility. Google hones search results based on what they know about users, and Facebook and Twitter follow Google’s lead while juicing results further by adding the finer details they know about their users. Facebook and Twitter set the bar in social media for how posts get pushed to the front for sharing on their platforms, and as long as readers keep clicking the wheels keep rolling, no matter how worthless are the posts everyone shares.

This clip from Sesame Street could serve as a metaphor for what the internet and social media have become.

A word such as “just” is a fine, serviceable word in most cases. Unfortunately, once some influential writers, platform arbiters, and readers on the world wide web and in social media adopt it as a manipulative expression it gets overused, abused, and misused on its way to becoming trite and tiresome. Just sayin’.
โ€” Ed.

 

10 Questions for Today’s Driver

 

Driverless cars will be ready for the mass market within a few years, though the question remains whether the mass market will be ready for driverless cars. There’s an incredible amount for the Artificial Intelligence (AI) behind driverless cars to learn, and for years Google has enlisted the help of internet users who train Google’s (now Waymo’s) driverless car AI whenever they tick the boxes on a reCAPTCHA relating to things seen on or around roads. Google owns reCAPTCHA, and for years has been using it for double duty as a security measure and as an AI trainer for its various projects.

1930s HU STUDENTS
Students at Hamline University in St. Paul, Minnesota, take final exams in the 1930s. Photo from the archives of Hamline University. Surely this driving test, which calls on knowledge affecting the safe passage of millions of people on the nations’ roads every day, can be taken as seriously.

 

What follows is a test to help you determine if you’re ready for a driverless car.

1. The rules of the road are for –
A) Lesser mortals
B) Drivers paying attention to such things
C) Sticklers and fussbudgets
D) All of the above

2. Using your turn signal is –
A) An inconvenience because your hands are otherwise occupied
B) Unnecessary because other drivers can divine your intentions
C) For losers, not an important person like you
D) All of the above

3. Using a phone while driving is –
A) Compulsory
B) The best way to update friends and family on every detail of your life
C) A good way to multitask for a superior driver like you
D) All of the above

4. Proper procedure when merging is to –
A) Come to a complete stop and wait for clear sailing on the main thoroughfare
B) Tootle along at your own speed and trust other drivers will make way for you
C) Use the opportunity to demonstrate your aggressive driving skills
D) All of the above

5. Waiting at a red light is a good time to –
A) Become engrossed in your phone and oblivious to the light turning green
B) Fiddle with your belongings and not notice when the light turns green
C) Creep forward every few seconds because you can’t wait for the green light
D) All of the above

6. When following another vehicle, be sure to –
A) Get as close as possible no matter how fast the other vehicle is traveling
B) Tap your brakes often because you’re following too closely to slow down using the gas pedal
C) Make impatient gestures to inform the driver in front of you of your displeasure
D) All of the above

7. Staying within your lane is –
A) Not interesting because there is no element of danger
B) Hard to do when you’re texting
C) A boring way to go around blind curves
D) All of the above

8. The speed limit is a –
A) Suggestion
B) Lower limit to speed
C) Thing only for old fogies
D) All of the above

9. Continuing to drive when very old –
A) Tests your deteriorating reflexes
B) Gives your clouded judgment a workout
C) Maintains your independence at the cost of everyone’s safety
D) All of the above

10. Driving defensively is –
A) A sign of weakness
B) Something requiring more attention than you have time for
C) Hitting the brakes frequently rather than modulating speed using the gas pedal
D) All of the above

English comic actor Rowan Atkinson as the selfish Mr. Bean.

There is only one right answer to all of the above, and if you checked it off for every question then you are ready for a driverless car, and everyone else on the road is ready for you to have one, too. Congratulations! At least our good friend AI doesn’t feel it necessary to eat a burrito and text a friend about it, all while piloting one or more tons of metal hurtling down the road.
โ€” Techly

 

Just Say No

 

As if the lack of trust hadn’t sunk low enough between internet users, advertisers, and the websites which host advertisements, along comes cryptojacking, a method for either honestly or dishonestly using the computing power and electricity of internet users to mine cryptocurrency. Last week, users of YouTube in some countries noticed that their antivirus and antimalware programs were alerting them to code hidden in ads on YouTube which were enlisting their computers for cryptomining without their permission. Google, which administers YouTube, claims to have fixed the problem. Unfortunately, there are many small websites that don’t have Google’s Information Technology (IT) resources and may have been hacked and had cryptojacking code installed without their knowledge.

