Sep 122013
 

Here is a sight I have not seen since July 30:

Route results for 199.166.252.0/24 from Vienna, Austria

BGP routing table entry for 199.166.252.0/24
Paths: (4 available, best #1)
  1239 577
  AS-path translation: { AS1239 BELL-AS }
    edge3.Frankfurt1 (metric 13114)
      Origin IGP, metric 100000, localpref 86, valid, internal, best
      Community: Europe  Lclprf_86 Germany Level3_Peer Frankfurt
      Originator: edge3.Frankfurt1
  1239 577
  AS-path translation: { AS1239 BELL-AS }
    edge3.Frankfurt1 (metric 13114)
      Origin IGP, metric 100000, localpref 86, valid, internal
      Community: Europe  Lclprf_86 Germany Level3_Peer Frankfurt
      Originator: edge3.Frankfurt1
  1239 577
  AS-path translation: { AS1239 BELL-AS }
    edge3.Frankfurt1 (metric 13114)
      Origin IGP, metric 100000, localpref 86, valid, internal
      Community: Europe  Lclprf_86 Germany Level3_Peer Frankfurt
      Originator: edge3.Frankfurt1
  1239 577
  AS-path translation: { AS1239 BELL-AS }
    edge3.Frankfurt1 (metric 13114)
      Origin IGP, metric 100000, localpref 86, valid, internal
      Community: Europe  Lclprf_86 Germany Level3_Peer Frankfurt
      Originator: edge3.Frankfurt1

This is a valid routing table entry for my class C address space at a randomly picked backbone router somewhere on the Internet.

On July 30, Verizon Canada disconnected me. Or rather, they decommissioned the point-of-presence equipment that was utilized by my Internet connection, without moving all their customers first to another POP.

When Verizon proved unable to restore my connection after 10 (!) days, I canceled my contract with them. Meanwhile, my sites’ continuing existence on the Internet was maintained using a backup cable modem connection.

But, as of today, I once again have a functioning DSL connection, courtesy of Bell Canada. Better yet, they were actually able to set up everything properly, including my special request for routing for my portable class C address space. Needless to say, I am very pleased.

And their service costs a lot less than Verizon Canada’s.

 Posted by at 4:41 pm
Sep 062013
 

So the NSA and their counterparts elsewhere, including Canada and the UK, are spying on us. I wish I could say the news shocked me, but it didn’t.

The level of secrecy is a cause for concern of course. It is one thing for these agencies not to disclose specific sources and methods, it is another to keep the existence of entire programs secret, especially when these programs are designed to collect data wholesale.

But my biggest concern is that the programs themselves represent a huge security threat for all of us.

First, the NSA apparently relies on its ability to compromise the security of encryption products and technologies or on backdoors built into these products. An unspoken assumption is that only the NSA would be able to exploit these weaknesses. But how do we know that this is the case? How do we know that the same weaknesses and backdoors used by the NSA to decrypt our communications are not discovered and then exploited by foreign intelligence agencies, industrial spies, or criminal organizations?

As an illustrative example, imagine purchasing a very secure lock for your front door. Now imagine that the manufacturer does not tell you that the locks are designed such that there exists a master key that opens them all. Maybe the only officially sanctioned master key is deposited in a safe place, but what are the guarantees that it does not get stolen? Copied? Or that the lock is not reverse engineered?

My other worry is about how the NSA either directly collects, or compels service providers to collect, and store, large amounts of data (e.g., raw Internet traffic). Once again, the unspoken assumption is that only authorized personnel are able to access the data that was collected. But what are the guarantees for that? How do we know that these databases are not compromised and that our private data will not fall into hands not bound by laws and legislative oversight?

These are not groundless concerns. As Edward Snowden’s case demonstrates, the NSA was unable to control unauthorized access even by its own contract employees working in what was supposedly a highly structured, extremely secure work environment. (How on Earth was Snowden able to copy data from a top secret system to a portable device? That violates just about every security rule in the book.)

So even if the NSA and friends play entirely above board and never act in an unlawful manner, these serious concerns remain.

