"blockchain" entries

Four short links: 21 April 2016

Four short links: 21 April 2016

BitCoin with Identity, Hardware is Hard, Data Test Suites, and Internet Voting

  1. Bribing Miners to Regulate Bitcoin — interesting! A somewhat conspiracy-theoretical take on an MIT proposal to layer identity onto Bitcoin. Features repurposed DRM tech, no less.
  2. Tesla Model X Quality Issues (Consumer Reports) — hardware is hard.
  3. Data Proofer — open source software that’s test cases for your data, to help ensure you’re not pushing corrupt data into production.
  4. Internet Voting? Really? (YouTube) — TEDx talk by Andrew Appel comparing physical with online voting. Very easy to follow for the non-technical.

(more…)

Four short links: 15 April 2016

Four short links: 15 April 2016

Building Economic Models, Living in a Computer Simulation, Distributed Ledgers, and 3D-Imaged DNA

  1. How to Build an Economic Model in Your Spare Time (PDF) — Hal Varian’s article is to economics research what The Manual by the KLF is to pop music.
  2. Are We Living in a Computer Simulation? (Scientific American) — an overview of the kind of scientific argument one normally has in the pub rather than Scientific American.
  3. Intel Ledger — open source experimental distributed ledger from Intel, described here.
  4. Berkeley Lab captures first high-res 3D images of DNA segments (Kurzweil) — “This is the first time for directly visualizing an individual double-strand DNA segment in 3D.”
Four short links: 22 March 2016

Four short links: 22 March 2016

HCI Pioneers, Security Architecture, Trial by Cyborg, and Distributed Ledgers

  1. HCI Pioneers — Ben Schneiderman’s photo collection, acknowledging pioneers in the field. (via CCC Blog)
  2. A Burglar’s Guide to the City (BLDGBLOG) — For the past several years, I’ve been writing a book about the relationship between burglary and architecture. Burglary, as it happens, requires architecture: it is a spatial crime. Without buildings, burglary, in its current legal form, could not exist. Committing it requires an inside and an outside; it’s impossible without boundaries, thresholds, windows, and walls. In fact, one needn’t steal anything at all to be a burglar. In a sense, as a crime, it is part of the built environment; the design of any structure always implies a way to break into it. Connection to computer security left as exercise to the reader.
  3. Trial by Machine (Roth) — The current landscape of mechanized proof, liability, and punishment suffers from predictable but underscrutinized automation pathologies: hidden subjectivities and errors in “black box” processes; distorted decision-making through oversimplified — and often dramatically inaccurate — proxies for blameworthiness; the compromise of values protected by human safety valves, such as dignity, equity, and mercy; and even too little mechanization where machines might be a powerful debiasing tool but where little political incentive exists for its development or deployment. […] The article ultimately proposes a systems approach – “trial by cyborg” – that safeguards against automation pathologies while interrogating conspicuous absences in mechanization through “equitable surveillance” and other means. (via Marginal Revolution)
  4. Distributed Ledger Technology: Blackett Review (gov.uk) — Distributed ledgers can provide new ways of assuring ownership and provenance for goods and intellectual property. For example, Everledger provides a distributed ledger that assures the identity of diamonds, from being mined and cut to being sold and insured. In a market with a relatively high level of paper forgery, it makes attribution more efficient, and has the potential to reduce fraud and prevent “blood diamonds” from entering the market. Report includes recommendations for policy makers. (via Dan Hill)
Four short links: 14 March 2016

Four short links: 14 March 2016

Measure What Matters, Broken Laws, Password Recovery Questions, and 3D Object Tracking

  1. What Thomas Hardy Taught MeIn educational research, perhaps the greatest danger lies in thinking “that which I cannot measure is not real.” The disruption fetishists have amplified this danger, now evincing the attitude “teaching that cannot be said to lead to the immediate acquisition of rote, mechanical skills has no value.” But absolutely every aspect of my educational journey — as a student, as a teacher, and as a researcher — demonstrates the folly of this approach to learning. (via Dan Meyer)
  2. Why Anti-Money Laundering Laws and Poorly Designed Copyright Laws Are Similar and Should be Revised (Joi Ito) — Just like with the Internet, weaknesses in networks like the blockchain propagate to countries and regions where privacy risks to users could cause significant risks to human rights workers, journalists, or anyone who questions authority. The conversation on creating new AML and KYC laws for new financial systems like bitcoin and blockchain needs to be a global one.
  3. Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google — Adrian Colyer summarizes a paper from Google. Using a crowdsourcing service, the authors asked 1,000 users to answer the ‘Favourite Food’ and ‘Father’s middle name’ questions. This took less than a day and cost $100. […] Using a single guess, it turns out, you have a 19.7% chance of guessing an English-speaking users’ answer to the favourite food.
  4. Clever MEMS 3D Object Tracking — early Oculus engineer has invented a nifty way to track a tagged object in 3D space. Worth reading for the description of how it works.
Four short links: 7 January 2016

Four short links: 7 January 2016

Holocaust Testimony Preservation, SLOTH, Body Modding, and Blockchain Monoculture

  1. Interact: A Mixed Reality Virtual Survivor for Holocaust Testimonies — description of how Nottingham researchers are building a virtual experience to recreate conversation with Holocaust survivors. This has great possibility for preservation of testimony.
  2. SLOTHweak hash functions continue to be used in various cryptographic constructions within mainstream protocols such as TLS, IKE, and SSH, because practitioners argue that their use in these protocols relies only on second preimage resistance, and hence is unaffected by collisions. We systematically investigate and debunk this argument.
  3. DFW Home of Body ModdingDallas is at the center of two movements that are each trying to bring implants to the mainstream. Tattoo artists and technophiles head one, and well-heeled university neurologists and medical device engineers form the vanguard of the other.
  4. On the Dangers of a Blockchain MonocultureWould you use a database with these features? Uses approximately the same amount of electricity as could power an average American household for a day per transaction; Supports 3 transactions / second across a global network with millions of CPUs/purpose-built ASICs; Takes over 10 minutes to “commit” a transaction; […]
Four short links: 30 December 2015