 

Cryptojacking sounds like it should be illegal, but oddly enough it is not. There can be repercussions such as blacklisting for hiding code in ads, and of course this sort of activity serves to push more people toward the use of ad blockers, which deplete the revenue of honest websites as well as dishonest ones. There are now outfits on the web, Coinhive being the most notable, which promote to website owners the idea of replacing ads altogether with a bit of JavaScript code on the website itself that will enlist the computers of visitors in mining Monero, a type of cryptocurrency that, unlike Bitcoin, doesn’t require high end equipment. Coinhive takes 30% of the resulting mining revenue, and the website owner gets 70%. Coinhive rather dubiously promotes this as a fair business model for the website owner in a time of declining revenue from ads, while not mentioning its relative fairness for the website visitor.

Cryptocurrency Mining Farm
A mining farm of Genesis Mining in Iceland. These are mainly Zeus scrypt miners. 2014 photo by Marco Krohn. No subterfuge involved in this cryptocurrency mining operation. Note that because the calculations required to create the currency generate a lot of heat, there are fans at the ends of all the units.

As originally set up by Coinhive, the JavaScript ran without the internet user’s knowledge or permission. If an internet user visited a website running Coinhive‘s JavaScript code, and the user’s security software did not alert the user or block the code from running, the only indication the user had of being legally cryptojacked was how unusually busy their computer was and, when the electric bill arrived, how unusually high it was. Savvy computer users might also check running processes monitored by the task manager on their computer. But it’s a good bet that most computer users have no idea about task manager or where to find it on their computer. Some users don’t run any security software at all, or if they do, they misuse it. Running Coinhive software without the knowledge or permission of website visitors is sneaky at best, and more likely just plain unethical, and any arguments from Coinhive or anyone else that it is a fair replacement for ads is mere sophistry.

After some amount of pushing from internet users, Coinhive started offering an above board, opt-in type of cryptomining code so that website visitors knew what was being asked of them. Naturally that version has not proved popular with the website owners who partner with Coinhive because advising visitors of cryptomining activity only leads to the great majority of them declining to participate. People who are not computer savvy, when confronted with an option which will in all likelihood confuse and frighten them, will resort to the safest option and just say no. More computer savvy visitors will likely decide it’s not worth their while to have their computer slowed down to a crawl and their electricity bill hiked by a few dollars a month just to visit a website. Only the most indispensable websites could get away with it, and they are apt to have access to many other less complicated sources of revenue. Coinhive, meanwhile, continues offering the original, surreptitious version of its software.

Naturalist David Attenborough discusses brood parasitism among birds in this BBC wildlife segment.

The arms race between website owners and advertisers on one side, and website visitors on the other side, began when internet service was incredibly slow and most consumers had data caps. Ads, particularly Flash ads that jumped up and down to attract the visitor’s attention, slowed down internet service even more and sucked up the visitor’s limited data. Enter ad blockers. The thing about ad blockers, however, is that even though most of them offer users the ability to whitelist websites, most users are either unaware of that option or don’t bother to use it unless prompted by the website. Ad blockers often act effectively as blunt instruments then, punishing honest websites which display discreet, reputable ads in an above board manner, along with dishonest or careless websites which display gaudy ads that may or may not harbor malicious code. Like many other areas of life, on the internet a few bad actors can spoil the honest efforts of the majority of website owners. The answer to declining revenue from the arms race between advertisers and advertising blockers is not for website owners to get sneaky, however, which erodes trust, but to develop trust with their visitors and exercise restraint on their advertisers.
โ€” Techly

 

Open Sesame

 

The latest crisis in computer security comes from news of the Meltdown and Spectre Central Processing Unit (CPU) exploits. Nearly all desktop and laptop computers are affected, and most tablets, smartphones, and other small devices are also affected.* The difference is on account of the types of CPUs used for the various computers and devices. Since home users usually access password protected accounts like email and online banking from smaller devices as well as larger computers, they could see their privacy and online security compromised across platforms. In other words, hackers can exploit a hardware flaw in the CPUs of home computers, and then hackers could use that vulnerability to access private email and banking passwords in software that crosses platforms.

 

ืขืœื™ ื‘ืื‘ื ืžืชื—ื‘ื ืขืœ ื”ืขืฅ
In the story “Ali Baba and the Forty Thieves”, Ali Baba overhears one of the thieves say “Open Sesame” to open the entrance of the cave where they store their loot. Illustration by Rena Xiaxiu.