I do not believe we, as citizens, should grant the authority to any state security apparatus to collect data wholesale, or to compromise the cryptographic security of our digital infrastructure. Even if it makes it harder to catch bad guys.

So, our message to the NSA, the CSE, the GCHQ and their friends elsewhere in the free world should be simply this: back off, guys. Or else, risk undermining the very thing you purportedly protect, our basic security.

 Posted by at 1:50 pm
Aug 072013
 

Visitors to my blog or Web sites may have noticed that in the past week, my Web pages loaded more slowly than usual, and may even have been unavailable at times.

The reason: shortly before noon, July 30, I lost my primary Internet connection.

This connection was via a legacy DSL service (bridged DSL) to a company that used to be UUNet Canada, was purchased by MCI, and eventually, by Verizon, and now does business under the Verizon Canada name.

Yes, the same Verizon that is about to enter the Canadian wireless market, much to the concern of Canada’s “big three”, Bell, Rogers and Telus.

I noticed the service interruption essentially immediately, and reported it to Verizon. First, they suggested that it was a telco problem; indeed, Bell Canada even wanted to send out a technician, but fortunately, I was able to talk them out of this. (The DSL modem was connecting just fine.)

The service was not restored the next day, nor on August 1. But on August 1, I had a long discussion with a Verizon technician. The first thing I learned is that the technician resides in the Philippines. Back in the old days, when I had a technical issue with UUNet Canada, I usually ended up talking to an engineer in their Toronto network operations center, and my issue was resolved in minutes. Don’t get me wrong, the Philippines technician spoke accent-free English and had a basic level of understanding of the technology; but no real competence and, obviously, no decision-making authority.

What the technician did explain, however, is that Verizon made a colossal screw-up: they decommissioned some of their point-of-presence equipment here in Ottawa without first moving all customers who were still using said equipment. The technician told me that they were scrambling to find a solution, and I’ll be back up and running within a few days.

Well… that was August 1. A long weekend then came and went, but still, no Internet service. So on Tuesday, August 5, I called Verizon Canada. Their main 800 number was answered by a pleasant sounding young lady (an intern, I later learned) but on my first two calls, she managed to connect me to two different voice mailboxes, whereas on the third try, I got disconnected. On the fourth try, she made a real effort to reach someone within the company. She was ready to give up (providing me with an e-mail address instead) but when I told her that I’d rather wait on hold a little longer, she finally managed to get me connected to a senior manager.

This gentleman was friendly and competent enough, and certainly understood and appreciated the severity of my situation. I explained to him that I was already taking steps to switch to Bell Canada as my primary Internet provider. He promised to look into my situation and find a solution. He asked for a day. I asked him to call me this morning, because I wanted to make a decision today, one way or another.

He called indeed at the promised time, but all he could tell me was that he was still waiting for some technical folks to come out of a meeting. Okay, we agreed that he’d call again before 2 PM. He sent an e-mail at 2:09 PM, saying that it would take just a tad longer.

At 3:45 PM, I e-mailed and then called him. No answer. So a few minutes later, it was the end of the line for me: I called and e-mailed again, this time instructing Verizon to terminate my service. I then contacted Bell and asked them to initiate setting up my new account.

Now let’s be clear for a moment: I am not talking about some cheap $20/month wireless contract. I was paying a premium, to the tune of several hundred dollars, to Verizon for this service. And I’ve been their customer (with a a short interruption) since way back in 1994. If my experience is indicative of the kind of service Verizon provides, all I can say to people cheering the prospects of Verizon’s entry into the Canadian wireless market is to be careful what they wish for.

It will be a few days before my new service with Bell is up and running. I am sure there will be headaches, but I am hopeful that it won’t be too much of a hassle. Meanwhile, I am relying on a backup service that I set up two years ago with Rogers, when my Verizon service was down for a few days (that time, it was actually Bell’s fault, or so I was told.) This service is a little slower, but at least it works (for now).


