Polymedios

Latest News Articles

boing boing cemments

View the latest news and breaking news from boing boing cemments website today with updated daily to provide the world, weather, entertainment, politics, commentaries, sports, business, lifestyle, entertainment and health news.



multiplayer high: how games help learning

listen to anyone talk about schools today: classical education just can't keep up. in the digital generation's world of constant change, most schooling is profoundly boring. but what else is possible?

imagine an environment where the participants are building a massive network databases, wikis and websites, and thousands of message forums, creating a large-scale knowledge economy. imagine an environment where participants constantly measure and evaluate their own performance, even if that requires them to build new tools to do so. imagine an environment where user interface dashboards are constructed by the users themselves to make sense of the world and their own performance in it. imagine an environment where evaluation is based on after-action reviews to continually enhance performance; an environment where learning happens on a continuous basis, because the participants are internally motivated to find, share, and filter new information on a near-constant basis.

finding an environment like that sounds difficult, but it isn't. it already exists, in the form of massively multiplayer online games. these large-scale social communities provide a case study in how players absorb tacit knowledge, process it into a series of increasingly sophisticated questions, and engage collectives to make the experience personally meaningful. what they teach us about learning is not found in the game at all, but is instead embedded in these collectives, which form in, around, and through the game. in essence, the game provides the impetus for collectives to take root.

in our view, the cultures created around mmos are almost perfect illustrations of a new learning environment. on one hand, online games produce massive information economies, composed of thousands of message forums, wikis, databases, player guilds, and communities. in that sense, they are paragons of an almost unlimited information network. on the other hand, they constitute a bounded environment within which players have near absolute agency, enjoying virtually unlimited experimentation and exploration—more of a petri dish.

mmos draw in players from every walk of life, of every age, and across gender, class, and socioeconomic divides. they require an immense amount of learning in order to play them and are grounded in participation. most important, the engine that drives learning is a blend of questioning, imagination, and—best of all—play.

(more…)






history's shadow

history's shadow ab1, 2010
c-print
frame: 41 x 31 inches / photo: 40 x 30 inches
ed. of 7

history's shadow

by david maisel

david maisel photographs the forgotten, the unseen, and the invisible. in 2006, he captured the unclaimed copper canisters containing the ashes of patients who died at a state-run psychiatric hospital, originally known as the oregon state insane asylum, between 1883 and the 1970s. the result was library of dust, a gorgeous oversized book and exhibition. then in 2008, maisel collected a series of "black maps," huge aerial photographs of strip mines, lake beds, and other large features that aren't easily recognizable out of context but reveal curious and provocative patterns and topographies. his latest project is history's shadow, an exploration of memory and excavation through x-rays of artifacts from san francisco's asian art museum. history's shadow is on display at the haines gallery in san francisco until june 4. later this year, nazraeli press will publish the series as a monograph, including a short story by jonathan lethem. we are thrilled to present maisel's ghostly images and his commentary on boing boing. — david pescovitz

history's shadow gm16, 2010
c-print
frame: 31 x 41 inches / photo: 30 x 40 inches
ed. of 7

as a documentarian of sorts, my photographic projects present what might be considered technical, abstract images seen through a metaphoric eye. the ongoing themes of my work concern the dual processes of memory and excavation, as i examine what societies leave behind as artifacts and evidence of their cultures. in my current project, history's shadow, i have utilized scientific images from art conservation archives to create new photographs. specifically, in this series i have re-photographed x-rays depicting sculpture and artifacts from antiquity, scanning and digitally manipulating the selected source material.

history's shadow ab2, 2010
c-print
frame: 41 x 31 inches / photo: 40 x 30 inches
ed. of 7

through the x-ray process, the artworks of origin become de-familiarized and de-contextualized, yet acutely alive and renewed. the ghostly images of these x-rays seem to surpass the power of the original objects of art.

history's shadow gm12, 2010
archival pigment prints
image: 40 x 30 inches / frame: 41 x 31 inches
ed. of 7

these spectral renderings become transmissions from the distant past, conveying messages across time, and revealing the essential components that comprise these objects' core.

history's shadow gm10, 2010
c-print
frame: 41 x 31 inches / photo: 40 x 30 inches
ed. of 7

my x-ray-derived photographs fuse the temporal, the artistic and the scientific, permitting us to see into previously invisible realms. the shadow-worlds they occupy are informed by the black space surrounding the images, which in some instances becomes a vast nether world, and in others becomes the velvety ground of some kind of brain scan/portrait.

history's shadow gm3, 2010
c-print
frame: 31 x 41 inches / photo: 30 x 40 inches
ed. of 7

i began this series while a scholar in residence at the getty research institute, and have continued it by working with material from the asian art museum of san francisco. i plan to develop this series over time, by collaborating with museums around the world whose holdings reflect the past of a broad range of cultures.

history's shadow av4, 2010
c-print
frame: 41 x 31 inches / photo: 40 x 30 inches
ed. of 7

x-rays have historically been used for structural examination of art and artifacts, as they reveal losses, replacements, methods of construction, and internal trauma not visible to the naked eye.

history's shadow av3, 2010
c-print
frame: 31 x 41 inches / photo: 30 x 40 inches
ed. of 7

by transcribing the inner and outer surfaces of their subjects simultaneously, these images form spectral images of indeterminate space, depth, and scale.

history's shadow ab8a & ab8b, 2010
archival pigment prints
image, each: 40 x 30 inches / frame, each: 41 x 31 inches
ed. of 7

the more deeply we see inside objects from the distant past of human culture, the more fully these renderings transcend their documentary function, allowing us to glimpse the invisible.

history's shadow gm20, 2010. c-print. frame: 31 x 41 inches / photo: 30 x 40 inches. ed. of 7

images courtesy of the artist and haines gallery






lockdown: the coming war on general-purpose computing

image

lockdown

the coming war on general-purpose computing

by cory doctorow - share this article

this article is based on a keynote speech to the chaos computer congress in berlin, dec. 2011.

general-purpose computers are astounding. they're so astounding that our society still struggles to come to grips with them, what they're for, how to accommodate them, and how to cope with them. this brings us back to something you might be sick of reading about: copyright.

but bear with me, because this is about something more important. the shape of the copyright wars clues us into an upcoming fight over the destiny of the general-purpose computer itself.

in the beginning, we had packaged software and we had sneakernet. we had floppy disks in ziplock bags, in cardboard boxes, hung on pegs in shops, and sold like candy bars and magazines. they were eminently susceptible to duplication, were duplicated quickly, and widely, and this was to the great chagrin of people who made and sold software.

enter digital rights management in its most primitive forms: let's call it drm 0.96. they introduced physical indicia which the software checked for—deliberate damage, dongles, hidden sectors—and challenge-response protocols that required possession of large, unwieldy manuals that were difficult to copy.

these failed for two reasons. first, they were commercially unpopular, because they reduced the usefulness of the software to the legitimate purchasers. honest buyers resented the non-functionality of their backups, they hated the loss of scarce ports to the authentication dongles, and they chafed at the inconvenience of having to lug around large manuals when they wanted to run their software. second, these didn't stop pirates, who found it trivial to patch the software and bypass authentication. people who took the software without paying for it were untouched.

typically, the way this happened is a programmer, with possession of technology and expertise of equivalent sophistication to the software vendor itself, would reverse-engineer the software and circulate cracked versions. while this sounds highly specialized, it really wasn't. figuring out what recalcitrant programs were doing and routing around media defects were core skills for computer programmers, especially in the era of fragile floppy disks and the rough-and-ready early days of software development. anti-copying strategies only became more fraught as networks spread; once we had bulletin boards, online services, usenet newsgroups and mailing lists, the expertise of people who figured out how to defeat these authentication systems could be packaged up in software as little crack files. as network capacity increased, the cracked disk images or executables themselves could be spread on their own.

this gave us drm 1.0. by 1996, it became clear to everyone in the halls of power that there was something important about to happen. we were about to have an information economy, whatever the hell that was. they assumed it meant an economy where we bought and sold information. information technology improves efficiency, so imagine the markets that an information economy would have! you could buy a book for a day, you could sell the right to watch the movie for a euro, and then you could rent out the pause button for a penny per second. you could sell movies for one price in one country, at another price in another, and so on. the fantasies of those days were like a boring science fiction adaptation of the old testament book of numbers, a tedious enumeration of every permutation of things people do with information—and what might be charged for each.

unfortunately for them, none of this would be possible unless they could control how people use their computers and the files we transfer to them. after all, it was easy to talk about selling someone a tune to download to their mp3 player, but not so easy to talk about the the right to move music from the player to another device. but how the hell could you stop that once you'd given them the file? in order to do so, you needed to figure out how to stop computers from running certain programs and inspecting certain files and processes. for example, you could encrypt the file, and then require the user to run a program that only unlocked the file under certain circumstances.

but, as they say on the internet, now you have two problems.

you must now also stop the user from saving the file while it's unencrypted—which must happen eventually— and you must stop the user from figuring out where the unlocking program stores its keys, enabling them to permanently decrypt the media and ditch the stupid player app entirely.

now you have three problems: you must stop the users who figure out how to decrypt from sharing it with other users. now you've got four problems, because you must stop the users who figure out how to extract secrets from unlocking programs from telling other users how to do it too. and now you've got five problems, because you must stop users who figure out how to extract these secrets from telling other users what the secrets were!

