Fireside 2.1 (https://fireside.fm) Reality 2.0 Blog https://www.reality2cast.com/articles Fri, 22 Apr 2022 11:00:00 -0400 Reality 2.0 Blog en Reality 2.0 Newsletter - April 22, 2022: What's Web 3 Again? https://www.reality2cast.com/articles/reality-2-0-newsletter-april-22-2022-what-s-web-3-again Fri, 22 Apr 2022 11:00:00 -0400 podcast@reality2cast.com 2ca36e48-29e7-480d-9a78-12a8e281b7fd Join us for our exploration of decentralization and identity. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 107: Building the Decentralized Web

Katherine Druckman and Doc Searls talk to James Walker of Fission about building the decentralized web, decentralized identity, IPFS, and empowering users.

Please remember to subscribe via the podcast player of your choice.


We had the pleasure of speaking with James Walker of Fission, a decentralized web platform, about decentralization, IPFS, and his long history with digital identity.

James is an old friend of ours, and is a kindred spirit who values user agency as much as we do. For him that means designing standards and protocols that help to ultimately empower users, and we were inspired to learn of the work he’s doing. We hope you enjoy it as well!

We encourage you to share your thoughts with us on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


More From Fission

Fission CTO, Brooklyn Zelenka, presented this fantastic overview of Web 3 recently, and it’s well worth a look. She packs a lot of knowledge into a quick presentation.




This Week’s Reading List

  • Build the future of web apps at the edge – Fission — Cloud native stacks won't deliver the future We're building the data, auth & compute primitives that enable true local-first edge applications. But we don’t get to the future alone. Our edge computing stack is already embedded into leading protocols, platforms and products.

  • Beyond the Web. Answer these questions: | by Doc Searls | Mar, 2022 | Medium — Why are the choices presented to you by websites called your choices, when all those choices are provided by them? And why don’t you give them choices?

  • Elon Musk offers to buy Twitter. Here's what we know | AP News — In 10 days, Tesla CEO Elon Musk has gone from popular Twitter contributor and critic to the company’s largest individual shareholder to a would-be owner of the social platform — a whirlwind of activity that could change the service dramatically given the sometimes whimsical billionaire’s self-identification as a free-speech absolutist.


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - April 13, 2022: Privacy Revisited https://www.reality2cast.com/articles/reality-2-0-newsletter-april-13-2022-privacy-revisited Wed, 13 Apr 2022 11:00:00 -0400 podcast@reality2cast.com dda71b42-b4cc-4591-97a4-0041d00e1167 We're back! To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 106: Revisiting Privacy

Katherine Druckman and Doc Searls revisit the topic of data privacy.

Please remember to subscribe via the podcast player of your choice.


We’re back to the newsletter after a bit of a 2022 hiatus, and it’s perfect timing with the topic of our most recent episode. Last week, we circled back to the topic that got our podcast started and explored what has, and possibly more notably, what hasn’t changed with regard to data privacy and personal agency. While we may not have seen the progress we had hoped for, there has been some notable work (including some praiseworthy books, linked below), so we hope you’ll join us as we discuss the changes we have seen in the last three and a half years.

You can still find us on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


Thank you to frequent guest, Shawn Powers, for sending us this gem that we had to resurrect the newsletter just to share with you.


This Week’s Reading List


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - December 3, 2021: Doc's Open Tabs https://www.reality2cast.com/articles/reality-2-0-newsletter-december-3-2021-doc-s-open-tabs Fri, 03 Dec 2021 11:00:00 -0500 podcast@reality2cast.com 88bcac9f-5ff6-48ce-8518-438ffad71453 Catch up on what's interesting. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 92: DIY

Doc Searls, Katherine Druckman, Shawn Powers, and Kyle Rankin talk right to repair Apple devices, cocktails, and our nerdy hobbies.

Please remember to subscribe via the podcast player of your choice.


We’re back with a new episode this week, which you can check out on the website, but if you didn’t get a chance to listen to our previous episode, Episode 92: The DIY Episode, it’s worth a listen. We talked all about DIY, Apple and right to repair, and even “hacking” cocktails. You’ll find all the episode links in the reading list below, and as a bonus, we’ve added a bunch of interesting links from Doc’s more extensive reading list, including quite a few relevant to Episode 91: The Metaverse, and some about the work he’s been involved in lately. Enjoy!

We’ll have another episode or two before the end of year, and then we’ll take a break and see you again in January with some great episodes we have lined up for 2022. In the meantime, you can find us on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


Doc’s Links

Report of the Commission on the Geopolitical Impacts of New Technologies and data — by the Atlantic Council

How NFTs Create Value — by Steve Kaczynski and Scott Duke Kominers

Investing in Friends With Benefits (a DAO) — by Carra Wu and Chris Dixon

The Singularity Is Here
Artificially intelligent advertising technology is poisoning our societies. — by Ayad Akhtar

You Are the Object of a Secret Extraction Operation — by Shoshana Zuboff

Facebook is blocking access to data about how much misinformation it spreads and who is affected: Simply counting instances of misinformation found on a social media platform leaves two key questions unanswered. — by Ethan Zuckerman

Vizio makes nearly as much money from ads and data as it does from TVs — by Richard Lawler

Earlier on that:

Vizio Admits Modern TV Sets Are Cheaper Because They're Spying On You — by Karl Bode

Software Freedom Conservancy files right-to-repair lawsuit against California TV manufacturer Vizio Inc. for alleged GPL violations — by the Software Freedom Conservancy

Litigation is historic in nature due to its focus on consumer rights, filing as third-party beneficiary

An Ethics Bounty System Could Help Clean Up the Web: Tech companies just need to adapt the bug bounty system they already use to detect vulnerabilities in code. — by Jonathan Cohn

Unfreezing the ice age: the truth about humanity’s deep past: Archaeological discoveries are shattering scholars’ long-held beliefs about how the earliest humans organised their societies – and hint at possibilities for our own — by David Graeber and David Wengrow

Sci-Fi Icon Neal Stephenson Finally Takes on Global Warming: The renowned author says his genre should inspire solutions. In his new novel, Termination Shock, he tackles our most existential crisis. — by Adam Rogers

Good video by After Skool, whatever that is:

‘We Need To Have This Knife Fight.’ Inside Facebook’s Strategy To Bring the War to Apple: An internal Facebook plan reveals the machinations of a company determined to fend off Apple’s new privacy controls — by Alex Kantrowitz

Studying the Internet: A course in designing the future of the net — by Jeff Jarvis

“IT MIGHT WELL BE UNSOLVABLE”: NILAY PATEL ON FACEBOOK’S RECKONING WITH REALITY—AND THE METAVERSE-SIZE PROBLEMS YET TO COME: After a decade covering the Zucks, Googles, and Ubers of the scene, the Verge editor in chief reflects on tech’s troublesome relationship with the rest of the world. — by Delia Cai

[As a separate matter, Nilay (@reckless) and I got into it on Twitter: 

http://pagexray.fouanalytics.com/q/theverge.com","title":"FouAnalytics - Ads By Domain","description":null,"domain":"pagexray.fouanalytics.com"},"video_url":null}">
Twitter avatar for @dsearlsDoc Searls @dsearls
Yo @rjcc, @reckless, @verge: good piece on how @VIZIO, @Roku, et. al. make money:
theverge.com/2018/7/20/1759… Now explain to @acfou and the rest of us how The Verge doesn't do the same kind of thing with trackers on websites. See here: FouAnalytics - Ads By Domainpagexray.fouanalytics.com

 Clearly they're not going to own, or care about, the tracking they do. They'll just keep picking on Facebook.]

Facebook Is Bad. Fixing It Rashly Could Make It Much Worse. — by Farhad Manjoo

Missing the Point
When AI manipulates free speech, censorship is not the solution. Better code is.
— by Lessig

The Imminent Collapse of Digital Advertising: Digital ad fraud could be a $150 billion business by 2025, which would make it the largest criminal enterprise after the drug trade — by Scott Galloway

The Seven Rules of the Metaverse: A framework for the coming immersive reality — by Tony Parisi

AI home-buying and how it could change real estate — by Dorey Scheimer and Meghna Chakrabarti

Your Herbs and Spices Might Contain Arsenic, Cadmium, and Lead:
CR tested 126 products from McCormick, Trader Joe's, Whole Foods, and other popular brands. Almost a third had heavy metal levels high enough to raise health concerns.
— by Lisa L. Gill

Beyond the Web: Making a platform-free online marketplace for goods, ideas and everything else — Doc and Joyce Searls, plus (upcoming) David P. Reed, Ethan Zuckerman, Robin Chase and Shoshana Zuboff

Tracking-industry body IAB Europe told that it has infringed the GDPR, and its “consent” pop-ups used by Google and other tech firms are unlawful:
Google and the entire tracking industry relies on IAB Europe’s consent system, which has now been found to be illegal.'
— by the Irish Council for Civil Liberties

Joyce and I starred in this

https://www.idsnews.com/article/2021/11/ostrom-workshop-partner-visiting-scholars-to-lead-e-commerce-event-the-byway

—but it's already gone by, and the recording of it sucked.


This Week’s Reading List

  • Everyone Is a Genius: Apple Will Offer Parts and Tools for DIY Repairs | iFixit News — Early next year, a previously impossible repair will be possible: you can buy an iPhone screen directly from Apple, use Apple’s repair guide (and tools, if you want) to install it, and have it fully work as intended, using Apple’s diagnostic software. And you won’t have to own an authorized repair shop to do it.

  • Apple Self Service Repair Program | Right to Repair - Consumer Reports — In a major win for advocates, device owners and independent repair shops will soon have access to dozens of Apple parts, tools, and manuals—at the same price as authorized shops

  • Apple (AAPL) Aims for Fully Autonomous Car - Bloomberg — Apple Inc. is pushing to accelerate development of its electric car and is refocusing the project around full self-driving capabilities, according to people familiar with the matter, aiming to solve a technical challenge that has bedeviled the auto industry. 

