Blog Archive: December 2012
More network problems
Another drop-back to GPRS mode on my network connection today: Dec 31 14:12:35 nerd-gw fstats: +CGREG 1 81E3 8FC8E66 Dec 31 14:12:41 nerd-gw fstats: +CGREG 1 81E3 142 That 3-character code in the last column appears to be an indication that the cell only does GPRS. The result is immediate: 64 bytes from 203.10.76.45: icmp_seq=74 ttl=54 time=88170.030 ms 64 bytes from 203.10.76.45: icmp_seq=75 ttl=54 time=87189.031 ms 64 bytes from 203.10.76.45: icmp_seq=76 ttl=54 time=86198.000 ms Tried restarting the ppp process, with only limited success: it came back in GPRS mode again, but soon changed to UTMS: Dec 31 14:17:46 nerd-gw fstats: +CGREG 1 F40 8FC48E8 Dec 31 14:17:52 nerd-gw fstats: +CGREG 2 ...
Freedom for Users, Not for Software
I finally published a short essay I wrote about a year ago: Freedom for Users, Not for Software. Anybody who has hung around the free software community for a while will be familiar with the confusion created by the ambiguity between "free as in price" versus "free as freedom." In the essay I argue that there is a less appreciated semantic ambiguity that arises when we begin to think that what matters is that software is free. Software doesn't need freedom, of course; Users of software need freedom. My essay looks at how the focus on free software, as opposed to on free users, has created challenges and divisions in the free software movement.
All outages are due to a failure to plan
I can't take credit for this, as a co-worker recently introduced me to this point. All outages are, at their core, a failure to plan. If a dead component (for example, a hard drive) failed, then there was a lack of planning for failed components. Components fail. Hard disks, RAM chips, CPUs, mother boards, power supplies, even ethernet cables fail. If a component fails and causes a visible outage, then there was a failure to plan for enough redundancy to survive the outage. There are technologies that, with prior forethought, can be included in a design to make any single component's failure a non-issue.
Terms of Service as a Security Threat
After the Instagram debacle, where it changed its terms of service to give itself greater rights over user photos and reversed itself after a user backlash, it's worth thinking about the security threat stemming from terms of service in general. As cloud computing becomes the norm, as Internet security becomes more feudal, these terms of service agreements define what our...
Whats entropy?
I sat down with the fascinating crew at the Titanium Physicists podcast to serve as their special physics-ignoramus guest in an episode about entropy (MP3)
Little Brother on stage in print!
The next issue of Theatre Bay Area will feature the full text of Josh Costello's theatrical adaptation of my novel Little Brother, which was incredibly well-received on stage in San Francisco last year.
The new cvr2
It's been over a week since I got the new Ethernet card, a prerequisite to swapping the bodies of dereel (test machine) and cvr2 (TV recorder). The latter machine is much faster, just what I need to install Microsoft on and run DxO Optics Pro at a bearable speed. The problem is that the Ethernet chip on the dereel motherboard was damaged thanks to a Powercor power surge. Thus the new Ethernet card. Problem: it didn't work in the motherboard for which it was intended. It worked fine in cvr2, but that has a functional interface on the motherboard. Was it the difference between FreeBSD (dereel) and Linux (cvr2)?
Joining MPEG clips
Yesterday I took a couple of not-very-good video clips of Yvonne and Chris riding horses. Yvonne wanted to join them together, something that I've tried before with only limited success. Finally got round to writing a minimal script to do the joining, in the process determining that yes, indeed, there's some problem with the avidemux2 audio. So mencoder it is: joinmpeg () { RESULT=$1 TMP=/tmp/clip$$ shift cat $* > $TMP mencoder -forceidx -oac copy -ovc copy $TMP -o $RESULT rm $TMP }
Links for Friday, December 28, 2012
KHK Stock Gears – “8399 types of Stock Gears for Robots.“ Welcome to RobotShop U.S.A. – “RobotShop, the World’s Leading Robot Store for Personal and Professional Robot Technology. Here you will find personal robots, professional robots, robot toys, robot kits … Continue reading →
Friday Squid Blogging: William Gilly, Squid Researcher
Good article. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....
I Seem to Be a Verb
From "The Insider's TSA Dictionary": Bruce Schneiered: (V, ints) When a passenger uses logic in order to confound and perplex an officer into submission. Ex: "A TSA officer took my Swiss army knife, but let my scissors go. I then asked him wouldn't it be more dangerous if I were to make my scissors into two blades, or to go...
Becoming a Police Informant in Exchange for a Lighter Sentence
Fascinating article. Snitching has become so commonplace that in the past five years at least 48,895 federal convicts -- one of every eight -- had their prison sentences reduced in exchange for helping government investigators, a USA TODAY examination of hundreds of thousands of court cases found. The deals can chop a decade or more off of their sentences. How...
Breaking Hard-Disk Encryption
The newly announced ElcomSoft Forensic Disk Decryptor can decrypt BitLocker, PGP, and TrueCrypt. And it's only $300. How does it work? Elcomsoft Forensic Disk Decryptor acquires the necessary decryption keys by analyzing memory dumps and/or hibernation files obtained from the target PC. You'll thus need to get a memory dump from a running PC (locked or unlocked) with encrypted volumes...
My Best Christmas Present Root Domain Support for Amazon S3 Website Hosting
I have been a big fan of the Amazon S3 Static Website Hosting feature since its launch and this blog happily is being served from it. S3 is not only a highly reliable and available storage service but also one of the most powerful web serving engines that exists today. By storing your website in Amazon S3, you suddenly no longer have to worry about scaling, replication, performance, security, etc. All of that is handled seamlessly by S3. As such I am very happy that the Amazon S3 team has finally knocked off the last piece of dependency on an external infrastructure piece.
