Seven things

  1. Mexican border fence being built “for national security” mysteriously stops at edges of property owned by golf courses and billionaire Bush donors.
  2. RIP, Gary Gygax. I spent most of 1985 in your Tomb of Horrors, and I thank you for it.
  3. David Pogue with a brilliant medley about the music and video industry. Same video embedded below from YouTube; the link is to the TED video feed.

  4. Google map of presidential primaries. Gotta love a popular vote difference of 0.013%.
  5. Statistical data from the United Nations now available online.
  6. Confidential military data repeatedly sent to British tourism site. Solution: British tourism site voluntarily shuts itself down because USAF won’t stop.
  7. Bruce Schneier brilliantly discusses the flaws in the “transparent society” model with a review of inherent power dynamics:

    You’re stopped by a police officer, who demands to see identification. Divulging your identity will give the officer enormous power over you: He or she can search police databases using the information on your ID; he or she can create a police record attached to your name; he or she can put you on this or that secret terrorist watch list. Asking to see the officer’s ID in return gives you no comparable power over him or her.

Wingnut review, 2007

If you want to find out what the conspiracy theorists are thinking about, I happened upon a great method of monitoring them all:

Put the word conspiracy in the name of your website.

So, without further ado, a list of search terms including the word “conspiracy” that landed people here in 2007. Entries in bold showed up, like, a bazillion times. Note: don’t ask me what the hell most of these are about, I’m stumped. Triscuits?

  • 2 pac
  • 2001
  • -911 movies conspiracy foil hands from floor
  • airplane liquid
  • american healthcare
  • americorps
  • americorps funding
  • amtrak
  • anti smoking
  • at&t motorola
  • atf documentary
  • babar the elephant
  • blood donation
  • bluetooth
  • brac
  • casino
  • cell phone companies
  • cell phone evdo
  • cingular
  • computer servers
  • d minus
  • desert storm
  • diet
  • do not call list
  • dow
  • dow jones
  • employment
  • enfant
  • fastest computer on earth
  • free agent
  • clark gable
  • google earth
  • groh
  • gulf war
  • health care conspiracy revealed october 6 2007 (this search was in September, so presumably it was done by a conspiracy member)
  • hershey’s
  • hitler
  • internet
  • iphone
  • iphone 6pm friday timing
  • ipod
  • i see blue dots
  • isight camera
  • jesus
  • no jewish conspiracy
  • jewish fossil
  • jews
  • henry kissinger
  • lincoln penny
  • mac 2007
  • magnesium
  • magnum opus
  • mccain
  • scott mcclellan
  • medical
  • messiah college
  • microsoft jim gray
  • military
  • musharraf
  • mutilated cows
  • muzak
  • noaa
  • nsa
  • poker
  • poker machine
  • poverty
  • powerball
  • radio ipod podcasts
  • red and blue
  • red hair people
  • theodore roosevelt
  • the royalty of presidency
  • donald rumsfeld
  • russian
  • saic
  • sistine
  • skype
  • smoking
  • superman jewish
  • thailand
  • theft
  • time-machine
  • triscuit
  • videos that can be embedded
  • virtual case file vcf
  • war of the worlds
  • weather forecast
  • john williams

Seven things

  1. Can Cheeseburger-in-a-Can possibly be any good? “No. Oh dear sweet shrieking Lord, no.”
  2. Sigma Phi Epsilon clearly does not give their brothers enough to do. But the big question: what happens when the iPhone hits 10,000 hours? They didn’t check? Wusses.
  3. Who do you want answering the phone at 3 AM? Brilliant spoof of Clinton ad.
  4. $31 million stolen from airport baggage while under TSA watch. Can we just give up on the whole “TSA keeps us safe” thing now? If criminals can take things out of the bags, then criminals can put things into the bags.
  5. Note to thieves: if you must rob a community organization, try to avoid bikers.
  6. The Billboard Liberation Front today announced a major new advertising improvement campaign executed on behalf of clients AT&T and the National Security Agency. Focusing on billboards in the San Francisco area, this improvement action is designed to promote and celebrate the innovative collaboration of these two global communications giants.