that's a lot of problems. but by 1996, we had a solution. we had the wipo copyright treaty, passed by the united nations world intellectual property organization. this created laws that made it illegal to extract secrets from unlocking programs, and it created laws that made it illegal to extract media (such as songs and movies) from the unlocking programs while they were running. it created laws that made it illegal to tell people how to extract secrets from unlocking programs, and it created laws that made it illegal to host copyrighted works or the secrets. it also established a handy streamlined process that let you remove stuff from the internet without having to screw around with lawyers, and judges, and all that crap.

and with that, illegal copying ended forever, the information economy blossomed into a beautiful flower that brought prosperity to the whole wide world; as they say on the aircraft carriers, “mission accomplished".

that's not how the story ends, of course, because pretty much anyone who understood computers and networks understood that these laws would create more problems than they could possibly solve. after all, these laws made it illegal to look inside your computer when it was running certain programs. they made it illegal to tell people what you found when you looked inside your computer, and they made it easy to censor material on the internet without having to prove that anything wrong had happened.

in short, they made unrealistic demands on reality and reality did not oblige them. copying only got easier following the passage of these laws—copying will only ever get easier. right now is as hard as copying will get. your grandchildren will turn to you and say “tell me again, grandpa, about when it was hard to copy things in 2012, when you couldn't get a drive the size of your fingernail that could hold every song ever recorded, every movie ever made, every word ever spoken, every picture ever taken, everything, and transfer it in such a short period of time you didn't even notice it was doing it."

reality asserts itself. like the nursery rhyme lady who swallows a spider to catch a fly, and has to swallow a bird to catch the spider, and a cat to catch the bird, so must these regulations, which have broad general appeal but are disastrous in their implementation. each regulation begets a new one, aimed at shoring up its own failures.

it's tempting to stop the story here and conclude that the problem is that lawmakers are either clueless or evil, or possibly evilly clueless. this is not a very satisfying place to go, because it's fundamentally a counsel of despair; it suggests that our problems cannot be solved for so long as stupidity and evilness are present in the halls of power, which is to say they will never be solved. but i have another theory about what's happened.

it's not that regulators don't understand information technology, because it should be possible to be a non-expert and still make a good law. mps and congressmen and so on are elected to represent districts and people, not disciplines and issues. we don't have a member of parliament for biochemistry, and we don't have a senator from the great state of urban planning. and yet those people who are experts in policy and politics, not technical disciplines, still manage to pass good rules that make sense. that's because government relies on heuristics: rules of thumb about how to balance expert input from different sides of an issue.

unfortunately, information technology confounds these heuristics—it kicks the crap out of them—in one important way.

the important tests of whether or not a regulation is fit for a purpose are first whether it will work, and second whether or not it will, in the course of doing its work, have effects on everything else. if i wanted congress, parliament, or the e.u. to regulate a wheel, it's unlikely i'd succeed. if i turned up, pointed out that bank robbers always make their escape on wheeled vehicles, and asked, “can't we do something about this?", the answer would be “no". this is because we don't know how to make a wheel that is still generally useful for legitimate wheel applications, but useless to bad guys. we can all see that the general benefits of wheels are so profound that we'd be foolish to risk changing them in a foolish errand to stop bank robberies. even if there were an epidemic of bank robberies—even if society were on the verge of collapse thanks to bank robberies—no-one would think that wheels were the right place to start solving our problems.

however, if i were to show up in that same body to say that i had absolute proof that hands-free phones were making cars dangerous, and i requested a law prohibiting hands-free phones in cars, the regulator might say “yeah, i'd take your point, we'd do that."

we might disagree about whether or not this is a good idea, or whether or not my evidence made sense, but very few of us would say that once you take the hands-free phones out of the car, they stop being cars.

we understand that cars remain cars even if we remove features from them. cars are special-purpose, at least in comparison to wheels, and all that the addition of a hands-free phone does is add one more feature to an already-specialized technology. there's a heuristic for this: special-purpose technologies are complex, and you can remove features from them without doing fundamental, disfiguring violence to their underlying utility.

this rule of thumb serves regulators well, by and large, but it is rendered null and void by the general-purpose computer and the general-purpose network—the pc and the internet. if you think of computer software as a feature, a computer with spreadsheets running on it has a spreadsheet feature, and one that's running world of warcraft has an mmorpg feature. the heuristic would lead you to think that a computer unable to run spreadsheets or games would be no more of an attack on computing than a ban on car-phones would be an attack on cars.

and, if you think of protocols and websites as features of the network, then saying “fix the internet so that it doesn't run bittorrent", or “fix the internet so that thepiratebay.org no longer resolves," sounds a lot like “change the sound of busy signals," or “take that pizzeria on the corner off the phone network," and not like an attack on the fundamental principles of internetworking.

the rule of thumb works for cars, for houses, and for every other substantial area of technological regulation. not realizing that it fails for the internet does not make you evil, and it does not make you an ignoramus. it just makes you part of that vast majority of the world, for whom ideas like turing completeness and end-to-end are meaningless.

so, our regulators go off, they blithely pass these laws, and they become part of the reality of our technological world. there are, suddenly, numbers that we aren't allowed to write down on the internet, programs we're not allowed to publish, and all it takes to make legitimate material disappear from the internet is the mere accusation of copyright infringement. it fails to attain the goal of the regulation, because it doesn't stop people from violating copyright, but it bears a kind of superficial resemblance to copyright enforcement—it satisfies the security syllogism: “something must be done, i am doing something, something has been done." as a result, any failures that arise can be blamed on the idea that the regulation doesn't go far enough, rather than the idea that it was flawed from the outset.

this kind of superficial resemblance and underlying divergence happens in other engineering contexts. i've a friend, who was once a senior executive at a big consumer packaged goods company, who told me what happened when the marketing department told the engineers that they'd thought up a great idea for detergent: from now on, they were going to make detergent that made your clothes newer every time you washed them!

after the engineers had tried unsuccessfully to convey the concept of entropy to the marketing department, they arrived at another solution: they'd develop a detergent that used enzymes that attacked loose fiber ends, the kind that you get with broken fibers that make your clothes look old. so every time you washed your clothes in the detergent, they would look newer. unfortunately, that was because the detergent was digesting your clothes. using it would literally cause your clothes to dissolve in the washing machine.

this was, needless to say, the opposite of making clothes newer. instead, you were artificially aging them every time you washed them, and as the user, the more you deployed the “solution", the more drastic your measures had to be to keep your clothes up to date. eventually, you would have to buy new clothes because the old ones fell apart.

today we have marketing departments that say things such as “we don't need computers, we need appliances. make me a computer that doesn't run every program, just a program that does this specialized task, like streaming audio, or routing packets, or playing xbox games, and make sure it doesn't run programs that i haven't authorized that might undermine our profits."

on the surface, this seems like a reasonable idea: a program that does one specialized task. after all, we can put an electric motor in a blender, and we can install a motor in a dishwasher, and we don't worry if it's still possible to run a dishwashing program in a blender. but that's not what we do when we turn a computer into an appliance. we're not making a computer that runs only the “appliance" app; we're taking a computer that can run every program, then using a combination of rootkits, spyware, and code-signing to prevent the user from knowing which processes are running, from installing her own software, and from terminating processes that she doesn't want. in other words, an appliance is not a stripped-down computer—it is a fully functional computer with spyware on it out of the box.

we don't know how to build a general-purpose computer that is capable of running any program except for some program that we don't like, is prohibited by law, or which loses us money. the closest approximation that we have to this is a computer with spyware: a computer on which remote parties set policies without the computer user's knowledge, or over the objection of the computer's owner. digital rights management always converges on malware.

in one famous incident—a gift to people who share this hypothesis—sony loaded covert rootkit installers on 6 million audio cds, which secretly executed programs that watched for attempts to read the sound files on cds and terminated them. it also hid the rootkit's existence by causing the computer operating system's kernel to lie about which processes were running, and which files were present on the drive. but that's not the only example. nintendo's 3ds opportunistically updates its firmware, and does an integrity check to make sure that you haven't altered the old firmware in any way. if it detects signs of tampering, it turns itself into a brick.

human rights activists have raised alarms over u-efi, the new pc bootloader, which restricts your computer so it only runs “signed" operating systems, noting that repressive governments will likely withhold signatures from operating systems unless they allow for covert surveillance operations.

on the network side, attempts to make a network that can't be used for copyright infringement always converge with the surveillance measures that we know from repressive governments. consider sopa, the u.s. stop online piracy act, which bans innocuous tools such as dnssec—a security suite that authenticates domain name information— because they might be used to defeat dns blocking measures. it blocks tor, an online anonymity tool sponsored by the u.s. naval research laboratory and used by dissidents in oppressive regimes, because it can be used to circumvent ip blocking measures.

in fact, the motion picture association of america, a sopa proponent, circulated a memo citing research that sopa might work because it uses the same measures as are used in syria, china, and uzbekistan. it argued that because these measures are effective in those countries, they would work in america, too!

it may seem like sopa is the endgame in a long fight over copyright and the internet, and it may seem that if we defeat sopa, we'll be well on our way to securing the freedom of pcs and networks. but as i said at the beginning of this talk, this isn't about copyright.

the copyright wars are just the beta version of a long coming war on computation. the entertainment industry is just the first belligerents to take up arms, and we tend to think of them as particularly successful. after all, here is sopa, trembling on the verge of passage, ready to break the internet on a fundamental level— all in the name of preserving top 40 music, reality tv shows, and ashton kutcher movies.

