Enough Is Never Enough

 

Amazon.com, the internet’s everything store, recently announced it will be opening two secondary headquarters, one in the New York City borough of Queens, and the other in the Arlington, Virginia, area near Washington, D.C.. City and state officials in both locations offered Amazon enormous benefits at taxpayers’ expense, though the exact amounts are unknown because officials claim they have a competitive advantage by keeping their bids secret.

 

Nonsense. It’s the taxpayers’ money and they have every right to know how officials spend it. The whole nationwide competition for Amazon’s secondary headquarters was a yearlong sham and circus, the kind of municipal debasement and looting that has become far too common as states and cities are pitted against each other for the dubious prize bestowed on them by corporate behemoths relocating or opening new places of business.

Caricature of "Organized Big Business Interests"
Caricature of “Organized Big Business Interests” illustrated by John Miller Baer (1886-1970) for part of the November 17, 1919 cover of The Nonpartisan Leader. Nearly one hundred years later, a caricature of a big business interest is more likely to appear trim and fit, wearing jeans and a turtleneck or other informal clothing.

Amazon is to labor practices and corporate citizenship as an internet business as Walmart is to labor practices and corporate citizenship among brick and mortar stores, which is to say they are leaders in their respective fields in abusing their lowest tier workers and siphoning funds away from local communities. Both Jeff Bezos, head of Amazon, and the Walton family at the head of Walmart are obscenely rich. They got that way because of their cleverness at exploiting the properties mentioned above, not because of their own virtuousness and hard work as they would have everyone believe. There are millions upon millions of people who are every bit as virtuous and hard working as Mr. Bezos and the Walton family, probably more so, and they are not obscenely rich, or even well off.

 

La2-buynothing
Buy Nothing Day demonstration in San Francisco, California, in November 2000. Photo by Lars Aronsson.

Mr. Bezos and others like him are obscenely rich because they are, among their other qualities in starting and running a business, both good and bad, obscenely greedy. Shoppers visiting the Amazon website cannot be blamed for taking advantage of the low prices and good service. That would be a kind of “blaming the victim”. Besides, it is all too easy for shoppers to forget about or remain ignorant of Amazon’s bad labor practices and exploitative corporate citizenship since it does those things mostly out of sight and therefore out of mind, a benefit it has as an internet company that Walmart does not have as a brick and mortar outfit.

Shoppers might fairly ask themselves, however, that even if they are not entirely complicit in sustaining Mr. Bezos’s greed, perhaps their own much smaller proportion of greed is something worth examining. It is a form of greed that drives most purchases from Amazon. Amazon sells some necessities such as groceries, but then so do stores at neighborhood shopping centers throughout the country. Most of what Amazon sells are not necessities. They are convenient luxuries, great or small, delivered to the shopper’s door. With the enormous emphasis on shopping around Thanksgiving all but swallowing up the holiday and its meaning, people might want to step back from the shopping cart, both real and virtual, and reflect on how their own petty greed feeds the monstrous greed of Jeff Bezos and his fellow billionaires and millionaires, while around the world millions upon millions of decent people go hungry.
β€” Techly

 

Voting Should Be Easy

 

Over 75 percent of the American people have smartphones, and since voter participation in elections hovers around 50 percent of eligible citizens, the idea has come around to increase voting by making it possible for people to use their smartphones for that purpose. This year, West Virginia is trying out smartphone voting on a limited basis. The biggest concern with this practice is ballot security from smartphone to tabulating facility, usually a government office such as in a county courthouse. The medium used for that transmission would, of course, be the internet.

Smartphone Zombie Girls (15773553090)
Pedestrians in the Rahova neighborhood of Bucharest, Romania, on October 27, 2014, days before the first round of the Romanian presidential election on November 2. Photo by J Stimp.

 

Now the internet is many wonderful things, but numbered among them is not airtight security for the general user. Some users haven’t the faintest idea about or concern for the security of their system, whether it be on a desktop or laptop computer, a tablet or a smartphone. It’s clear that the integrity of internet voting by smartphone or any other device would need to be maintained by a third party, since the users themselves are unreliable.

