Resident of the world, traveling the road of life
64577 stories
·
21 followers

Pluralistic: Google's new phones can't stop phoning home (08 Oct 2024)

1 Share


Today's links



A photo of a 1950s-era teen girl lying on a pink bed, holding a Princess phone to her head. Her face has been replaced with the glaring red eye of HAL 9000 from Stanley Kubrick's '2001: A Space Odyssey.' The phone's handset, coil and body have been recolored with stripes in Google's four logo colors. Three Android mascot/robots peek out around her body.

Google's new phones can't stop phoning home (permalink)

One of the most brazen lies of Big Tech is that people like commercial surveillance, a fact you can verify for yourself by simply observing how many people end up using products that spy on them. If they didn't like spying, they wouldn't opt into being spied on.

This lie has spread to the law enforcement and national security agencies, who treasure Big Tech's surveillance as an off-the-books trove of warrantless data that no court would ever permit them to gather on their own. Back in 2017, I found myself at SXSW, debating an FBI agent who was defending the Bureau's gigantic facial recognition database, which, he claimed, contained the faces of virtually every American:

https://www.theguardian.com/culture/2017/mar/11/sxsw-facial-recognition-biometrics-surveillance-panel

The agent insisted that the FBI had acquired all those faces through legitimate means, by accessing public sources of people's faces. In other words, we'd all opted in to FBI facial recognition surveillance. "Sure," I said, "to opt out, just don't have a face."

This pathology is endemic to neoliberal thinking, which insists that all our political matters can be reduced to economic ones, specifically, the kind of economic questions that can be mathematically modeled and empirically tested. It would be great if all our thorniest problems could be solved like mathematical equations.

Unfortunately, there are key elements of these systems that can't be reliably quantified and turned into mathematical operators, especially power. The fact that someone did something tells you nothing about whether they chose to do so – to understand whether someone was coerced or made a free choice, you have to consider the power relationships involved.

Conservatives hate this idea. They want to live in a neat world of "revealed preferences," where the fact that you're working in a job where you're regularly exposed to carcinogens, or that you've stayed with a spouse who beats the shit out of you, or that you're homeless, or that you're addicted to Oxy, is a matter of choice. Monopolies exist because we all love the monopolist's product best, not because they've got monopoly power. Jobs that pay starvation wages exist because people want to work full time for so little money that they need food-stamps just to survive. Intervening in any of these situations is "woke paternalism," where the government thinks it knows better than you and intervenes to take away your right to consume unsafe products, get maimed at work, or have your jaw broken by your husband.

Which is why neoliberals insist that politics should be reduced to economics, and that economics should be carried out as if power didn't exist:

https://pluralistic.net/2024/10/05/farrago/#jeffty-is-five

Nowhere is this stupid trick more visible than in the surveillance fight. For example, Google claims that it tracks your location because you asked it to, by using Google products that make use of your location without clicking an opt out button.

In reality, Google has the power to simply ignore your preferences about location tracking. In 2021, the Arizona Attorney General's privacy case against Google yielded a bunch of internal memos, including memos from Google's senior product manager for location services Jen Chai complaining that she had turned off location tracking in three places and was still being tracked:

https://pluralistic.net/2021/06/01/you-are-here/#goog

Multiple googlers complained about this: they'd gone through dozens of preference screens, hunting for "don't track my location" checkboxes, and still they found that they were being tracked. These were people who worked under Chai on the location services team. If the head of that team, and her subordinates, couldn't figure out how to opt out of location tracking, what chance did you have?

Despite all this, I've found myself continuing to use stock Google Pixel phones running stock Google Android. There were three reasons for this:

First and most importantly: security. While I worry about Google tracking me, I am as worried (or more) about foreign governments, random hackers, and dedicated attackers gaining access to my phone. Google's appetite for my personal data knows no bounds, but at least the company is serious about patching defects in the Pixel line.