  • DIY Cocktails: A Simple Guide to Creating Your Own Signature Drinks: Marcia Simmons, Jonas Halpren: Amazon.com: Books — Black Rose, Blood Orange Tequila & Soda, Kentucky Apple Sour: the newest trend in cocktails is creating your own! Now, the editors of DrinkoftheWeek.com have concocted the only guide that teaches you to create your own infallible thirst-quenchers. Using a simple system of basic ratios, you will learn to: Mix new flavor combinations for the perfect new blend using the Flavor Profile Chart as a guide Master advanced mixology techniques from infusing liquors at home to creating custom-flavored syrups Serve the perfect drink every time, whether it kicks off a rowdy party or winds down a romantic evening! With only nine ratios to master, you'll shake, stir, roll, and build literally thousands of unique and exceptional cocktails. All you need is a good thirst, an active imagination--and this guide!

  • Amazon.com: Mixology Dice® (tumbler) // Laser Engraved Wood Dice for Craft cocktail inspiration - Christmas gift, boyfriend gift, gift for him, gift for guys : Handmade Products — Whether you’re a newbie or a pro behind the bar, Mixology Dice will take your cocktail game to the next level. Along with providing seemingly endless inspiration (over 1.5 million combos!), this set of dice is actually a clever system for actually learning the art of mixology.

  • Redwood Empire Whiskey - Our Whiskeys — The Northern California Coast is a unique place, one of the few in the world where giant redwood trees grow. A place of inspiration and renewal. This same cool climate makes it a perfect place to produce sublime whiskey. Aging barrels here allows for a slow and even extraction of flavor, producing a whiskey of exceptional balance and complexity. Taste what our Redwood Empire inspires.

  • Gulden Draak, tremendous beer for titans | Gulden Draak — With its Gulden Draak, the Van Steenberge Brewery has brewed a beer that is as robust as the symbol of the dragon itself. It is a specialty beer with a fiery colour and unparalleled flavour and aroma. Gulden Draak has devoted fans throughout the world.

  • xkcd: Sandwich


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - November 5, 2021: Can Facebook Be the Good Guy? https://www.reality2cast.com/articles/reality-2-0-newsletter-november-5-2021-can-facebook-be-the-good-guy Fri, 05 Nov 2021 11:00:00 -0400 podcast@reality2cast.com f3bd02c3-4dd0-43fc-8b79-5c041a23a72a The metaverse and whistleblowers give us a lot to talk about. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 90: Can Facebook Be the Good Guy?

Katherine Druckman and Doc Searls talk to Shawn Powers and Petros Koutoupis about Facebook’s metaverse focus and whistleblower problems.

Please remember to subscribe via the podcast player of your choice.


the person who screws up something the absolute worst is now the expert

If there is one guarantee in life lately, it’s that Facebook will give us something to talk about. Last week, we discussed the Facebook papers, whistleblower Frances Haugen’s allegations, and the metaverse announcement. We’ve since released Episode 91 as well, which explores the metaverse idea further.

Perhaps most surprising was Shawn’s fairly optimistic take:

But I think that they have an advantage in that they are the company that is in the weeds with that situation right now. Right. I mean they're in Congress voluntarily and you know, whistleblowery, so I mean, the good, the bad and the ugly. I think though that the company could take this opportunity to leverage all of this horrible, bad press and this evilness that they have brought upon themselves to do good. And, and I say that because who knows more about how to be creepy with privacy data than Facebook right now. . .

I mean, and if they lean into that, like, okay, we designed an AI or “the algorithm” as as it's known, we designed this thing and man, it got, they got the better of us. It got the better of everybody because it has done terrible things. And if they learn from that in anything other than how to make more money then, you know, it could be a positive. I like to think that, that there is still some soul left in the people working there. So maybe there's some hope.

We also touched a little on the spotlight Frances Haugen finds herself in, and how her ideas around end-to-end encryption may or may not have been misconstrued. People seem to fit the released information into their existing narratives, whatever those may be, and we hope people will take a few deep breaths and digest the released information carefully.

We hope you’ll dive in with us and explore these ideas, and then let us know your thoughts on the recent Facebook issues. Can they become the good guys and turn their reputation around?

Please let us know in a comment, on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - October 29, 2021: Digital Identity https://www.reality2cast.com/articles/reality-2-0-newsletter-october-29-2021-digital-identity Fri, 29 Oct 2021 11:00:00 -0400 podcast@reality2cast.com cf8e08b1-800a-4b9a-b0c9-cca20494de61 Thoughts on sovereign identity. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 89: Digital Identity

Katherine Druckman and Doc Searls talk to Phil Windley about digital identity, picos, oauth, and big tech ecosystems.

Please remember to subscribe via the podcast player of your choice.


"if you look at why life in the large sense is so amazing and beautiful and wonderful is because people are autonomous."

We need self-sovereign identity. We need to be in charge of the way we identify ourselves in the digital and physical worlds. Today, however, there is a significant delta between the way most of us currently identify ourselves online, and the way many would consider ideal.

The concept of logging in for everything has not always been the norm online. In the early days, the web was less dependent on the practice, and much more sovereign in the sense that people tended to mind their own individual islands, using independent blogs or websites rather than the current way of sharing information via social media or other large platforms like Medium or Substack, but the early web was largely made up of more technical users, so one wonders if we could go back or how we might evolve. How will we identify ourselves in the metaverse?

In The End of Logins and Passwords, Just for Starters, Doc wrote:

There is no end to the number and ways SSI can grow outside of the old administrative identity box. Take, for example, what the tech educator Phil Windley calls the self-sovereign internet of things. Here your things are truly yours and under your control. They don’t even need to be smart. For example, you can slap a QR code on your dumb gizmo, scan it into a cloud of its own (called a “pico,” for “persistent compute object”), and you can have a relationship with the maker or seller of that gizmo through that pico. When picos become common, they will give you one way to deal with many different companies, and save those companies the trouble of maintaining their own proprietary systems for limiting customer involvement (including useful forms of customer input).

For more on identity, see Doc’s archive, or the Internet Identity Workshop.

We dove into these ideas in Episode 89, and we’d love to know your thoughts.

You can always reach us in a comment, on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List

  • Phil Windley's Technometria

  • 7 Laws of Identity – Kim Cameron's Identity Weblog — Here's the most beautiful take yet on the Seven Laws of Identity – put together by Karon and Katrika, who even saw how the Laws connect with the Perception of Ailatan.  In the past people have asked why I didn't do a Laws of Identity poster – this must be it.  Click to view full size.

  • Rainbows End - Wikipedia — Rainbows End is a 2006 science fiction novel by Vernor Vinge. It was awarded the 2007 Hugo Award for Best Novel.[1] The book is set in San Diego, California, in 2025, in a variation of the fictional world Vinge explored in his 2002 Hugo-winning novella "Fast Times at Fairmont High" and 2004's "Synthetic Serendipity". Vinge has tentative plans for a sequel,[2] picking up some of the loose threads left at the end of the novel. The many technological advances depicted in the novel suggest that the world is undergoing ever-increasing change, following the technological singularity, a recurring subject in Vinge's fiction and nonfiction writing.

  • Ten Reasons to Use Picos for Your Next Decentralized Programming Project — Picos are a programming model for building decentralized applications that provide significant benefits in the form of abstractions that reduce programmer effort. Here are ten eleven reasons you should use picos for your next decentralized application.

  • Moore's law - Wikipedia — Moore's law is the observation that the number of transistors in a dense integrated circuit (IC) doubles about every two years. Moore's law is an observation and projection of a historical trend. Rather than a law of physics, it is an empirical relationship linked to gains from experience in production.

  • Doc Searls Weblog · Car design trends — On Quora, here’s my answer to What are the worst design trends in modern cars?—updated by our family’s experience with a new Toyota that features even more indicators than the bunch above.



The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - October 15, 2021: Oh, Facebook https://www.reality2cast.com/articles/reality-2-0-newsletter-october-15-2021-oh-facebook Fri, 15 Oct 2021 11:00:00 -0400 podcast@reality2cast.com f8585f01-57da-4104-9808-f9528dfb34b7 Can Facebook be fixed? To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 88: Can We Fix Facebook?

Katherine Druckman and Doc Searls talk to Jerry Michalski and Petros Koutoupis about Facebook, its weaknesses, relationship to its users, and impact on all of us, and what happens when it disappears for six hours.

Please remember to subscribe via the podcast player of your choice.


What if we force Zuckerberg to redesign Facebook around citizens instead of consumers?

Last week we talked to Jerry Michalski all about Facebook, capitalism, and its impact on users. We really got into the weeds in this one, and I encourage you to listen to the whole episode, and to make use of the supplementary links below. A good question to put in your mind as you start listening is, “What if Facebook treated its users as citizens instead of consumers?” How would you ask Facebook to treat you, as a user?

You can hear more from Jerry in his TEDx talk below:


Please let us know your thoughts in a comment, on any of our social outlets, or via our contact form. Thank you!

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List

  • John Taylor Gatto - The Six Lesson Schoolteacher — “Look...at the...lessons of school teaching - confusion, class position, indifference, emotional and intellectual dependency, conditional self-esteem, surveillance - all of these lessons are prime training for permanent underclasses, people deprived forever of finding the center of their own special genius....Can you imagine a school where children challenged prevailing assumptions? Or worked alone without guidance? Or defined their own problems? It would be a radical contradiction of everything we've been conditioned to expect schools to do. If you want your son or daughter to learn what Harvard said was necessary, you'll have to arrange it outside of school time, maybe in between the dentist and the dancing lessons. And if you are poor, you better forget it altogether.” - John Taylor Gatto

  • The Seven Lesson School Teacher — Teaching means different things in different places, but seven lessons are universally taught from Harlem to Hollywood Hills. They constitute a national curriculum you pay for in more ways than you can imagine, so you might as well know what it is. You are at liberty, of course, to regard these lessons any way you like, but believe me when I say I intend no irony in this presentation. These are the things I teach, these are the things you pay me to teach. Make of them what you will.

  • The Hidden Curriculum of School

  • Frances Haugen

  • Facebook outage, by the numbers: Largest outage ever tracked could cost millions - MarketWatch — Outage cost company about $164,000 a minute in revenue, while stock’s decline wiped away more than $40 billion in market cap and cost Mark Zuckerberg roughly $6 billion personally


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - September 17, 2021: Improving the Internet's Responsiveness https://www.reality2cast.com/articles/improving-the-internet-s-responsiveness Fri, 17 Sep 2021 11:00:00 -0400 podcast@reality2cast.com 7be1878d-542c-4b1f-b894-6ff53585f779 How well does the internet work for us? To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 85: Bufferbloat

Katherine Druckman and Doc Searls talk to Dave Taht about bufferbloat, latency, and the issues plaguing our networks.