The voting system would have to be capable of freezing out “man-in-the-middle” hacks, which have historically been the greatest vulnerability of internet communications and the most commonly exploited by hackers. Think of it as the postal system, in which Party A mails a letter to Party B by entrusting it to Party C, in this case the United States Postal Service, with the understanding that in between point A and point B no one will intercept and read it, save perhaps a Postal Inspector who can show probable cause.

 

The internet has never been even as secure as the postal system. More often it has been like the party lines that used to exist on some phone systems around the country. Until the security problems can be fixed, smartphone voting is unlikely to see widespread use. The safest system for voters is still paper ballots filed either by mail or in person at a polling place. Voting should be easier, not more difficult, as all the voter suppression laws passed by Republican controlled state legislatures have made it, with the idea that low turnout favors their candidates.

Voters wait in line to cast their ballots in the US presidential election in Philadelphia 14200A
Voters wait in line to cast their ballots in the U.S. presidential election in Philadelphia, Pennsylvania, on November 8, 2016. Note how some are looking down at their smartphones, a common sight in public places now. Photo by Voice of America News.

Relatively few people are motivated to spend a long time waiting to vote in a queue that may keep them outdoors in bad weather, though some do appear willing to endure similar conditions in order to purchase the latest iPhone. Smartphone voting is a great idea for increasing participation in elections, but sadly it is one that needs work before becoming wholly viable, if it ever does. Until then, voters can still bring along their smartphones to their polling places to keep themselves entertained while they wait.
β€” Techly

 

Don’t Hold Your Breath

 

Ten or more years ago there was some hope among rural internet users that a service called Broadband over Power Lines (BPL) would come along soon to save the day by bringing them high speed internet at affordable prices. Not any more. American Telephone and Telegraph (AT&T) has a program in trials in Georgia that is a last grasp at trying to make the technology feasible without all the stumbling blocks encountered by other companies in earlier efforts. If AT&T’s engineers are successful, BPL may at last be rolling out on a large scale in the next five years.

Because internet service is a two way street, downloading data from a provider to a user and uploading data from a user to a provider, getting reliable, high speed internet to people in the countryside has been more complicated than the similar situation of stringing electrical service to those people in the middle of the last century. Satellite internet service is an option in the countryside, but is limited by slow upload speeds since consumers for good reason are not allowed by government regulation to possess enormously powerful transmitters. Satellite service providers also throttle their customers’ usage at certain limits because there is limited bandwidth available on a satellite.


Power lines during Blue Hour BW
Linear perspective of 230 kV power lines during blue hour in the Castleton part of Virginia Beach, Virginia. Photo by PumpkinSky.

Point to point microwave service has been an option for people living in or near small towns. It has been a rarely used option, however, because state and local laws passed at the behest of large internet providers hinder the ability of local governments to coordinate with small internet providers in setting up microwave service, which is most often undertaken as a public/private partnership. Cable television and landline telephone companies, where they have strung lines for internet service the last country mile, usually charge high rates on account of their monopoly status, with indifferent customer service also reflecting their status as an only option.

The last option left for some country people has been mobile telephone internet service. There are numerous problems associated with reliance on cellular internet service, from the possibility of poor signal to the certainty of data caps and high costs. It’s certainly not the best choice for regularly streaming video or trying to run an internet dependent business. The next generation of wireless data technology, 5G, will be available within the next few years, but it’s questionable whether it will solve the problems mentioned above. When a customer does have a solid connection to 5G service, it will be lightning fast.

The possibility of BPL had always seemed like a Godsend for rural internet users because it would have made connecting to broadband service as easy as plugging a modem into an electrical outlet, and because power lines have high capacity there would have been no need for data caps. The prices would have been relatively low by industry standards because the infrastructure was largely already in place, and because utility companies were more highly regulated than cable and telephone companies. “Would have been” is unfortunately where BPL will have to float in limbo, never to be a real option unless AT&T or some other technology company can resurrect it and make it viable.
β€” Techly

 

It Ain’t Library Science

 

Archaeologists recently uncovered the remains of a public library in Cologne, Germany, which they surmise was built in the second century of the common era by the Romans or the workers of the Roman client state in control of the region. The architecture follows the model of other large Roman libraries of the period, such as the one in Ephesus, on the western coast of modern Turkey. The reason for thinking it was a public library rather than a private one is the great size of the structure and its location in the public forum of the ancient city, where all buildings were public.