    AT&T works for NSA headquarters

    Billboard Liberation Front web site highly recommended for its uncanny spoof of marketing firms.

  7. I think I’ve neglected to mention the excellent webcomic Basic Instructions. This is excerpted from December 12th, “How to Destroy Society”; collect them all!

    bi.jpg

On recent Mac security issues

There are now two ways to crack a Mac login password that are in the wild, and before any of the usual suspects start to crow about how Macs are now as totally insecure as Windows has always been, I thought a quick note was in order. So, a few observations:

  1. Yes, these are serious attacks.
  2. However, both require physical access to your Mac. If you can prevent anyone from laying hands on your keyboard, you’re in no greater danger.
  3. Physical access to your Mac has always been a security hole. Anyone with a Mac system restore DVD can use it to change your passwords without knowing your existing password.
  4. Therefore, this makes not one iota of difference to your data security in the event of laptop or desktop theft. Savvy thieves or fences can get your data, and the DVD trick is far easier than the RAM extraction methods.
  5. You can thwart thieves in the event of theft by using FileVault. If you don’t want to use FileVault, you can create secure disk images using Disk Utility and store secure data there. (This is what I do.)
  6. The RAM extraction method listed above will thwart FileVault, however. If this is a concern, use Disk Utility images and a different password for encrypting them.
  7. There is a foolproof method that stops both of the above: shut down your computer, and leave it off for a few minutes before surrendering it to other people. Or before having it stolen, if you have such foresight. You can do this whenever you move your laptop if you want to be paranoid, or just before you encounter people you have no reason to trust, such as a TSA checkpoint.

I’m in agreement that Apple should fix the new loginwindow.app issue asap, although I don’t see physical-access attacks to be nearly the concern that network attacks are.

This week’s timewasters

Dada, thy name is Jim Davis: Garfield strips without the cat. Humorous if you enjoy laughing at the pathetic.

While I’m thinking about comic strips, A Friend Who Shall Not Be Named pointed me in the direction of the highly disturbing Sexy Losers comic strip. No, really, I mean it. Highly disturbing. But this relatively tame joke about incest is the most amusing thing I’ve read all year.

It’s all over, folks; a Diebold computer error has released the 2008 election results (according to The Onion). “This country is based on the fantasy that the government is the voice of the people.”

919,000 “suspected terrorists” on government watch lists. And growing.

Iraq war causes sub-prime crisis? Can’t say as I understand it, but then again, Joseph Stiglitz has a Nobel in economics, and he said so. But $3 trillion, or about 60 times more that Bush said it would cost when he was (literally) selling the war? That I understand. How many more times will we be forced to ask, “incompetence or malfeasance?”

Experimental 16.4 terabit per second fiber network created over a distance of 1,500 miles. Jesus. That’s my entire 120 gig hard drive in 0.06 seconds. Human eyeblink: 0.3 seconds.

Most of my readers won’t understand this, but those that do will find this hysterical, as I do: “GLTerminal emulates a 1970’s terminal monitor, complete with flaws in brightness, warped display curvature, and flicker. It even simulates baud rate lag. And! for extra verisimilitude, the character colors can be green or amber.”

The Onion: Dangerous idiom shortage strikes. “Citizens in the South and West have been hit by the dearth of idioms like babies bite the bedpost. Unless something is done before long to dry out the cinnamon jars, residents of Texas may soon cease speaking altogether.”

Some thoughts on ISPs and BitTorrent

Cross-posting a message I wrote today for Dave Farber’s Interesting-People mailing list. The topic is regarding ISPs and their policies towards high bandwidth applications such as BitTorrent. The thread was started by Brett Glass, owner of a small ISP in Wyoming; the entire thread is archived here, while his specific message which I replied to is here.

From: Jeff Porten
Sent: Monday, February 18, 2008 1:58 PM
Subject: Re: [IP] Re: Comments on LARIAT and Comcast not same problem

On Feb 17, 2008, at 3:11 PM, Brett Glass wrote:

The default is for [BitTorrent to take up all available bandwidth]. And how many gamers, thirsting for the latest World of Warcraft update, would change that default (if they knew how)?