Public Shaming as a Security Measure
In Liars and Outliers, I talk a lot about the more social forms of security. One of them is reputational. This post is about that squishy sociological security measure: public shaming as a way to punish bigotry (and, by extension, to reduce the incidence of bigotry). It's a pretty rambling post, first listing some of the public shaming sites, then...
My Best Christmas Present ? Root Domain Support for Amazon S3 Website Hosting
I have been a big fan of the Amazon S3 Static Website Hosting feature since its launch and this blog happily is being served from it. S3 is not only a highly reliable and available storage service but also one of the most powerful web serving engines that exists today. By storing your website in Amazon S3, you suddenly no longer have to worry about scaling, replication, performance, security, etc.
Package installation complete?
Continued installing packages on my FreeBSD reference virtual machine today. With a couple of minor issues, it went very well, much faster than compiling ports. That's not only because I didn't need to compile: I also didn't need to answer configuration questions, nor address strangenesses in the build. And it used the best part of 2 GB of traffic. About the only hold-up was that postfix wanted me to answer a question about the default mail configuration. Things aren't over yet. A number of these packages printed out information, some possibly important, that scrolled off the top of the screen. A good thing that I've saved a transcript of the installation.
Control point detector or random number generator?
After my experience with Subhash's panoramas a couple of weeks ago, I was interested to see this thread in the Hugin mailing lists. Another case where somebody had extreme difficulties assembling a panorama. He made his images available, so I had a try. Once again, It Works For Me: But another person responded, also with an image: He had had more difficulties, but had managed to get past them. But his image is different. Yes, it's not cropped, but if it were, parts would be missing that are present on my image.
For Everyone
Our family gathering is small this year; only five. Even at that size, when everyone likes the same book, thats remarkable. Im talking about Giants Beware!, a graphic novel by Jorge Aguirre (who doesnt have a Wikipedia entry, someone get on it). All five of us read it, cover to cover, on Christmas day. Granted, my 6-year-old daughter is an unusually good reader, and my 82-your-old mother is unusually bookish and open-minded, but still. The book is funny, deft, well-drawn, and a total page-turner. Its a little tougher than what the six-year-old gets from her first-grade library, and she groused out loud, demanding that everyone stop talking so she could concentrate.
Cryptography Engineering Available as an eBook
Finally, Cryptography Engineering is available as an ebook. Even better, it's today's deal of the day at O'Reilly: $27.50 (50% off) and no copy protection. (The discount won't show until you add the book to your cart.)...
Hackers Use Backdoor to Break System
Industrial control system comes with a backdoor: Although the system was password protected in general, the backdoor through the IP address apparently required no password and allowed direct access to the control system. "[Th]e published backdoor URL provided the same level of access to the company's control system as the password-protected administrator login," said the memo. The security of this...
FreeBSD upgrade procedure, next attempt
After accepting the failure of my previous ways of trying to keep up to date with FreeBSD, continued today with the virtual machine approach. I had a base machine with no ports. How should I install them? There's this thing called PKGNG (Package New Generation) which should enable me just to download binary packages, and thus eliminate this eternal configuration that the Ports Collection requires. Problem: As a result of a recent security incident, no official packages are available. So for the time being, at any rate, I have to download binary packages the old way, with pkg_add -r. I already had most of the infrastructure for that in place, but discovered I had never put it to the test.
Copyright puzzles
I don't use the various file-sharing services on the Internet. I disagree strongly with the copyright holders' heavy-handed protection of their rights, but currently they have the law on their side, and I don't intend to break the law. But more and more it's becoming clear to me that the whole business is lopsided. I can, for example, buy a DVD or a CD with multimedia content. I own the medium, but not the content. Recent developments, of course, get rid of the medium, so I don't own anything. Either way, I am not allowed to give this content to anybody else, and that's what the file-sharing services do.
Low-stress Inbox
Ive long been aware of the Inbox Zero notion, and never really got it. My Google inbox has 6,457 messages and my personal inbox 5,096; none are unread and I feel no stress. Recently Ive noticed that lots of people have huge numbers of unread emails staring them in the face, more or less all the time I guess. This would drive me crazy in about fifteen minutes. So, as a Christmas present to the world, here is my recipe for maintaining an unread count of zero; a condition Ill call Low-stress Inbox. You Decide When to Read Set up your mail so that when youre not looking at it, there are no bright red numbers anywhere on your screen pestering you about whats unread.
Peruvian Spider Species Creates Decoys
Clyclosa spiders create decoys to fool predators....
Phishing via Twitter
Interesting firsthand phishing story: A few nights ago, I got a Twitter direct message (DM) from a friend saying that someone was saying nasty things about me, with a link. The link was a shortened (t.co) link, so it was hard to see exactly what it pointed to. I followed the link on my cell phone, and got to a...
Sending the Christmas Letter
After writing our Christmas letter, the next thing was to send it, of course. The idea was to post it as status on facebook and also send it as email to a list of people we know. Yvonne sent me a list of her contacts, and then I added my own from my ~/.mail_aliases file. How old that is! There are people in it whom I haven't communicated with for 20 years, and sadly I know of at least 7 who are dead. The death of Dennis Ritchie is well known, of course, and at my age you'd expect people to gradually start dying off.
More weather station pain
It's been very hot latelytoday we had a top temperature of 41.3°, unusual for so early in the summer. But that's not what my weather software showed: in fact, it showed nothing. Further investigation showed that the external transmitter wasn't transmitting the humidity, and that one of the few functions I hadn't written myself, dewpoint(), wasn't handling 0 humidity correctly, returning NaN. So for the first time in well over a year I had to modify the software. It's not done: it seems that the station is also reporting random incorrect temperatures, over 10° from what they should be.