Please remember to subscribe via the podcast player of your choice.


"Ad astra per aspera - to the stars through difficulties." --John James Ingalls, 1861

Last week’s show, Episode 85, is one of our most technical ones; but also one of the most important, because it involves how well the Internet actually works for each and all of us. 

Take the matter of AQM: Active Queue Management. AQM keeps latencies (lag times) low. Poor or nonexistent AQM, rather than low bandwidth, is one of the main reasons that images and sound uploads can break up Zoom, FaceTime and other common calls over the Net. Given how much that kind of activity is becoming a primary way to use the Internet, it is hugely important for AQM to be deployed and work well.

One approach to that is DOCSIS-PIE, or PIE for short. (It stands for "Proportional Integral Controller Enhanced.") According to this paper, "For the device with AQM, the large majority of the latency under load tests resulted in 15-30 milliseconds of latency. In comparison, the device without AQM averaged roughly 250 milliseconds of latency – between 8-16 times higher – a highly significant difference to the end user quality of experience (QoE)."

PIE is the kind of civil engineering work on the Internet that happens all the time out of the public eye. This work often involves productive cooperation between the big entities putting the Internet's base protocols to work (for example, cable and phone companies), and independent queue theorists such as Dave, in an organization called the IETF. In fact, Dave singles out Comcast, which provides many of us Internet service through its Xfinity brand, as one of the good guys, in fact being one of the few ISPs actively investing in Open Source, and especially WiFi, via the Comcast Innovation Fund.*

As a separate matter, there is a new non-improvement to the Internet, led by some of the same big companies, called "Low-latency, low-loss, scalable throughput," or L4S for short. Here's a paper explaining it: Operational Guidance for Deployment of L4S in the Internet. Dave says L4S is meant to privilege some data flows, giving them a "fast lane" on the Internet while initially leveraging docsis pie to provide that initial, well agreed upon, truly fair, performance enhancement to the internet.

Dave calls this “the battle over the last bit in the IP header”. Should that bit be used to divide the internet in two, giving a performance advantage to ISP servers and specialized applications kept close to the ISP's network? Or used to provide better congestion signaling end to end, in a backwards compatible way for all applications? Or not used up at all, as Dave thinks neither approach can work. This battle is holding up deployments of docsis-pie, sch_cake, and fq_ codel when deployment of the proven AQM algorithms is direly needed to improve internet access for all stuck, working from home, suffering from latency stress and network glitches.

Still, it's interesting to witness the debate, for example reading that the BigCos are busy caring about "fairness" toward uses they favor.

Among other interesting and hyper-relevant things, Dave describes a simple hack that SpaceX's Starlink can use to make good on its promise of low-latency Internet service from space.

Dave also pointed us at the (now concluded) Internet Architecture Board workshop, keynoted by Vint Cerf, where among many other things, Matt Mathis of Google Measurement Labs described a marked (3-fold!) improvement in Internet responsiveness over the last 5 years for some ISPs, and Apple explained their new Network Responsiveness tool and metric, which is in beta now, and will be released in the next iOS and OSX versions.

Back on the ground, you should check out what you can do to maximize the quality of your own connection using SQM (Smart Queue Management), developed by Dave and his colleagues in the OpenWrt project

If you care about the way the Internet actually works, and what great hackers are doing to make sure it works well, this is a show not to miss.

—Doc

* It’s worth noting that Dave Taht's work has been funded by NLNET, Google fiber and the Comcast Innovation Fund.


This Week’s Reading List

  • Pitch in on Dave’s Patreon

  • dtaht (Dave Täht) · GitHub

  • Postcards from the Bleeding Edge — David Täht writes about politics, space, copyright, the internet, audio software, operating systems and surfing.

  • Does my modem have Active Queue Management (AQM) for low latency? | Xfinity Community Forum — Does my modem have Active Queue Management (AQM) for low latency?

  • RFC 8290 - The Flow Queue CoDel Packet Scheduler and Active Queue Management Algorithm

  • Bufferbloat.net - Bufferbloat.net — Bufferbloat is the undesirable latency that comes from a router or other network equipment buffering too much data.

  • Cerowrt Wiki - Bufferbloat.net — The CeroWrt Project is complete. The last build (3.10.50-1) was released in July 2014. The principles learned from that research project have been transferred to the Linux kernel and OpenWrt.

  • The congestion-notification conflict [LWN.net] — Most of the time, the dreary work of writing protocol standards at organizations like the IETF and beyond happens in the background, with most of us being blissfully unaware of what is happening. Recently, though, a disagreement over protocols for congestion notification and latency reduction has come to a head in a somewhat messy conflict. The outcome of this discussion may well affect how well the Internet of the future works — and whether Linux systems can remain first-class citizens of that net.

  • Objections to L4S WGLC — This document is a companion to a pair of slides presented at the IETF-111 TSVWG session. Due to time and space constraints, the slides could only contain a bare listing of the most pertinent, purely technical issues. This document illustrates and links to concrete data supporting the relevance of those issues, and amplifies them with further relevant issues. The bullet points from the slides are quoted, followed by supporting material.

  • Edward Bernays - Wikipedia

  • Operational Guidance for Deployment of L4S in the Internet — This document is intended to provide guidance in order to ensure successful deployment of Low Latency Low Loss Scalable throughput (L4S) in the Internet. Other L4S documents provide guidance for running an L4S experiment, but this document is focused solely on potential interactions between L4S flows and flows using the original ('Classic') ECN over a Classic ECN bottleneck link. The document discusses the potential outcomes of these interactions, describes mechanisms to detect the presence of Classic ECN bottlenecks, and identifies opportunities to prevent and/or detect and resolve fairness problems in such networks. This guidance is aimed at operators of end-systems, operators of networks, and researchers.

  • draft-ietf-tsvwg-aqm-dualq-coupled-16 - DualQ Coupled AQMs for Low Latency, Low Loss and Scalable Throughput (L4S)

  • [OpenWrt Wiki] SQM Details — If you want to set up SQM to minimize bufferbloat, you should start at the SQM Howto page.

  • SpaceX nicknames Starlink Internet user terminal 'Dishy McFlatface' — SpaceX started to offer Starlink satellite broadband internet this week. The company sent out e-mails to potential customers who would want to beta test the Starlink network in its early phase. SpaceX currently operates approximately 888 Starlink satellites in low Earth orbit out of thousands it plans to deploy to provide broadband coverage globally. Starlink is initially providing service to the northern United States and southern Canada. SpaceX states that by 2021 the company will provide service to 'the populated world'.


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - September 3, 2021: Does fiduciary duty scale? https://www.reality2cast.com/articles/reality-2-0-newsletter-september-3-2021-does-fiduciary-duty-scale Fri, 03 Sep 2021 06:00:00 -0400 podcast@reality2cast.com add4cfff-8682-43ab-a7a7-f4d171259e2e Our rundown on where tech and real estate collide. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 83: Intent Broadcasting and the Real Estate Market

Tune in to our new episode! Katherine Druckman and Doc Searls talk to Bill Wendel and Joyce Searls about where tech meets real estate, and how intentcasting could improve the market.

Please remember to subscribe via the podcast player of your choice.


Last week we veered away from our usual topics a bit to talk about real estate markets and how they may benefit from intentcasting, discussing ideas born out of Doc’s work (and others) from project VRM at Harvard’s Berkman Klein Center for Internet & Society.

We hope you’ll listen to the whole episode, but this quote from Joyce Searls is the heart of the issue that we cover in more detail.

I just want to wind back to this thought where bill was talking about the institutional buyers, the iBuyers. And, and what I've been saying is it's like the family farm movement with that family farms sold out to agribusiness.

And it, that was the way that agriculture became big ag, but before that agriculture in the U S was all family farms. And my fear about residential real estate is that these are our family farms now. And what will happen next is that the iBuyers will come in and they'll be agricultural type giant conglomerates. So it'd be residential real estate, giant conglomerates that buy and run, and we then have to, you know, get our housing from the, the equivalent of big ag.

So the reason I really care about it is because I have been a small landlord and I've been a small homeowner. And I really think that there's so much power to having your own agency and your own way of, of, you know, running your own business, your own show, even if you have a job at a corporation, but if you own some, a duplex or something that you are as a small landlord, you have a sense of agency. So why real estate really resounds with me in this is like, let's not do what happened with big ag to the American dream, the actual American dream, which is, you know, owning your own home.

So I wanted to just start with that. And then now I can stay a little bit about what we're we're doing with this on our Customer Commons non-profit, building something called the byway, which is the alternative to the web. The web is the highway. Remember the information highway that Al gore talked about? Well, the information highway turned out to be basically your choice of big tech, you know, your choice of platform you can be on. You have full agency as long as you're, you know, selling on eBay or selling on Amazon or, or you're driving for Uber or whatever.

So the, the big platforms have, have captured in the same way that I was talking about with big ag have, have captured tech. Now let's just use the internet to take the byway, which is kind of like, you know, the back roads of America. So it's the back roads of tech so that I can just connect with whoever it is. Maybe I want to sell my house, I'm getting ready to sell my house maybe, or my parent is getting ready to sell. And there's a lot of work that needs to be done.

But if I have the availability of connecting with, you know, locals in my community who might be interested in buying my house, if I can connect with them directly without the giant industrial system that is industrial real estate, then I might really have a very satisfying transaction and have the right outcome for what I want. And I believe that the baby boom generation, which Bill really spends a lot of time talking about is ripe for this. We're like, we want to do the right thing for the next generation.

And so why if we... Not saying everybody's going to do it, there's plenty of people that will do it the way, whatever way that is out there to be done, but have have an alternative. . .

The idea is, is that, that my platform, my machine is my platform so that I could have an algorithm that runs on my data and the runs on what I'm concerned with and my financials and my ownership, and that I would have an algorithm, which would work on my personal data and help me to figure out what I should do, and that I could buy this from an independent app store. It doesn't have to be an app store that's run by Google or apple. And it would be an app of my own, an app for me.