but the reality is that copyright legislation gets as far as it does precisely because it's not taken seriously by politicians. this is why, on one hand, canada has had parliament after parliament introduce one awful copyright bill after another, but on the other hand, parliament after parliament has failed to actually vote on each bill. it's why sopa, a bill composed of pure stupid and pieced together molecule-by-molecule into a kind of “stupidite 250" normally only found in the heart of newborn stars, had its rushed-through sopa hearings adjourned midway through the christmas break: so that lawmakers could get into a vicious national debate over an important issue, unemployment insurance.

it's why the world intellectual property organization is gulled time and again into enacting crazed, pig-ignorant copyright proposals: because when the nations of the world send their u.n. missions to geneva, they send water experts, not copyright experts. they send health experts, not copyright experts. they send agriculture experts, not copyright experts, because copyright is just not as important.

canada's parliament didn't vote on its copyright bills because, of all the things that canada needs to do, fixing copyright ranks well below health emergencies on first nations reservations, exploiting the oil patch in alberta, interceding in sectarian resentments among french- and english-speakers, solving resources crises in the nation's fisheries, and a thousand other issues. the triviality of copyright tells you that when other sectors of the economy start to evince concerns about the internet and the pc, copyright will be revealed for a minor skirmish—not a war.

why might other sectors come to nurse grudges against computers in the way the entertainment business already has? the world we live in today is made of computers. we don't have cars anymore; we have computers we ride in. we don't have airplanes anymore; we have flying solaris boxes attached to bucketfuls of industrial control systems. a 3d printer is not a device, it's a peripheral, and it only works connected to a computer. a radio is no longer a crystal: it's a general-purpose computer, running software. the grievances that arise from unauthorized copies of snooki's confessions of a guidette are trivial when compared to the calls-to-action that our computer-embroidered reality will soon create.

consider radio. radio regulation until today was based on the idea that the properties of a radio are fixed at the time of manufacture, and can't be easily altered. you can't just flip a switch on your baby monitor and interfere with other signals. but powerful software-defined radios (sdrs) can change from baby monitor to emergency services dispatcher or air traffic controller, just by loading and executing different software. this is why the federal communications commission (fcc) considered what would happen when we put sdrs in the field, and asked for comment on whether it should mandate that all software-defined radios should be embedded in “trusted computing" machines. ultimately, the question is whether every pc should be locked, so that their programs could be strictly regulated by central authorities.

even this is a shadow of what is to come. after all, this was the year in which we saw the debut of open source shape files for converting ar-15 rifles to full-automatic. this was the year of crowd-funded open-sourced hardware for genetic sequencing. and while 3d printing will give rise to plenty of trivial complaints, there will be judges in the american south and mullahs in iran who will lose their minds over people in their jurisdictions printing out sex toys. the trajectory of 3d printing will raise real grievances, from solid-state meth labs to ceramic knives.

it doesn't take a science fiction writer to understand why regulators might be nervous about the user-modifiable firmware on self-driving cars, or limiting interoperability for aviation controllers, or the kind of thing you could do with bio-scale assemblers and sequencers. imagine what will happen the day that monsanto determines that it's really important to make sure that computers can't execute programs which cause specialized peripherals to output custom organisms which literally eat their lunch.

regardless of whether you think these are real problems or hysterical fears, they are, nevertheless, the political currency of lobbies and interest groups far more influential than hollywood and big content. every one of them will arrive at the same place: “can't you just make us a general-purpose computer that runs all the programs, except the ones that scare and anger us? can't you just make us an internet that transmits any message over any protocol between any two points, unless it upsets us?"

there will be programs that run on general-purpose computers, and peripherals, that will freak even me out. so i can believe that people who advocate for limiting general-purpose computers will find a receptive audience. but just as we saw with the copyright wars, banning certain instructions, protocols or messages will be wholly ineffective as a means of prevention and remedy. as we saw in the copyright wars, all attempts at controlling pcs will converge on rootkits, and all attempts at controlling the internet will converge on surveillance and censorship. this stuff matters because we've spent the last decade sending our best players out to fight what we thought was the final boss at the end of the game, but it turns out it's just been an end-level guardian. the stakes are only going to get higher.

as a member of the walkman generation, i have made peace with the fact that i will require a hearing aid long before i die. it won't be a hearing aid, though; it will really be a computer. so when i get into a car—a computer that i put my body into—with my hearing aid—a computer i put inside my body—i want to know that these technologies are not designed to keep secrets from me, or to prevent me from terminating processes on them that work against my interests.

last year, the lower merion school district, in a middle-class, affluent suburb of philadelphia, found itself in a great deal of trouble. it was caught distributing, to its students, rootkitted laptops that allowed remote covert surveillance through the computer's camera and network connection. they photographed students thousands of times, at home and at school, awake and asleep, dressed and naked. meanwhile, the latest generation of lawful intercept technology can covertly operate cameras, microphones, and gps tranceivers on pcs, tablets, and mobile devices.

we haven't lost yet, but we have to win the copyright war first if we want to keep the internet and the pc free and open. freedom in the future will require us to have the capacity to monitor our devices and set meaningful policies for them; to examine and terminate the software processes that runs on them; and to maintain them as honest servants to our will, not as traitors and spies working for criminals, thugs, and control freaks.

note: the comments below are closed. discuss this post in the bbs forums.






skooba laptop weekender travel bag - a carry-on bag for gadget lovers

i go somewhere on a plane at least twice a month. for over ten years i’ve used a briggs & riley roller carry-on, and i’ve been fairly happy with it. it’s heavy for its small size and the zipper pulls all broke off (i made replacements from binder clips and sugru) so i’ve been keeping my eye out for a replacement. after hearing great things about the accessibility and capacity of the skooba weekender duffle, i decided to give it a try. it turned out the be the most convenient carry-on i’ve ever used.

(more…)






mophie juice pack powerstation duo: all day charger for mobile gadgets

i bought this usb charging unit because i have a lousy sense of direction. i get lost in buildings and in cities, even ones i’m familiar with. my iphone’s gps map is a godsend. i use it when i’m driving, walking, and taking public transportation.

when i was in tokyo in june, i brought along a small android phone installed with a local data sim card. i used the phone as a wireless hotspot for my iphone, and appreciated having access to the online map to guide me from my hotel to the subway station, and to attractions like the tsukiji fish market and kabuki-cho. it was also nice to call home using skype, and to post instagram photos. the only problem was that the batteries on the android phone and iphone drained after a few hours, forcing me to ask people, chikatetsu wa doko desu ka? in badly-accented japanese, to find the nearest subway station.

(more…)






astonishingly absorbent towel

i take at least two daily showers and have problems with cotton towels getting damp, smelly, and yucky because they can’t dry quickly enough in the hours between. i recently turned to an item i’ve had for a year and used for the opposite intended purpose — the ergodyne chill-its is designed to keep someone cool on a hot day by absorbing a lot of water and evaporating gradually. but, since it’s moisture-absorbent, it can also be used for the effectively inverse purpose: get you dry fast!

(more…)






author kim newman on his new anno dracula novel, johnny alucard (plus excerpt)

johnny alucard is the fourth book in the anno dracula series; the earlier novels are anno dracula,the bloody red baron and dracula cha cha cha -- and the definitive titan editions include the long novellas ‘vampire romance’ and ‘aquarius’.

the premise is that in 1885 count dracula came to britain, as bram stoker describes in his novel … but rather than being defeated by van helsing, he rose to power, becoming queen victoria’s second husband and popularising vampirism as a lifestyle choice at the heart of the british empire. he also imported all the other surviving vampires of fiction as his retinue of hangers-on and toadies.

all this is in the first book -- which revolves around stoker’s dr. seward, who has become a vampire-slaying jack the ripper. the subsequent volumes cover the next hundred years and have a global reach, with dracula moving from country to country and era to era … and manifesting the ills of the century even when seemingly dead again. in johnny alucard, the story moves from europe to america, and we follow the rise of a romanian orphan who becomes dracula’s heir apparent as he conquers such american fields of endeavour as drug-dealing, movie production, serial murder, and covert military intervention in other countries.