More panorama processing
Continued with my TIFF-based panorama processing today. Some of the numbers are amazing: === grog@eureka (/dev/pts/8) ~/Photos/20121222 266 -> du -scm . ../Hugin-build-eureka/ 41593 . 4216 ../Hugin-build-eureka/ 45808 total PID USERNAME THR PRI NICE SIZE RES STATE C TIME WCPU COMMAND 47437 grog 1 108 5 10971M 4488M CPU1 0 6:21 100.00% enblend 23871 grog 1 28 5 1063M 479M select 2 57:56 1.37% hugin That du output is in megabytes: the project used over 45 GB of disk, most of it in deletable TIFF files.
More TIFF processing
Last week my experiments with TIFF images in the intermediate processing of panoramas weren't overly encouraging, but I had this recollection of surprising sharpness in the details while processing the garden centre panorama. So today I decided to try it again. I thought that last week I had cleaned up most of the strangenesses in processing TIFFs, but today I found many more. The really frustrating one seems to be that ImageMagick's convert doesn't copy EXIF data for TIFFs. I can copy it myself, but it takes about 30 seconds per image, at least partially because exiftool copies the entire image, all 75 MB of it.
An Album for Each Year - 2012 Version
About 5 years ago I joined a challenge to list "a favorite album for every year of your life." The challenge has two restrictions: only one album per year and there can be no repeats of artists. I added for myself the restriction that I should actually own the album, which restricts the set to choose from significantly and also makes for some peculiar choices. My list stopped in 2007, so now that 2012 is almost at its end it is a good moment to add the next 5 years to the list 1958: Jerry Lee Lewis, Great Balls of Fire 1959: Ray Charles, What I'd Say 1960: Miles Davis, Sketches of Spain 1961: Robert Johnson, King of the Delta Blues Singers 1962: Booker T & MG, Green Onions 1963: James Brown, Live at the Apollo 1964: John Coltrane, Love Supreme 1965: Bob Dylan, Highway 61 Revisted 1966: Cream, ...
An Album for Each Year - 2012 Version
About 5 years ago I joined a challenge to list "a favorite album for every year of your life." The challenge has two restrictions: only one album per year and there can be no repeats of artists. I added for myself the restriction that I should actually own the album, which restricts the set to choose from significantly and also makes for some peculiar choices.
The Cost of Collaboration for Code and Art
This post was written with Andrés Monroy-Hernández for the Follow the Crowd Research Blog. The post is a summary of a paper forthcoming in Computer-Supported Cooperative Work 2013. You read also read the full paper: The Cost of Collaboration for Code and Art: Evidence from Remixing. It is part of a series of papers I have written with Monroy-Hernández using data from Scratch. You can find the others on my academic website. Does collaboration result in higher quality creative works than individuals working alone? Is working in groups better for functional works like code than for creative works like art? Although these questions lie at the heart of conversations about collaborative production on the Internet and peer production, it can be hard to find research settings where you can compare across both individual and group work and across both code and art.
multimedia, technology
While going through TV programmes on cvr2 today, discovered I didn't have any programme data for PRIME7. That must have happened the last time I ran the channel configuration through Shepherd. Irritating, but no big deal. So I re-ran configuration, and then ran mythfilldatabase to get the data. Not quite what I expected: 2012-12-21 17:09:47.283 XMLTV config file is: /home/mythtv/.mythtv/.xmltv 2012-12-21 17:09:58.249 FAILED: xmltv returned error code 256. 2012-12-21 17:09:58.249 Error in 1:1: unexpected end of file 2012-12-21 17:09:58.249 Updating icons for sourceid: 1 2012-12-21 17:09:58.249 New DB connection, total: 4 2012-12-21 17:09:58.250 Connected to database 'mythconverg' at host: localhost 2012-12-21 17:09:58.250 No programs found in data.
Friday Squid Blogging: Laughing Squid
The small San Francisco film and video company is celebrating its 17th anniversary. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....
This Week's Overreactions
Schools go into lockdown over a thermometer, a car backfiring, a bank robbery a few blocks away, a student alone in a gym, a neighbor on the street, and some vague unfounded rumors. And one high-school kid was arrested for drawing pictures of guns. Everywhere else, post-traumatic stupidity syndrome." (It's not a new phrase -- Google shows hits back to...
Happy hols!
Today, on a very special Cory Doctorow podcast, the podcasting debut of Ms Poesy Emmeline Fibonacci Nautilus Taylor Doctorow! MP3 Link
Amazon Replacement-Order Scam
Clever: Chris Cardinal discovered someone running such a scam on Amazon using his account: the scammer contacted Amazon pretending to be Chris, supplying his billing address (this is often easy to guess by digging into things like public phone books, credit reports, or domain registration records). Then the scammer secured the order numbers of items Chris recently bought on Amazon....
Links for Friday, December 22, 2012
Time to clean out my browser menu before the holidays: BrickPicker: The End of Life is the Start of Profits) – “Missing out on a great LEGO set is a gut-wrenching feeling that happens all too often for the casual … Continue reading →
An implementation of generic lambdas is now available
For those interested in C++ standardization and not already following along at isocpp.org, here’s an item of likely interest: An implementation of generic lambdas (request for feedback)Faisal Vali This week, Faisal Vali shared an initial “alpha” implementation of generic lambdas in Clang. Faisal is the lead author of the proposal (N3418), with Herb Sutter and [...]
China Now Blocking Encryption
The "Great Firewall of China" is now able to detect and block encryption: A number of companies providing "virtual private network" (VPN) services to users in China say the new system is able to "learn, discover and block" the encrypted communications methods used by a number of different VPN systems. China Unicom, one of the biggest telecoms providers in the...