So that's why we called it a palgorithm like personal algorithm, but also my buddy. And, and that it, it reports to me. So it's not out there, you know, giving information to some larger platform.

Please let us know your thoughts in a comment, on any of our social outlets, or via our contact form. Thank you!

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - August 27, 2021: Apple's Child Safety Policy https://www.reality2cast.com/articles/apple-s-child-safety-policy Thu, 26 Aug 2021 11:00:00 -0400 podcast@reality2cast.com 5b88dff9-9020-4ef2-a11f-c51a3d8a5b2f Listen to the screeching voices of the minority. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 82: Apple’s Child Safety and the Screeching Voices of the Minority

Katherine Druckman and Doc Searls talk to Kyle Rankin about Apple’s new plans to monitor personal devices, and what it means for privacy, ownership, and setting precedence.

Please remember to subscribe via the podcast player of your choice.


The Screeching What, Now?

A few weeks ago, Apple announced a new approach to child safety that caused a swift backlash from nearly every privacy expert and advocate, including the Electronic Frontier Foundation, the ACLU, Fight for the Future, and many individuals and others, with many ultimately signing an open letter to Apple strongly condemning the move.

The undersigned organisations committed to civil rights, human rights and digital rights around the world are writing to urge Apple to abandon the plans it announced on 5 August 2021 to build surveillance capabilities into iPhones, iPads and other Apple products. Though these capabilities are intended to protect children and to reduce the spread of child sexual abuse material (CSAM), we are concerned that they will be used to censor protected speech, threaten the privacy and security of people around the world, and have disastrous consequences for many children.

Reality 2.0 guests, Kyle Rankin and Bruce Schneier weighed in with reasoned commentary as well. Schneier provides an excellent round up of various information related to Apple’s announcement, and in his first post, aptly recalls his own 2005 warning:

Beware the Four Horsemen of the Information Apocalypse: terrorists, drug dealers, kidnappers, and child pornographers. Seems like you can scare any public into allowing the government to do anything with those four.

Rankin’s more thorough analysis on the Puri.sm blog raises the very fair question of precedence setting:

So companies capture and sell our data, and the police and private groups sometimes buy that data to look for crimes. But up to this point, the “snitching” that devices did on you was indirect–it would send data to vendors or app developers to sell to brokers, but the only time that vendors might search your data and alert the authorities is when searching files stored on their own servers that you have shared. Up to now, actually scanning for potential contraband on a person’s device was a line companies wouldn’t cross.

We hope you’ll listen to episode 82 to hear our full discussion with Kyle on what we feel is a gravely important issue. We’re with the experts on this, and you can add us to the “screeching voices of the minority.” You can show your support for the podcast and digital privacy by ordering a t-shirt or other printed items with the design below.

And as always, please let us know your thoughts in a comment, on any of our social outlets, or via our contact form. Thank you!

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - August 12, 2021: Geeks at Home https://www.reality2cast.com/articles/reality-2-0-newsletter-august-12-2021-geeks-at-home Thu, 12 Aug 2021 12:00:00 -0400 podcast@reality2cast.com 38f35258-9b1f-4dc6-8bde-7a43589a3f5a Our favorite gadgets, toys, and tools for working and playing from home. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 81: Geeks at Home: The Gear That Makes Us Happy

Katherine Druckman and Doc Searls talk to Shawn Powers and Petros Koutoupis about how we make our personal spaces better for work and play.

Please remember to subscribe via the podcast player of your choice.


TOYS!

I think a lot of us think of something electronic when we think of our favorite toys, but sometimes the toys that truly speak to our souls are a bit simpler. While recording last week’s podcast, Shawn was kind enough to show us a prototype of his new Spot plush. Spot is the adorable dog in Shawn’s webcomic, MyBigRoundWorld.com, featured in strips like you’ll see below. We think it turned out incredibly well, and we can’t wait until we can all have Spots of our own.

Photo of Spot plush toy from MyBigRoundWorld.com
Spot and Shawn from MyBigRoundWorld.com


Our Favorite Gear

Stuff we love

Our focus last week was the things that make us happy while working and playing from home, which we’ve all done a lot more of this past year. We’ll outline the highlights here:

Katherine’s Picks

Herman Miller Aeron Chair — A lifesaver (backsaver? buttsaver?). Possibly an actual medical expense. Try to find one used.

This Star Wars themed rug — I love it. It knows. (I don’t actually have this yet, but I will. Someday.)

AeroGarden — I have become weirdly obsessed with my two Aerogardens over the last year and a half.

Blue Yeti Mic — A great entry-level mic.

Shawn’s Picks

Sony a6400 — This camera is why Shawn always looks better than the rest of us on video calls. Now you know.

Electro-Voice RE20 Broadcast Announcer Microphone — And this mic is why he sounds better!

X2U - Microphone to USB Adapter

Cam Link 4K | elgato.com

Key Light Air | elgato.com

Plex — Shawn’s preferred home media solution. There’s a background story in last week’s episode!

Krikzz — A retro gaming find. Load ROMs on cartridge, play on original console!

Doc’s Picks

Sony Alpha 7R — Doc’s preferred camera.

Fast.com — The best speed test. No ads, no bullshit. But there is a small trick to getting the whole picture: click on "Show more info" and then on "Settings." Then put a check by "Measure loaded latency during upload" and "Always show all metrics" and save. Loaded latency will be your bufferbloat.

EFF's Cover Your Tracks page — A favorite privacy tool.

Ear 1 Earbuds — An AirPods killer?

4K UHD Hisense Roku TV — Big, cheap, and easy to use.

Petros’s Picks

Arcade1Up — Officially Licensed Arcade Cabinets. This is why Petros has a cooler gameroom than me.

Digging Up The Past — His own monthly newsletter for ancient history enthusiasts.


This Week’s Reading List

  • My Big Round World – Everyone's a square…

  • Pet Sematary (1989) - IMDb — After tragedy strikes, a grieving father discovers an ancient burial ground behind his home with the power to raise the dead.

  • Sony Alpha 7R Review: Digital Photography Review — If there's one thing you can say about Sony's digital camera business, it's that they've experimented with many different concepts. From SLRs with dual autofocus systems and Translucent Mirror Technology to its NEX mirrorless line-up, Sony has gone down virtually every avenue in digital imaging. Its latest products - the Alpha 7 and Alpha 7R - may be the most exciting products to come out of the Sony labs in some time. The company has managed to create full-frame cameras which are about the same size as the Olympus OM-D E-M1. In other words, the Alpha 7s are much smaller than their full-frame interchangeable lens peers (such as Nikon's D610 and the Canon EOS 6D), an achievement made possible primarily because they're not SLRs.

  • Sony a6400 review: Digital Photography Review — Sony's a6400 is a compact 24MP mirrorless interchangeable lens camera with an APS-C sensor that will serve plenty of photographers from family documentarians to pro shooters looking for a lightweight second body. The big news is that it has a new processor based on that used in Sony's sports-shooting flagship a9 which enables 'Real-Time Tracking' autofocus, which is one of the most effective autofocus implementations we've yet seen. It's also among the easiest to use, once you've gotten it set up.

  • Watch Free Movies Online Now | Stream Free TV with Plex

  • 4K UHD Hisense Roku TV with HDR (2020) (55R6G) - Hisense USA

  • Aeron - Office Chairs - Herman Miller

  • Swopper Active Stool Archives | Ergify

  • 18 Best Ergonomic Office Chairs 2021 | The Strategist — Whether you’re working from home at a DIY desk setup or commuting to an office, you may have begun to feel the strain that sitting for seven or more hours a day can put on a body. If said strain has led you to wonder whether it’s worth investing in a better, more ergonomic office chair, the answer is almost certainly yes, according to experts we spoke to. “Makeshift setups can cause a laundry list of problems, including back, shoulder, and wrist pain,” explains Dr. David Perna of Back and Body Medical. Dr. Marc Agulnick, an orthopedic surgeon based on Long Island who’s affiliated with NYU Winthrop Hospital, agrees: “If you’re sitting for a long period of time in one position that’s not natural, or a bad position from a postural standpoint, over time that’s going to break down your spine.”

  • Arcade1Up | Officially Licensed Arcade Cabinets


Doc’s Bonus Links

The myth of individual control: Mapping the limitations of privacy self-management: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3881776

The Thermocline of Truth: https://robm.me.uk/2021/04/thermocline-of-truth/

Apple’s Privacy Mythology Doesn’t Match Reality:https://www.wired.com/story/opinion-apples-privacy-mythology-doesnt-match-reality/

Apple says it will refuse gov’t demands to expand photo-scanning beyond CSAM: https://arstechnica.com/tech-policy/2021/08/apple-says-it-will-refuse-govt-demands-to-expand-photo-scanning-beyond-csam/

Buried in the Bipartisan Infrastructure Bill: In-Car Breathalyzers:https://www.yahoo.com/entertainment/buried-bipartisan-infrastructure-bill-car-180614671.html

How open-source intelligence is disrupting statecraft: https://www.economist.com/podcasts/2021/08/10/how-open-source-intelligence-is-disrupting-statecraft

4 Keys to Self-sovereign Identity Adoption:https://medium.com/trinsic/4-keys-to-self-sovereign-identity-adoption-ad269b208569

Meet the man who wants you to give up Google: https://www.nytimes.com/2021/07/29/opinion/sway-kara-swisher-sridhar-ramaswamy.html

Everything Cory writes and links to: https://pluralistic.net/


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - August 6, 2021: Pegasus, Stingrays, and Grindr, Oh My! https://www.reality2cast.com/articles/reality-2-0-newsletter-august-6-2021-pegasus-stingrays-and-grindr-oh-my Fri, 06 Aug 2021 11:00:00 -0400 podcast@reality2cast.com b0420009-9673-4183-9acd-cb0bbe7df061 Thoughts on surveillance and consent To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 80: You’re Being Surveilled. Did You Consent?

Katherine Druckman and Doc Searls talk to Kyle Rankin about NSO group and Pegasus, Stingrays and cars, and surveilling priests.

Please remember to subscribe via the podcast player of your choice.


What is Pegasus?