Bookplate of Edward Penfield
Bookplate of American painter and illustrator Edward Penfield (1866-1925). Bookplates are labels people paste into the frontispiece of their books to declare ownership. They were more popular a century ago than now, and as seen here some readers contrived custom bookplates.

 

A public library of two thousand years ago was not the same as a public library now, offering books on loan to members of the general public. Because books were hand copied into scrolls or codices, they were limited in number and expensive to produce. No one could walk in to a public library of two thousand years ago and expect to walk out with one or more books under their arm, to be returned after several weeks. People read the books in the library and the books never left the premises.

The meaning of “public” was also limited at that time to those who were literate and therefore had a reason to be there accessing the books. These would have been scholars of one sort or another, whether in the employ of government, academia, or a wealthy individual, and they would have been almost certainly all male. Lending libraries did not come about until the Renaissance, after the invention of the printing press made available large numbers of copies of books at lower cost.

 

Even then, the number and type of people who could borrow books was limited. Universities and colleges had their own libraries, with their collections available not to the general public but to students and faculty of the institution. That model persists to this day. Private societies lent out books to their members, who also contributed books. They were lending libraries, but in no sense were they public. It was not until civic groups and prominent citizens in Boston, Massachusetts, created the Boston Public Library in 1848 that the institution of the lending library as we know it came into being. The Boston Public Library was the first institution in the country that was open to all and was funded largely by taxpayers, with some assistance by private endowments and gifts of books.

BostonPublicLibrary BoylstonSt 1850s
An 1855 engraving showing the future building of the Boston Public Library on Boylston Street. The library moved into the building in 1858 and stayed there until 1895, when it moved into the grand building on Copley Square where it has remained to this day.

The model caught on, obviously, since today there are over 16,000 public libraries around the country. In the past 30 years or more, two great changes have affected those public libraries, and they are no longer what they were during their heyday in the twentieth century. The first change came from the effects of cutbacks in social programs starting with the Reagan administration. Homeless numbers increased as politicians undercut the social safety net and as mental hospitals could no longer afford to house indigent patients, setting them loose on the streets. Shelters that took in homeless people overnight often turned them out during the day, and the homeless gravitated toward public libraries for safe daytime shelter with access to bathrooms.

Boston Public Library Reading Room
Boston Public Library Reading Room in October 2013. Photo by Brian Johnson.

 

The second change came about with the rise of computers and the internet. Public libraries have gamely kept up with the technological changes despite cutbacks in taxpayer funding, and for the most part they have successfully integrated patrons’ interest in checking out electronic books as well as traditional paper books. Where conflict has arisen it is in affording access to library computers to patrons, some of whom had little interest in setting foot in their local public library until it installed computers with free internet.

With the influx of people who are not readers as much as internet users and are likely as not indifferent to norms of behavior in the library, and homeless people who sometimes abuse library facilities and even other patrons, librarians now have their hands full with duties that have nothing to do with their traditional training in library science. Patrons who are readers and have used their local library’s services in person for decades no longer feel comfortable there, and now often prefer checking out electronic books from the library’s website rather than visiting the library in person. Pity the unfortunate librarians then, who cannot escape the loud cell phone users, the raucous children who have been dumped by their parents in the young readers’ room as if it were a free day care center, and the homeless people who, often through no fault of their own, have been thrown on the good graces of the librarians, but who complicate the work day for those overburdened librarians by the criminal or mentally unstable acting out of some of their number.
β€” Vita

 

The Night Light

 

There was a time, thirty and more years ago, when late night television struck a delicate balance between light entertainment and interesting conversations with political and media celebrities in a talk show that was perhaps taken for granted at the time and has not been repeated since, namely The Tonight Show Starring Johnny Carson. In the time since, there have been other late night shows which touched on some of the same notes, particularly the ones hosted by David Letterman, but none have reproduced the entire formula, if indeed they were even trying. Since 2016, reruns of The Tonight Show have been airing, and viewing them is a revelation in comparison to the shows currently airing.