I’ve used over a dozen different BitTorrent clients; most of these do not expose their defaults to the users or allow the user to modify them. The ones that do clearly differ in their default settings. So your argument is provably incorrect. There is no “the default”, and I strongly suspect that if you were to download a dozen or so BitTorrent programs, you’d find that the defaults are set rather reasonably.

Secondly, in the “unprovably incorrect” category, anyone doing a casual search on “how do I use this BitTorrent thing” — which nearly everyone has to do as the software tends towards the complex — will come across many web documents that say, “do not do X, Y, or Z, as this is bad for the network.” [1] These are usually explained in terms of “ultimately bad for your download speed”, so it speaks to user self-interest rather than trying to inspire hearts and bunnies in the user.

[1]: http://www.azureuswiki.com/index.php/Good_Torrents

Alas, there is. Even if you throttle your BitTorrent client, your system (and your ISP) will be beaten on relentlessly with requests for the material. Day and night.

The largest swarms I’ve ever seen have about 40,000 members; the medians can range from 50 to 2,000 members depending upon whether you’re grabbing the latest hot release, or joining an older swarm. According to http://wiki.theory.org/BitTorrentSpecification#Messages , the messages in question are mostly measured in single-digit bitlengths [1], so presumably these require a single IP packet in each direction. The only large bandwidth requirements are in response to the request packets, which is precisely where the throttles come into play.

[1] Typo. I should have said bytelengths.

So I have difficulty with your characterization that your system is “beaten on”; it seems to me that a properly throttled BitTorrent client would be kinder to networks than, say, RSS readers and other glatt kosher network apps. Likewise, I note that iTunes podcast downloads and various network file transfers invariably max out available local bandwidth, and for some reason no one is complaining loudly about these — despite the fact that they are substantively similar to unthrottled torrents.

Long after your own download is done. And unless you “relent” by not doing P2P, you are still taking your ISP’s bandwidth for a third party.

No. If I am choosing to share a portion of my hard drive, that is a first party use of network resources, and I am the person paying the bills. If I choose to share these with anonymous third parties, that’s my choice — I happen to find it gratifying when a stranger reads my website, and resent an implication that if I don’t know my correspondent, he is somehow stealing my ISP’s resources.

The entire point is that your software cares not whether any network is “overloaded,” and seeks to bypass all of the safeguards against congestion which are part of the TCP/IP protocol suite. It is thus abusive to the network.

Actually, Brett, my particular software has rather sophisticated mechanisms to judge whether a network is busy. [1] Admittedly there are also instructions to avoid traffic shaping [2], which to my mind ranks up there with the global port 80 block that ISPs imposed on all users after Code Red was released. That said, and as you well should know, these are applications riding on top of the TCP/IP layer, not hacks to the TCP layer itself. If there is anything an end user can do to hack your TCP/IP layer, the fault is not with the clever or clueless user, the fault is with the programmer who left such glaring security holes in your routers and servers.

[1]: http://www.azureuswiki.com/index.php/ConfigAuto-Speed
[2]: http://www.azureuswiki.com/index.php/Avoid_traffic_shaping

One of the most effective P2P mitigation tactics we’ve tried is to slow down the user’s connection to compensate for the excessive duty cycle of P2P applications, keeping the net load (in gigabits per month) imposed on the network by the user down to a reasonable level. It’s the equivalent of, say, limiting the number of plates that a customer at a buffet can fill.

Yes, and this is what so profoundly angers your educated customers. We know that ISPs have always worked on the model that a few users will make high use of their connections, but the vast majority of their users will contribute high profits with low usages. This model dates back to modem banks and dial-up.

There are two ways ISPs can respond:

1) the ethical way is to say, “due to changes in our business model, we are raising our prices/changing our policies/imposing caps.” This gives their customers a chance to review their contracted relationship and decide whether to support the ISP or leave for a better competitor.

2) the unethical way is to modify their infrastructure such that they can screw over their customers in ways that they hope won’t be noticed. I happen to run a bandwidth meter in my menu bar, but ISPs very well know that most people don’t, and that ignorance is their opportunity.

As best as I can tell, ISPs to date have overwhelmingly opted for option #2. It is my opinion that the attitude of trying to put one over the ISPs is largely due to the obviously poor relationship between provider and client.