Why the entertainment industrys release strategy creates piracy
The Guardian
Why entertainment industry release windows drive piracy that we all have to pay for
My latest Guardian column, "Why the entertainment industry's release strategy creates piracy," looks at the weird entertainment industry practice of defending their right not to sell us the things we want to buy, and the rather more odious practice of asking the public to foot the bill for this strategy: In a real marketplace, the … [Read more]
New Ethernet card
Finally received the Ethernet card that I had bought on eBay nearly a month ago. Why Ethernet card? Thanks to Powercor, one of my motherboards (currently running dereel) lost its USB and Ethernet ports, and I'm running it with an ancient 3com 3C509 PCI card. But it makes sense to use it as a replacement for cvr2, the video recorder box, which has a much more powerful processor which I could use to run DxO Optics Pro natively, in the hope that it would then be considerably faster than in a VM. I don't need USB for cvr2, but I do need Ethernet and 2 PCI slots for the tuners.
Information-Age Law Enforcement Techniques
This is an interesting blog post: Buried inside a recent United Nations Office on Drugs and Crime report titled Use of Internet for Terrorist Purposes one can carve out details and examples of law enforcement electronic surveillance techniques that are normally kept secret. [...] Point 280: International members of the guerilla group Revolutionary Armed Forces of Colombia (FARC) communicated with...
APIs, Libraries, and Code
Lets say you want to display a JPEG-compressed image, calculate Pearsons correlation coefficient, parse an XML file, or create a key-value store. You can often choose between using the functionality of the applications platform (Java EE or .NET), calling one of several available external libraries, or writing the code on your own. It isnt an easy choice because you have many factors to consider. Specifically, you must take into account the tasks complexity, as well as the licensing, quality, and support of competing alternatives.
The Back-to-Basics Readings of 2012
After the AWS re: Invent conference I spent two weeks in Europe for the last customer visits of the year. I have since returned and am now in New York City enjoying a few days of winding down the last activities of the year before spending the holidays here with family. Do not expect too many blog posts or twitter updates. Although there are still a few very exciting AWS news updates to happen this year. I thought this was a good moment to collect all the readings I suggested this year in one summary post. It was not until later in the year that I started to recording the readings here on the blog, so I hope this is indeed the complete list.
GPS navigator strangeness
While in town, dropped in at Gays, coming from the direction of the Botanical Gardens. My GPS navigator went crazy. The route is pretty much straight down Gillies St, but it wanted me to turn left and head through Victoria Park. That was with the profile shortest route, which it clearly wasn't, so waiting at the lights crossing Sturt St I tried fast, and it told me to turn right, which is also clearly wrong. Carried on straight ahead and got there, and it still wanted me drive about 3 km in a circle and then come back to where I was.
Yet Another Upgrade Strategy
It's been over 10 years since I first tried to find a simplified way of staying up to date with FreeBSD. I still haven't succeeded. It's becoming an issue again: teevee is running relatively well, but the installation is about 18 months old, and it's running firefox 6.0. Not that much of a problem, but for reasons I don't understand it now pops up an additional Please upgrade tab every time I open a new tab. I can't upgrade from their site, because they don't have versions for FreeBSD, and I can't upgrade to the latest and greatest because I'd get caught in a dependency nightmare.
The Back-to-Basics Readings of 2012
After the AWS re: Invent conference I spent two weeks in Europe for the last customer visits of the year. I have since returned and am now in New York City enjoying a few days of winding down the last activities of the year before spending the holidays here with family.
Wintersun
After a dry bright summer and a forgiving autumn, winter is biting down hard; day after day of lashing rain and single-digit-°C temperatures. And dark. Dark, dark, dark. When the sun comes out, its surprising. It wasnt even really out, just a gap in the clouds big enough for a stray beam to catch this old house. Like a performer in the spotlight, reaching back for a little more. In winter north of 49°, you take what you can get.
Nasty Samsung Phone Exploit
There's a new exploit against Samsung Galaxy phones that allows a rogue app access to all memory. A hacker could copy all of your data, erase all of your data, and basically brick your phone. I haven't found an offical Samsung response, but there is a quick fix....
Open calendar project?
Mail from Julian Stacey, whom I know from my visits in München nearly 20 years ago. Though he's been living there for ever, and is married to a German, he remains somewhat British, and it seems that he's been maintaining a file /usr/share/calendar/calendar.british, which should be part of the FreeBSD calendar program that I'm currently looking at, but somehow it doesn't exist (/usr/share/calendar/calendar.australia, for example, does exist). The message was in reply to a message from Peter Tynan, who has been doing something similar for Debian Linux. But his file didn't look very Linux-like: /* * United Kingdom of Great Britain and Northern Ireland * compiled by Peter R Tynan * * $FreeBSD$ */ I queried that, but it seems that Linux doesn't have its own calendar program.
Emacs highlighting: can of worms
So now I have this nice white space highlighting running with Emacs, and it's a great improvement. Only one problem: by default trailing white space is highlighted in red, which on the one hand is somewhat irritating, but on the other hand a real problem: a single space at the end of the line looks just like a cursor, and I kept trying to input data there. Time to change the colour. But how do you do that? GNU Emacs has changed a lot since I first installed revision 18.39 in late 1989, and it looks like there is a whole new infrastructure around the display.
Possible Decryption of World War II Pigeon Message
A Canadian claims that the message is based on a WWI codebook. A spokesman from GCHQ remains dubious, but says they'll be happy to look at the proposed solution....