 

Phil Donahue Johnny Carson 1970
Johnny Carson appeared in August 1970 as a guest on the syndicated daytime talk show The Phil Donahue Show. Phil Donahue, on the right, talked with a wide variety of guests, much like Carson did on his show, with the difference being that Donahue often went into greater depth in his interviews, many times having only one guest on for an entire hour long show. Photo by Rollyn Puterbaugh.

Late night television talk shows have never been a fountainhead of intellectual conversation, but compared to what passes for conversation on today’s shows, the talk shows of the 1950s, 60s, 70s, and even 80s could almost pass for Socratic dialogues. Perhaps with the atomization of media into YouTube and social media outlets, where people can select snippets of the shows they want to watch, having long form dialogues between host and guest is no longer salable. In that case, it’s hard to say whether the fault belongs with the audience or with the purveyors, or even whether either party sees assigning blame as necessary. Maybe they are all happy with the new situation.

Thanks to the same internet media outlets which have served the short, snappy comedy bits on the new late night talk shows well, many of the older shows which have a more limited audience, such as the earliest Tonight Show episodes hosted by Steve Allen, Jack Paar, or Johnny Carson, are available for those who know where to look. Meanwhile, for those less internet savvy, there are reruns of The Tonight Show Starring Johnny Carson available on select television outlets around the country.

An appearance by the Smothers Brothers on The Tonight Show Starring Johnny Carson in January 1991 exemplifies the kind of classy, understated comedy rarely seen since then on the late night talk shows or anywhere else on television.

It’s interesting that a talk show, of all formats, can hold up to scrutiny from thirty years on, because much of the political jokes and movie and television show plugs from the era of original airing have of course dated, and some may even be incomprehensible to many viewers now. What makes return viewing worthwhile is the charm and charisma of the host, Johnny Carson, in relating to his guests; the polish of the show’s production and its good natured sensibility; and the view into a world which expected a little more from its viewers in the form of attention span and intellectual capacity than what is expected today by most of the late night television media, never mind the distorted mirror held up to our society by the trashy daytime shows which we acknowledge with revulsion or delight, depending on our point of view.
β€” Vita

 

Just Say No

 

As if the lack of trust hadn’t sunk low enough between internet users, advertisers, and the websites which host advertisements, along comes cryptojacking, a method for either honestly or dishonestly using the computing power and electricity of internet users to mine cryptocurrency. Last week, users of YouTube in some countries noticed that their antivirus and antimalware programs were alerting them to code hidden in ads on YouTube which were enlisting their computers for cryptomining without their permission. Google, which administers YouTube, claims to have fixed the problem. Unfortunately, there are many small websites that don’t have Google’s Information Technology (IT) resources and may have been hacked and had cryptojacking code installed without their knowledge.

 

Cryptojacking sounds like it should be illegal, but oddly enough it is not. There can be repercussions such as blacklisting for hiding code in ads, and of course this sort of activity serves to push more people toward the use of ad blockers, which deplete the revenue of honest websites as well as dishonest ones. There are now outfits on the web, Coinhive being the most notable, which promote to website owners the idea of replacing ads altogether with a bit of JavaScript code on the website itself that will enlist the computers of visitors in mining Monero, a type of cryptocurrency that, unlike Bitcoin, doesn’t require high end equipment. Coinhive takes 30% of the resulting mining revenue, and the website owner gets 70%. Coinhive rather dubiously promotes this as a fair business model for the website owner in a time of declining revenue from ads, while not mentioning its relative fairness for the website visitor.

Cryptocurrency Mining Farm
A mining farm of Genesis Mining in Iceland. These are mainly Zeus scrypt miners. 2014 photo by Marco Krohn. No subterfuge involved in this cryptocurrency mining operation. Note that because the calculations required to create the currency generate a lot of heat, there are fans at the ends of all the units.

As originally set up by Coinhive, the JavaScript ran without the internet user’s knowledge or permission. If an internet user visited a website running Coinhive‘s JavaScript code, and the user’s security software did not alert the user or block the code from running, the only indication the user had of being legally cryptojacked was how unusually busy their computer was and, when the electric bill arrived, how unusually high it was. Savvy computer users might also check running processes monitored by the task manager on their computer. But it’s a good bet that most computer users have no idea about task manager or where to find it on their computer. Some users don’t run any security software at all, or if they do, they misuse it. Running Coinhive software without the knowledge or permission of website visitors is sneaky at best, and more likely just plain unethical, and any arguments from Coinhive or anyone else that it is a fair replacement for ads is mere sophistry.

