Oolite — open-source clone of Elite, the classic space trading game from the 80s.
Who Owns the Robots Rules The World (PDF) — interesting finding: As companies substitute machines and computers for human activity, workers need to own part of the capital stock that substitutes for them to benefit from these new “robot” technologies. Workers could own shares of the firm, hold stock options, or be paid in part from the profits. Without ownership stakes, workers will become serfs working on behalf of the robots’ overlords. Governments could tax the wealthy capital owners and redistribute income to workers, but that is not the direction societies are moving in. Workers need to own capital rather than rely on government income redistribution policies. (via Robotenomics)
Schrodinger’s Cat Video and the Death of Clear-Text (Morgan Marquis-Boire) — report, based on leaked information, about use of network injection appliances targeted unencrypted pages from major providers. Compromising a target becomes as simple as waiting for the user to view unencrypted content on the Internet.
Thinking About the Network as Filter (JP Rangaswami) — Constant re-openings of the same debate as people try and get a synchronous outcome out of an asynchronous tool without the agreements and conventions in place to do it. He says friends are your social filters. You no longer have to read every email. When you come back from vacation, whatever has passed in the stream unread can stay unread but most social tools are built as collectors, not as filters. Looking forward to the rest in his series.
Open Auto Alliance — The OAA is a global alliance of technology and auto industry leaders committed to bringing the Android platform to cars starting in 2014. “KidGamesPack 7 requires access to your history, SMS, location, network connectivity, speed, weight, in-car audio, and ABS control systems. Install or Cancel?”
Jacob Appelbaum’s CCC Talk — transcript of an excellent talk. One of the scariest parts about this is that for this system or these sets of systems to exist, we have been kept vulnerable. So it is the case that if the Chinese, if the Russians, if people here wish to build this system, there’s nothing that stops them. And in fact the NSA has in a literal sense retarded the process by which we would secure the internet because it establishes a hegemony of power, their power in secret to do these things.
Toyota Manufacturing Principles (Joseph Cohen) — Jidoka: Automation with a Human Touch. The idea of jidoka is that humans should work with machines to produce the best possible outcome, leveraging the execution ability of a machine and the judgement of a human. We at O’R Radar have been saying for years that there’s gold in the collaboration between people and machines, about augmenting people and not simply replacing them.
Twister — the fully decentralized P2P microblogging platform leveraging from the free software implementations of Bitcoin and BitTorrent protocols. Interesting to see BT and BC reused as platforms for app development, though if eventual consistency and threading Heisenbugs gave you headaches then just wait for the world of Bitcoin-meets-BitTorrent….
Transcript of Glenn Greenwald’s Speech to CCC — the relationship of privacy to security, and the transparency of governmental positions on that relationship, remain unaddressed. NSA’s actions are being used to establish local governmental control of the Internet, which will destroy the multistakeholder model that has kept net architecture and policy largely separate from the whims of elected officials. The fallout of Snowden’s revelations will shape 2014. Happy New Year.
Comments Off on Four short links: 31 December 2013
PirateBay Moves Domains — different ccTLDs have different policies and operate in different jurisdictions, because ICANN gives them broad discretion to operate the country code domains. However, post-Snowden, governments are turning on the US’s stewardship of critical Internet bodies, so look for governments (i.e., law enforcement) to be meddling a lot more in DNS, IP addresses, routing, and other things which thus far have been (to good effect) fairly neutrally managed.
The Promise and Peril of Real-Time Corrections to Political Misperceptions (PDF) — paper presenting results of an experiment comparing the effects of real-time corrections to corrections that are presented after a short distractor task. Although real-time corrections are modestly more effective than delayed corrections overall, closer inspection reveals that this is only true among individuals predisposed to reject the false claim. In contrast, individuals whose attitudes are supported by the inaccurate information distrust the source more when corrections are presented in real time, yielding beliefs comparable to those never exposed to a correction. We find no evidence of realtime corrections encouraging counterargument. Strategies for reducing these biases are discussed. So much for the Google Glass bullshit detector transforming politics. (via Vaughan Bell)
techu Search Server — Techu exposes a RESTful API for realtime indexing and searching with the Sphinx full-text search engine. We leverage Redis, Nginx and the Python Django framework to make searching easy to handle & flexible.
In Defence of Digital Freedom — a member of the European Parliament’s piece on the risks to our online freedoms caused by framing computer security into cyberwarfare. Digital freedoms and fundamental rights need to be enforced, and not eroded in the face of vulnerabilities, attacks, and repression. In order to do so, essential and difficult questions on the implementation of the rule of law, historically place-bound by jurisdiction rooted in the nation-state, in the context of a globally connected world, need to be addressed. This is a matter for the EU as a global player, and should involve all of society. (via BoingBoing)
Nautilus — elegantly-designed science web ‘zine. Includes Artificial Emotions on AI, neuro, and psych efforts to recognise and simulate emotions.