I said “I was paying a premium”, but in the last few months, I really wasn’t. Not my fault… I really tried giving them my money. Earlier this year, Verizon moved their Canadian business customers to their pre-existing Enterprise system that combines billing, online payments, service calls, etc. I dutifully set up my account as instructed and made many attempts to pay. The system accepted my credit card, informed me that my payment was processed, but charges never actually appeared on my credit card account. Last month, I contacted Verizon and after some lengthy phone calls with their billing department, also located in the Philippines, they finally told me that the problem has been found and fixed. Well… no charges appeared on my credit card account yet. Funny thing is, when I check with Verizon, my account there shows no arrears. What can I say? If they don’t want my money… I just hope that if they do come to their senses and collect the outstanding invoice amounts, they don’t actually try to charge me for the month of August… the service, after all, went away on July 30 and it was never restored.

 Posted by at 9:20 pm
Jun 202013
 

I have read about this before and I didn’t want to believe it then. I still don’t believe it, to be honest, but it is apparently happening.

Yahoo will recycle inactive user IDs. That is, if you don’t log on to Yahoo for a period of 12 months, your old user ID will be up for grabs by whoever happens to be interested.

Like your friendly neighborhood identity thief.

Yahoo claims that they are going to extraordinary lengths to prevent identity theft. But that is an insanely stupid thing to say. How can Yahoo prevent, say, a financial institution from sending a password confirmation e-mail to a hapless user’s old Yahoo ID if said user happened to use that ID to establish the account years ago?

That is just one of many scenarios that I can think about for Yahoo’s bone-headed decision to backfire.

And I can’t think of a single sensible reason as to why Yahoo wants to do this in the first place. They will piss off a great many users and likely please no one.

I hope they will change their mind before it’s too late. I hope that if they don’t change their mind, something nasty happens soon and someone sues their pants off.

 Posted by at 11:00 pm
Jun 162013
 

tLast month, I was in Europe. It was fun (apart from a stomach bug that crippled me for two days.)

While in Europe, I used my smartphone. My phone is unlocked. I originally planned to purchase SIM cards in Hungary and the UK, to minimize costs. In the meantime though, I found out that Telus had fairly decent international data roaming packages. I already have a Telus SIM card, in a data stick that I use as a backup Internet connection. So instead of wasting my time hunting for local SIM cards with the right features, I put the Telus SIM card into my phone for the duration of this trip.

I used 191 megabytes of data, 51 minutes of voice, and 1 text message during this trip. The first 100 megabytes were covered by a $65 data package, after which data was charged at $1/megabyte. Here is the breakdown of my final bill:

Package $65.00
Data $90.72
Voice $76.50
Text $0.60
TOTAL $232.82

As it turns out, the plan I chose was not optimal: a slightly different plan that combined voice and data would have saved me an additional 17 dollars or so. But it is hard to anticipate in advance how you would use your phone (I expected to rely more on Skype, but Skype was often not working very well). On the other hand, without a plan, I would have paid through my nose:

Package $0.00
Data $953.60
Voice $76.50
Text $0.60
TOTAL $1,030.70

Even this is nothing though compared to what Rogers would have charged me. Without a plan, the amount is almost astronomical:

Package $0.00
Data $1,907.20
Voice $102.00
Text $0.75
TOTAL $2,009.95

Even with the best plan available at the time (purchasing three times 75 megabytes plus 40 minutes of international voice roaming) I would have paid more than three times as much as I paid Telus:

Package $725.00
Data $0.00
Voice $14.85
Text $0.00
TOTAL $739.85

Rogers has since introduced new prices and new roaming packages, so it is only fair to check what I would have paid under the new scheme. After purchasing 100 megabytes of data and 40 minutes in advance, the total would have come to:

Package $160.00
Data $91.00
Voice $14.85
Text $0.00
TOTAL $265.85

So the new Rogers plan is still beaten by the old plan of Telus to the tune of over 30 dollars (or more like 50 dollars, had I purchased the optimal Telus plan).

No wonder Rogers doesn’t want you to unlock your phone.