After some amount of pushing from internet users, Coinhive started offering an above board, opt-in type of cryptomining code so that website visitors knew what was being asked of them. Naturally that version has not proved popular with the website owners who partner with Coinhive because advising visitors of cryptomining activity only leads to the great majority of them declining to participate. People who are not computer savvy, when confronted with an option which will in all likelihood confuse and frighten them, will resort to the safest option and just say no. More computer savvy visitors will likely decide it’s not worth their while to have their computer slowed down to a crawl and their electricity bill hiked by a few dollars a month just to visit a website. Only the most indispensable websites could get away with it, and they are apt to have access to many other less complicated sources of revenue. Coinhive, meanwhile, continues offering the original, surreptitious version of its software.

Naturalist David Attenborough discusses brood parasitism among birds in this BBC wildlife segment.

The arms race between website owners and advertisers on one side, and website visitors on the other side, began when internet service was incredibly slow and most consumers had data caps. Ads, particularly Flash ads that jumped up and down to attract the visitor’s attention, slowed down internet service even more and sucked up the visitor’s limited data. Enter ad blockers. The thing about ad blockers, however, is that even though most of them offer users the ability to whitelist websites, most users are either unaware of that option or don’t bother to use it unless prompted by the website. Ad blockers often act effectively as blunt instruments then, punishing honest websites which display discreet, reputable ads in an above board manner, along with dishonest or careless websites which display gaudy ads that may or may not harbor malicious code. Like many other areas of life, on the internet a few bad actors can spoil the honest efforts of the majority of website owners. The answer to declining revenue from the arms race between advertisers and advertising blockers is not for website owners to get sneaky, however, which erodes trust, but to develop trust with their visitors and exercise restraint on their advertisers.
β€” Techly

 

Open Sesame

 

The latest crisis in computer security comes from news of the Meltdown and Spectre Central Processing Unit (CPU) exploits. Nearly all desktop and laptop computers are affected, and most tablets, smartphones, and other small devices are also affected.* The difference is on account of the types of CPUs used for the various computers and devices. Since home users usually access password protected accounts like email and online banking from smaller devices as well as larger computers, they could see their privacy and online security compromised across platforms. In other words, hackers can exploit a hardware flaw in the CPUs of home computers, and then hackers could use that vulnerability to access private email and banking passwords in software that crosses platforms.

 

Χ’ΧœΧ™ באבא מΧͺחבא גל Χ”Χ’Χ₯
In the story “Ali Baba and the Forty Thieves”, Ali Baba overhears one of the thieves say “Open Sesame” to open the entrance of the cave where they store their loot. Illustration by Rena Xiaxiu.

CPU makers like Intel† are racing to fix the problem, which was first discovered by Google security researchers last June, and internet browser makers, where many users store passwords, are hurrying to tighten security on their end. In the meantime, people need to be vigilant about email and banking security themselves, starting with changing their passwords if they suspect unusual activity in their accounts and running a full suite of anti-virus, anti-spyware, and anti-malware programs on their computers. Those are routine security measures that people ought to be taking already, but unfortunately some folks don’t even do that much. When their computers are compromised by hackers, those home users are often as not completely unaware they are being used as part of a rogue network, called a botnet, to spread spam and other nasties throughout the internet. When everything is linked as with the internet, the weakest links are the easiest targets of hackers.

Even after tightening up individual computer security by using strong passwords and storing them securely, by not clicking on links in untrusted emails, by surfing the web safely using the anti-phishing feature built into most browsers, by regularly updating a security suite and running scans with it, even after all that a careful home user can still have difficulties, whether it’s because of something completely out of their control in the so-called cloud, such as when credit reporting agencies got hacked, or simply because their Internet Service Provider (ISP) momentarily gives them the Internet Protocol (IP) address of a blacklisted spammer, causing their email provider to block their account.