Hardware failures: picking up the pieces
Spent quite some time attending to yesterday's hardware failures. In the case of the GPS navigator, there's an alternative to assuming the battery is dead: what if it didn't get charged? The indoor charger is a generic USB device, but the one I used wasn't the one it came with, and it looked a little anaemic. So I tried the correct one andit worked! One problem solved, one to go. Into town to buy a new disk. After some consideration, it made sense to buy a 2 TB external drive with USB 3.0 connection and use it for photo backups. It's becoming clear that eSATA is no longer a viable option.
Photo processing progress
Into the office this morning to continue with my photo processing. The remainder of the photo processing with DxO Optics Pro hat taken 6 hours, 12 minutes, and just copying the TIFFs and reinstating the EXIF data took 20 minutes. Processing with TIFF is really slow. I should do some comparisons to see whether it's worth it. This time I gave up and tried it with JPEG instead. Eventually got all but one panorama processed, the garden centre one, which suffered because of the light wind. Interestingly, the control point detection was even worse with JPEG than with TIFF, but at least one of the control points in the TIFF was completely wrong, half an image apart.
Multiple failures
As if the photo processing wasn't frustrating enough, a couple of other things ganged up to annoy me. After this morning's excursion, put the GPS navigator on to charge, and came back a little later to see the charge indicator showing purplenormally it's red (for charging) or blue (for charged). And the thing didn't work. More playing around brought a bright, uneven screen, which then died. Resetting helped enough to get the thing to start booting before crashing. And when I reconnected the charger, it didn't charge. All suggests a dead battery, which isn't user-replaceable. I've only had the thing 18 monthslooks like I need a new one.
Still more panorama experiments
The weather this morning was not good enough for my house photos, and I had planned to put them off until tomorrow, but by mid-afternoon things had picked up, and I managed to get them done. This time I had decided to create TIFF images, after a suggestion from Subhash. Not easy: I needed to modify most of my scripts, and there were all sorts of problems. DxO Optics Pro creates TIFF files which are dubious to say the least. Here's what ImageMagick's ambiguously named convert has to say: 20121215: Unknown field with tag 50341 (0xc4a5) encountered.
Emacs indentation progress
Continued playing around with my Emacs indentation macros today, and finally got not just what I wanted, but more. Now I can finally place the braces where I want them, indented with the block which they delimit: if (mytime.tm_year < 0) /* not a valid year, */ { basetm = localtime (&base); /* get base in struct tm format */ mytime.tm_year = basetm->tm_year; /* use this year */ hms = argv [*arg]; /* and reinterpret this value as hms */ } else hms ...
Focus stacking: how?
Lots of new flowers in the garden, but the weather's been pretty moist, so I took photos from the protection of the verandah. That means telephoto lenses, and that means focus issues. So I took two photos from the same place with different focus, intending to merge them to show both foreground and background in focus: The problem is that the images are of different size .
Friday Squid Blogging: Giant PVC Squid
Neat art project. Another link. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....
Heading West
This week, I accepted a job on the faculty of at the University of Washington Department of Communication. I've arranged for a post-doc during the 2013-2014 academic year which I will spend at UW as an Acting Assistant Professor. I'll start the tenure-track Assistant Professor position in September 2014. The hire is part of a "big data" push across UW. I will be setting up a lab and research projects, as well as easing into a teaching program, over the next couple years. I'm not going to try to list all the great people in the department, but UW Communication has an incredible faculty with a strong background in studying the effect of communication technology on society, looking at political communication, enagement, and collective action, and tracing out the implications of new communication technologies in addition to very strong work in other areas.
Review of my LISA '12 half-day tutorial on Time Management for Sysadmins
Ben Cotton write an excellent summary of my half-day tutorial from LISA this year: https://www.usenix.org/blog/time-management-system-administrators-0
Book Review: Against Security
Against Security: How We Go Wrong at Airports, Subways, and Other Sites of Ambiguous Danger, by Harvey Molotch, Princeton University Press, 278 pages, $35 Security is both a feeling and a reality, and the two are different things. People can feel secure when theyre actually not, and they can be secure even when they believe otherwise. This discord explains much...
The History of Security Economics
Ross Anderson recalls the history of security economics (presentation and paper.)...
Emacs C indentation
I've been using versions of Emacs for ever, about half the history of digital computers. It's wired into my fingers. But Emacs hasn't stayed the same. One of the very first things I wrote for MINCE (MINCE Is Not Complete Emacs), in about 1980, was a set of functions for indenting C sources. When I got GNU Emacs, I hacked the indentation macros to match. And gradually the indentation functionality in the Emacs distribution increased, to the point that it became desirable to change to it. But how? I have my own style of indentation that nobody else seems to use, and my attempts to adapt to it ultimately came to nothing.
More Hugin experiments
I've been doing more thinking about the control point mismatches that have been plaguing Subhash (mainly) and me this last week or so. One unexamined clue was the problems I had in August, where the control point detectors discovered control points in exactly the same location on each image. Could this be a problem with the sensor, maybe dirt or flawed pixels? And conversion to JPEG would be enough to hide them, but TIFFs are too accurate a representation? Tried multiple conversions of August's images, using both CPfind and panomatic. Nothing. I couldn't reproduce it. OK, that's enough for the moment.
The Internet in North Korea
How Internet censorship works in North Korea....
QR Code Scams
There's a rise in QR codes that point to fraudulent sites. One of the warning signs seems to be a sticker with the code, rather than a code embedded in an advertising poster. This brings up another question: does anyone actually use these things?...