Second: coercion. There are a lot of apps that I need to run – to pay for parking, say, or to access my credit union or control my rooftop solar – that either won't run on jailbroken Android phones or require constant tweaking to keep running.

Finally: time. I already have the equivalent of three full time jobs and struggle every day to complete my essential tasks, including managing complex health issues and being there for my family. The time I take out of my schedule to actively manage a de-Googled Android would come at the expense of either my professional or personal life.

And despite Google's enshittificatory impulses, the Pixels are reliably high-quality, robust phones that get the hell out of the way and let me do my job. The Pixels are Google's flagship electronic products, and the company acts like it.

Until now.

A new report from Cybernews reveals just how much data the next generation Pixel 9 phones collect and transmit to Google, without any user intervention, and in defiance of the owner's express preferences to the contrary:

https://cybernews.com/security/google-pixel-9-phone-beams-data-and-awaits-commands/

The Pixel 9 phones home every 15 minutes, even when it's not in use, sharing "location, email address, phone number, network status, and other telemetry." Additionally, every 40 minutes, the new Pixels transmit "firmware version, whether connected to WiFi or using mobile data, the SIM card Carrier, and the user’s email address." Even further, even if you've never opened Google Photos, the phone contacts Google Photos’ Face Grouping API at regular intervals. Another process periodically contacts Google's Voice Search servers, even if you never use Voice Search, transmitting "the number of times the device was restarted, the time elapsed since powering on, and a list of apps installed on the device, including the sideloaded ones."

All of this is without any consent. Or rather, without any consent beyond the "revealed preference" of just buying a phone from Google ("to opt out, don't have a face").

What's more, the Cybernews report probably undercounts the amount of passive surveillance the Pixel 9 undertakes. To monitor their testbench phone, Cybernews had to root it and install Magisk, a monitoring tool. In order to do that, they had to disable the AI features that Google touts as the centerpiece of Pixel 9. AI is, of course, notoriously data-hungry and privacy invasive, and all the above represents the data collection the Pixel 9 undertakes without any of its AI nonsense.

It just gets worse. The Pixel 9 also routinely connects to a "CloudDPC" server run by Google. Normally, this is a server that an enterprise customer would connect its employees' devices to, allowing the company to push updates to employees' phones without any action on their part. But Google has designed the Pixel 9 so that privately owned phones do the same thing with Google, allowing for zero-click, no-notification software changes on devices that you own.

This is the kind of measure that works well, but fails badly. It assumes that the risk of Pixel owners failing to download a patch outweighs the risk of a Google insider pushing out a malicious update. Why would Google do that? Well, perhaps a rogue employee wants to spy on his ex-girlfriend:

https://www.wired.com/2010/09/google-spy/

Or maybe a Google executive wins an internal power struggle and decrees that Google's products should be made shittier so you need to take more steps to solve your problems, which generates more chances to serve ads:

https://pluralistic.net/2024/04/24/naming-names/#prabhakar-raghavan

Or maybe Google capitulates to an authoritarian government who orders them to install a malicious update to facilitate a campaign of oppressive spying and control:

https://en.wikipedia.org/wiki/Dragonfly_(search_engine)

Indeed, merely by installing a feature that can be abused this way, Google encourages bad actors to abuse it. It's a lot harder for a government or an asshole executive to demand a malicious downgrade of a Google product if users have to accept that downgrade before it takes effect. By removing that choice, Google has greased the skids for malicious downgrades, from both internal and external sources.

Google will insist that these anti-features – both the spying and the permissionless updating – are essential, that it's literally impossible to imagine building a phone that doesn't do these things. This is one of Big Tech's stupidest gambits. It's the same ruse that Zuck deploys when he says that it's impossible to chat with a friend or plan a potluck dinner without letting Facebook spy on you. It's Tim Cook's insistence that there's no way to have a safe, easy to use, secure computing environment without giving Apple a veto over what software you can run and who can fix your device – and that this veto must come with a 30% rake from every dollar you spend on your phone.

