Wastholm.com

Thanks to the “smart” revolution, our appliances, watches, fridges, and televisions have gotten a computer-aided intelligence boost. But where there are computers, there is also copyrighted software, and where there is copyrighted software, there are often software locks. Under Section 1201 of the DMCA, you can’t pick that lock without permission. Even if you have no intention of pirating the software. Even if you just want to modify the programming or repair something you own.

As Green puts it, “Your computer is now only as secure as that database of keys held by Microsoft, which means it may be vulnerable to hackers, foreign governments, and people who can extort Microsoft employees.”

I guess the first question is why, why has one style swept across the web design world and been implemented across so many websites? I’ve thought and thought about this and never really come up with a single answer. Initially I looked at the huge theme market that exists where creators sell their themes to any number of customers. The theme market is massive, and as a result creators mimic the best selling work in an effort to make more money. You’re not going to make a lot of money in the theme market by going out on a limb and creating something incredibly unique and personalised. Generic wins out every time.

In an expertly designed data visualization, the Times guided us through its own version of events, which boils down to: Hamas started it, and Israel responded in self-defense. Data from the last three flare-ups is included in the same way, gently suggesting to readers that this is a pattern.

What follows is a breakdown of some ways that design can be misused to tell a biased story.

So who's to blame for all these bad stories and the sorry state of health journalism? One new study, published in the British Medical Journal, assigns a large fraction of blame to the press shops at various research universities. The study found that releases from these offices often overhype the findings of their scientists — while journalists play along uncritically, parroting whatever showed up in their inbox that day. Hype, they suggest, was manufactured in the ivory tower, not the newsroom.

This type of STARTTLS stripping attack has mostly gone unnoticed because it tends to be applied to residential networks, where it is uncommon to run an email server2. STARTTLS was also relatively uncommon until late 2013, when EFF started rating companies on whether they used it. Since then, many of the biggest email providers implemented STARTTLS to protect their customers. We continue to strongly encourage all providers to implement STARTTLS for both outbound and inbound email. Google's Safer email transparency report and starttls.info are good resources for checking whether a particular provider does.

Gmail represents a dying class of products that, like Google Reader, puts control in the hands of users, not signal-harvesting algorithms.

The news broke this morning that the NSA (US), the GCHQ (UK), and the FRA (Sweden) have been actively working to subvert the cryptography that makes our society tick, by planting backdoors in most if not all commercial cryptography software. This means that these agencies have deliberately made all of us vulnerable as we conduct our banking business, as we go to the hospital, and as we talk privately online. Our society depends on our ability to keep secrets, and the deliberate planting of backdoors, the deliberate subversion of our infrastructure, is nothing short of a declaration of war. Even according to U.S. Generals.

When the copyright industry is demanding that Google censors “search results” from their investigative reports, they are demanding that an investigative news agency alter their journalistic findings because those findings of fact happen to be starkly embarrassing to the copyright industry. Further, the copyright industry is also demanding that the news agency should lie to the public about what the world actually looks like.

|< First   < Previous   11–20 (40)   Next >   Last >|