CPU makers like Intelโ€  are racing to fix the problem, which was first discovered by Google security researchers last June, and internet browser makers, where many users store passwords, are hurrying to tighten security on their end. In the meantime, people need to be vigilant about email and banking security themselves, starting with changing their passwords if they suspect unusual activity in their accounts and running a full suite of anti-virus, anti-spyware, and anti-malware programs on their computers. Those are routine security measures that people ought to be taking already, but unfortunately some folks don’t even do that much. When their computers are compromised by hackers, those home users are often as not completely unaware they are being used as part of a rogue network, called a botnet, to spread spam and other nasties throughout the internet. When everything is linked as with the internet, the weakest links are the easiest targets of hackers.

Even after tightening up individual computer security by using strong passwords and storing them securely, by not clicking on links in untrusted emails, by surfing the web safely using the anti-phishing feature built into most browsers, by regularly updating a security suite and running scans with it, even after all that a careful home user can still have difficulties, whether it’s because of something completely out of their control in the so-called cloud, such as when credit reporting agencies got hacked, or simply because their Internet Service Provider (ISP) momentarily gives them the Internet Protocol (IP) address of a blacklisted spammer, causing their email provider to block their account.

Since the majority of IP addresses are dynamic rather than static, meaning that each time a computer user connects to the internet the device that user is on, or possibly a larger network it is part of, is assigned a different IP address rather than keeping the same IP address from session to session. Because dynamic IP addresses are recycled, it’s a wonder that the unfortunate coincidence of being assigned a blacklisted address does not happen more often than it does. It’s impractical to remove a bad address from the rotation entirely because spammers can jump from address to address so quickly that soon all of them would be blacklisted, or the addresses would have to be prohibitively long.

Alfred Hitchcock’s 1956 film The Wrong Man explores the nightmare of mistaken identity.

The other way to get blacklisted as a spammer is to get hacked as described earlier, either through negligence or bad luck, and end up an unknowing part of a botnet distributing spam to friends and strangers alike. The use of biometrics like fingerprint and iris scans are no better a solution to account security than passwords since hackers have been at work on spoofing mechanisms for biometrics. Police can also compel people to grant access to their computers and other devices when they are locked by biometric measures, whereas they cannot compel people to divulge their passwords. There is no single, simple solution to keeping private data entirely secure on any computer or device as long as it is connected to the internet. It’s like the locks on doors and windows, which ultimately will keep out only honest people. Dishonest people will find a way in if they are determined enough, but it’s better for everyone else if it’s not too easy for them, and if they get caught sooner rather than later.
โ€• Techly

*Post updated to enlarge number of devices affected.

โ€ In November, long after he had learned of the vulnerability in his company’s products, but of course before the flaw had become general knowledge last week, Intel CEO Brian Krzanich sold almost all of his stock in the company for $39 million.

 

Joy in a Toy

 

With Christmas past by several days now, many children will be enraptured by a new toy or toys if they were lucky enough to receive them. The trend now is for giving more technologically sophisticated toys even to small children, but a simple toy such as a rubber duck can give a small child many hours of joy through encouraging the use of imagination, while some complicated toys do everything for the child, who quickly becomes bored through passivity.

 

For such a simple toy, the rubber duck has become enormously popular since its introduction in the form we recognize today in the mid-twentieth century. Some rubber ducks squeak when squeezed and others don’t, but all are hollow with a weight in the bottom, so that they always float upright. Of all toys in America, perhaps only the teddy bear is more popular than the rubber duck. A teddy bear does even less on its own than a rubber duck, however, since some won’t float, and it certainly doesn’t know which end is up when it does float.

Tall Ships Festival (14847730919)
The world’s largest floating rubber duck, designed by the Dutch artist Florentijn Hofman, is towed in Los Angeles harbor in August 2014 as part of the Tall Ships Festival. Photo by Eric Garcetti.

The technology employed in making rubber ducks is some of the simplest in manufacturing, involving rotational molds, heat, and some hand painting. The toys are not made of rubber anymore, since that has gotten too expensive. Manufacturers instead use a non-toxic vinyl which will be safe for toddlers, who inevitably will chew on the toy. The paints also are designed for child safety. Like many manufacturing plants in the past half century, the ones for making these simple toys had moved overseas, primarily to China, until one company returned part of its manufacturing to the United States. That company struggled at first to find a factory and skilled workers, evidence of how quickly disused facilities and worker skills melt away without investment.

For all the stories in the news about how Silicon Valley technological companies like Apple and Google are leading the way for the American economy, and how the less educated workers who don’t fill that mold will just have to make do with minimum wage jobs in the service economy, flipping burgers at McDonald’s or driving Ubers, there are millions of workers who are not cut out to be software engineers but who nonetheless could use better paying jobs to help their families not merely stay afloat, but get ahead in the world.