Last week, we spoke to our favorite security expert, Kyle Rankin, about some recent privacy and security news. In particular, we are all gravely concerned about the recent frightening revelations about NSO Groups’s Pegasus spyware, and its use in targeting journalists around the world. As privacy geeks with journalism backgrounds, this hits close to home, and even worse is the realization that it is possible to violate a target’s device without the target initiating any action such as clicking on a link like you might find in a typical phishing attack. There will also be no indication of compromise. Kyle’s post on the Puri.sm blog goes into further detail:

What’s particularly scary about spyware in general, and is true for Pegasus as well, is that victims have no indication they’ve been compromised. Due to how locked down the iPhone is from the end user, detecting Pegasus in particular requires expert forensics techniques. This has left many at-risk iPhone users wondering whether they too are compromised and if so, what do they do?

We’d encourage you to read Kyle’s post as well as Amnesty International’s full forensic report on Pegasus. And if you are so inclined, you can check your own devices with the MVT tool released by Amnesty International, which is available on github.


Edward Snowden on Pegasus


Check out the episode for our full discussion about Pegasus, law enforcement surveillance technology, and an unfortunate story about a priest on Grindr. Yikes! 

And as always, please let us know your thoughts in a comment, on any of our social outlets, or via our contact form. Thank you!

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List

  • Defending Against Spyware Like Pegasus – Purism — What’s particularly scary about spyware in general, and is true for Pegasus as well, is that victims have no indication they’ve been compromised. Due to how locked down the iPhone is from the end user, detecting Pegasus in particular requires expert forensics techniques. This has left many at-risk iPhone users wondering whether they too are compromised and if so, what do they do?

  • Here’s how to check your phone for Pegasus spyware using Amnesty’s tool - The Verge — Amnesty International — part of the group that helped break the news of journalists and heads of state being targeted by NSO’s government-grade spyware, Pegasus — has released a tool to check if your phone has been affected. Alongside the tool is a great set of instructions, which should help you through the somewhat technical checking process. Using the tool involves backing up your phone to a separate computer and running a check on that backup. Read on if you’ve been side-eyeing your phone since the news broke and are looking for guidance on using Amnesty’s tool.

  • Mobile Verification Toolkit — Mobile Verification Toolkit (MVT) is a tool to facilitate the consensual forensic analysis of Android and iOS devices, for the purpose of identifying traces of compromise.

  • The FBI Is Locating Cars By Spying On Their WiFi — The FBI is using a controversial technology traditionally used to locate smartphones as a car tracking surveillance tool that spies on vehicles’ on-board WiFi.

  • Catholic priest quits after “anonymized” data revealed alleged use of Grindr | Ars Technica — In what appears to be a first, a public figure has been ousted after de-anonymized mobile phone location data was publicly reported, revealing sensitive and previously private details about his life.

  • Secure, Fast & Private Web Browser with Adblocker | Brave Browser — Brave stops online surveillance, loads content faster, and uses 35% less battery.


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - July 30, 2021: Who Am I? https://www.reality2cast.com/articles/reality-2-0-newsletter-july-30-2021-who-am-i Fri, 30 Jul 2021 11:00:00 -0400 podcast@reality2cast.com 83a68aeb-5d31-4eb2-9f2d-5622f6b02f14 Whose identity is more important? To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 79: Your Identity - Twitter Verification, Facial Recognition, and More

Tune in to our new episode! Katherine Druckman, Doc Searls and Shawn Powers chat about Twitter verification, facial recognition, YouTube moderation, and algorithmic bias.

Please remember to subscribe via the podcast player of your choice.



Last week we discussed identity from a few angles. The first was the frequently contentious topic of Twitter verification, and the coveted (Maybe?) checkmark next to certain account names. Incidentally, Shawn is verified. Katherine and Doc are not. How about you? Do you want to be? Should we want to be? These are the questions, among many, we attempted to address in episode 79.

We would love to hear your thoughts on Twitter verification. Please drop us a line and tell us what you think in a comment, or on any of our social outlets, or via our contact form. Thank you!

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List

  • I’m Not a Reporter. But I’m Verified as One on Twitter | WIRED — I NEVER CALLED myself a journalist until Twitter made me. I’m an attorney, activist, and faculty member, but it was only by using the “journalist” label that I was able to get one of the most coveted assets in social media, the blue “verified” checkmark. My months-long effort to get verified revealed a system that is stacked against grassroots activists, particularly BIPOC communities.

  • Twitter verification requirements - how to get the blue check — The blue Verified badge  on Twitter lets people know that an account of public interest is authentic. To receive the blue badge, your account must be authentic, notable, and active.

  • Goodbye, Fleets — We built Fleets as a lower-pressure, ephemeral way for people to share their fleeting thoughts. We hoped Fleets would help more people feel comfortable joining the conversation on Twitter. But, in the time since we introduced Fleets to everyone, we haven’t seen an increase in the number of new people joining the conversation with Fleets like we hoped. Because of this, on August 3, Fleets will no longer be available on Twitter.

  • Black teen barred from skating rink by inaccurate facial recognition - The Verge — A facial recognition algorithm used by a local roller skating rink in Detroit wouldn’t let teen Lamya Robinson onto the premises, and accused her of previously getting into a fight at the establishment.

  • Algorithmic bias - Wikipedia — Algorithmic bias describes systematic and repeatable errors in a computer system that create unfair outcomes, such as privileging one arbitrary group of users over others. Bias can emerge due to many factors, including but not limited to the design of the algorithm or the unintended or unanticipated use or decisions relating to the way data is coded, collected, selected or used to train the algorithm. Algorithmic bias is found across platforms, including but not limited to search engine results and social media platforms, and can have impacts ranging from inadvertent privacy violations to reinforcing social biases of race, gender, sexuality, and ethnicity. The study of algorithmic bias is most concerned with algorithms that reflect "systematic and unfair" discrimination. This bias has only recently been addressed in legal frameworks, such as the 2018 European Union's General Data Protection Regulation. More comprehensive regulation is needed as emerging technologies become increasingly advanced and opaque.

  • Face-Detection Cameras: Glitches Spur Charges of Racism - TIME — When Joz Wang and her brother bought their mom a Nikon Coolpix S630 digital camera for Mother's Day last year, they discovered what seemed to be a malfunction. Every time they took a portrait of each other smiling, a message flashed across the screen asking, "Did someone blink?" No one had. "I thought the camera was broken!" Wang, 33, recalls. But when her brother posed with his eyes open so wide that he looked "bug-eyed," the messages stopped.

  • Meet the Censored: Matt Orfalea - by Matt Taibbi - TK News by Matt Taibbi — Yes, the government is helping crack down on text messages and Facebook posts, but not to worry. At least your private thoughts are safe, right? Not so fast, found filmmaker Matt Orfalea

  • Texas’ social media censorship bill pushes unconstitutional limits on free speech — Amid ongoing allegations that social media platforms are censoring conservatives, regulating Big Tech has become one of the hottest issues across the country. In Texas, Gov. Greg Abbott has called a special legislative session in part to debate and pass content moderation legislation.

  • I Got Access to My Secret Consumer Score. Now You Can Get Yours, Too. - The New York Times — Little-known companies are amassing your data — like food orders and Airbnb messages — and selling the analysis to clients. Here’s how to get a copy of what they have on you.


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - July 23, 2021: Human ID https://www.reality2cast.com/articles/reality-2-0-newsletter-july-23-2021-human-id Fri, 23 Jul 2021 11:00:00 -0400 podcast@reality2cast.com d0861ab3-7f84-457b-b2ab-1f9e2947e3aa An open source single sign-on project. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 78: Human ID for Single Sign-On

Katherine Druckman and Doc Searls talk to Bastian Purrer and Namik Muduroglu about Human ID, their open source anonymous single sign-on solution.

Please remember to subscribe via the podcast player of your choice.


Last week, we talked to the co-founders of Human ID, an ambitious non-profit project, inspired by a desire to fight misinformation and its potential threat to democracy around the world. We hope you’ll listen to these energetic founders and consider their perspectives. From ours, we see putting in the work to address the problem as admirable in itself. Whether this solution or one of their future projects end up hitting the mark, we’re excited to see them tackle some tough problems.

Here’s Bastian with some background:

If you’d like to dive further into Human id, and we hope you will, you’ll find their GitHub profile, a demo, and a live implementation.

I’m sure they would love to see your feedback, and we would too. Please feel free to get in touch with us in a comment, or on any of our social outlets, or via our contact form. Sometimes it take us a little while to respond, but we’re definitely reading. Thank you!

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Short Reading List

  • humanID | One-Click Anonymous Login — humanID is an anonymous, bot-resistant authentication for safer online communities. Non-profit and open source, the project was started in 2018 by the Foundation for New humanID. With the help of Mozilla and Harvard, we’re on a mission to #FixTheInternet.


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - July 8, 2021: Our Chat with BASH creator, Brian Fox https://www.reality2cast.com/articles/reality-2-0-newsletter-july-8-2021-our-chat-with-bash-creator-brian-fox Thu, 08 Jul 2021 11:00:00 -0400 podcast@reality2cast.com 52a000d8-7ed9-41e8-960b-8d6155801b50 Privacy, open source voting, blockchain, and a lot more. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 76: Brian Fox on Voting Systems, Post-COVID Work, and Bash

Katherine Druckman and Doc Searls talk to Brian Fox about voting systems, open source, work in the post-covid era, blockchain, programming languages, and more.

Please remember to subscribe via the podcast player of your choice.


In last week’s episode, we had a great time talking to well-known free software advocate, Brian Fox, about everything from remote work to open source voting, to blockchain technology and cryptocurrency. For even more wisdom from Brian, you might enjoy the following videos. The first is a recent episode of FLOSS Weekly, also featuring our own Doc Searls.


This Week’s Reading List

  • Brian Fox (computer programmer) - Wikipedia — Brian Jhan Fox (born 1959) is an American computer programmer and free software advocate. He is the original author of the GNU Bash shell, which he announced as a beta in June 1989.[1] He continued as the primary maintainer of bash until at least early 1993.[2][3] Fox also built the first interactive online banking software in the U.S. for Wells Fargo in 1995,[4] and he created an open source election system in 2008.