 Posted by at 10:45 am
Jun 082013
 

Today I realized that in the past month, my blog has once again become what blogs were meant to be originally: a write-only medium that nobody reads.

Well, almost. The few people who actually bother to look it up at spinor.info could still read it (and thank you for your interest!) The few people who follow my tweets may have seen my posts. People on Google+ may have seen them as well, but are there still people on Google+?

However, the WordPress plugin that I’ve been using for the last couple of years now to publish my posts automatically on my Facebook page has quit on me. And since I was not usually checking my own Facebook posts, I didn’t even notice that something was amiss, I merely assumed that my Facebook friends were really not that interested in what I had to say.

In reality, my posts never made it to Facebook. The culprit has been one of the stupid “migrations” of the Facebook API (Application Programming Interface), which I foolishly enabled, thus breaking the plugin.

Anyhow, thanks to a helpful hint by the plugin’s developer in a WordPress support forum, I was able to find the cause and fix the problem.

I have yet to figure out why people who develop software on which other people depend, most notably people who develop software libraries that are used by other people’s programs, are so keen on making changes that seemingly serve no useful purpose other than breaking said other people’s programs.

Grumble.

 Posted by at 10:31 pm
Jun 082013
 

Yes, it’s Orwellian, and this time around, it’s no hyperbole.

The US government apparently not only collects information (“metadata”) on all telephone calls, they also have the means collect e-mails, online chats, voice-over-IP (e.g., Skype) telephone calls, file transfers, photographs and other stored data, and who knows what else… basically, all data handled by some of the largest Internet companies, including Google, Facebook, Skype and others.

Last summer, I decided to revamp my e-mail system. The main goal was to make it compatible with mobile devices; instead of using a conventional mail client that downloads and stores messages, I set up an IMAP server.

But before I did so, I seriously considered off-loading all this stuff to Google’s Gmail or perhaps, Microsoft’s outlook.com. After all, why should I bother maintaining my own server, when these fine companies offer all the services I need for free (or for a nominal fee)?

After evaluating all options, I decided against “outsourcing” my mail system. The fact that I did not want to have my mail stored on servers that fall under the jurisdiction of the US government played a significant role in my decision. Not because I have anything to hide; it’s because I value my privacy.

Little did I know back then just how extensively the US government was already keeping services such as Google under surveillance:

 
 

From the leaked slides (marked top secret, sensitive information, originator controlled, no foreign nationals; just how much more secret can stuff get?) and the accompanying newspaper articles it is not clear if this is blanket surveillance (as in the case of telephone company metadata) or targeted surveillance. Even so, the very fact that the US government has set up this capability and recruited America’s leading Internet companies (apparently not concerned about their reputation; after all, a presentation, internal as it may be, looks so much nicer if you can splatter the logos of said companies all over your slides) is disconcerting, to say the least.

True, they are doing this supposedly to keep us safe. And I am willing to believe that. But if I preferred security over liberty, I’d have joined Hungary’s communist party in 1986 instead of emigrating and starting a new life in a foreign country. Communist countries were very safe, after all. (And incidentally, they were not nearly this intrusive. Though who knows how intrusive they’d have become if they had the technical means available.)

One thing I especially liked: the assurances that the NSA does not spy on US residents or citizens. Of course… they don’t have to. This will be done for them by their British (or Canadian?) counterparts. No agency is breaking any of the laws of its own country, yet everybody is kept under surveillance. And this is not even new: I remember reading an article in the Globe and Mail some 20 years ago, detailing this “mutually beneficial” practice. I may even have kept a copy, but if so, it is probably buried somewhere in my basement.

Meanwhile, I realize that the good people at the NSA or at Canada’s Communications Security Establishment must really hate folks like me, though, running our own secure mail servers. I wonder when I will get on some suspect list for simply refusing to use free services like Gmail that can be easily monitored by our masters and overlords.

 Posted by at 7:17 pm
May 262013
 

I noticed that the pictures on Google Street View for our neighborhood were updated recently. Much to my delight, I noticed that two cats from the neighborhood, cats that we have known for at least seven years, were photographed by Google’s cameras:

Yes, my wife and I are both fond of cats. Not just our own four cats but also cats from the neighborhood.