(more…)






amped wireless range extender - send wi-fi to your home's weak spots

my cable modem and wifi router are on one end of our long house. the signal peters out before it gets to my daughters’ bedrooms, and because they like to do their homework in their rooms, i needed to come up with a way to extend the range. the amped wireless sr20000g range extender did the trick. i placed it in our dining room and it greatly extended the wireless signal. setup was trivial and hassle-free. the speed of the data transfer did not noticeably diminish (i.e., my kids don’t complain when they watch netflix on an ipad). i recommend this quick solution for spreading wi-fi around your house. -- mark frauenfelder

amped wireless high power wireless-n 600mw gigabit dual band range extender, model sr20000g $140






multiplayer high: how games help learning

listen to anyone talk about schools today: classical education just can't keep up. in the digital generation's world of constant change, most schooling is profoundly boring. but what else is possible?

imagine an environment where the participants are building a massive network databases, wikis and websites, and thousands of message forums, creating a large-scale knowledge economy. imagine an environment where participants constantly measure and evaluate their own performance, even if that requires them to build new tools to do so. imagine an environment where user interface dashboards are constructed by the users themselves to make sense of the world and their own performance in it. imagine an environment where evaluation is based on after-action reviews to continually enhance performance; an environment where learning happens on a continuous basis, because the participants are internally motivated to find, share, and filter new information on a near-constant basis.

finding an environment like that sounds difficult, but it isn't. it already exists, in the form of massively multiplayer online games. these large-scale social communities provide a case study in how players absorb tacit knowledge, process it into a series of increasingly sophisticated questions, and engage collectives to make the experience personally meaningful. what they teach us about learning is not found in the game at all, but is instead embedded in these collectives, which form in, around, and through the game. in essence, the game provides the impetus for collectives to take root.

in our view, the cultures created around mmos are almost perfect illustrations of a new learning environment. on one hand, online games produce massive information economies, composed of thousands of message forums, wikis, databases, player guilds, and communities. in that sense, they are paragons of an almost unlimited information network. on the other hand, they constitute a bounded environment within which players have near absolute agency, enjoying virtually unlimited experimentation and exploration—more of a petri dish.

mmos draw in players from every walk of life, of every age, and across gender, class, and socioeconomic divides. they require an immense amount of learning in order to play them and are grounded in participation. most important, the engine that drives learning is a blend of questioning, imagination, and—best of all—play. (more…)






history's shadow

history's shadow ab1, 2010 c-print frame: 41 x 31 inches / photo: 40 x 30 inches ed. of 7

history's shadow

by david maisel

david maisel photographs the forgotten, the unseen, and the invisible. in 2006, he captured the unclaimed copper canisters containing the ashes of patients who died at a state-run psychiatric hospital, originally known as the oregon state insane asylum, between 1883 and the 1970s. the result was library of dust, a gorgeous oversized book and exhibition. then in 2008, maisel collected a series of "black maps," huge aerial photographs of strip mines, lake beds, and other large features that aren't easily recognizable out of context but reveal curious and provocative patterns and topographies. his latest project is history's shadow, an exploration of memory and excavation through x-rays of artifacts from san francisco's asian art museum. history's shadow is on display at the haines gallery in san francisco until june 4. later this year, nazraeli press will publish the series as a monograph, including a short story by jonathan lethem. we are thrilled to present maisel's ghostly images and his commentary on boing boing. — david pescovitz

history's shadow gm16, 2010 c-print frame: 31 x 41 inches / photo: 30 x 40 inches ed. of 7

as a documentarian of sorts, my photographic projects present what might be considered technical, abstract images seen through a metaphoric eye. the ongoing themes of my work concern the dual processes of memory and excavation, as i examine what societies leave behind as artifacts and evidence of their cultures. in my current project, history's shadow, i have utilized scientific images from art conservation archives to create new photographs. specifically, in this series i have re-photographed x-rays depicting sculpture and artifacts from antiquity, scanning and digitally manipulating the selected source material.

history's shadow ab2, 2010 c-print frame: 41 x 31 inches / photo: 40 x 30 inches ed. of 7

through the x-ray process, the artworks of origin become de-familiarized and de-contextualized, yet acutely alive and renewed. the ghostly images of these x-rays seem to surpass the power of the original objects of art.

history's shadow gm12, 2010 archival pigment prints image: 40 x 30 inches / frame: 41 x 31 inches ed. of 7

these spectral renderings become transmissions from the distant past, conveying messages across time, and revealing the essential components that comprise these objects' core.

history's shadow gm10, 2010 c-print frame: 41 x 31 inches / photo: 40 x 30 inches ed. of 7

my x-ray-derived photographs fuse the temporal, the artistic and the scientific, permitting us to see into previously invisible realms. the shadow-worlds they occupy are informed by the black space surrounding the images, which in some instances becomes a vast nether world, and in others becomes the velvety ground of some kind of brain scan/portrait.

history's shadow gm3, 2010 c-print frame: 31 x 41 inches / photo: 30 x 40 inches ed. of 7

i began this series while a scholar in residence at the getty research institute, and have continued it by working with material from the asian art museum of san francisco. i plan to develop this series over time, by collaborating with museums around the world whose holdings reflect the past of a broad range of cultures.

history's shadow av4, 2010 c-print frame: 41 x 31 inches / photo: 40 x 30 inches ed. of 7

x-rays have historically been used for structural examination of art and artifacts, as they reveal losses, replacements, methods of construction, and internal trauma not visible to the naked eye.

history's shadow av3, 2010 c-print frame: 31 x 41 inches / photo: 30 x 40 inches ed. of 7

by transcribing the inner and outer surfaces of their subjects simultaneously, these images form spectral images of indeterminate space, depth, and scale.

history's shadow ab8a & ab8b, 2010 archival pigment prints image, each: 40 x 30 inches / frame, each: 41 x 31 inches ed. of 7

the more deeply we see inside objects from the distant past of human culture, the more fully these renderings transcend their documentary function, allowing us to glimpse the invisible.

history's shadow gm20, 2010. c-print. frame: 31 x 41 inches / photo: 30 x 40 inches. ed. of 7

images courtesy of the artist and haines gallery






lockdown: the coming war on general-purpose computing

image

lockdown

the coming war on general-purpose computing

by cory doctorow - share this article

this article is based on a keynote speech to the chaos computer congress in berlin, dec. 2011.

general-purpose computers are astounding. they're so astounding that our society still struggles to come to grips with them, what they're for, how to accommodate them, and how to cope with them. this brings us back to something you might be sick of reading about: copyright.

but bear with me, because this is about something more important. the shape of the copyright wars clues us into an upcoming fight over the destiny of the general-purpose computer itself.

in the beginning, we had packaged software and we had sneakernet. we had floppy disks in ziplock bags, in cardboard boxes, hung on pegs in shops, and sold like candy bars and magazines. they were eminently susceptible to duplication, were duplicated quickly, and widely, and this was to the great chagrin of people who made and sold software.

enter digital rights management in its most primitive forms: let's call it drm 0.96. they introduced physical indicia which the software checked for—deliberate damage, dongles, hidden sectors—and challenge-response protocols that required possession of large, unwieldy manuals that were difficult to copy.

these failed for two reasons. first, they were commercially unpopular, because they reduced the usefulness of the software to the legitimate purchasers. honest buyers resented the non-functionality of their backups, they hated the loss of scarce ports to the authentication dongles, and they chafed at the inconvenience of having to lug around large manuals when they wanted to run their software. second, these didn't stop pirates, who found it trivial to patch the software and bypass authentication. people who took the software without paying for it were untouched.

typically, the way this happened is a programmer, with possession of technology and expertise of equivalent sophistication to the software vendor itself, would reverse-engineer the software and circulate cracked versions. while this sounds highly specialized, it really wasn't. figuring out what recalcitrant programs were doing and routing around media defects were core skills for computer programmers, especially in the era of fragile floppy disks and the rough-and-ready early days of software development. anti-copying strategies only became more fraught as networks spread; once we had bulletin boards, online services, usenet newsgroups and mailing lists, the expertise of people who figured out how to defeat these authentication systems could be packaged up in software as little crack files. as network capacity increased, the cracked disk images or executables themselves could be spread on their own.

this gave us drm 1.0. by 1996, it became clear to everyone in the halls of power that there was something important about to happen. we were about to have an information economy, whatever the hell that was. they assumed it meant an economy where we bought and sold information. information technology improves efficiency, so imagine the markets that an information economy would have! you could buy a book for a day, you could sell the right to watch the movie for a euro, and then you could rent out the pause button for a penny per second. you could sell movies for one price in one country, at another price in another, and so on. the fantasies of those days were like a boring science fiction adaptation of the old testament book of numbers, a tedious enumeration of every permutation of things people do with information—and what might be charged for each.

unfortunately for them, none of this would be possible unless they could control how people use their computers and the files we transfer to them. after all, it was easy to talk about selling someone a tune to download to their mp3 player, but not so easy to talk about the the right to move music from the player to another device. but how the hell could you stop that once you'd given them the file? in order to do so, you needed to figure out how to stop computers from running certain programs and inspecting certain files and processes. for example, you could encrypt the file, and then require the user to run a program that only unlocked the file under certain circumstances.

but, as they say on the internet, now you have two problems.

you must now also stop the user from saving the file while it's unencrypted—which must happen eventually— and you must stop the user from figuring out where the unlocking program stores its keys, enabling them to permanently decrypt the media and ditch the stupid player app entirely.

now you have three problems: you must stop the users who figure out how to decrypt from sharing it with other users. now you've got four problems, because you must stop the users who figure out how to extract secrets from unlocking programs from telling other users how to do it too. and now you've got five problems, because you must stop users who figure out how to extract these secrets from telling other users what the secrets were!

that's a lot of problems. but by 1996, we had a solution. we had the wipo copyright treaty, passed by the united nations world intellectual property organization. this created laws that made it illegal to extract secrets from unlocking programs, and it created laws that made it illegal to extract media (such as songs and movies) from the unlocking programs while they were running. it created laws that made it illegal to tell people how to extract secrets from unlocking programs, and it created laws that made it illegal to host copyrighted works or the secrets. it also established a handy streamlined process that let you remove stuff from the internet without having to screw around with lawyers, and judges, and all that crap.

and with that, illegal copying ended forever, the information economy blossomed into a beautiful flower that brought prosperity to the whole wide world; as they say on the aircraft carriers, “mission accomplished".

that's not how the story ends, of course, because pretty much anyone who understood computers and networks understood that these laws would create more problems than they could possibly solve. after all, these laws made it illegal to look inside your computer when it was running certain programs. they made it illegal to tell people what you found when you looked inside your computer, and they made it easy to censor material on the internet without having to prove that anything wrong had happened.