  • Opinion | To Protect Voting, Use Open-Source Software - The New York Times — Although Russian hackers are reported to have tried to disrupt the November election with attacks on the voting systems of 39 states, the consensus of the intelligence community is that they were probably unsuccessful in their efforts to delete and alter voter data. But another national election is just 15 months away, and the risk that those working on behalf of President Vladimir Putin of Russia could do real damage — and even manage to mark your ballot for you or altering your vote — remains. Since the debacle of the 2000 election (remember hanging chads?) American election machinery has been improved to reduce the chances of mis-tallying votes, outright fraud and attacks by hackers. These improvements brought with them a new concern: lack of software security. Most voting machines’ software can now be easily hacked. This is in large part because the current voting systems use proprietary software based on Microsoft’s operating system.

  • Gerald Jay Sussman - Wikipedia — Gerald Jay Sussman (born February 8, 1947) is the Panasonic Professor of Electrical Engineering at the Massachusetts Institute of Technology (MIT). He received his S.B. and Ph.D. degrees in mathematics from MIT in 1968 and 1973 respectively. He has been involved in artificial intelligence (AI) research at MIT since 1964. His research has centered on understanding the problem-solving strategies used by scientists and engineers, with the goals of automating parts of the process and formalizing it to provide more effective methods of science and engineering education. Sussman has also worked in computer languages, in computer architecture and in Very Large Scale Integration (VLSI) design.[1]

  • Lisp (programming language) - Wikipedia — Lisp (historically LISP) is a family of programming languages with a long history and a distinctive, fully parenthesized prefix notation.[3] Originally specified in 1958, Lisp is the second-oldest high-level programming language in widespread use today. Only Fortran is older, by one year.[4][5] Lisp has changed since its early days, and many dialects have existed over its history. Today, the best-known general-purpose Lisp dialects are Racket, Common Lisp, Scheme and Clojure.

  • Pwnie Awards - Wikipedia — The Pwnie Awards recognize both excellence and incompetence in the field of information security. Winners are selected by a committee of security industry professionals from nominations collected from the information security community.[2] The awards are presented yearly at the Black Hat Security Conference.[3]

  • Z shell - Wikipedia — The Z shell (Zsh) is a Unix shell that can be used as an interactive login shell and as a command interpreter for shell scripting. Zsh is an extended Bourne shell with many improvements, including some features of Bash, ksh, and tcsh.


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - July 2, 2021: Blocking FLoC https://www.reality2cast.com/articles/reality-2-0-newsletter-july-2-2021-blocking-floc Fri, 02 Jul 2021 13:00:00 -0400 podcast@reality2cast.com ab4ea740-99d1-475d-9c1b-05314daf21b3 Google's new approach to the post-cookie web. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 75: Let's Talk About FLoC Blocking

Katherine Druckman and Doc Searls talk to Drupal Association Community Liaison, Rachel Lawson, and Drupal developer, Tony Savorelli, about Privacy in Drupal and beyond, and protecting ourselves and others on the web.

Please remember to subscribe via the podcast player of your choice.


"My conclusion is usually that if you're in the ad tech business, you should not also be making a browser."

In last week’s episode, we talked to Rachel Lawson and Tony Savorelli about privacy on the web, the role developers play in advocating for users, and the heightened responsibility we feel when important issues are at stake.

The springboard for this conversation starts with the decision by Drupal and other web frameworks to block Google’s Federated Learning of Cohorts (FLoC) out of the box. The swift actions taken by these projects, including WordPress and Joomla, reflects the concern many privacy advocates and developers have about the implications of Google’s new plan to replace third-party cookies with a new type of user tracking that relies on federated learning, grouping people into “cohorts” in order to target users for advertising without the use of cookies, a.k.a FLoC.

Major organizations like Mozilla, Amazon, and others have also taken swift steps to head FLoC off at the proverbial pass with thorough analysis and outright blocking. Subsequently, Google announced that it would now continue to support 3rd party cookies until 2023 instead of 2022, which delays a full launch of FLoC as well. Inc. Magazine had an interesting take on this announcement:

The cynical take is that Google is dragging this out because it's addicted to your data and wants to protect its business. The truth, however, is that's only partially true. In fact, I think you can make the case the truth is actually worse. Google doesn't even need that data.

While Google could technically make the internet respect your privacy, the problem is that doing so would give it an enormous advantage over every other advertising network and platform. Google collects massive amounts of first-party data on its users, meaning that it is far less dependent on third-party tracking.

Besides, Google's most profitable advertising platform is search. Google doesn't have to do any third-party tracking to know what you search for since you literally type what you're looking for into its website. All it has to do is show you ads at the top of the search engine results page.

What happens with FLoC remains to be seen, but the most interesting part of this story is how quickly developers took steps of their own to take back some control on behalf of the user.

We hope you enjoy the episode and give some further thought to this and the many other issues we raised, and please reach out with any comments or questions here in a comment, on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List

  • Add Permissions-Policy header to block Google FLoC [#3209628] | Drupal.org — Google is introducing what it calls Federated Learning of Cohorts, which is a way to gather user data without cookies, regardless of whether a website is loading any Google-related trackers. This is enabled starting in Chrome 89, and only in select countries on a trial basis. Although other major browser vendors are likely against this technology and will presumably not be implementing it, given Chrome’s market share this will become a concerning issue, because it largely remove users’ ability to easily opt out of being tracked—particularly true in the case of less-savvy users. See a very informative post by Plausible. Since no one can reasonably expect users to just stop using Chrome, it will be up to responsible developers to block FLoC at the source.

  • Amazon is blocking Google's FLoC — and that could seriously weaken the system — Amazon is blocking Google’s controversial cookieless tracking and targeting method.

  • Privacy analysis of FLoC — In the current web, trackers (and hence advertisers) associate a cookie with each user. Whenever a user visits a website that has an embedded tracker, the tracker gets the cookie and can thus build up a list of the sites that a user visits. Advertisers can use the information gained from tracking browsing history to target ads that are potentially relevant to a given user’s interests. The obvious problem here is that it involves advertisers learning everywhere you go. 

  • Surveillance Self-Defense | Tips, Tools and How-tos for Safer Online Communications — We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. This is Surveillance Self-Defense : our expert guide to protecting you and your friends from online spying.

  • University of Pennsylvania ScholarlyCommons — The Tradeoff Fallacy - How Marketers Are Misrepresenting American Consumers and Opening Them up to Exploitation

  • Reality 2.0 - Blog - Reality 2.0 Newsletter - June 4, 2021: More Tracking Tech and Apple — After a lengthy discussion in Drupal’s core issue queue by some of Katherine’s favorite people, the upcoming release of Drupal 9.2 will officially block Google’s Federated Learning of Cohorts (FLoC) by default! Similarly, the WordPress and Joomla communities are taking similar measures. With these platforms representing a huge chunk of websites, this must be quite a blow to Google, enough so that a member of Google Chrome’s developer relations team weighed in on the Drupal issue himself. I hope this news inspires you to run off and build a Drupal site, so I’ll just leave this documentation link here just in case.


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - June 24, 2021: DeleteMe, Privacy Tools, and Protecting Yourself https://www.reality2cast.com/articles/reality-2-0-newsletter-june-24-2021-deleteme-privacy-tools-and-protecting-yourself Thu, 24 Jun 2021 11:00:00 -0400 podcast@reality2cast.com 593a0177-6c06-4f1f-aa7a-b7221d372508 Last week we talked to Abine co-founder Rob Shavell. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 74: DeleteMe, Privacy Tools, and Protecting Yourself

Katherine Druckman and Doc Searls talk to Abine’s Rob Shavell about DeleteMe and other privacy tools, as well as emerging issues like vaccine tracking, AI, and facial recognition.

Please remember to subscribe via the podcast player of your choice.


Last week, we talked to Rob Shavell of Abine, the company behind privacy tools DeleteMe and Blur, about his company, current issues concerning privacy advocates such as vaccine passports, AI, and a few other topics. We hope you’ll check it out and maybe give DeleteMe or Blur a try.

Perhaps the most encouraging takeaway from the conversation was the dynamism in the privacy start-up space. When talented and passionate people get together to serve a market that is eager to be guided through an increasingly challenging consumer technology landscape, there is tremendous potential for paradigm-shifting products, and that is very encouraging to see.

Do you have any favorite privacy tools you would like us to talk about or recommend? Are you or someone you know innovating in this field? Please let us know here in a comment, or on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Links


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - June 11, 2021: To Opt-In or Not To Opt-In https://www.reality2cast.com/articles/reality-2-0-newsletter-june-11-2021-to-opt-in-or-not-to-opt-in Fri, 11 Jun 2021 11:00:00 -0400 podcast@reality2cast.com 4d897178-a694-4fa3-84f2-d0e039eab389 That is the Question To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 72: To Opt-In or Not To Opt-In, That is the Question

Katherine Druckman and Doc Searls talk about Amazon’s new Sidewalk feature, more about Apple’s opt-out options, and other privacy issues.

Please remember to subscribe via the podcast player of your choice.


Last week we dove further into Apple’s opt-out options, but there is much more to that conversation to be found on Doc’s blog. He wrote extensively about the current state of opting out of ad tracking, some background, as well as reactions from around the web in two parts, Apple vs (or plus) Adtech and Apple vs (or plus) Adtech, Part II.

Here’s an excerpt, but we hope you’ll head over to check out the whole thing:

This piece has had a lot of very smart push-back (and forward, but mostly back). I respond to it in Part II, here.

If you haven’t seen it yet, watch Apple’s Privacy on iPhone | tracked ad. In it a guy named Felix (that’s him, above) goes from a coffee shop to a waiting room somewhere, accumulating a vast herd of hangers-on along the way. The herd represents trackers in his phone, all crowding his personal space while gathering private information about him. The sound track is “Mind Your Own Business,” by Delta 5. Lyrics:

Can I have a taste of your ice cream?
Can I lick the crumbs from your table?
Can I interfere in your crisis?

No, mind your own business
No, mind your own business

Can you hear those people behind me?
Looking at your feelings inside me
Listen to the distance between us

Why don’t you mind your own business?
Why don’t you mind your own business?

Can you hear those people behind me?
Looking at your feelings inside me
Listen to the distance between us

Why don’t you mind your own business?
Why don’t you mind your own business?