Four short links: 30 December 2015

Bitcoin Patents, Wall-Climbing Robot, English 2 Code, and Decoding USB

  1. Bank of America Loading up on Bitcoin PatentsThe wide-ranging patents cover everything from a “cryptocurrency transaction payment system” which would let users make transactions using cryptocurrency, to risk detection, storing cryptocurrencies offline, and using the blockchain to measure fraudulent activity.
  2. Vertigo: A Wall-Climbing Robot (Disney Research) — watch the video. YOW! (via David Pescovitz)
  3. Synthesizing What I MeanIn this paper, we describe SWIM, a tool which suggests code snippets given API-related natural language queries.
  4. serialusb — this is how you decode USB protocols.
Four short links: 22 December 2015

Four short links: 22 December 2015

Machine Poetry, Robo Script Kiddies, Big Data of Love, and Virtual Currency and the Nation State

  1. How Machines Write PoetryHarmon would love to have writers or other experts judge FIGURE8’s work, too. Her online subjects tended to rate the similes better if they were obvious. “The snow continued like a heavy rain” got high scores, for example, even though Harmon thought this was quite a bad effort on FIGURE8’s part. She preferred “the snow falls like a dead cat,” which got only middling ratings from humans. “They might have been cat lovers,” she says. FIGURE8 (PDF) system generates figurative language.
  2. The Decisions the Pentagon Wants to Leave to Robots“You cannot have a human operator operating at human speed fighting back at determined cyber tech,” Work said. “You are going to need have a learning machine that does that.” I for one welcome our new robot script kiddie overlords.
  3. Love in the Age of Big DataOver decades, John has observed more than 3,000 couples longitudinally, discovering patterns of argument and subtle behaviors that can predict whether a couple would be happily partnered years later or unhappy or divorced. Turns out, “don’t be a jerk” is good advice for marriages, too. (via Cory Doctorow)
  4. National Security Implications of Virtual Currency (PDF) — Rand research report examining the potential for non-state actor deployment.
Four short links: 7 December 2015

Four short links: 7 December 2015

Telepresent Axeman, Toxic Workers, Analysis Code, and Cryptocurrency Attacks

  1. Axe-Wielding Robot w/Telepresence (YouTube) — graphic robot-on-wall action at 2m30s. (via IEEE)
  2. Toxic Workers (PDF) — In comparing the two costs, even if a firm could replace an average worker with one who performs in the top 1%, it would still be better off by replacing a toxic worker with an average worker by more than two-to-one. Harvard Business School research. (via Fortune)
  3. Replacing Sawzall (Google) — At Google, most Sawzall analysis has been replaced by Go […] we’ve developed a set of Go libraries that we call Lingo (for Logs in Go). Lingo includes a table aggregation library that brings the powerful features of Sawzall aggregation tables to Go, using reflection to support user-defined types for table keys and values. It also provides default behavior for setting up and running a MapReduce that reads data from the logs proxy. The result is that Lingo analysis code is often as concise and simple as (and sometimes simpler than) the Sawzall equivalent.
  4. Attacks in the World of Cryptocurrency — a review of some of the discussed weakness, attacks, or oddities in cryptocurrency (esp. bitcoin).
Four short links: 28 August 2015

Four short links: 28 August 2015

Ad Blockers, Self-Evaluation, Blockchain Podcast, and Mobile Fingerprints

  1. 10 Ad Blocking Extensions Tested for Best PerformanceThis test is about the performance of an ad blocker in terms of how quickly it loads a range of ad blocked pages, the maximum amount of memory it uses, and how much stress it puts on the CPU. µBlock Origin wins for Chrome. (via Nelson Minar)
  2. Staff Evaluation of Me (Karl Fisch) — I also tried the Google Form approach. 0 responses, from which I concluded that nobody had any problems with me and DEFINITELY no conclusions could be drawn about my coworkers creating mail filters to mark my messages as spam.
  3. Blockchain (BBC) — episode on the blockchain that does a good job of staying accurate while being comprehensible. (via Sam Kinsley)
  4. Fingerprints On Mobile Devices: Abusing and Leaking (PDF) — We will analyze the mobile fingerprint authentication and authorization frameworks, and discuss several security pitfalls of the current designs, including: Confused Authorization Attack; Unsecure fingerprint data storage; Trusted fingerprint sensors exposed to the untrusted world; Backdoor of pre-embedding fingerprints.
Four short links: 26 August 2015

Four short links: 26 August 2015

World SF, Digital Currency Scholarships, Project Management, and Glass 3D Printing

  1. The Apex Book of World SF 4 (Amazon) — if SF invents the future by shaping and directing our imagination, and if you believe that non-American cultures will ascend over time, then it behooves you to sample this collection of SF from beyond the usual. (via Cory Doctorow)
  2. Diversity Scholarships Available — to Digital Consensus 2015, a conference on digital currency. Apply or tell someone who is eligible.
  3. Making Huge Projects Work (Amy Hoy) — the description of her workflow for modest and monster projects was useful to me, and may be to you as well. I think the real question is “where do we get an Alex of our own?” [Note: swearing]
  4. Additive Manufacturing of Optically Transparent Glass (PDF) — yes, a 3D printer that emits glass. Check out the videos on IFL Science.