in short, they made unrealistic demands on reality and reality did not oblige them. copying only got easier following the passage of these laws—copying will only ever get easier. right now is as hard as copying will get. your grandchildren will turn to you and say “tell me again, grandpa, about when it was hard to copy things in 2012, when you couldn't get a drive the size of your fingernail that could hold every song ever recorded, every movie ever made, every word ever spoken, every picture ever taken, everything, and transfer it in such a short period of time you didn't even notice it was doing it."

reality asserts itself. like the nursery rhyme lady who swallows a spider to catch a fly, and has to swallow a bird to catch the spider, and a cat to catch the bird, so must these regulations, which have broad general appeal but are disastrous in their implementation. each regulation begets a new one, aimed at shoring up its own failures.

it's tempting to stop the story here and conclude that the problem is that lawmakers are either clueless or evil, or possibly evilly clueless. this is not a very satisfying place to go, because it's fundamentally a counsel of despair; it suggests that our problems cannot be solved for so long as stupidity and evilness are present in the halls of power, which is to say they will never be solved. but i have another theory about what's happened.

it's not that regulators don't understand information technology, because it should be possible to be a non-expert and still make a good law. mps and congressmen and so on are elected to represent districts and people, not disciplines and issues. we don't have a member of parliament for biochemistry, and we don't have a senator from the great state of urban planning. and yet those people who are experts in policy and politics, not technical disciplines, still manage to pass good rules that make sense. that's because government relies on heuristics: rules of thumb about how to balance expert input from different sides of an issue.

unfortunately, information technology confounds these heuristics—it kicks the crap out of them—in one important way.

the important tests of whether or not a regulation is fit for a purpose are first whether it will work, and second whether or not it will, in the course of doing its work, have effects on everything else. if i wanted congress, parliament, or the e.u. to regulate a wheel, it's unlikely i'd succeed. if i turned up, pointed out that bank robbers always make their escape on wheeled vehicles, and asked, “can't we do something about this?", the answer would be “no". this is because we don't know how to make a wheel that is still generally useful for legitimate wheel applications, but useless to bad guys. we can all see that the general benefits of wheels are so profound that we'd be foolish to risk changing them in a foolish errand to stop bank robberies. even if there were an epidemic of bank robberies—even if society were on the verge of collapse thanks to bank robberies—no-one would think that wheels were the right place to start solving our problems.

however, if i were to show up in that same body to say that i had absolute proof that hands-free phones were making cars dangerous, and i requested a law prohibiting hands-free phones in cars, the regulator might say “yeah, i'd take your point, we'd do that."

we might disagree about whether or not this is a good idea, or whether or not my evidence made sense, but very few of us would say that once you take the hands-free phones out of the car, they stop being cars.

we understand that cars remain cars even if we remove features from them. cars are special-purpose, at least in comparison to wheels, and all that the addition of a hands-free phone does is add one more feature to an already-specialized technology. there's a heuristic for this: special-purpose technologies are complex, and you can remove features from them without doing fundamental, disfiguring violence to their underlying utility.

this rule of thumb serves regulators well, by and large, but it is rendered null and void by the general-purpose computer and the general-purpose network—the pc and the internet. if you think of computer software as a feature, a computer with spreadsheets running on it has a spreadsheet feature, and one that's running world of warcraft has an mmorpg feature. the heuristic would lead you to think that a computer unable to run spreadsheets or games would be no more of an attack on computing than a ban on car-phones would be an attack on cars.

and, if you think of protocols and websites as features of the network, then saying “fix the internet so that it doesn't run bittorrent", or “fix the internet so that thepiratebay.org no longer resolves," sounds a lot like “change the sound of busy signals," or “take that pizzeria on the corner off the phone network," and not like an attack on the fundamental principles of internetworking.

the rule of thumb works for cars, for houses, and for every other substantial area of technological regulation. not realizing that it fails for the internet does not make you evil, and it does not make you an ignoramus. it just makes you part of that vast majority of the world, for whom ideas like turing completeness and end-to-end are meaningless.

so, our regulators go off, they blithely pass these laws, and they become part of the reality of our technological world. there are, suddenly, numbers that we aren't allowed to write down on the internet, programs we're not allowed to publish, and all it takes to make legitimate material disappear from the internet is the mere accusation of copyright infringement. it fails to attain the goal of the regulation, because it doesn't stop people from violating copyright, but it bears a kind of superficial resemblance to copyright enforcement—it satisfies the security syllogism: “something must be done, i am doing something, something has been done." as a result, any failures that arise can be blamed on the idea that the regulation doesn't go far enough, rather than the idea that it was flawed from the outset.

this kind of superficial resemblance and underlying divergence happens in other engineering contexts. i've a friend, who was once a senior executive at a big consumer packaged goods company, who told me what happened when the marketing department told the engineers that they'd thought up a great idea for detergent: from now on, they were going to make detergent that made your clothes newer every time you washed them!

after the engineers had tried unsuccessfully to convey the concept of entropy to the marketing department, they arrived at another solution: they'd develop a detergent that used enzymes that attacked loose fiber ends, the kind that you get with broken fibers that make your clothes look old. so every time you washed your clothes in the detergent, they would look newer. unfortunately, that was because the detergent was digesting your clothes. using it would literally cause your clothes to dissolve in the washing machine.

this was, needless to say, the opposite of making clothes newer. instead, you were artificially aging them every time you washed them, and as the user, the more you deployed the “solution", the more drastic your measures had to be to keep your clothes up to date. eventually, you would have to buy new clothes because the old ones fell apart.

today we have marketing departments that say things such as “we don't need computers, we need appliances. make me a computer that doesn't run every program, just a program that does this specialized task, like streaming audio, or routing packets, or playing xbox games, and make sure it doesn't run programs that i haven't authorized that might undermine our profits."

on the surface, this seems like a reasonable idea: a program that does one specialized task. after all, we can put an electric motor in a blender, and we can install a motor in a dishwasher, and we don't worry if it's still possible to run a dishwashing program in a blender. but that's not what we do when we turn a computer into an appliance. we're not making a computer that runs only the “appliance" app; we're taking a computer that can run every program, then using a combination of rootkits, spyware, and code-signing to prevent the user from knowing which processes are running, from installing her own software, and from terminating processes that she doesn't want. in other words, an appliance is not a stripped-down computer—it is a fully functional computer with spyware on it out of the box.

we don't know how to build a general-purpose computer that is capable of running any program except for some program that we don't like, is prohibited by law, or which loses us money. the closest approximation that we have to this is a computer with spyware: a computer on which remote parties set policies without the computer user's knowledge, or over the objection of the computer's owner. digital rights management always converges on malware.

in one famous incident—a gift to people who share this hypothesis—sony loaded covert rootkit installers on 6 million audio cds, which secretly executed programs that watched for attempts to read the sound files on cds and terminated them. it also hid the rootkit's existence by causing the computer operating system's kernel to lie about which processes were running, and which files were present on the drive. but that's not the only example. nintendo's 3ds opportunistically updates its firmware, and does an integrity check to make sure that you haven't altered the old firmware in any way. if it detects signs of tampering, it turns itself into a brick.

human rights activists have raised alarms over u-efi, the new pc bootloader, which restricts your computer so it only runs “signed" operating systems, noting that repressive governments will likely withhold signatures from operating systems unless they allow for covert surveillance operations.

on the network side, attempts to make a network that can't be used for copyright infringement always converge with the surveillance measures that we know from repressive governments. consider sopa, the u.s. stop online piracy act, which bans innocuous tools such as dnssec—a security suite that authenticates domain name information— because they might be used to defeat dns blocking measures. it blocks tor, an online anonymity tool sponsored by the u.s. naval research laboratory and used by dissidents in oppressive regimes, because it can be used to circumvent ip blocking measures.

in fact, the motion picture association of america, a sopa proponent, circulated a memo citing research that sopa might work because it uses the same measures as are used in syria, china, and uzbekistan. it argued that because these measures are effective in those countries, they would work in america, too!

it may seem like sopa is the endgame in a long fight over copyright and the internet, and it may seem that if we defeat sopa, we'll be well on our way to securing the freedom of pcs and networks. but as i said at the beginning of this talk, this isn't about copyright.

the copyright wars are just the beta version of a long coming war on computation. the entertainment industry is just the first belligerents to take up arms, and we tend to think of them as particularly successful. after all, here is sopa, trembling on the verge of passage, ready to break the internet on a fundamental level— all in the name of preserving top 40 music, reality tv shows, and ashton kutcher movies.

but the reality is that copyright legislation gets as far as it does precisely because it's not taken seriously by politicians. this is why, on one hand, canada has had parliament after parliament introduce one awful copyright bill after another, but on the other hand, parliament after parliament has failed to actually vote on each bill. it's why sopa, a bill composed of pure stupid and pieced together molecule-by-molecule into a kind of “stupidite 250" normally only found in the heart of newborn stars, had its rushed-through sopa hearings adjourned midway through the christmas break: so that lawmakers could get into a vicious national debate over an important issue, unemployment insurance.

it's why the world intellectual property organization is gulled time and again into enacting crazed, pig-ignorant copyright proposals: because when the nations of the world send their u.n. missions to geneva, they send water experts, not copyright experts. they send health experts, not copyright experts. they send agriculture experts, not copyright experts, because copyright is just not as important.