There is always more conversation to be had, so please reach out here in a comment, or on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]> Reality 2.0 Newsletter - June 4, 2021: More Tracking Tech and Apple https://www.reality2cast.com/articles/reality-2-0-newsletter-june-4-2021-more-tracking-tech-and-apple Fri, 04 Jun 2021 11:00:00 -0400 podcast@reality2cast.com 51f871ea-fc51-4dec-885e-d68a5cada348 More places to find unwanted advertising. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 71: Tons of Tracking Tech

Katherine Druckman and Doc Searls talk about Apple’s IDFA, Ford In-Car ads, and more about AirTags.

Please remember to subscribe via the podcast player of your choice.


Drupal's upcoming minor release includes a feature that blocks Google's FLoC tracking!

Drupal, WordPress, and Joomla Block Google’s FLoC Out of the Box

After a lengthy discussion in Drupal’s core issue queue by some of Katherine’s favorite people, the upcoming release of Drupal 9.2 will officially block Google’s Federated Learning of Cohorts (FLoC) by default! Similarly, the WordPress and Joomla communities are taking similar measures. With these platforms representing a huge chunk of websites, this must be quite a blow to Google, enough so that a member of Google Chrome’s developer relations team weighed in on the Drupal issue himself. I hope this news inspires you to run off and build a Drupal site, so I’ll just leave this documentation link here just in case.

We talked a bit about these decisions in last weeks episode, but barely scratched the surface, so it’s definitely worth exploring further. If anything strikes you about this or any other privacy-related issue, please reach out here in a comment, or on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List

  • Ford Patented In-Car Ads Because We Live In Hell Now — I’m all for innovation in the automotive sector, but there are some technologies I simply cannot abide by, and Ford’s newly-patented billboard detector that can read ads and display them inside your car is exactly one of those technologies.

  • Apple forcing developers to ditch unique device IDs | Ars Technica — 2013 article about the origins of Apple's IDFA.

  • Proposal: Treat FLoC like a security concern – Make WordPress Core — Why is this bad? As the Electronic Frontier Foundation explains in their post “Google’s FLoC is a terrible idea“, placing people in groups based on their browsing habits is likely to facilitate employment, housing and other types of discrimination, as well as predatory targeting of unsophisticated consumers. This is in addition to the privacy concerns of tracking people and sharing their data, seemingly without informed consent – and making it more difficult for legislators and regulators to protect people.

  • Add Permissions-Policy header to block Google FLoC [#3209628] | Drupal.org — Google is introducing what it calls Federated Learning of Cohorts, which is a way to gather user data without cookies, regardless of whether a website is loading any Google-related trackers. This is enabled starting in Chrome 89, and only in select countries on a trial basis. Although other major browser vendors are likely against this technology and will presumably not be implementing it, given Chrome’s market share this will become a concerning issue, because it largely remove users’ ability to easily opt out of being tracked—particularly true in the case of less-savvy users. See a very informative post by Plausible. Since no one can reasonably expect users to just stop using Chrome, it will be up to responsible developers to block FLoC at the source.

  • Joomla! and FLoC — Federated Learning of Cohorts (FLoC) proposes a new way for businesses to reach people with relevant content and ads. We explore what this could mean and why we are giving you the choice as to whether to use it or not.


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - May 21, 2021: AirTags and Privacy https://www.reality2cast.com/articles/reality-2-0-newsletter-may-21-2021-airtags-and-privacy Fri, 21 May 2021 11:00:00 -0400 podcast@reality2cast.com 18846f80-aca4-4cd0-96a3-eb0626ad68a8 Apple's new tracking devices raise some serious questions. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 70: Apple AirTags and Privacy

Katherine Druckman, Doc Searls, and Petros Koutoupis talk Apple AirTags and privacy.

Please remember to subscribe via the podcast player of your choice.


Apple recently announced AirTags, which are small tracking devices that you can attach to your belongings in order to track them via Apple’s “find my” feature. While Apple marketing puts privacy at the forefront, this new product has, predictably, raised concerns. In last week’s episode, Doc, Katherine, and Petros weighed in. We’ve shared a roundup of links below, and we hope you’ll listen in for our take.


This Week’s Reading List


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - May 14, 2021: Workplace Communication https://www.reality2cast.com/articles/reality-2-0-newsletter-may-14-2021-workplace-communication Fri, 14 May 2021 11:00:00 -0400 podcast@reality2cast.com 93d4e08e-946a-49bc-859c-c1fa077c7444 What restrictions are appropriate? To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 69: What’s Up With Basecamp?

Katherine Druckman and Doc Searls talk about Basecamp’s new policy on workplace political conversation.

Please remember to subscribe via the podcast player of your choice.


We're learning animals. We need to learn and you don't get that without conversation.

Recently, Basecamp, the company behind the eponymous project management app and Hey.com email, announced a set of controversial workplace policies that caused public pushback as well as significant employee resignations. In last week’s episode, we discussed this move and shared our own thoughts on communication in the workplace.

Ultimately, we’re rooting for Basecamp to reevaluate and move forward, but at the same time, we concluded that open communication is an important part of the human experience. Most importantly, it is absolutely necessary to foster an environment for learning.

We’d encourage you to dive into the links below, listen to this short episode, and come to your own conclusions. If anything strikes you, please reach out here in a comment, or on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List

  • Changes at Basecamp — Recently, we've made some internal company changes, which, taken in total, collectively feel like a full version change. It deserves an announcement.

  • The story of Basecamp’s disastrous policy - The Verge — On April 26th, Basecamp founder and CEO Jason Fried posted on his blog about some policy changes that would be happening at the company, which makes team collaboration software. One policy stuck out to many on the internet — the company would no longer be allowing its employees to have discussions about society or politics on its internal account. What followed was a tidal wave of public outcry, employees speaking out against the policies (and talking about what led to them), several revisions of the blog post, and, finally, almost a third of the company’s employees deciding to accept buyouts and leave. There has since been an apology from Fried, but it remains to be seen if any more will be coming — there are still accusations made by employees that haven’t really been addressed.

  • The Utopia of Rules: On Technology, Stupidity, and the Secret Joys of Bureaucracy: Graeber, David: 9781612195186: Amazon.com: Books — Where does the desire for endless rules, regulations, and bureaucracy come from? How did we come to spend so much of our time filling out forms? And is it really a cipher for state violence?

  • The Soul of A New Machine: Kidder, Tracy: 9780316491976: Amazon.com: Books — Computers have changed since 1981, when The Soul of a New Machine first examined the culture of the computer revolution. What has not changed is the feverish pace of the high-tech industry, the go-for-broke approach to business that has caused so many computer companies to win big (or go belly up), and the cult of pursuing mind-bending technological innovations.


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - May 6, 2021: Hack the Planet https://www.reality2cast.com/articles/reality-2-0-newsletter-may-6-2021-hack-the-planet Thu, 06 May 2021 12:00:00 -0400 podcast@reality2cast.com e177c1a2-dfea-4853-8d63-81ac7b14b984 Signal's founder hacks Cellebrite. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 68: Signal Snoops On Cellebrite as They Snoop On Us

Katherine Druckman and Doc Searls chat with Kyle Rankin and Shawn Powers about Signal’s exposure of vulnerabilities in Cellebrite’s mobile device hacking software..

Please remember to subscribe via the podcast player of your choice.


Signal’s founder, known as Moxie Marlinspike, recently posted a quite thorough outline of significant vulnerabilities in the Cellebrite phone analysis software used by law enforcement and governments around the world to extract data from mobile devices. As this software has reputedly been used in ethically questionable ways, it makes perfect sense that a hacker/privacy activist would target Cellebrite, and especially after word got out (erroneously) that Signal’s app was vulnerable to Cellebrite software.

The blog post went as far as to suggest that an app could effectively booby trap itself to completely undermine the Cellebrite system.

For example, by including a specially formatted but otherwise innocuous file in an app on a device that is then scanned by Cellebrite, it’s possible to execute code that modifies not just the Cellebrite report being created in that scan, but also all previous and future generated Cellebrite reports from all previously scanned devices and all future scanned devices in any arbitrary way (inserting or removing text, email, photos, contacts, files, or any other data), with no detectable timestamp changes or checksum failures. This could even be done at random, and would seriously call the data integrity of Cellebrite’s reports into question.

Also interesting are the potential legal consequences of these vulnerabilities. A Maryland lawyer is currently challenging a conviction that was largely based on evidence gathered using Cellebrite’s analysis on the basis that its integrity is now highly questionable.

Kyle Rankin and Shawn Powers joined us in last week’s episode to talk through this news, and other issues. And interestingly, we previously discussed the new trend of schools using Cellebrite tools to violate student privacy in Episode 52: Fragmentation and Outrage of the Week, which is frankly just as outrageous today as then. Is this latest hack perhaps a little karmic justice?

Please feel free to reach out here in a comment, or on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


That Awesome Video

This is a must-watch video, originally posted in the Signal blog post. We promise it will speak to your hacker soul.


This Week’s Reading List

  • Australia’s vague anti-encryption law sets a dangerous new precedent - ProtonMail Blog — the Australian government and its Labor partners rammed a shockingly invasive anti-encryption law through Parliament, over the objections of experts, businesses, and civil rights groups.

  • Australia's Encryption-Busting Law Could Impact Global Privacy | WIRED — Australia has passed a law that would require companies to weaken their encryption, a move that could reverberate globally.

  • P versus NP problem - Wikipedia — The P versus NP problem is a major unsolved problem in computer science. It asks whether every problem whose solution can be quickly verified can also be solved quickly.

  • Data Double Dipping: When Companies Mine Paying Customers – Purism — There’s an old snarky saying among privacy advocates: “If you aren’t paying for something, you are the product!” This updated version of “There’s no such thing as a free lunch” arose in the Internet age among the ever-growing list of free services and apps on the Internet funded by collecting and selling your data to advertisers. If large companies like Google and Facebook are any indication, a lot of money can be made with user data and the more data you collect, the more money you can make.

  • Eva Galperin: What you need to know about stalkerware | TED Talk — "Full access to a person's phone is the next best thing to full access to a person's mind," says cybersecurity expert Eva Galperin. In an urgent talk, she describes the emerging danger of stalkerware -- software designed to spy on someone by gaining access to their devices without their knowledge -- and calls on antivirus companies to recognize these programs as malicious in order to discourage abusers and protect victims.