The thing is, we know it's possible to separate these things, because they used to be separate. Facebook used to sell itself as the privacy-forward alternative to Myspace, where they would never spy on you (not coincidentally, this is also the best period in Facebook's history, from a user perspective):

https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3247362

And we know it's possible to make a Pixel that doesn't do all this nonsense because Google makes other Pixel phones that don't do all this nonsense, like the Pixel 8 that's in my pocket as I type these words.

This doesn't stop Big Tech from gaslighting* us and insisting that demanding a Pixel that doesn't phone home four times an hour is like demanding water that isn't wet.

*pronounced "jass-lighting"

Even before I read this report, I was thinking about what I would do when I broke my current phone (I'm a klutz and I travel a lot, so my gadgets break pretty frequently). Google's latest OS updates have already crammed a bunch of AI bullshit into my Pixel 8 (and Google puts the "invoke AI bullshit" button in the spot where the "do something useful" button used to be, meaning I accidentally pull up the AI bullshit screen several times/day).

Assuming no catastrophic phone disasters, I've got a little while before my next phone, but I reckon when it's time to upgrade, I'll be switching to a phone from the @calyxinstitute@mastodon.social. Calyx is an incredible, privacy-focused nonprofit whose founder, Nicholas Merrill, was the first person to successfully resist one of the Patriot Act's "sneek-and-peek" warrants, spending 11 years defending his users' privacy from secret – and, ultimately, unconstitutional – surveillance:

https://www.eff.org/deeplinks/2013/03/depth-judge-illstons-remarkable-order-striking-down-nsl-statute

Merrill and Calyx have tapped into various obscure corners of US wireless spectrum licenses that require major carriers to give ultra-cheap access to nonprofits, allowing them to offer unlimited, surveillance-free, Net Neutrality respecting wireless data packages:

https://memex.craphound.com/2016/09/22/i-have-found-a-secret-tunnel-that-runs-underneath-the-phone-companies-and-emerges-in-paradise/

I've been a very happy Calyx user in years gone by, but ultimately, I slipped into the default of using stock Pixel handsets with Google's Fi service.

But even as I've grown increasingly uncomfortable with the direction of Google's Android and Pixel programs, I've grown increasingly impressed with Calyx's offerings. The company has graduated from selling mobile hotspots with unlimited data SIMs to selling jailbroken, de-Googled Pixel phones that have all the hardware reliability of a Pixel, coupled with an alternative app suite and your choice of a Calyx SIM and/or a Calyx hotspot:

https://calyxinstitute.org/

Every time I see what Calyx is up to, I think, dammit, it's really time to de-Google my phone. With the Pixel 9 descending to new depths of enshittification, that decision just got a lot easier. When my current phone croaks, I'll be talking to Calyx.

(Image: Cryteria, CC BY 3.0, modified)


Hey look at this (permalink)



A Wayback Machine banner.

This day in history (permalink)

#20yrsago HOWTO censor the net with a Hotmail account https://web.archive.org/web/20041023150004/http://www.bof.nl/docs/researchpaperSANE.pdf

#20yrsago Pratchett’s “Going Postal”: Graft, hackers, and a semaphore Internet https://memex.craphound.com/2004/10/09/pratchetts-going-postal-graft-hackers-and-a-semaphore-internet/

#20yrsago Both Presidential candidates arrested while serving papers on CPD https://web.archive.org/web/20041009213011/https://badnarik.org/supporters/blog/2004/10/08/michael-badnarik-arrested/

#15yrsago Marc Laidlaw’s “Sleepy Joe” — sf story comic podcast about war, cable access and human bombs https://escapepod.org/2009/10/08/ep219-sleepy-joe/

#15yrsago Junky Styling: a manual for thrift-shop clothes-remixers https://memex.craphound.com/2009/10/09/junky-styling-a-manual-for-thrift-shop-clothes-remixers/

#10yrsago Kids who sext more likely to be comfortable with their sexuality https://publications.aap.org/pediatrics/article-abstract/47/Supplement_1/229/78000/The-Relationships-Between-Adrenal-Cortical?redirectedFrom=PDF