Announcing the 20-city US tour for HOMELAND, the sequel to Little Brother
As I mentioned yesterday, the sequel to Little Brother is coming out in February. Called Homeland, it picks up the action shortly after Little Brother ends, and features the continuing and exciting adventures of the characters from the first book. Tor, my publisher, have posted the first cut at the 20-city US tour schedule (the … [Read more]
More hugin stitching issues
Subhash sent me his photos to look at overnight, along with a project file. The photos stitched perfectly! The project file, on the other hand, was a complete disaster. He described what he had done, and it all made sense. So what's the problem? He keeps all his images in DNG format, and converts them to TIFF before processing. I don't have the same tools as he does: I extract the raw image from the DNG using the Adobe tool and then process it with DxO Optics Pro. But I've seen problems with TIFF images and Hugin before. Could it be something similar?
Vint Cerf's keynote at LISA '12
Did you miss the Usenix LISA live stream of Vint Cerf's keynote? Video is online: http://ow.ly/g38p7
Detecting Edited Audio
Interesting development in forensic analysis: Comparing the unique pattern of the frequencies on an audio recording with a database that has been logging these changes for 24 hours a day, 365 days a year provides a digital watermark: a date and time stamp on the recording. Philip Harrison, from JP French Associates, another forensic audio laboratory that has been logging...
Changes in the Way we View Computing
The Association for Computing Machinery recently released the 2012 version of the ACM Computing Classification System (CCS). This is the work of 120 volunteers and marks significant changes over the previous version, which was released in 1998. To create it the volunteers mined ACM Digital Library search terms and used the services of a specialist company that creates ontologies. To see what has changed in the past 14 years in the way we view computing, I used Wordle to create word clouds from the 1998 and the 2012 versions.
Drone Flights Over the US
The EFF has been prying data out of the government and analyzing it....
Subhash's panorama problems, continued
Subhash is still having problems with Hugin, so I got him to send me his latest batch. He has asked me not to show them, but there's not much to see: It Worked For Me. Why not for him? More investigation needed.
More calendar pain
Spent most of the day looking at calendar(1). What I had expected to be a simple bug fix goes much further; partially code is missing, in many cases it's (almost) duplicated, and I'm left wondering whether to apply a band-aid or rewrite the parser. But then, there's always a tendency to reinvent the wheel. More thought needed.
The National Cyber Security Framework Manual
This book is available as a free pdf download: The National Cyber Security Framework Manual provides detailed background information and in-depth theoretical frameworks to help the reader understand the various facets of National Cyber Security, according to different levels of public policy formulation. The four levels of government -- political, strategic, operational and tactical/technical -- each have their own perspectives...
Microserver Market Heats up: Intel Atom S1200 (Centerton) Announcement
Since 2008, Ive been excited by, working on, and writing about Microservers. In these early days, some of the workloads I worked with were I/O bound and didnt really need or use high single-thread performance. Replacing the server class processors that supported these applications with high-volume, low-cost client system CPUs yielded both better price/performance and power/performance. Fortunately, at that time, there were good client processors available with ECC enabled (see You Really DO Need ECC) and most embedded system processors also supported ECC. I wrote up some of the advantages of these early microserver deployments and showed performance results from a production deployment in an internet-scale mail processing application in Cooperative, Expendable, Microslice, Servers: Low-Cost, Low-Power Servers for Internet-Scale Services.
Dictators Shutting Down the Internet
Excellent article: "How to Shut Down Internets." First, he describes what just happened in Syria. Then: Egypt turned off the internet by using the Border Gateway Protocol trick, and also by switching off DNS. This has a similar effect to throwing bleach over a map. The location of every street and house in the country is blotted out. All the...
Virtual hardware problems
I do my test building in a virtual machine, and today it hung. The console messages were unnerving: Dec 10 17:31:12 swamp: kernel: (ada0:ata0:0:0:0): WRITE_DMA. ACB: ca 00 ff bb 74 40 00 00 00 00 00 00 Dec 10 17:31:12 swamp: kernel: (ada0:ata0:0:0:0): CAM status: Command timeout Dec 10 17:31:12 swamp: kernel: (ada0:ata0:0:0:0): Retrying command Dec 10 17:31:12 swamp: kernel: g_vfs_done():ada0s1a[WRITE(offset=3917053952, length=65536)]error = 6 Dec 10 17:31:12 swamp: kernel: (ada0:ata0:0:0:/: got error 6 while accessing filesystem Dec 10 17:31:12 swamp: kernel: 0): lost device Dec 10 17:31:12 swamp: kernel: /: got error 6 while accessing filesystem Dec 10 17:31:12 swamp: kernel: (pass0:/: got error 6 while accessing filesystem Dec 10 17:31:12 swamp: kernel: ata0:0:0:/: got error 6 while accessing filesystem Dec 10 17:31:12 swamp: kernel: 0): passdevgonecb: devfs entry is gone Dec 10 17:31:12 swamp: kernel: g_vfs_done():ada0s1a[WRITE(offset=3917250560, length=16384)]error = 6 ...
More calendar fun
For various reasons, I've had more to do with the calendar(1) program than I would have expected, notably when Chris Yeardley tidied it up for a university project. And then at the end of last month I discovered this: 25 Nov* First Sunday of Advent (4th Sunday before Christmas) That's nonsense, of course. The earliest date for the first Sunday in Advent is 27 November. So what did it say for the real first Sunday in Advent, 2 December?
CFP: Runtime Environments, Systems, Layering and Virtualized Environments (RESoLVE 2013)
This year, we presented two papers at RESoLVE 2012 relating to the structure of operating systems and hardware, one focused on CPU instruction set security features out of our CTSRD project, and another on efficient and reconfigurable communications in data centres out of our MRC2 project. I’m pleased to announce the Call for Papers for RESoLVE [...]
Which Cameras?