The flaw in this scheme is that it still lets abusers take bandwidth from us for the benefit of third parties, such as Blizzard and Vuze, without compensation.

Just so I’m clear — the “abusers” are people who pay you money, yes? I want to make sure that I’m understanding the terminology you’re using for your customers.

I run two businesses, and I routinely fire my underperforming customers and clients when they are more trouble than they are worth. The difference is, I do this politely, and I don’t call them names or imply that they are thieves for using the services I have promised them.

Best,
Jeff Porten

John Scalzi on money

Scalzi has a great post up on how to be a thrifty writer, which counts as good advice for budding entrepreneurs as well.

One caveat: in his segue on “buy good stuff that lasts”, he mentions the epitomé of new and shiny, the MacBook Air, as its antithesis. Fact is, I own about a dozen Macs, and with the exception of a few PowerBook 140s that I bought used in 1997, they all still work. I can fire up my PowerBook Duo 210 any time I like, although its battery life is now measurable in picoseconds. The PowerBook G3 from 1999 is still in my stable of useful computers (great monitor, decent hard drive) for anything that doesn’t require heavy duty horsepower or Mac OS X 10.4 and up.

So, just saying: if you need a computer that will last for ten years, maybe you should go with the shiny.

123 meme

Brian just tagged me with another blogmeme, and seeing as how I haven’t posted for a while… what the hell?

The meme in question:

1. Pick up the nearest book (of at least 123 pages).
2. Open the book to page 123.
3. Find the fifth sentence.
4. Post the next three sentences.
5. Tag five people.

What Brian didn’t realize is that he tagged me twice, so here are the top two books in the stack.

Ken Follett, Jackdaws: “The last thing Monty had said to Paul Chancellor, late on Monday night, had been: ‘If you do only one thing in this war, make sure that telephone exchange is destroyed.’ Paul had woken this morning with those words echoing in his mind. It was a simple instruction.”

Dan Harrington & Bill Robertie, Harrington on Hold ‘Em, Volume III: “The big blind has been active throughout this session, and likes to stick in a lot of small raises during a pot. The small raises don’t indicate anything about the strength of his hand. Your hand: Aâ™  A♣.”

Avoid OfficeDepot.com like the plague

Tried to pick up a terabyte drive from OfficeDepot.com that was listed on DealMac. To date, I’ve had the following wonderful experiences with the company:

1) Phone rep lied about expected delivery date.

2) Charge to my credit card applied three separate times ($963 for a hard drive; not exactly the bargain I was looking for).

3) Wait time of 5-7 business days before such charges can be reversed.

4) Ask for a supervisor, and get dumped into the Spanish language recordings. Unfortunately for them, I speak enough Spanish to navigate that. But a cute way of ditching problem callers.

Still on hold, so addenda to this post may apply.

Addendum 1: time on hold of sufficient length to look up executive customer service email on Consumerist, find all tracking numbers on my credit card account, compose three-paragraph email, and send. Not sure how long I’ve been on hold, but length of call is about 45 minutes. I’m now promised a callback later today….

Addendum 2: callback from executive customer service just now (5:30 PM Friday); no callback ever received from the standard escalation request. She was extremely friendly and her attitude by itself went a long way towards making me feel better about Office Depot. Summary: she could help me, but only with credit card details that I couldn’t give out to an incoming phone call. We decided to see if the problem resolves itself by Monday, otherwise I call her back.

Autumn of the Multitaskers

Short version of this interesting article in The Atlantic: Do one thing at a time. Avoid multitasking. Technology that enables multitasking is bad; technology that encourages multitasking is horrid.

I can’t say that I can argue with the premise, especially with the neuroscience–I’m just not qualified to take that on. But my gut feeling is that what he calls the evils of multitasking is what I experience at the end of a day where I say to myself, “I was so busy today; how is it that I got so little done?”

That said, as a card-carrying technological utopian (and the card isn’t made of antediluvian paper, nosirree), I can think of several times when multitasking is not only beneficial, it is right and proper. Listening to a podcast or good music while walking long distances. Putting on just the right mix when watching the stars, the ocean, or just the world passing by. A little distraction when a poker game isn’t going quite the way you want it to, and to focus your entire attention on it will be to play badly.