#10yrsago SWAT team murders burglary victim because burglar claimed he found meth https://www.techdirt.com/2014/10/08/swat-team-raids-house-kills-homeowner-because-criminal-who-burglarized-house-told-them-to/

#10yrsago Malware needs to know if it’s in the Matrix https://web.archive.org/web/20141009164227/http://thestack.com/mimicry-in-malware-giovanni-vigna-081014

#5yrsago After banning working cryptography and raiding whistleblowers, Australia’s spies ban speakers from national infosec conference https://www.theguardian.com/technology/2019/oct/09/melbourne-cyber-conference-organisers-pressured-speaker-to-edit-biased-talk

#5yrsago SQL Murder Mystery: teaching SQL concepts with a mystery game https://github.com/NUKnightLab/sql-mysteries

#5yrsago Washington establishment freaks out as Modern Monetary Theory gains currency https://www.bloomberg.com/news/articles/2019-10-07/economists-worry-that-mmt-is-winning-the-argument-in-washington

#5yrsago Hunter Biden’s Ukraine gig was corrupt, just not in the way Republican conspiracists claim it was https://theintercept.com/2019/10/09/joe-hunter-biden-family-money/

#5yrsago Gamers propose punishing Blizzard for its anti-Hong Kong partisanship by flooding it with GDPR requests https://www.reddit.com/r/hearthstone/comments/df0zx5/upset_about_blizzards_hk_ruling_heres_what_to_do/

#1yrago How Google's trial secrecy lets it control the coverage https://pluralistic.net/2023/10/09/working-the-refs/#but-id-have-to-kill-you


Upcoming appearances (permalink)

A photo of me onstage, giving a speech, holding a mic.



A screenshot of me at my desk, doing a livecast.

Recent appearances (permalink)



A grid of my books with Will Stahle covers..

Latest books (permalink)



A cardboard book box with the Macmillan logo.

Upcoming books (permalink)

  • Picks and Shovels: a sequel to "Red Team Blues," about the heroic era of the PC, Tor Books, February 2025

  • Unauthorized Bread: a middle-grades graphic novel adapted from my novella about refugees, toasters and DRM, FirstSecond, 2025



Colophon (permalink)

Today's top sources:

Currently writing:

  • Enshittification: a nonfiction book about platform decay for Farrar, Straus, Giroux. Today's progress: 752 words (60068 words total).

  • A Little Brother short story about DIY insulin PLANNING

  • Picks and Shovels, a Martin Hench noir thriller about the heroic era of the PC. FORTHCOMING TOR BOOKS FEB 2025

Latest podcast: Spill, part one (a Little Brother story) https://craphound.com/littlebrother/2024/10/06/spill-part-one-a-little-brother-story/


This work – excluding any serialized fiction – is licensed under a Creative Commons Attribution 4.0 license. That means you can use it any way you like, including commercially, provided that you attribute it to me, Cory Doctorow, and include a link to pluralistic.net.

https://creativecommons.org/licenses/by/4.0/

Quotations and images are not included in this license; they are included either under a limitation or exception to copyright, or on the basis of a separate license. Please exercise caution.


How to get Pluralistic:

Blog (no ads, tracking, or data-collection):

Pluralistic.net

Newsletter (no ads, tracking, or data-collection):

https://pluralistic.net/plura-list

Mastodon (no ads, tracking, or data-collection):

https://mamot.fr/@pluralistic

Medium (no ads, paywalled):

https://doctorow.medium.com/

Twitter (mass-scale, unrestricted, third-party surveillance and advertising):

https://twitter.com/doctorow

Tumblr (mass-scale, unrestricted, third-party surveillance and advertising):

https://mostlysignssomeportents.tumblr.com/tagged/pluralistic

"When life gives you SARS, you make sarsaparilla" -Joey "Accordion Guy" DeVilla

Read the whole story
mkalus
12 minutes ago
reply
iPhone: 49.287476,-123.142136
Share this story
Delete