canada's parliament didn't vote on its copyright bills because, of all the things that canada needs to do, fixing copyright ranks well below health emergencies on first nations reservations, exploiting the oil patch in alberta, interceding in sectarian resentments among french- and english-speakers, solving resources crises in the nation's fisheries, and a thousand other issues. the triviality of copyright tells you that when other sectors of the economy start to evince concerns about the internet and the pc, copyright will be revealed for a minor skirmish—not a war.

why might other sectors come to nurse grudges against computers in the way the entertainment business already has? the world we live in today is made of computers. we don't have cars anymore; we have computers we ride in. we don't have airplanes anymore; we have flying solaris boxes attached to bucketfuls of industrial control systems. a 3d printer is not a device, it's a peripheral, and it only works connected to a computer. a radio is no longer a crystal: it's a general-purpose computer, running software. the grievances that arise from unauthorized copies of snooki's confessions of a guidette are trivial when compared to the calls-to-action that our computer-embroidered reality will soon create.

consider radio. radio regulation until today was based on the idea that the properties of a radio are fixed at the time of manufacture, and can't be easily altered. you can't just flip a switch on your baby monitor and interfere with other signals. but powerful software-defined radios (sdrs) can change from baby monitor to emergency services dispatcher or air traffic controller, just by loading and executing different software. this is why the federal communications commission (fcc) considered what would happen when we put sdrs in the field, and asked for comment on whether it should mandate that all software-defined radios should be embedded in “trusted computing" machines. ultimately, the question is whether every pc should be locked, so that their programs could be strictly regulated by central authorities.

even this is a shadow of what is to come. after all, this was the year in which we saw the debut of open source shape files for converting ar-15 rifles to full-automatic. this was the year of crowd-funded open-sourced hardware for genetic sequencing. and while 3d printing will give rise to plenty of trivial complaints, there will be judges in the american south and mullahs in iran who will lose their minds over people in their jurisdictions printing out sex toys. the trajectory of 3d printing will raise real grievances, from solid-state meth labs to ceramic knives.

it doesn't take a science fiction writer to understand why regulators might be nervous about the user-modifiable firmware on self-driving cars, or limiting interoperability for aviation controllers, or the kind of thing you could do with bio-scale assemblers and sequencers. imagine what will happen the day that monsanto determines that it's really important to make sure that computers can't execute programs which cause specialized peripherals to output custom organisms which literally eat their lunch.

regardless of whether you think these are real problems or hysterical fears, they are, nevertheless, the political currency of lobbies and interest groups far more influential than hollywood and big content. every one of them will arrive at the same place: “can't you just make us a general-purpose computer that runs all the programs, except the ones that scare and anger us? can't you just make us an internet that transmits any message over any protocol between any two points, unless it upsets us?"

there will be programs that run on general-purpose computers, and peripherals, that will freak even me out. so i can believe that people who advocate for limiting general-purpose computers will find a receptive audience. but just as we saw with the copyright wars, banning certain instructions, protocols or messages will be wholly ineffective as a means of prevention and remedy. as we saw in the copyright wars, all attempts at controlling pcs will converge on rootkits, and all attempts at controlling the internet will converge on surveillance and censorship. this stuff matters because we've spent the last decade sending our best players out to fight what we thought was the final boss at the end of the game, but it turns out it's just been an end-level guardian. the stakes are only going to get higher.

as a member of the walkman generation, i have made peace with the fact that i will require a hearing aid long before i die. it won't be a hearing aid, though; it will really be a computer. so when i get into a car—a computer that i put my body into—with my hearing aid—a computer i put inside my body—i want to know that these technologies are not designed to keep secrets from me, or to prevent me from terminating processes on them that work against my interests.

last year, the lower merion school district, in a middle-class, affluent suburb of philadelphia, found itself in a great deal of trouble. it was caught distributing, to its students, rootkitted laptops that allowed remote covert surveillance through the computer's camera and network connection. they photographed students thousands of times, at home and at school, awake and asleep, dressed and naked. meanwhile, the latest generation of lawful intercept technology can covertly operate cameras, microphones, and gps tranceivers on pcs, tablets, and mobile devices.

we haven't lost yet, but we have to win the copyright war first if we want to keep the internet and the pc free and open. freedom in the future will require us to have the capacity to monitor our devices and set meaningful policies for them; to examine and terminate the software processes that runs on them; and to maintain them as honest servants to our will, not as traitors and spies working for criminals, thugs, and control freaks.

note: the comments below are closed. discuss this post in the bbs forums.






skooba laptop weekender travel bag - a carry-on bag for gadget lovers

i go somewhere on a plane at least twice a month. for over ten years i’ve used a briggs & riley roller carry-on, and i’ve been fairly happy with it. it’s heavy for its small size and the zipper pulls all broke off (i made replacements from binder clips and sugru) so i’ve been keeping my eye out for a replacement. after hearing great things about the accessibility and capacity of the skooba weekender duffle, i decided to give it a try. it turned out the be the most convenient carry-on i’ve ever used.

(more…)





mophie juice pack powerstation duo: all day charger for mobile gadgets

i bought this usb charging unit because i have a lousy sense of direction. i get lost in buildings and in cities, even ones i’m familiar with. my iphone’s gps map is a godsend. i use it when i’m driving, walking, and taking public transportation.

when i was in tokyo in june, i brought along a small android phone installed with a local data sim card. i used the phone as a wireless hotspot for my iphone, and appreciated having access to the online map to guide me from my hotel to the subway station, and to attractions like the tsukiji fish market and kabuki-cho. it was also nice to call home using skype, and to post instagram photos. the only problem was that the batteries on the android phone and iphone drained after a few hours, forcing me to ask people, chikatetsu wa doko desu ka? in badly-accented japanese, to find the nearest subway station.

(more…)





astonishingly absorbent towel

i take at least two daily showers and have problems with cotton towels getting damp, smelly, and yucky because they can’t dry quickly enough in the hours between. i recently turned to an item i’ve had for a year and used for the opposite intended purpose — the ergodyne chill-its is designed to keep someone cool on a hot day by absorbing a lot of water and evaporating gradually. but, since it’s moisture-absorbent, it can also be used for the effectively inverse purpose: get you dry fast!

(more…)





author kim newman on his new anno dracula novel, johnny alucard (plus excerpt)

johnny alucard is the fourth book in the anno dracula series; the earlier novels are anno dracula,the bloody red baron and dracula cha cha cha -- and the definitive titan editions include the long novellas ‘vampire romance’ and ‘aquarius’.

the premise is that in 1885 count dracula came to britain, as bram stoker describes in his novel … but rather than being defeated by van helsing, he rose to power, becoming queen victoria’s second husband and popularising vampirism as a lifestyle choice at the heart of the british empire. he also imported all the other surviving vampires of fiction as his retinue of hangers-on and toadies.

all this is in the first book -- which revolves around stoker’s dr. seward, who has become a vampire-slaying jack the ripper. the subsequent volumes cover the next hundred years and have a global reach, with dracula moving from country to country and era to era … and manifesting the ills of the century even when seemingly dead again. in johnny alucard, the story moves from europe to america, and we follow the rise of a romanian orphan who becomes dracula’s heir apparent as he conquers such american fields of endeavour as drug-dealing, movie production, serial murder, and covert military intervention in other countries.

(more…)





lockdown: the coming war on general-purpose computing

image

lockdown

the coming war on general-purpose computing

by cory doctorow - share this article

this article is based on a keynote speech to the chaos computer congress in berlin, dec. 2011.

general-purpose computers are astounding. they're so astounding that our society still struggles to come to grips with them, what they're for, how to accommodate them, and how to cope with them. this brings us back to something you might be sick of reading about: copyright.

but bear with me, because this is about something more important. the shape of the copyright wars clues us into an upcoming fight over the destiny of the general-purpose computer itself.

in the beginning, we had packaged software and we had sneakernet. we had floppy disks in ziplock bags, in cardboard boxes, hung on pegs in shops, and sold like candy bars and magazines. they were eminently susceptible to duplication, were duplicated quickly, and widely, and this was to the great chagrin of people who made and sold software.

enter digital rights management in its most primitive forms: let's call it drm 0.96. they introduced physical indicia which the software checked for—deliberate damage, dongles, hidden sectors—and challenge-response protocols that required possession of large, unwieldy manuals that were difficult to copy.

these failed for two reasons. first, they were commercially unpopular, because they reduced the usefulness of the software to the legitimate purchasers. honest buyers resented the non-functionality of their backups, they hated the loss of scarce ports to the authentication dongles, and they chafed at the inconvenience of having to lug around large manuals when they wanted to run their software. second, these didn't stop pirates, who found it trivial to patch the software and bypass authentication. people who took the software without paying for it were untouched.

typically, the way this happened is a programmer, with possession of technology and expertise of equivalent sophistication to the software vendor itself, would reverse-engineer the software and circulate cracked versions. while this sounds highly specialized, it really wasn't. figuring out what recalcitrant programs were doing and routing around media defects were core skills for computer programmers, especially in the era of fragile floppy disks and the rough-and-ready early days of software development. anti-copying strategies only became more fraught as networks spread; once we had bulletin boards, online services, usenet newsgroups and mailing lists, the expertise of people who figured out how to defeat these authentication systems could be packaged up in software as little crack files. as network capacity increased, the cracked disk images or executables themselves could be spread on their own.