 Posted by at 4:07 pm
Apr 192013
 

Minutes ago, a tweet from the Boston Police Department: “Suspect in custody. Officers sweeping the area. Stand by for further info.”

If true: if these two were indeed the clowns who committed mass murder on Monday, then congratulations are in order. They may have shut down a major metropolis for a day, but the result was worth it. This was not a shutting-the-barn-door-after-the-horses-left overreaction, but appropriate action in light of the fact that an extremely dangerous clown with explosives was on the loose. If I lived in Boston, I’d seriously consider intercepting a random off-duty police officer and inviting him for a beer.

An interesting side note, though, about how information flows (or doesn’t flow) in the 21st century: despite the massive media presence and the non-stop breathless reporting, in the end Anderson Cooper broke the news by reading the above tweet from the Boston Police Department. Not sure what it says about the freedom of the press and the authorities’ ability to control the message in this day and age.

 Posted by at 8:58 pm
Mar 152013
 

Yesterday, when I logged on to Google Reader, I was presented with a notice indicating that Reader will be shut down July 1st.

Too bad. I was not using Reader much, but it was the one semi-automated means with which I was reasonably comfortable that allowed me to share my blog posts on Google+. Whether or not I can be bothered to continue with Google+ afterwards remains to be seen. Maybe not… blogs are meant to be a write-only medium anyway (I yell at the world, I do not expect the world to yell back at me), a model which is kind of broken in this era of social networking.

Anyhow, it appears that a number of people are quite upset at Google’s decision, and they even started a petition that is rapidly approaching 100,000 signatures. (Yes, I signed it, too.) So who knows, maybe Google will listen and Reader will get a reprieve.

 Posted by at 9:03 am
Mar 102013
 

To the esteemed dinosaurs in charge of whatever our timekeeping bureaucracies happen to be: stop this nonsense already. We no more need daylight savings time in 2013 than we need coal rationing.

It is an outdated idea, the benefits of which may have been dubious even at the time of its inception, and are almost certainly nonexistent today. But the harm is real: you are subjecting the entire population to a completely unnecessary one-hour jetlag each spring.

Being self-employed and working mostly from my home, I am among the least affected, but I still find this clock-forwarding business just boneheadedly stupid and annoying.

Oh, and while you are at it… would you please get rid of leap seconds, too? Another harmful solution to a nonexistent problem. So what if our clocks are out of whack by a second with respect to the Earth’s rotation? Does it bother anyone?

Oh wait. The organization in charge of leap seconds is the ITU. The same ITU that is busy trying to place the Internet under international regulation, at the bidding of such champions of Internet freedom like China or Russia. No wonder they have little time left in their busy schedule to abolish leap seconds.

 Posted by at 9:07 am
Feb 272013
 

yahooThere has been a lot of discussion lately about Yahoo! CEO Marissa Mayer’s decision to ban working from home at her company.

Many criticized her decision. Some of them raised some good points about productivity and flexibility, and the ability to accommodate workers such as expectant women.

Others supported her decision, pointing out that at Yahoo! more than at other similar high-tech companies, slackers have abused work at home privileges to such an extent that some barely did any work for Yahoo! at all.

But there is one thing conspicuously missing from this discussion: why should Ms. Mayer concern herself with this issue in the first place? Why is she micromanaging her workforce? Should it not be up to lower-level managers to decide who can work from home and why, how, and when?

 Posted by at 1:50 pm
Feb 062013
 

I happen to be using the oldest surviving Linux distribution, Slackware, on my servers. I have been using Slackware for a very long time; in fact, the only other distribution I ever used was the first Linux distribution, SLS (Softlanding Linux System), which was ultimately succeeded by Slackware.

Now I realize that while Slackware is perfect if you actually know what you are doing, it is not the easiest distribution to use. It lacks many of the system management, package installation and dependency resolution tools that users of more recent distributions take for granted.