Bret Weinstein doesn't understand the immune system

1 Share
From: Debunk the Funk with Dr. Wilson
Duration: 8:02

Read the whole story
mkalus
21 hours ago
reply
iPhone: 49.287476,-123.142136
Share this story
Delete

Über 33.000 Soundeffekte aus dem BBC-Archiv zum Download

1 Share
(Foto: Ashley PomeroyCC BY 4.0, via DJ Mag)

Die BBC hat ihre Soundeffekt-Bibliothek auf nicht weniger als 33.000 Samples aufgestockt, die dort jetzt zum kostenlosen Download bereitstehen.

Indexed into categories, the sounds span everything from footsteps and transport to nature and machines. Among the plethora of sounds covered are reindeer grunts, rain, clocks, horses walking in mud, common frog calls and crowds at the 1989 FA Cup Final. And that barely scratches the surface.

The sounds have been released under a non-commercial use license (a RemArc License) as part of the BBC’s RemArc programme, which is “designed to help trigger memories in people with dementia using BBC Archive material as stimulation”.

A RemArc License stipulates that the samples can only be used for research, educational or personal projects, and therefore can’t be legally sampled in music that is then sold.

Read the whole story
mkalus
1 day ago
reply
iPhone: 49.287476,-123.142136
Share this story
Delete

Pluralistic: China hacked Verizon, AT&T and Lumen using the FBI's backdoor (07 Oct 2024)

1 Share


Today's links



A stainless steel, riveted cubic vault. On one face is a giant vault door surmounted by the FBI logo. On the other face is a rusty screen door with the words NO ENTRY on it; through the screen we see a Chinese flag.

China hacked Verizon, AT&T and Lumen using the FBI's backdoor (permalink)

State-affiliated Chinese hackers penetrated AT&T, Verizon, Lumen and others; they entered their networks and spent months intercepting US traffic – from individuals, firms, government officials, etc – and they did it all without having to exploit any code vulnerabilities. Instead, they used the back door that the FBI requires every carrier to furnish:

https://www.wsj.com/tech/cybersecurity/u-s-wiretap-systems-targeted-in-china-linked-hack-327fc63b?st=C5ywbp&reflink=desktopwebshare_permalink

In 1994, Bill Clinton signed CALEA into law. The Communications Assistance for Law Enforcement Act requires every US telecommunications network to be designed around facilitating access to law-enforcement wiretaps. Prior to CALEA, telecoms operators were often at pains to design their networks to resist infiltration and interception. Even if a telco didn't go that far, they were at the very least indifferent to the needs of law enforcement, and attuned instead to building efficient, robust networks.

Predictably, CALEA met stiff opposition from powerful telecoms companies as it worked its way through Congress, but the Clinton administration bought them off with hundreds of millions of dollars in subsidies to acquire wiretap-facilitation technologies. Immediately, a new industry sprang into being; companies that promised to help the carriers hack themselves, punching back doors into their networks. The pioneers of this dirty business were overwhelmingly founded by ex-Israeli signals intelligence personnel, though they often poached senior American military and intelligence officials to serve as the face of their operations and liase with their former colleagues in law enforcement and intelligence.

Telcos weren't the only opponents of CALEA, of course. Security experts – those who weren't hoping to cash in on government pork, anyways – warned that there was no way to make a back door that was only useful to the "good guys" but would keep the "bad guys" out.

These experts were – then as now – dismissed as neurotic worriers who simultaneously failed to understand the need to facilitate mass surveillance in order to keep the nation safe, and who lacked appropriate faith in American ingenuity. If we can put a man on the moon, surely we can build a security system that selectively fails when a cop needs it to, but stands up to every crook, bully, corporate snoop and foreign government. In other words: "We have faith in you! NERD HARDER!"