Since the majority of IP addresses are dynamic rather than static, meaning that each time a computer user connects to the internet the device that user is on, or possibly a larger network it is part of, is assigned a different IP address rather than keeping the same IP address from session to session. Because dynamic IP addresses are recycled, it’s a wonder that the unfortunate coincidence of being assigned a blacklisted address does not happen more often than it does. It’s impractical to remove a bad address from the rotation entirely because spammers can jump from address to address so quickly that soon all of them would be blacklisted, or the addresses would have to be prohibitively long.

Alfred Hitchcock’s 1956 film The Wrong Man explores the nightmare of mistaken identity.

The other way to get blacklisted as a spammer is to get hacked as described earlier, either through negligence or bad luck, and end up an unknowing part of a botnet distributing spam to friends and strangers alike. The use of biometrics like fingerprint and iris scans are no better a solution to account security than passwords since hackers have been at work on spoofing mechanisms for biometrics. Police can also compel people to grant access to their computers and other devices when they are locked by biometric measures, whereas they cannot compel people to divulge their passwords. There is no single, simple solution to keeping private data entirely secure on any computer or device as long as it is connected to the internet. It’s like the locks on doors and windows, which ultimately will keep out only honest people. Dishonest people will find a way in if they are determined enough, but it’s better for everyone else if it’s not too easy for them, and if they get caught sooner rather than later.
― Techly

*Post updated to enlarge number of devices affected.

†In November, long after he had learned of the vulnerability in his company’s products, but of course before the flaw had become general knowledge last week, Intel CEO Brian Krzanich sold almost all of his stock in the company for $39 million.

 

We’re Going to Need More Dimes

 

When it comes to net neutrality analogies, many people opt for the internet superhighway one where there may be fast lanes and slow lanes or, on a content neutral internet, all lanes are equal. Since it’s hard to bring in the gatekeepers who set the rules for the internet on that kind of analogy, it might be easier to think of net neutrality or non-neutrality as related to a toll plaza, where the gatekeepers, such as AT&T, Verizon, or Comcast, charge different amounts and cause varying delays to the vehicles attempting to pass through their gates.

 

On a net neutral superhighway, the gatekeepers at the toll plaza charge roughly the same amount to every vehicle and pass them all through with equal alacrity. On an internet superhighway that is not neutral and grants wide discretion to the gatekeepers at the toll plaza, toll charges vary a great deal from vehicle to vehicle, and the gatekeepers might also hold up certain vehicles, making them late to their destination.

Storebaelt toll area
The Great Belt Fixed Link toll plaza in Denmark. Different colored lights indicate different payment methods. Photo by heb.

FCC Chairman Ajit Pai, after going through the motions of a public comment period through the summer on his proposed, Orwellian-named “Restoring Internet Freedom” gutting of the 2015 net neutrality rules, announced today that the FCC board of three Republicans and two Democrats will vote on rules changes on December 14. The fix is in, as it has been since early this year when Mr. Pai expressed his intention to overturn the 2015 rules, and there is little doubt how the majority will vote on December 14. It is still possible between now and then to bring enough public pressure to bear on Congress for that body to influence either the FCC board vote, which is not likely, or put in motion legislation to override FCC rules on rescinding net neutrality, which is the more likely outcome, if there is to be a positive one at all for neutrality advocates.

Regulation of internet access is too vital to leave up to the unelected five member board of a regulatory commission. The current FCC board has also recently demonstrated its irresponsibility to the country at large when it did away with rules preventing monopolization of local media markets by a single company, recklessly opening the gates to allow Sinclair Broadcasting to consolidate its control across the country.

In the 1974 film Blazing Saddles, directed by Mel Brooks, the citizens of Rock Ridge set up a toll booth to slow down the bad guys coming to destroy their town. Warning: foul language.

Congress could put an end to FCC favoritism toward big business by passing legislation, instead of allowing the FCC board to vote on rules after the formality of a meaningless public comment period, since the board Republicans will almost certainly vote against net neutrality despite the majority of public comments in favor of it. Congress is also beholden to big business, but at least it retains some ability to bend to the public will. As it stands now, after the December 14 vote the new rules will likely get challenged in court, and the legal struggle will eat up years, and all the while the internet gatekeepers will make fortunes extorting internet users who need to pass their toll booths.
― Techly

 

Your Bitcoin or Your Files

 

The WannaCry, or WannaCrypt, ransomware that attacked mostly networked computers running unpatched Windows operating systems last month did not affect many non-networked home computer users, but that doesn’t mean those users will avoid future attacks. The computers of home users are often just as vulnerable as those used by banks, hospitals, and other large institutions. They are less likely to be attacked only because they aren’t generally tied into a larger network and because loss of their data is not critical. Home users also have less money, or access to Bitcoin, than large institutions, making an attack on them not as worthwhile for hackers.