This is why I was very surprised when I read this morning in PCWorld that in a recent survey conducted by LinuxQuestions.org, Slackware was found to be the most popular desktop Linux distribution. I may have expected to see Slackware fare well on servers, but the desktop? Mind you, I am very pleased to see that Slackware is doing well, even though it appears to have been a somewhat informal survey.

As to servers, Slackware came in as a close second, narrowly beaten by Debian. Even a second place finish is impressive for this venerable distribution.

I just hope that Slackware is here to stay for a long time to come. I would loathe to switch distributions after all these years.

 Posted by at 10:35 am
Jan 292013
 

I may be sitting on board a decidedly 20th century airplane but I suddenly feel like I arrived in the 21st at last… being able to check my email and post to my blog from 30,000 feet.

image

 Posted by at 12:18 am
Jan 262013
 

Anonymous attacked the Web site of the United States Sentencing Commission, an independent agency of the United States government responsible for articulating federal sentencing guidelines.

The USSC.GOV Web site is down (or rather, there is no DNS service for ussc.gov or www.ussc.gov; I guess that is one way of taking down a corrupted Web site) but I found the defaced content in Google’s cache, including the Anonymous letter in its entirety, as well as the accompanying YouTube video (with surprisingly good production values.)

The letter is a long rant, but I am not altogether unsympathetic to what they have to say. The death of Aaron Swartz was an absolute disgrace. It was also a completely unnecessary demonstration of a justice system gone berserk. And the concerns expressed by Anonymous over disproportional punishments, the presumption of innocence gambled away by plea deals in the face of excessive sentences and unaffordable justice, or criminalization of violations of terms of service are all concerns I share.

What I don’t share is the belief of Anonymous that the perceived criminality of government can be repaired by criminal acts of their own. Their “solution” does not lead to a better society; it leads to anarchy. Then again, weirdly and confusingly, Anonymous appear to understand this when they write, “We understand that due to the actions we take we exclude ourselves from the system within which solutions are found. There are others who serve that purpose, people far more respectable than us, people whose voices emerge from the light, and not the shadows.”

I am more than a bit puzzled by the second half of their message. In this half, they describe a “warhead”, perhaps some cybertool that they are distributing to their followers this way. The instructions are simple: download all components, assemble them, and wait for the moment that hopefully never comes when you get a decryption key.

Ok-kay… well, the components no longer appear to be available (if they ever were) on the listed mirror sites, but that’s not the puzzling part. The puzzling bit is the command line offered that the would be Anonymous supporter presumably had to execute after downloading all the files named Scalia.Warhead1, Kennedy.Warhead1, Thomas.Warhead1, Ginsburg.Warhead1, Breyer.Warhead1, Roberts.Warhead1, Alito.Warhead1, Sotomayor.Warhead1, Kagan.Warhead1:

cat Scalia* Kennedy* Thomas* Ginsburg* Breyer* Roberts* Alito* Sotomayor* Kagan* >
    Warhead-US-DOJ-LEA-2013.aes256 && rm -rf /

In plain English: assemble all the parts into a file named Warhead-US-DOJ-LEA-2013.aes256. If successful, wipe out your entire hard drive.

Say what? Yes, wipe out your entire hard drive. That’s what rm -rf / does on a UNIX system.

That is, that’s what rm -rf / does on a UNIX system if a) you are logged in as root, and b) you are dumb enough to execute it.

So what exactly are Anonymous trying to pull here? Do they think American investigators are so dumb that they would follow these instructions without question, but their own followers are smarter? Is it a kind of an intelligence test to prevent stupid people from joining Anonymous? Or has the Anonymous letter itself been hacked?

 Posted by at 9:07 am
Jan 172013
 

signonMany years ago, I created a form where players can sign up to play MUD2. To keep things relatively uncomplicated, I just created two fields for the player’s name: one labeled “Last Name” and the other, “First Name and Initials”. To me it was self-evident that if I encountered a form like this, I’d enter “Toth” and “Viktor T.”, respectively, into these fields.