In this clip from an early episode of Sesame Street, Ernie the Muppet sings “Rubber Duckie”, the 1970 song that set off a resurgence in popularity for the toy.
These are people who may never invent the next big thing in computers or smartphones or driverless cars, but whose children possibly could if given a fair chance at a good education without sinking the family into poverty. In the last fifty years, while the rich in their opulent yachts have gotten ever richer, the working class has been cut adrift from the mainstream economy by the loss of good paying manufacturing jobs, and the middle class has been kept busy furiously kicking to keep from drowning. Not everything has to be complicated or technologically sophisticated to work well in the world. Sometimes all it takes to make people happy is a simple toy that knows enough to bob upright in the water and keep afloat with a plucky smile.
โ€• Techly

 

Your Bitcoin or Your Files

 

The WannaCry, or WannaCrypt, ransomware that attacked mostly networked computers running unpatched Windows operating systems last month did not affect many non-networked home computer users, but that doesn’t mean those users will avoid future attacks. The computers of home users are often just as vulnerable as those used by banks, hospitals, and other large institutions. They are less likely to be attacked only because they aren’t generally tied into a larger network and because loss of their data is not critical. Home users also have less money, or access to Bitcoin, than large institutions, making an attack on them not as worthwhile for hackers.

 

Computer Using Cat
Cat using computer; photo by EvanLovely.
Any computer running any operating system connected to the internet is vulnerable to ransomware, malware, viruses, and a host of other exploits. Macintosh and Linux operating systems are partially less vulnerable than Windows, but not invulnerable. The same goes for the Android and iOS mobile phone platforms. Frequently updating an operating system with patches downloaded from the operating system provider is key to maintaining security. An equally important best practice is to avoid human error in daily computing, such as being wary of web links or attachments in suspicious emails, and even being careful of clicking on ads from unknown providers on sketchy websites. The internet is a teeming public square where pickpockets mix with everyone else, and where some side streets and alleyways lead to unwholesome places, increasing the likelihood of something bad happening.

 

All this seems like common sense and fairly common knowledge, so why are large institutions with professional Information Technology (IT) staff on hand nonetheless vulnerable to cybercrime exploits that home computer users who are conscientious about updating their software and careful when visiting the internet can usually avoid? Are the IT departments incompetent? The answer is they apparently do their best most of the time, like anyone else with a job to do, but their efforts are many times hobbled by that second factor mentioned above – human error. And the larger the organization and the more computers tied into the network, the greater the chances for one small human error to multiply throughout the organization. IT specialists are also hobbled by the unwillingness of higher ups to let go of outdated operating systems like Windows XP. The WannaCry ransomware targeted unpatched, networked Windows XP computers.


From Woody Allen’s 1969 movie Take the Money and Run, a job interview presumably for an IT position, with a nod to the old TV quiz show, What’s My Line?

Here we have blame enough to go around for everyone: from the executives who, whether out of cheapness or reluctance to overhaul their company’s computer systems, failed to modernize; to the IT specialists who, whether from incompetence or overwork, failed to install vital patches to an outdated operating system; to the end users or user sitting at a computer who, whether out of ignorance or foolishness, clicked on a malicious link or fell for a phishing scam, and then passed it on to co-workers. What made the WannaCry ransomware especially vicious was its ability to exploit the very minimum of human error in order to replicate throughout a network. Computer experts are still not certain of the attack vector WannaCry used to gain initial access. The patch Microsoft issued months earlier should nevertheless have protected Windows XP computers, human error or no.

 

1940 Oldsmobile Station Wagon
1940 Oldsmobile Station Wagon advertisement. You rarely see Woodies like this on the road these days!
Windows XP was Microsoft’s most popular operating system ever, and it’s understandable many users are reluctant to let it go. There are a lot of reasons Microsoft has tried to move on from Windows XP, as popular as it remains, and at this stage those reasons, good or bad, believable or not, are beside the point. The fact is Microsoft is moving on. For computer users to cling to Windows XP at this point is like automobile fanciers who own vintage cars: Yes, having a fine old car can be engaging, but don’t expect there will be many qualified mechanics available to work on it, or driving it on interstate highways will be a safe and effective means of travel in the 21st century. Windows 10, the up to date model of Microsoft’s operating system, has plenty of faults, among them being a data hog that is far too chatty with its home base so that it can mine the user’s personal data for sale, a lesson Microsoft learned well from Google, but at least it’s safely built for travel on today’s internet, the information superhighway, as Al Gore called it. Drive safely.
โ€• Techly

 

1 2