I recently picked up a Palm Centro smartphone, about which I’ve been intending to write an extensive review for a month–but I’ll say in passing that the way in which it wormed its way into my life so quickly was precisely the ability it provides to grab snippets of the Internet while doing something else. An opponent asked me last night when the minting dates were of my Morgan dollar card protector; I found them out (1878-1904, and 1921) while grabbing a smoke break. That’s information I want to know, but wouldn’t have made a note to track down hours later.

Maybe it denied me the full enjoyment of that nicotine hit. Somehow, I doubt it.

Flaming Laballa, in spades

My fraternity has a traditional game that’s been played for decades, called Flaming Laballa. It’s a little bit like handball, except that it’s played with a tennis ball. Oh, and the tennis ball is soaked in lighter fluid. And then set on fire.

The part about using your hands to bat around the ball, though, that’s the same.

The game is best played while drunk, and near very large snowbanks.

In that spirit, I pass along a video of a pyromaniac who clearly should be one of our members.

CES wrapup

Last show post wrap-up available at TidBITS, but as a special extra for blog readers, here’s a photoblog with some thoughts that were deemed either too rude or too inconsequential for publication.

Hiromi Oshima, Miss June 2004, not entirely revealedYes, it’s true, I met this woman, and I asked her to talk to me about non-lethal weaponry. There is something clearly wrong with me.

A truck with monster speakers.Here’s a tip about adjusting the volume in your car stereo: if your subwoofers can make a man’s scrotum vibrate at 50 paces, it is too fucking loud.

Advertisement making Microsoft Home Servers into a faux debate topic.Microsoft demonstrates that either they continue to have their wooden ear for comedy, or that they’re being crippled by the writer’s strike.

Transformers robot, about 50 feet tall.I, for one, welcome our new robot overlords. (This thing was huge.)

Disneyesque line at Starbucks.Finally, a new personal record set for “longest line ever waited in at Starbucks”. And all the time I’m thinking, “if there were just one line for all of those frufru bastards with their lattes and cappuccinos, and another for us venti drip with room people, I’d be outta here by now.”

Informative emergency alerts

If anyone can tell me what the hell Alert DC meant with today’s “emergency alert” message, I’m listening.

From: “Alert DC”
To: “Alert DC Users”
Subject: Message from Alert DC
Date: Wed, 09 Jan 2008 12:28:27 -0500

The exercise drill has ended at George Washington University (1900 block of F St., NW) and streets will be opening soon. A hot wash will also be conducted.

A GTD trade show survival tactic

The CES show floor is immense, and I’m staying at a hotel that’s too far away for convenient drop-off of the many pounds of conference brochures and swag I’m picking up. Therefore, a strategy for schlepping is essential.

More to the point, I’m writing up this show and I need a way to keep track of everything I’m getting, plus a way of organizing it for the various articles I’m planning to write. Ergo, my unofficial GTD system for trade shows:

First, you need inboxes. In this case, I’m using giveaway bags from the show floor. Today I was actually carrying two inboxes; a large paper shopping bag and a shoulder bag. Brand new items went into the paper bag, which I carried in my hand. Every 20 minutes or so, I’d transfer things into the easier-to-carry shoulder bag, and gave each item a quick perusal to see if it should be discarded.

Second, processing. The shoulder bag inbox is reviewed from time to time, when I can sit down with my MacBook. Items worth keeping get noted in an OmniOutliner document, and are transferred to my laptop backpack. Anything which contains information that I can quickly put into OmniOutliner and toss, I do so.

Third, post-processing. When I get back to my hotel room, everything in the bag gets dumped into various piles that act as my on-the-road reference system. I leave in the morning with completely empty bags. Next year, I’d seriously consider bringing a high-speed scanner for this step.

Result: lots of weight gets quickly distributed into the best bags for carrying them without causing too much fatigue, plus each bag represents an entry in an ad hoc filing system. The large quantities of atoms I receive act as automatic “mind like water” reminders for most of the writing I’m doing (especially once I put some categorization effort into them), and they’re shifted from being deadweight to useful objects as quickly as possible.