But soon I found out that I was wrong. I got one signup after another like “Doe”, “John JD”. Or “Doe”, “John, JAD” if the delinquient’s middle name happened to start with an A.

What’s wrong with my form, I asked? Perhaps it’s my English? I quickly Googled “First name and initials” and found a great many hits. It was clear from the context that none of them asked for all your initials, only the initials of any additional given names that you might have, just like I did. Yet registrations in the form of Doe, John JD kept on coming. Do these people write “John JD” on passport and other official forms, too, when they are requested to enter their “Middle name and initials”?

Just to be absolutely clear, though, I added an asterisk to the field and a note: “*In case there’s a misunderstanding, this means any EXTRA initials you might have. If you’re called John A. Doe, put John A. in this field, not John JAD. And if you’re John Doe, well, that means that you have no initials to put here next to your first name!

It didn’t help. To this date, I continue getting registrations in the form of Doe, John JD.

Nowadays, this is more amusing than annoying. I needed to know the name and country of residence of players when we charged for MUD2, for tax purposes (among other things, I was obliged to collect the Goods and Services Tax from Canadian players.) But now that the game is free, it really doesn’t matter anymore what your name is. So long as you supply a valid e-mail address, I have a means to contact you if I must (which means almost never. And no, I don’t collect and sell e-mail addresses.) But perhaps it does illustrate why I always found programming so much easier than dealing with people.

 Posted by at 9:52 am
Jan 122013
 

jstor_logoComputer pioneer Alan Turing, dead for more than half a century, is still in the news these days. The debate is over whether or not he should be posthumously pardoned for something that should never have been a crime in the first place, his homosexuality. The British government already apologized for a prosecution that drove Turing into suicide.

I was reminded of the tragic end of Turing’s life as I am reading about the death of another computer pioneer, Aaron Swartz. His name may not have been a household name, but his contributions were significant: he co-created the RSS specifications and co-founded Reddit, among other things. And, like Turing, he killed himself, possibly as a result of government prosecution. In the case of Swartz, it was not his sexual orientation but his belief that information, in particular scholarly information should be freely accessible to all that brought him into conflict with authorities; specifically, his decision to download some four million journal articles from JSTOR.

Ironically, it was only a few days ago that JSTOR opened up their archives to limited public access. And the trend in academic publishing for years has been in the direction of free and open access to all scientific information.

Perhaps one day, the United States government will also find itself in the position of having to apologize for a prosecution that, far from protecting the public’s interests, instead deprived the public of the contributions that Mr. Swartz will now never have a chance to make.

 Posted by at 4:53 pm
Jan 112013
 

Message to Google: please do NOT start uploading photos from my phone to Google+ without first asking for my bleeping permission. I don’t care if only I see the pictures. I don’t want you to upload crap from my phone without asking, is that clear?

 Posted by at 11:05 pm
Dec 202012
 

facebook_like_button_bigI use a simple WordPress plugin, called “Simple Facebook Connect”, to automatically post my blog posts to Facebook. The plugin also provides a Like button for my posts. Recently, I noticed that a number of my posts acquired a fair number of Likes from apparent strangers.

Today, it became clear to me that the plugin is cheating. After exchanging a series of comments on Facebook in response to one of my blog posts, I noticed that every time a comment was added, the number of Likes went up by one. So no, I am not nearly as popular as I previously thought.

Oh well. Blogs are meant to be written, not read.

 Posted by at 10:12 am
Dec 112012
 

fbspamThank you, Facebook. Now I am getting garbage that is apparently coming from some of my Facebook friends, all because (no doubt in your eagerness to please your corporate sponsors and push your sinking share price up a little) you happened to leave open a gaping security hole allowing spammers to “scrape” friend lists and e-mail addresses.

Worse yet, it is possible that the same spammers are sending garbage to others in my name. And while I may know not to click on an unsolicited link even if it appears to come from a good friend, colleague, or close relative, others may not be so cautious.

One of these days, I’ll find myself a spammer and slowly strangle him.

 Posted by at 10:23 pm