this gave us drm 1.0. by 1996, it became clear to everyone in the halls of power that there was something important about to happen. we were about to have an information economy, whatever the hell that was. they assumed it meant an economy where we bought and sold information. information technology improves efficiency, so imagine the markets that an information economy would have! you could buy a book for a day, you could sell the right to watch the movie for a euro, and then you could rent out the pause button for a penny per second. you could sell movies for one price in one country, at another price in another, and so on. the fantasies of those days were like a boring science fiction adaptation of the old testament book of numbers, a tedious enumeration of every permutation of things people do with information—and what might be charged for each.

unfortunately for them, none of this would be possible unless they could control how people use their computers and the files we transfer to them. after all, it was easy to talk about selling someone a tune to download to their mp3 player, but not so easy to talk about the the right to move music from the player to another device. but how the hell could you stop that once you'd given them the file? in order to do so, you needed to figure out how to stop computers from running certain programs and inspecting certain files and processes. for example, you could encrypt the file, and then require the user to run a program that only unlocked the file under certain circumstances.

but, as they say on the internet, now you have two problems.

you must now also stop the user from saving the file while it's unencrypted—which must happen eventually— and you must stop the user from figuring out where the unlocking program stores its keys, enabling them to permanently decrypt the media and ditch the stupid player app entirely.

now you have three problems: you must stop the users who figure out how to decrypt from sharing it with other users. now you've got four problems, because you must stop the users who figure out how to extract secrets from unlocking programs from telling other users how to do it too. and now you've got five problems, because you must stop users who figure out how to extract these secrets from telling other users what the secrets were!

that's a lot of problems. but by 1996, we had a solution. we had the wipo copyright treaty, passed by the united nations world intellectual property organization. this created laws that made it illegal to extract secrets from unlocking programs, and it created laws that made it illegal to extract media (such as songs and movies) from the unlocking programs while they were running. it created laws that made it illegal to tell people how to extract secrets from unlocking programs, and it created laws that made it illegal to host copyrighted works or the secrets. it also established a handy streamlined process that let you remove stuff from the internet without having to screw around with lawyers, and judges, and all that crap.

and with that, illegal copying ended forever, the information economy blossomed into a beautiful flower that brought prosperity to the whole wide world; as they say on the aircraft carriers, “mission accomplished".

that's not how the story ends, of course, because pretty much anyone who understood computers and networks understood that these laws would create more problems than they could possibly solve. after all, these laws made it illegal to look inside your computer when it was running certain programs. they made it illegal to tell people what you found when you looked inside your computer, and they made it easy to censor material on the internet without having to prove that anything wrong had happened.

in short, they made unrealistic demands on reality and reality did not oblige them. copying only got easier following the passage of these laws—copying will only ever get easier. right now is as hard as copying will get. your grandchildren will turn to you and say “tell me again, grandpa, about when it was hard to copy things in 2012, when you couldn't get a drive the size of your fingernail that could hold every song ever recorded, every movie ever made, every word ever spoken, every picture ever taken, everything, and transfer it in such a short period of time you didn't even notice it was doing it."

reality asserts itself. like the nursery rhyme lady who swallows a spider to catch a fly, and has to swallow a bird to catch the spider, and a cat to catch the bird, so must these regulations, which have broad general appeal but are disastrous in their implementation. each regulation begets a new one, aimed at shoring up its own failures.

it's tempting to stop the story here and conclude that the problem is that lawmakers are either clueless or evil, or possibly evilly clueless. this is not a very satisfying place to go, because it's fundamentally a counsel of despair; it suggests that our problems cannot be solved for so long as stupidity and evilness are present in the halls of power, which is to say they will never be solved. but i have another theory about what's happened.

it's not that regulators don't understand information technology, because it should be possible to be a non-expert and still make a good law. mps and congressmen and so on are elected to represent districts and people, not disciplines and issues. we don't have a member of parliament for biochemistry, and we don't have a senator from the great state of urban planning. and yet those people who are experts in policy and politics, not technical disciplines, still manage to pass good rules that make sense. that's because government relies on heuristics: rules of thumb about how to balance expert input from different sides of an issue.

unfortunately, information technology confounds these heuristics—it kicks the crap out of them—in one important way.

the important tests of whether or not a regulation is fit for a purpose are first whether it will work, and second whether or not it will, in the course of doing its work, have effects on everything else. if i wanted congress, parliament, or the e.u. to regulate a wheel, it's unlikely i'd succeed. if i turned up, pointed out that bank robbers always make their escape on wheeled vehicles, and asked, “can't we do something about this?", the answer would be “no". this is because we don't know how to make a wheel that is still generally useful for legitimate wheel applications, but useless to bad guys. we can all see that the general benefits of wheels are so profound that we'd be foolish to risk changing them in a foolish errand to stop bank robberies. even if there were an epidemic of bank robberies—even if society were on the verge of collapse thanks to bank robberies—no-one would think that wheels were the right place to start solving our problems.

however, if i were to show up in that same body to say that i had absolute proof that hands-free phones were making cars dangerous, and i requested a law prohibiting hands-free phones in cars, the regulator might say “yeah, i'd take your point, we'd do that."

we might disagree about whether or not this is a good idea, or whether or not my evidence made sense, but very few of us would say that once you take the hands-free phones out of the car, they stop being cars.

we understand that cars remain cars even if we remove features from them. cars are special-purpose, at least in comparison to wheels, and all that the addition of a hands-free phone does is add one more feature to an already-specialized technology. there's a heuristic for this: special-purpose technologies are complex, and you can remove features from them without doing fundamental, disfiguring violence to their underlying utility.

this rule of thumb serves regulators well, by and large, but it is rendered null and void by the general-purpose computer and the general-purpose network—the pc and the internet. if you think of computer software as a feature, a computer with spreadsheets running on it has a spreadsheet feature, and one that's running world of warcraft has an mmorpg feature. the heuristic would lead you to think that a computer unable to run spreadsheets or games would be no more of an attack on computing than a ban on car-phones would be an attack on cars.

and, if you think of protocols and websites as features of the network, then saying “fix the internet so that it doesn't run bittorrent", or “fix the internet so that thepiratebay.org no longer resolves," sounds a lot like “change the sound of busy signals," or “take that pizzeria on the corner off the phone network," and not like an attack on the fundamental principles of internetworking.

the rule of thumb works for cars, for houses, and for every other substantial area of technological regulation. not realizing that it fails for the internet does not make you evil, and it does not make you an ignoramus. it just makes you part of that vast majority of the world, for whom ideas like turing completeness and end-to-end are meaningless.

so, our regulators go off, they blithely pass these laws, and they become part of the reality of our technological world. there are, suddenly, numbers that we aren't allowed to write down on the internet, programs we're not allowed to publish, and all it takes to make legitimate material disappear from the internet is the mere accusation of copyright infringement. it fails to attain the goal of the regulation, because it doesn't stop people from violating copyright, but it bears a kind of superficial resemblance to copyright enforcement—it satisfies the security syllogism: “something must be done, i am doing something, something has been done." as a result, any failures that arise can be blamed on the idea that the regulation doesn't go far enough, rather than the idea that it was flawed from the outset.

this kind of superficial resemblance and underlying divergence happens in other engineering contexts. i've a friend, who was once a senior executive at a big consumer packaged goods company, who told me what happened when the marketing department told the engineers that they'd thought up a great idea for detergent: from now on, they were going to make detergent that made your clothes newer every time you washed them!

after the engineers had tried unsuccessfully to convey the concept of entropy to the marketing department, they arrived at another solution: they'd develop a detergent that used enzymes that attacked loose fiber ends, the kind that you get with broken fibers that make your clothes look old. so every time you washed your clothes in the detergent, they would look newer. unfortunately, that was because the detergent was digesting your clothes. using it would literally cause your clothes to dissolve in the washing machine.

this was, needless to say, the opposite of making clothes newer. instead, you were artificially aging them every time you washed them, and as the user, the more you deployed the “solution", the more drastic your measures had to be to keep your clothes up to date. eventually, you would have to buy new clothes because the old ones fell apart.

today we have marketing departments that say things such as “we don't need computers, we need appliances. make me a computer that doesn't run every program, just a program that does this specialized task, like streaming audio, or routing packets, or playing xbox games, and make sure it doesn't run programs that i haven't authorized that might undermine our profits."

on the surface, this seems like a reasonable idea: a program that does one specialized task. after all, we can put an electric motor in a blender, and we can install a motor in a dishwasher, and we don't worry if it's still possible to run a dishwashing program in a blender. but that's not what we do when we turn a computer into an appliance. we're not making a computer that runs only the “appliance" app; we're taking a computer that can run every program, then using a combination of rootkits, spyware, and code-signing to prevent the user from knowing which processes are running, from installing her own software, and from terminating processes that she doesn't want. in other words, an appliance is not a stripped-down computer—it is a fully functional computer with spyware on it out of the box.

we don't know how to build a general-purpose computer that is capable of running any program except for some program that we don't like, is prohibited by law, or which loses us money. the closest approximation that we have to this is a computer with spyware: a computer on which remote parties set policies without the computer user's knowledge, or over the objection of the computer's owner. digital rights management always converges on malware.

in one famous incident—a gift to people who share this hypothesis—sony loaded covert rootkit installers on 6 million audio cds, which secretly executed programs that watched for attempts to read the sound files on cds and terminated them. it also hid the rootkit's existence by causing the computer operating system's kernel to lie about which processes were running, and which files were present on the drive. but that's not the only example. nintendo's 3ds opportunistically updates its firmware, and does an integrity check to make sure that you haven't altered the old firmware in any way. if it detects signs of tampering, it turns itself into a brick.