Right at the moment, the Most Interesting Camera in the World is clearly the Sony RX-1. Its started to hit the streets; for example, check out some early pix from Duncan Davidson. Theyre good! The concept is brilliant, and I salute The Most [well, only] Interesting Part of Sony for it. But I probably wouldnt get one even at a less-stupidly-high price. Heres what I think: You should have a modern interchangeable-lens camera whose sensor can deal with darkness, and most of the time you should mount a difficult opinionated prime lens on it and walk around with that. Also, you should have a high-quality pocket camera with a reasonably big reasonably fast zoom and a sensor thats only moderately afraid of the dark.
Bypassing Two-Factor Authentication
Yet another way two-factor authentication has been bypassed: For a user to fall prey to Eurograbber, he or she must first be using a computer infected with the trojan. This was typically done by luring the user onto a malicious web page via a round of unfortunate web surfing or email phishing attempts. Once infected, the trojan would monitor that...
The Internet of the Dead
Here's a podcast of my recent Locus column, The Internet of the Dead: I had begun my trip with a few days in Toronto, attending to a strange and new kind of memorial ritual for a close friend who had died unexpectedly in June. My friends name was Erik Possum Man Stewart, and Id known … [Read more]
Buy Your Own ATM Skimmer for $3000
I have no idea if this is real. If I had to guess, I would say no....
Asocial Science
Random people on the Internet want to know: Why is economics asocial science?
What's your "LISA '12 moment"?
Every year at Usenix LISA it seems that there is a moment where someone says something that makes me want to jump up and shout, "OMG! Learning that just paid for my entire conference!" It may be something an instructor says at a tutorial, a presenter says at a paper or Invited Talk. Often it is something you learn from the person you just happened to start chatting with while on line waiting for lunch. If you have a "LISA Moment", I encourage you to tweet it with hashtag #lisa12 #moment or post it as a comment to this post.
Ingress
Its a new thing on the Internet, a planetary-scale augmented-reality game being played on a real planet: ours. Its fun to play, particularly if you have kids. And interesting, I think, for anyone who cares about issues of Life Online, even non-gamers. If you want to know the basics, hop on over and read the overexcited pitch at Google Play and the calmer Ingress in Wikipedia. Go ahead, Ill wait. Back now? Heres whats actually interesting about the game. Numbers This has only been running since mid-November, and its hard to get an invite, but a lot of people are playing.
Squids on the Economist Cover
Four squids on the cover of this week's Economist represent the four massive (and intrusive) data-driven Internet giants: Google, Facebook, Apple, and Amazon. Interestingly, these are the same four companies I've been listing as the new corporate threat to the Internet. The first of three pillars propping up this outside threat are big data collectors, which in addition to Apple...
Book signing at LISA: Taming Information Technology
In the past I've said good things a few different times about "Taming Information Technology: Lessons from Studies of System Administrators" by Eser Kandogan, Paul Maglio, Eben Haber and John Bailey. Eben will be at Usenix LISA next week, in San Diego, doing a book signing during the Wednesday afternoon break on the expo floor. He'll have a limited number of copies for sale at a huge discount (I hear it's $40/book while supplies last). See you there!
Book signing at LISA: Taming Information Technology
In the past I've said good things a few different times about "Taming Information Technology: Lessons from Studies of System Administrators" by Eser Kandogan, Paul Maglio, Eben Haber and John Bailey. Eben will be at Usenix LISA next week, in San Diego, doing a book signing during the Wednesday afternoon break on the expo floor. He'll have a limited number of copies for sale at a huge discount (I hear it's $40/book while supplies last). See you there!
Why I don't like Facebook
Everybody uses Facebook today, even most of the people I know. And I spend a lot of time talking in IRC, which is arguably something very similar, and I also keep this diary. But try as I might, I can't get to like Facebook. Why? There are a number of reasons: The format is neither like a conversation (IRC) nor like letter-writing (email). It falls somewhere in between. Arguably there's nothing wrong with that, but I can't find a use for it.
Comedy and Cryptography
Not the sort of pairing I normally think of, but: Robin Ince and Brian Cox are joined on stage by comedian Dave Gorman, author and Enigma Machine owner Simon Singh and Bletchley Park enthusiast Dr Sue Black as they discuss secret science, code-breaking and the extraordinary achievements of the team working at Bletchley during WW II. Audio here....
Gonna Hang Out
Theres this notion of a Google+ Event, which combines G+, YouTube, and Moderator; its trying to be a new way to do an online conversation. Some of the outreach people at Google (i.e. in jobs like mine) are going on the road a lot less and Eventing a lot more, these days. So Im going to try it tomorrow (Thursday): Life, Identity, and Everything. The idea is, I and Breno (an Identity tech lead here) will talk a little bit about what were up to (OAuth, OpenID, AccountChooser, bearer tokens for n00bs, and so on), and I mean a little bit; single-digit minutes.
Roger Williams' Cipher Cracked
Another historical cipher, this one from the 1600s, has been cracked: Senior math major Lucas Mason-Brown, who has done the majority of the decoding, said his first instinct was to develop a statistical tool. The 21-year-old from Belmont, Mass., used frequency analysis, which looks at the frequency of letters or groups of letters in a text, but initially didn't get...
Programming Languages vs. Fat Fingers
A substitution of a comma with a period in project Mercury's working Fortran code compromised the accuracy of the results, rendering them unsuitable for longer orbital missions. How probable are such events and how does a programming language's design affect their likelihood and severity? In a paper I recently presented at the 4th Annual International Workshop on Evaluation and Usability of Programming Languages and Tools I showed results obtained by randomly perturbing similar programs written in diverse languages to see whether the compiler or run-time system would detect those changes as errors, or whether these would end-up generating incorrect output.