 

Computer Using Cat
Cat using computer; photo by EvanLovely.
Any computer running any operating system connected to the internet is vulnerable to ransomware, malware, viruses, and a host of other exploits. Macintosh and Linux operating systems are partially less vulnerable than Windows, but not invulnerable. The same goes for the Android and iOS mobile phone platforms. Frequently updating an operating system with patches downloaded from the operating system provider is key to maintaining security. An equally important best practice is to avoid human error in daily computing, such as being wary of web links or attachments in suspicious emails, and even being careful of clicking on ads from unknown providers on sketchy websites. The internet is a teeming public square where pickpockets mix with everyone else, and where some side streets and alleyways lead to unwholesome places, increasing the likelihood of something bad happening.

 

All this seems like common sense and fairly common knowledge, so why are large institutions with professional Information Technology (IT) staff on hand nonetheless vulnerable to cybercrime exploits that home computer users who are conscientious about updating their software and careful when visiting the internet can usually avoid? Are the IT departments incompetent? The answer is they apparently do their best most of the time, like anyone else with a job to do, but their efforts are many times hobbled by that second factor mentioned above – human error. And the larger the organization and the more computers tied into the network, the greater the chances for one small human error to multiply throughout the organization. IT specialists are also hobbled by the unwillingness of higher ups to let go of outdated operating systems like Windows XP. The WannaCry ransomware targeted unpatched, networked Windows XP computers.


From Woody Allen’s 1969 movie Take the Money and Run, a job interview presumably for an IT position, with a nod to the old TV quiz show, What’s My Line?

Here we have blame enough to go around for everyone: from the executives who, whether out of cheapness or reluctance to overhaul their company’s computer systems, failed to modernize; to the IT specialists who, whether from incompetence or overwork, failed to install vital patches to an outdated operating system; to the end users or user sitting at a computer who, whether out of ignorance or foolishness, clicked on a malicious link or fell for a phishing scam, and then passed it on to co-workers. What made the WannaCry ransomware especially vicious was its ability to exploit the very minimum of human error in order to replicate throughout a network. Computer experts are still not certain of the attack vector WannaCry used to gain initial access. The patch Microsoft issued months earlier should nevertheless have protected Windows XP computers, human error or no.

 

1940 Oldsmobile Station Wagon
1940 Oldsmobile Station Wagon advertisement. You rarely see Woodies like this on the road these days!
Windows XP was Microsoft’s most popular operating system ever, and it’s understandable many users are reluctant to let it go. There are a lot of reasons Microsoft has tried to move on from Windows XP, as popular as it remains, and at this stage those reasons, good or bad, believable or not, are beside the point. The fact is Microsoft is moving on. For computer users to cling to Windows XP at this point is like automobile fanciers who own vintage cars: Yes, having a fine old car can be engaging, but don’t expect there will be many qualified mechanics available to work on it, or driving it on interstate highways will be a safe and effective means of travel in the 21st century. Windows 10, the up to date model of Microsoft’s operating system, has plenty of faults, among them being a data hog that is far too chatty with its home base so that it can mine the user’s personal data for sale, a lesson Microsoft learned well from Google, but at least it’s safely built for travel on today’s internet, the information superhighway, as Al Gore called it. Drive safely.
― Techly

 

How About That Free Lunch Now

 

The great thing about the internet is that it is interactive; interactivity is also one of the bad things about the internet. When people read paper newspapers, way back when, they were exposed to advertisements paid for by commercial establishments in the news and features sections, and to classified advertisements paid for mostly by individuals or small businesses in a section of their own. Paper newspaper advertisements were interactive only in the sense that the reader could choose to ignore them. This was reasonably easy for the reader because the ads themselves did not hop up and down, yell and scream for attention, obfuscate the actual content of the newspaper for a period, or otherwise make a nuisance of themselves and detract from the peaceful enjoyment of the newspaper by the person who had paid a dime or a quarter for it.