A Short Essay on 3D Printing — This hands-off approach to culpability cannot last long. If you design something to go into someone’s bathroom, it will make it’s way into their childs mouth. If someone buys, downloads and prints a case for their OUYA and they suffer an electric shock as a result, who is to blame? If a person replaces their phone case with a 3D printed one, and it doesn’t survive a drop to the floor, what then? We need to create a new chain of responsiblity for this emerging, and potentially very profitable business. (via Near Future Laboratory)
Zuckerberg’s FWD.us PAC (Anil Dash) — One of Mark Zuckerberg’s most famous mottos is “Move fast and break things.” When it comes to policy impacting the lives of millions of people around the world, there couldn’t be a worse slogan. Let’s see if we can get FWD.us to be as accountable to the technology industry as it purports to be, since they will undoubtedly claim to have the grassroots support of our community regardless of whether that’s true or not.
Pirate Economics — four dimensions of pirate institutions. Not BitTorrent pirates, but Berbers and arr-harr-avast-ye-swabbers nautical pirates. Pirate crews not only elected their captains on the basis of universal pirate suffrage, but they also regularly deposed them by democratic elections if they were not satisfied with their performance. Like the Berbers, or the US constitution, pirates didn’t just rely on democratic elections to keep their leaders under check. Though the captain of the ship was in charge of battle and strategy, pirate crews also used a separate democratic election to elect the ship’s quartermaster who was in charge of allocating booty, adjudicating disputes and administering discipline. Thus they had a nascent form of separation of powers.
What American Startups Can Learn From the Cutthroat Chinese Software Industry — It follows that the idea of “viral” or “organic” growth doesn’t exist in China. “User acquisition is all about media buys. Platform-to-platform in China is war, and it is fought viciously and bitterly. If you have a Gmail account and send an email to, for example, NetEase163.com, which is the local web dominant player, it will most likely go to spam or junk folders regardless of your settings. Just to get an email to go through to your inbox, the company sending the email needs to have a special partnership.” This entire article is a horror show.
White House Hangout Maker Movement (Whitehouse) — During the Hangout, Tom Kalil will discuss the elements of an “all hands on deck” effort to promote Making, with participants including: Dale Dougherty, Founder and Publisher of MAKE; Tara Tiger Brown, Los Angeles Makerspace; Super Awesome Sylvia, Super Awesome Maker Show; Saul Griffith, Co-Founder, Otherlab; Venkatesh Prasad, Ford.
The Modern Malware Review (PDF) — 90% of fully undetected malware was delivered via web-browsing; It took antivirus vendors 4 times as long to detect malware from web-based applications as opposed to email (20 days for web, 5 days for email); FTP was observed to be exceptionally high-risk.
FISA Amendment Hits Non-Citizens — FISAAA essentially makes it lawful for the US to conduct purely political surveillance on foreigners’ data accessible in US Cloud providers. […] [A] US judiciary subcommittee on FISAAA in 2008 stated that the Fourth Amendment has no relevance to non-US persons. Americans, think about how you’d feel keeping your email, CRM, accounts, and presentations on Russian or Chinese servers given the trust you have in those regimes. That’s how the rest of the world feels about American-provided services. Which jurisdiction isn’t constantly into invasive snooping, yet still has great bandwidth?
Tim Berners-Lee Opposes Government Snooping — “The whole thing seems to me fraught with massive dangers and I don’t think it’s a good idea,” he said in reply to a question about the Australian government’s data retention plan.
Google’s Approach to Government Requests for Information (Google Blog) — they’ve raised the dialogue about civil liberties by being so open about the requests for information they receive. Telcos and banks still regard these requests as a dirty secret that can’t be talked about, whereas Google gets headlines in NPR and CBS for it.
Open Internet Tools Project — supports and incubates a collection of free and open source projects that enable anonymous, secure, reliable, and unrestricted communication on the Internet. Its goal is to enable people to talk directly to each other without being censored, surveilled or restricted.
How to Write a Good Bio (Scott Berkun) — something we all have to do, and rarely do well the first time. Excellent advice.
Scumbag Steve’s Advice for Annoying Facebook Girl — Some people can’t distinguish the internet from real life. There are people who refuse to believe my name isn’t Steve and that I am not really the scumbag (well not all the time, that is). Just remember who you are. And that you know you’re a decent kid. Blake (the guy whose image was adopted as “Scumbag Steve” by meme-makers) was 21 when he wrote that, and it remains the best advice for anyone dealing with sudden visibility in the public eye.
The Battle for Obama’s Tech (The Verge) — same old story: the software that got Obama elected won’t be released. Instead it’ll atrophy and have to be rewritten in four years’ time. How do I know this? The morons at the Democratic Party did it with Kerry’s run and again for Obama’s first campaign. It’s a choice the OFA developers warn could not only squander the digital advantage the Democrats now hold, but also severely impact their ability to recruit top tech talent in the future.
Precog Software (Wired) — researchers assembled a dataset of more than 60,000 crimes, including homicides, then wrote an algorithm to find the people behind the crimes who were more likely to commit murder when paroled or put on probation. Berk claims the software could identify eight future murderers out of 100. The software parses about two dozen variables, including criminal record and geographic location. The type of crime and the age at which it was committed, however, turned out to be two of the most predictive variables. […] The software aims to replace the judgments parole officers already make based on a parolee’s criminal record and is currently being used in Baltimore and Philadelphia. I look forward to the study comparing human judgement from parole officers against algorithmic judgement.