NERD HARDER! has been the answer ever since CALEA – and related Clinton-era initiatives, like the failed Clipper Chip program, which would have put a spy chip in every computer, and, eventually, every phone and gadget:

https://en.wikipedia.org/wiki/Clipper_chip

America may have invented NERD HARDER! but plenty of other countries have taken up the cause. The all-time champion is former Australian Prime Minister Malcolm Turnbull, who, when informed that the laws of mathematics dictate that it is impossible to make an encryption scheme that only protects good secrets and not bad ones, replied, "The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia":

https://www.zdnet.com/article/the-laws-of-australia-will-trump-the-laws-of-mathematics-turnbull/

CALEA forced a redesign of the foundational, physical layer of the internet. Thankfully, encryption at the protocol layer – in the programs we use – partially counters this deliberately introduced brittleness in the security of all our communications. CALEA can be used to intercept your communications, but mostly what an attacker gets is "metadata" ("so-and-so sent a message of X bytes to such and such") because the data is scrambled and they can't unscramble it, because cryptography actually works, unlike back doors. Of course, that's why governments in the EU, the US, the UK and all over the world are still trying to ban working encryption, insisting that the back doors they'll install will only let the good guys in:

https://pluralistic.net/2023/03/05/theyre-still-trying-to-ban-cryptography/

Any back door can be exploited by your adversaries. The Chinese sponsored hacking group know as Salt Typhoon intercepted the communications of hundreds of millions of American residents, businesses, and institutions. From that position, they could do NSA-style metadata-analysis, malware injection, and interception of unencrypted traffic. And they didn't have to hack anything, because the US government insists that all networking gear ship pre-hacked so that cops can get into it.

This isn't even the first time that CALEA back doors have been exploited by a hostile foreign power as a matter of geopolitical skullduggery. In 2004-2005, Greece's telecommunications were under mass surveillance by US spy agencies who wiretapped Greek officials, all the way up to the Prime Minister, in order to mess with the Greek Olympic bid:

https://en.wikipedia.org/wiki/Greek_wiretapping_case_2004%E2%80%9305

This is a wild story in so many ways. For one thing, CALEA isn't law in Greece! You can totally sell working, secure networking gear in Greece, and in many other countries around the world where they have not passed a stupid CALEA-style law. However the US telecoms market is so fucking huge that all the manufacturers build CALEA back doors into their gear, no matter where it's destined for. So the US has effectively exported this deliberate insecurity to the whole planet – and used it to screw around with Olympic bids, the most penny-ante bullshit imaginable.

Now Chinese-sponsored hackers with cool names like "Salt Typhoon" are traipsing around inside US telecoms infrastructure, using the back doors the FBI insisted would be safe.

(Image: Kris Duda, CC BY 2.0, modified)


Hey look at this (permalink)



A Wayback Machine banner.

This day in history (permalink)

#20yrsago How the NSA broke crypto, and created civilian crypto industry https://www.schneier.com/blog/archives/2004/10/the_legacy_of_d.html

#20yrsago Brewster Kahle: Universal access to all human knowledge is possible https://craphound.com/kahleweb20.txt

#20yrsago HOWTO break Google Print DRM https://web.archive.org/web/20041011120549/http://vitanuova.loyalty.org/weblog/nb.cgi/view/vitanuova/2004/10/07/2

#15yrsago Japanese court overturns Winny ruling, says file-sharing software is legal even if used for infringement https://web.archive.org/web/20091009232138/http://mdn.mainichi.jp/mdnnews/national/news/20091008p2a00m0na016000c.html

#15yrsago Robert E Howard collection, HEROES IN THE WIND: revisit your heroic past https://memex.craphound.com/2009/10/08/robert-e-howard-collection-heroes-in-the-wind-revisit-your-heroic-past/

#15yrsago The criticism that Ralph Lauren doesn’t want you to see! https://memex.craphound.com/2009/10/06/the-criticism-that-ralph-lauren-doesnt-want-you-to-see/