When newspapers and writers of other content moved to the internet, they still needed to make a living, of course, and naturally they turned to advertisers to help fund their efforts. Since there was no pay model for the internet, such as had been the case in the days of paper newspapers when readers either subscribed for home delivery or paid directly at street corner kiosks, publishers relied even more heavily on advertisers for income. For some reason, people had gotten the notion that internet content should be free, and rightly or wrongly that’s the way things developed. Here is where the interactive part kicked in and started an internet arms race.

Bob Dylan performs his song “Mr. Tambourine Man” at the 1964 Newport Folk Festival. Dylan’s guitar and harmonica rig is much like the getup buskers used then and today to make a few dollars for their efforts. All that’s missing here is the hat or guitar case for collecting money tossed in by passers by. Many small websites, like this one, have to either pass the hat by posting a “Donate” button, or hope for the best from advertising revenue, or both.

Advertisers realized that since the internet was interactive and didn’t just lie there waiting to wrap fish after it was published like the old paper newspapers did, they could do things to jazz up their ads and, they thought, readers would pay closer attention and the advertisers would see higher returns. Great! Not all advertisers, just the ones who lacked any restraint, got their ads to hop up and down, to yell and scream for attention, to obfuscate for a period the content the reader was actually there to see, and to otherwise make a nuisance of themselves in order to draw attention. It turns out people did not like that, particularly the ones with slow internet connections or limited bandwidth, which the sparkly new advertisements ate into, much to the hapless reader’s dismay. Enter software engineers with a retaliatory response.

The software engineers had some experience in combating opponents in the advertising field after having worked to swat away the pop up army of advertisements that plagued internet users in the early days. One thing many advertisers have never been known for is restraint. Now here they were again, but instead of pop ups they were employing twitchy, sparkly, pushy advertisements. The software engineers working on behalf of browser makers and internet users came up with ad blockers. Now all ads were blocked. Hah hah! Internet users had the option of whitelisting – or permitting – ads on a website in the options menu of their ad blocker, but who would ever bother to do that? Publishers noticed, however, that their internet ad revenue plummeted.

An emotionally fraught rendition of “Silver Springs” in a 1997 concert by Fleetwood Mac, which demonstrates why they continued to draw large crowds well after their heyday. The song, written and sung by Stevie Nicks, who as a songwriter ranks in the top echelon of 1970s and 1980s pop and soft rock, is a deeply personal revelation. Fleetwood Mac had by 1997 long passed their peak of popularity for album sales, but concert ticket prices for such an established group with an extensive catalog of hits remained high, from $20 to $50 for the cheap seats, to over $100 for the best seats. The internet works similarly, with an enormous underclass of websites barely making it, and several well established websites with large followings dominating the market.

Enter Google in the spring of 2017 with the Funding Choices program and their own ad blocker built into their Chrome browser, which in the past year has overtaken Microsoft’s Internet Explorer as the world’s most popular browser. But since Google makes the lion’s share of its revenue selling ads and marketing user information, why would Google then be against ads? Because the obnoxious ads that prompted the development of ad blockers have poisoned the well for everybody, and Google, with its dominant market position, can dictate which ads will fly and which ones won’t.

The Funding Choices program is geared toward internet users, telling them they can pay to subscribe to a publisher’s content and go ad free, or view the content free on condition they allow ads, which Google assures them they have vetted for good behavior. Google’s ad blocker built into its Chrome browser is geared toward advertisers, telling them essentially that unless they allow Google to vet their ads for good behavior, they will not see the light of day on the world’s most popular browser. All of this would seem a boon to both internet users and publishers. But that depends on how much they trust “Don’t Be Evil” Google. Rather than turn over yet more power to Google, a company which has already surpassed Microsoft in ways not only financial but morally suspect, perhaps the time has come for internet users to seek alternatives not only for search but for the multitude of other applications which Google has used to ingratiate itself as the public’s servant, the servant whose ear is always at the door. This website, for one, will seek alternatives to displaying Google ads. Oh, you weren’t even aware there were Google ads on this website?
― Techly

 

1 2 3