Friends computers, more pain
While in town, dropped in to the Friends of the Ballarat Botanical Gardens with intent to attach an Ethernet cable for the third computer and a USB cable extension for Lorraine Powell, who hates fiddling round behind the computer. It turned out that the third computer already had a cableit looks like I had done it myself and forgotten. And I couldn't attach the USB cable because the computer only had two sockets at the back, and they were both in use. It's a funny looking little metal cube with strange controls on the frontI'm continually looking for the power buttonso I investigated and discovered a couple of secret flaps, one hiding a DVD drive, and the other a set of connectors, including two USB sockets!
New at LISA: Watch the tutorials via live-streaming!
As you know, I'll be teaching 3 tutorials at LISA this year (Intro To Time Management, Advanced Time Managemente, and Ganeti/Build a private cloud). If you can't attend in person you can still watch over the internet. The cost is about the same as being there, and there will be a chatroom so that you can ask questions just like in-person attendees. However, you save money of travel and hotel. https://www.usenix.org/conference/lisa12/training-program/live-streaming See you there at the conference or via the interwebz!
Compatibility
On yesterdays thread, I just wrote in a comment: @Jon: Yes, C++ is complex and the complexity is largely because of C compatibility. I agree with Bjarne that theres a small language struggling to get out Ive participated in private experiments to specify such a language, and you can do it in well under [...]
Heres what ICT should really teach kids: how to do regular expressions
The Guardian
Computer classes should teach regular expressions to kids
My latest Guardian column is "Here's what ICT should really teach kids: how to do regular expressions," and it makes the case for including regular expressions in foundational IT and computer science courses. Regexp offer incredible power to normal people in their normal computing tasks, and we treat them as deep comp-sci, instead of something … [Read more]
Internode: 3 ADSL dropouts per day are normal
I've put in a ticket with Internode support about the continued poor quality of service I've had with my wireless Internet connection, which continues. I made the mistake of supplying not only the obvious information, like the remote termination requests, but also supporting information like the frequent cell hopping. So I get a reply saying that cell hopping is normal, and ignoring the real problem. From my reply to them: You also haven't addressed this part of the ticket: Apart from this, I continually receive remote termination requests: Nov 29 09:55:42 nerd-gw ppp[63956]: tun0: LCP: deflink: RecvTerminateReq(7) state = Opened Nov 29 09:55:42 nerd-gw ppp[63956]: tun0: LCP: deflink: LayerDown Nov 29 09:55:42 nerd-gw ppp[63956]: tun0: LCP: deflink: SendTerminateAck(7) state = Opened Nov 29 09:55:42 nerd-gw ppp[63956]: tun0: LCP: deflink: State change Opened ...
Perspective: Why C++ Is Not Back
John Sonmez wrote a nice article on the weekend both the article and the comments are worth reading. Why C++ Is Not Back by John Sonmez I love C++. [&] There are plenty of excellent developers I know today that still use C++ and teach others how to use it and there is nothing [...]
Play services
Theres a new release of Google Play services, which brings some love to the long-unrevised Maps API, and introduces Photo Sphere APIs. The world hasnt figured out how big a deal Play services is; one of the highest-impact changes in Androids history. Historically, big new features in Android required Framework revisions, which require major releases with updates right down into the Linux kernel, which only ship twice a year, and which arent reliably made available on older devices. Play services allows the Android group to ship major new features (OAuth 2.0, Mapping, and Photo Sphere so far) in a way that is auto-refreshed on all compatible devices back to 2.2 Froyo.
Feudal Security
Its a feudal world out there. Some of us have pledged our allegiance to Google: We have Gmail accounts, we use Google Calendar and Google Docs, and we have Android phones. Others have pledged allegiance to Apple: We have Macintosh laptops, iPhones, and iPads; and we let iCloud automatically synchronize and back up everything. Still others of us let Microsoft...
More X hangs!
While working on the panoramas, ran into an old enemy: the X hang with the cursor jumping between the screens. Not once, but twice in quick succession. I suppose I should report the bug, but they want me to log in, and I'm not sure I want to share my account details with them.
Fisheyes and stitching suboptimal panoramas
My investigation of fisheye lenses is on hold for the moment. The lens I was looking at fetched a record $532, far more than I had thought it was worth. But the discussion goes on, and on the Hugin discussion Erik Krause pointed me at this description of the projection of the Samyang lens. Much more to learn. On the German list a side topic sprang up: Subhash wanted a tutorial on using Hugin, and then ran into trouble with a series of photos not originally intended as a panorama and thus not taken with a panorama bracket. And he couldn't get them to stitch.
Private By Default
As of now, this blogs primary address is https://www.tbray.org/ongoing; note the red s. That means your communication with it is private, which I think is the way the whole Internet should be. Depending which browser youre using, you should see a little lock or some such in the address bar. On the right are readouts from (top down) Chrome, Safari, and Firefox. You can click on that readout to get some information on the privacy/security settings. What It Means The way this is set up, you can be pretty sure, when you see that lock, of two things: First, that your browser is really connected to www.tbray.org, not some other site pretending to be mine.
256 cores by 2013?
I just saw a tweet thats worth commenting on: Almost right, and we have already reached that. I said something similar to the above, but with two important differences: I said hardware threads, not only hardware cores it was about the amount of hardware parallelism available on a mainstream system. What I gave was [...]
Captchamania
I hate Captchas! And they seem to be getting more and more prevalent. A couple of days ago I received a mail message from [email protected] and replied from an address different from the one he sent the message to. Bang! A reply with subject My spam filter requires verification of your email address. Not a problem; I suppose it really does help reduce spam. Follow the link, enter the detailsand fill out a particularly emetic Captcha! No, I won't do it. Let him do it if he wants mail from me. Then today I had the problem again. Yvonne is attending a training session in Rokeby with Robyn Hood next week.