human rights activists have raised alarms over u-efi, the new pc bootloader, which restricts your computer so it only runs “signed" operating systems, noting that repressive governments will likely withhold signatures from operating systems unless they allow for covert surveillance operations.

on the network side, attempts to make a network that can't be used for copyright infringement always converge with the surveillance measures that we know from repressive governments. consider sopa, the u.s. stop online piracy act, which bans innocuous tools such as dnssec—a security suite that authenticates domain name information— because they might be used to defeat dns blocking measures. it blocks tor, an online anonymity tool sponsored by the u.s. naval research laboratory and used by dissidents in oppressive regimes, because it can be used to circumvent ip blocking measures.

in fact, the motion picture association of america, a sopa proponent, circulated a memo citing research that sopa might work because it uses the same measures as are used in syria, china, and uzbekistan. it argued that because these measures are effective in those countries, they would work in america, too!

it may seem like sopa is the endgame in a long fight over copyright and the internet, and it may seem that if we defeat sopa, we'll be well on our way to securing the freedom of pcs and networks. but as i said at the beginning of this talk, this isn't about copyright.

the copyright wars are just the beta version of a long coming war on computation. the entertainment industry is just the first belligerents to take up arms, and we tend to think of them as particularly successful. after all, here is sopa, trembling on the verge of passage, ready to break the internet on a fundamental level— all in the name of preserving top 40 music, reality tv shows, and ashton kutcher movies.

but the reality is that copyright legislation gets as far as it does precisely because it's not taken seriously by politicians. this is why, on one hand, canada has had parliament after parliament introduce one awful copyright bill after another, but on the other hand, parliament after parliament has failed to actually vote on each bill. it's why sopa, a bill composed of pure stupid and pieced together molecule-by-molecule into a kind of “stupidite 250" normally only found in the heart of newborn stars, had its rushed-through sopa hearings adjourned midway through the christmas break: so that lawmakers could get into a vicious national debate over an important issue, unemployment insurance.

it's why the world intellectual property organization is gulled time and again into enacting crazed, pig-ignorant copyright proposals: because when the nations of the world send their u.n. missions to geneva, they send water experts, not copyright experts. they send health experts, not copyright experts. they send agriculture experts, not copyright experts, because copyright is just not as important.

canada's parliament didn't vote on its copyright bills because, of all the things that canada needs to do, fixing copyright ranks well below health emergencies on first nations reservations, exploiting the oil patch in alberta, interceding in sectarian resentments among french- and english-speakers, solving resources crises in the nation's fisheries, and a thousand other issues. the triviality of copyright tells you that when other sectors of the economy start to evince concerns about the internet and the pc, copyright will be revealed for a minor skirmish—not a war.

why might other sectors come to nurse grudges against computers in the way the entertainment business already has? the world we live in today is made of computers. we don't have cars anymore; we have computers we ride in. we don't have airplanes anymore; we have flying solaris boxes attached to bucketfuls of industrial control systems. a 3d printer is not a device, it's a peripheral, and it only works connected to a computer. a radio is no longer a crystal: it's a general-purpose computer, running software. the grievances that arise from unauthorized copies of snooki's confessions of a guidette are trivial when compared to the calls-to-action that our computer-embroidered reality will soon create.

consider radio. radio regulation until today was based on the idea that the properties of a radio are fixed at the time of manufacture, and can't be easily altered. you can't just flip a switch on your baby monitor and interfere with other signals. but powerful software-defined radios (sdrs) can change from baby monitor to emergency services dispatcher or air traffic controller, just by loading and executing different software. this is why the federal communications commission (fcc) considered what would happen when we put sdrs in the field, and asked for comment on whether it should mandate that all software-defined radios should be embedded in “trusted computing" machines. ultimately, the question is whether every pc should be locked, so that their programs could be strictly regulated by central authorities.

even this is a shadow of what is to come. after all, this was the year in which we saw the debut of open source shape files for converting ar-15 rifles to full-automatic. this was the year of crowd-funded open-sourced hardware for genetic sequencing. and while 3d printing will give rise to plenty of trivial complaints, there will be judges in the american south and mullahs in iran who will lose their minds over people in their jurisdictions printing out sex toys. the trajectory of 3d printing will raise real grievances, from solid-state meth labs to ceramic knives.

it doesn't take a science fiction writer to understand why regulators might be nervous about the user-modifiable firmware on self-driving cars, or limiting interoperability for aviation controllers, or the kind of thing you could do with bio-scale assemblers and sequencers. imagine what will happen the day that monsanto determines that it's really important to make sure that computers can't execute programs which cause specialized peripherals to output custom organisms which literally eat their lunch.

regardless of whether you think these are real problems or hysterical fears, they are, nevertheless, the political currency of lobbies and interest groups far more influential than hollywood and big content. every one of them will arrive at the same place: “can't you just make us a general-purpose computer that runs all the programs, except the ones that scare and anger us? can't you just make us an internet that transmits any message over any protocol between any two points, unless it upsets us?"

there will be programs that run on general-purpose computers, and peripherals, that will freak even me out. so i can believe that people who advocate for limiting general-purpose computers will find a receptive audience. but just as we saw with the copyright wars, banning certain instructions, protocols or messages will be wholly ineffective as a means of prevention and remedy. as we saw in the copyright wars, all attempts at controlling pcs will converge on rootkits, and all attempts at controlling the internet will converge on surveillance and censorship. this stuff matters because we've spent the last decade sending our best players out to fight what we thought was the final boss at the end of the game, but it turns out it's just been an end-level guardian. the stakes are only going to get higher.

as a member of the walkman generation, i have made peace with the fact that i will require a hearing aid long before i die. it won't be a hearing aid, though; it will really be a computer. so when i get into a car—a computer that i put my body into—with my hearing aid—a computer i put inside my body—i want to know that these technologies are not designed to keep secrets from me, or to prevent me from terminating processes on them that work against my interests.

last year, the lower merion school district, in a middle-class, affluent suburb of philadelphia, found itself in a great deal of trouble. it was caught distributing, to its students, rootkitted laptops that allowed remote covert surveillance through the computer's camera and network connection. they photographed students thousands of times, at home and at school, awake and asleep, dressed and naked. meanwhile, the latest generation of lawful intercept technology can covertly operate cameras, microphones, and gps tranceivers on pcs, tablets, and mobile devices.

we haven't lost yet, but we have to win the copyright war first if we want to keep the internet and the pc free and open. freedom in the future will require us to have the capacity to monitor our devices and set meaningful policies for them; to examine and terminate the software processes that runs on them; and to maintain them as honest servants to our will, not as traitors and spies working for criminals, thugs, and control freaks.

note: the comments below are closed. discuss this post in the bbs forums.






skooba laptop weekender travel bag - a carry-on bag for gadget lovers

i go somewhere on a plane at least twice a month. for over ten years i’ve used a briggs & riley roller carry-on, and i’ve been fairly happy with it. it’s heavy for its small size and the zipper pulls all broke off (i made replacements from binder clips and sugru) so i’ve been keeping my eye out for a replacement. after hearing great things about the accessibility and capacity of the skooba weekender duffle, i decided to give it a try. it turned out the be the most convenient carry-on i’ve ever used.

(more…)





mophie juice pack powerstation duo: all day charger for mobile gadgets

i bought this usb charging unit because i have a lousy sense of direction. i get lost in buildings and in cities, even ones i’m familiar with. my iphone’s gps map is a godsend. i use it when i’m driving, walking, and taking public transportation.

when i was in tokyo in june, i brought along a small android phone installed with a local data sim card. i used the phone as a wireless hotspot for my iphone, and appreciated having access to the online map to guide me from my hotel to the subway station, and to attractions like the tsukiji fish market and kabuki-cho. it was also nice to call home using skype, and to post instagram photos. the only problem was that the batteries on the android phone and iphone drained after a few hours, forcing me to ask people, chikatetsu wa doko desu ka? in badly-accented japanese, to find the nearest subway station.

(more…)





astonishingly absorbent towel

i take at least two daily showers and have problems with cotton towels getting damp, smelly, and yucky because they can’t dry quickly enough in the hours between. i recently turned to an item i’ve had for a year and used for the opposite intended purpose — the ergodyne chill-its is designed to keep someone cool on a hot day by absorbing a lot of water and evaporating gradually. but, since it’s moisture-absorbent, it can also be used for the effectively inverse purpose: get you dry fast!

(more…)





author kim newman on his new anno dracula novel, johnny alucard (plus excerpt)

johnny alucard is the fourth book in the anno dracula series; the earlier novels are anno dracula,the bloody red baron and dracula cha cha cha -- and the definitive titan editions include the long novellas ‘vampire romance’ and ‘aquarius’.

the premise is that in 1885 count dracula came to britain, as bram stoker describes in his novel … but rather than being defeated by van helsing, he rose to power, becoming queen victoria’s second husband and popularising vampirism as a lifestyle choice at the heart of the british empire. he also imported all the other surviving vampires of fiction as his retinue of hangers-on and toadies.

all this is in the first book -- which revolves around stoker’s dr. seward, who has become a vampire-slaying jack the ripper. the subsequent volumes cover the next hundred years and have a global reach, with dracula moving from country to country and era to era … and manifesting the ills of the century even when seemingly dead again. in johnny alucard, the story moves from europe to america, and we follow the rise of a romanian orphan who becomes dracula’s heir apparent as he conquers such american fields of endeavour as drug-dealing, movie production, serial murder, and covert military intervention in other countries.

(more…)