#15yrsago Scott Westerfeld’s Leviathan: kick-ass young adult steampunk series starts with a bang, a hiss and a clank https://memex.craphound.com/2009/10/06/scott-westerfelds-leviathan-kick-ass-young-adult-steampunk-series-starts-with-a-bang-a-hiss-and-a-clank/

#10yrsago Profile of Daniel Pinkwater, “Pynchon for kids” https://forward.com/culture/206667/how-daniel-pinkwater-became-my-own-personal-guru/

#10yrsago Sore losers: How casinos went after two guys who found a video poker bug https://www.wired.com/2014/10/cheating-video-poker/

#10yrsago Fixing the unfixable USB bug https://www.wired.com/2014/10/unpatchable-usb-malware-now-patchsort/

#10yrsago 20 meaningful things you can do about climate change http://thischangeseverything.org/twenty-things-you-can-do-to-address-the-climate-crisis/

#10yrsago 10% of Americans have 10 or more alcoholic drinks every day https://www.washingtonpost.com/news/wonk/wp/2014/09/25/think-you-drink-a-lot-this-chart-will-tell-you/

#10yrsago $35 Firefox OS smartphone – back to the drawing board https://arstechnica.com/gadgets/2014/10/testing-a-35-firefox-os-phone-how-bad-could-it-be/

#5yrsago For the first time ever, taxes on the 400 richest Americans were lower than taxes on everyone else https://www.nytimes.com/interactive/2019/10/06/opinion/income-tax-rate-wealthy.html

#5yrsago Supreme Court greenlights lawsuit over Amazon’s wage-theft from warehouse workers https://www.reuters.com/article/us-usa-court-amazon-com/u-s-supreme-court-rejects-amazon-warehouse-worker-wage-appeal-idUSKBN1WM1FI/

#5yrsago Bernie Blindness: a subreddit for noting the way press narratives ignore or smear Bernie Sanders https://www.reddit.com/r/bernieblindness/top/

#5yrsago Checkm8: an “unstoppable” Iphone jailbreaking crack https://arstechnica.com/information-technology/2019/09/developer-of-checkm8-explains-why-idevice-jailbreak-exploit-is-a-game-changer/

#5yrsago After an injunction against Pacifica radio, New York’s WBAI is back on the air https://twitter.com/2600/status/1181423565389942786

#5yrsago How the “Varsity Blues” admissions scam punished deserving, hard working kids so that mediocre kids of the super-rich could prosper https://memex.craphound.com/2019/10/08/how-the-varsity-blues-admissions-scam-punished-deserving-hard-working-kids-so-that-mediocre-kids-of-the-super-rich-could-prosper/

#5yrsago Facebook’s 2016 election billboards: Buy all your elections with us! https://twitter.com/MarietjeSchaake/status/1180166896294887424

#5yrsago Podcast: Why do people believe the Earth is flat? https://ia601006.us.archive.org/35/items/Cory_Doctorow_Podcast_311/Cory_Doctorow_Podcast_311_-_Why_do_people_believe_the_Earth_is_flat.mp3

#5yrsago The cloud vs humanity: Adobe terminates every software license in Venezuela, keeps Venezuelans’ money https://helpx.adobe.com/la/x-productkb/policy-pricing/executive-order-venezuela.html

#5yrsago How this fine gentleman convinced me to donate $300 to Elizabeth Warren https://memex.craphound.com/2019/10/06/how-this-fine-gentleman-convinced-me-to-donate-300-to-elizabeth-warren/

#5yrsago The corrupt Brazilian prosecutors who locked up Lula now want to release him, to make him less sympathetic https://memex.craphound.com/2019/10/06/the-corrupt-brazilian-prosecutors-who-locked-up-lula-now-want-to-release-him-to-make-him-less-sympathetic/

#5yrsago Hi-rez, open-licensed recreation of the 1968 Disneyland souvenir map https://ia803109.us.archive.org/7/items/disneylandmap1968_201910/DisneylandMap1968Full.jpg


Upcoming appearances (permalink)

A photo of me onstage, giving a speech, holding a mic.



A screenshot of me at my desk, doing a livecast.

Recent appearances (permalink)



A grid of my books with Will Stahle covers..

Latest books (permalink)



A cardboard book box with the Macmillan logo.

Upcoming books (permalink)

  • Picks and Shovels: a sequel to "Red Team Blues," about the heroic era of the PC, Tor Books, February 2025

  • Unauthorized Bread: a middle-grades graphic novel adapted from my novella about refugees, toasters and DRM, FirstSecond, 2025



Colophon (permalink)

Today's top sources: Matt Blaze (https://www.mattblaze.org/).

Currently writing:

  • Enshittification: a nonfiction book about platform decay for Farrar, Straus, Giroux. Today's progress: words ( words total).

  • A Little Brother short story about DIY insulin PLANNING

  • Picks and Shovels, a Martin Hench noir thriller about the heroic era of the PC. FORTHCOMING TOR BOOKS FEB 2025

Latest podcast: Spill, part one (a Little Brother story) https://craphound.com/littlebrother/2024/10/06/spill-part-one-a-little-brother-story/


This work – excluding any serialized fiction – is licensed under a Creative Commons Attribution 4.0 license. That means you can use it any way you like, including commercially, provided that you attribute it to me, Cory Doctorow, and include a link to pluralistic.net.

https://creativecommons.org/licenses/by/4.0/

Quotations and images are not included in this license; they are included either under a limitation or exception to copyright, or on the basis of a separate license. Please exercise caution.


How to get Pluralistic:

Blog (no ads, tracking, or data-collection):

Pluralistic.net

Newsletter (no ads, tracking, or data-collection):

https://pluralistic.net/plura-list

Mastodon (no ads, tracking, or data-collection):

https://mamot.fr/@pluralistic

Medium (no ads, paywalled):

https://doctorow.medium.com/

Twitter (mass-scale, unrestricted, third-party surveillance and advertising):

https://twitter.com/doctorow

Tumblr (mass-scale, unrestricted, third-party surveillance and advertising):

https://mostlysignssomeportents.tumblr.com/tagged/pluralistic

"When life gives you SARS, you make sarsaparilla" -Joey "Accordion Guy" DeVilla

Read the whole story
mkalus
1 day ago
reply
iPhone: 49.287476,-123.142136
Share this story
Delete

In der Security gibt es seit einiger Zeit einen sehr ...

1 Share
In der Security gibt es seit einiger Zeit einen sehr beunruhigenden Trend, dass Leute die Security schlechter machen, und das dann mit "Monitoring" oder (neu!) Observability "kompensieren".

Aktuelles Beispiel: Keycloak.

Im neuen Release der IAM-Software sind User-Sessions standardmäßig persistierend. Eine Preview für Tracing mit OpenTelemetry dient der erhöhten Observability.
Die Überschrift ist deutlich reißerischer als der Fließtext, aber grundsätzlich solltet ihr auf sowas achten. Bei mir gehen inzwischen die Warnlampen an, wenn Leute "Observability" als Feature einbauen und bewerben. Das heißt, dass die Software ihnen selbst entglitten ist und auch für sie nicht funktioniert und sie daher Debugging-Code rübersprenkeln.
Read the whole story
mkalus
1 day ago
reply
iPhone: 49.287476,-123.142136
Share this story
Delete

Meet Craig, my 47-year-old 8-track recorder

1 Share
From: vwestlife
Duration: 19:56

After getting fixed up, Craig still looks and sounds great for his age, but unfortunately he has lost his timing. A restoration and demonstration of the Craig H260 8-track stereo recorder from late 1976.

Time flow:
0:00 Introduction
1:33 Features & specs
3:51 First test
6:03 A look inside
8:01 Repair
10:02 Success
12:07 Maintenance
13:35 Timer
15:48 Recording
18:53 Conclusion

#RetroTech #VintageAudio #8track

Read the whole story
mkalus
1 day ago
reply
iPhone: 49.287476,-123.142136
Share this story
Delete
Next Page of Stories