  • Reality 2.0 Episode 52: Fragmentation and Outrage of the Week — Doc Searls and Katherine Druckman talk to Kyle Rankin about fragmentation and software development, the Amazon Halo, and surveilling school children.

  • This Is How They Tell Me the World Ends — From New York Times cybersecurity reporter Nicole Perlroth, THIS IS HOW THEY TELL ME THE WORLD ENDS is the untold story of the cyber arms trade-the most secretive, invisible, government-backed market on earth-and a terrifying first look at a new kind of global warfare.


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - April 29, 2021: The Intention Byway https://www.reality2cast.com/articles/reality-2-0-newsletter-april-29-2021-the-intention-byway Thu, 29 Apr 2021 12:00:00 -0400 podcast@reality2cast.com 91dda1c1-e005-4409-a4b7-ed6986f60ad0 A new model for communicating intent. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 67:It’s a Great Effing Island

Katherine Druckman and Doc Searls discuss a new approach to intent broadcasting, the end of tracking, and the island of Kauai.

Please remember to subscribe via the podcast player of your choice.


"We are calves that go to the cows of websites for the milk of content, plus some cookies that help them keep track of things about us."

In our last episode, Katherine and Doc discuss a new model for intentcasting that aims to return agency to users, and free them a bit from the current model where cookies, surveillance, and the browser-based web hold all the cards.

The new approach is the work of Customer Commons, an organization devoted to empowering customers and reframing the relationships between customers and vendors by opening up countless new paths for signals between demand and supply. As one of the team behind Customer Commons, our own Doc Searls announced this new model, called the Intention Byway, which is the technical work of Customer Commons CTO, Hadrian Zbarcea. You. may remember Hadrian as a prior guest on Reality 2.0.

In this model, the byway is the path along which messages signaling intent travel between individuals and companies (or anyone), each of which has a simple computer called an intentron, which sends and receives those messages, and also executes code for the owner’s purposes as a participant in the open marketplace the Internet was designed to support.

As computers (which can be physical or virtual), intentrons run apps that can come from any source in the free and open marketplace, and not just from app stores of controlling giants such as Apple and Google. These apps can run algorithms that belong to you, and can make useful sense of your own data. (For example, data about finances, health, fitness, property, purchase history, subscriptions, contacts, calendar entries—all those things that are currently silo’d or ignored by silo builders that want to trap you inside their proprietary systems.) The same apps also don’t need to be large. Early prototypes have less than 100 lines of code.

Messages called intentcasts can be sent from intentrons to markets on the pub-sub model, through the byway, which is asynchronous, similar to email in the online world and package or mail forwarding in the offline world. Subscribers on the sell side will be listening for signals from markets for anything. Name a topic, and there’s something to subscribe to. Intentcasts on the customers’ side are addressed to markets by topical name. Responsibilities along the way are handled by messaging and addressing authorities. Addresses themselves are URNs, or Uniform Resource Names.

Keep an eye on customercommons.org to follow the project.

We’d love to hear your thoughts on the Intention Byway, so please reach out to us about the newsletter or podcast here in a comment, or on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


Beyond the Browser on TWiT

You might recognize the co-hosts of this week’s FLOSS Weekly. Doc and Katherine spoke with frequent guest, Shawn Powers, about Doc’s new project, so if our episode wasn’t enough, there’s even more on FLOSS!


This Week’s Reading List

  • Customer Commons — Customer Commons’ mission is to restore the balance of power, respect and trust between individuals and organizations that serve them.

  • A New Way – Customer Commons — Why do you always have to accept websites’ terms? And why do you have no record of your own of what you accepted, or when‚ or anything?

The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - April 22, 2021: Open Source Contribution https://www.reality2cast.com/articles/reality-2-0-newsletter-april-22-2021-open-source-contribution Thu, 22 Apr 2021 17:15:00 -0400 podcast@reality2cast.com f57e43f5-769f-4a4e-ab41-9756d7765f8e Pull up a chair and take your seat at the table. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 66: You Should Open Source Now, Ask Me How!

Katherine Druckman chats with Petros Koutoupis and Kyle Rankin about FOSS (Free and Open Source Software), the benefits of contributing to the projects you use, and why you should be a FOSS fan as well.

Please remember to subscribe via the podcast player of your choice.


This week, we talked about why it’s important to contribute to the open source software you depend on. The talk was largely inspired by a recent DrupalCon panel on a similar topic. You may recognize one of the panelists, and we’ll be sure to share a link when a recording is available.

For this episode, we pulled Petros and Kyle into the conversation to share their experiences with various projects, and in particular, Purism’s upstream first policy. We outlined the business case for contribution, as well as the ideological case, and offer a few suggestions about where to start.

We hope this return to our open source roots proves useful, and inspires you to find ways to support the technologies that interest you.

Please reach out to us about the newsletter or podcast here in a comment, or on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


Surveillance Capitalism

Our previous guest Evan Greer has released a new single worth checking out. Enjoy!


This Week’s Reading List

The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - April 8, 2021: Is Tech Accountable for Disinformation? https://www.reality2cast.com/articles/reality-2-0-newsletter-april-8-2021-is-tech-accountable-for-disinformation Thu, 08 Apr 2021 12:00:00 -0400 podcast@reality2cast.com a2dedf55-7117-4525-8b23-22883fc8384c Or is it strictly the user's responsibility to evaluate? To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 64: Who is Accountable for Disinformation?

Katherine Druckman and Doc Searls talk about responsibility for disinformation, congressional hearings, and the Suez canal.

Please remember to subscribe via the podcast player of your choice.

"You know, are you actually responsible for something that you may not actually be able to act on? Because, you know, you've absorbed a lot of the way the world works socially and, and people lie all the time and people try to make trouble all the time. And how can you possibly begin to control all of that while simply enabling conversation? How do you do that?"

Last week we revisited disinformation, and this time we tried to assign responsibility. The only conclusion I can say we came to was that assigning it shouldn’t be oversimplified.

Past guest, Evan Greer, sums it up well:

Does a user’s scale of influence affect a web platform’s responsibility to take action? Is there a heightened responsibility to moderate or ban users with massive audiences? What responsibility do platforms have for addressing disinformation bots, especially those perpetuating potentially dangerous disinformation about a public health crisis? Do advertisers have a moral responsibility to withdraw support from outlets that spread intentionally misleading information? There is no doubt that social media provides a fertile environment for rapidly spreading sensationalized and incorrect content, whether or not that content has malicious origin, so at what point can a tech giant no longer play a neutral role? Or do we collectively have it all wrong and need to take a completely hands-off approach, especially with regard to government regulation and inquiry?

We’d love to hear from you on these questions and others we raised this week, and in the meantime, please enjoy the links we’ve gathered below.

Please reach out to us about the newsletter or podcast here in a comment, or on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - April 1, 2021: Protecting Your Privacy https://www.reality2cast.com/articles/reality-2-0-newsletter-april-1-2021-protecting-your-privacy Thu, 01 Apr 2021 18:00:00 -0400 podcast@reality2cast.com 96970f50-78d3-4000-8f18-cbf8dd464be0 We talked to Don Marti and Shawn Powers about protecting our privacy. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 63: Is Your Privacy Set by Marketers in Aeron Chairs?

Katherine Druckman and Doc Searls talk to Don Marti and Shawn Powers about realistic data privacy measures, surveillance marketing, and privacy regulation.

Please remember to subscribe via the podcast player of your choice.


“Essentially, the surveillance marketing dystopia is the entire free world against a few overgrown mailing list brokers with Aeron chairs.”

Last week, we talked to Don Marti and Shawn Powers about privacy regulations and surveillance marketing. This week, we thought it would be fun to highlight some of their work.

Don writes extensively about privacy issues on his blog at https://blog.zgp.org/, and of particular interest are his two posts about a shell script for automating CCPA (California Consumer Privacy Act) disclosure and deletion requests. Find them here: CCPA opt out, nerd edition and CCPA for nerds, part 2

Included in these posts are links to useful boilerplate letters both for opting out directly to Facebook advertisers and generally opting out under CCPA. Enjoy!

Meanwhile, Shawn Powers fans have something new to get excited about. Shawn has started a web comic! We hope you’ll go offer him some words of encouragement so he’ll keep going and keep us all entertained.

Thanks, Shawn. We needed this.

Please reach out to us about the newsletter or podcast here in a comment, or on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List

  • CCPA opt out, nerd edition — While we figure out how to make general-purpose CCPA opt-outs practical.

  • Resource Conservation and Recovery Act (RCRA) Laws and Regulations | US EPA — The Resource Conservation and Recovery Act (RCRA) is the public law that creates the framework for the proper management of hazardous and non-hazardous solid waste. The law describes the waste management program mandated by Congress that gave EPA authority to develop the RCRA program. The term RCRA is often used interchangeably to refer to the law, regulations and EPA policy and guidance. 

  • Resource Conservation and Recovery Act - Wikipedia — The Resource Conservation and Recovery Act (RCRA), enacted in 1976, is the principal federal law in the United States governing the disposal of solid waste and hazardous waste.[1]

  • Global Privacy Control — Take Control Of Your Privacy — Online privacy should be accessible to everyone. It starts with a simpler way to exercise your rights.

  • CCPA guidance for authorized agents — The California Consumer Privacy Act of 2018 (“CCPA”) creates a variety of privacy rights for California consumers. Microsoft makes it easy for consumers to exercise their rights, including the rights, via a verifiable request, that we (i) disclose and access what personal data we collect, use, disclose, and sell and (ii) delete the consumer’s personal data. Per the CCPA, consumers may exercise their rights through an authorized agent. This guidance is intended for authorized agents acting on behalf of a consumer looking to exercise the above CCPA rights.

  • The State of Authorized Agent Opt Outs Under the California Consumer Privacy Act (PDF)

  • Consumer Reports Model State Privacy Act — Though consumers have a fundamental right to privacy, there is no comprehensive federal privacy law granting them baseline privacy and security protections. Instead of leaving it to consumers to “opt-in” or “opt-out,” this bill protects consumer privacy by prohibiting companies from engaging in privacy-invasive behaviors. 


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - March 25, 2021: How Did Disinformation Become the Truth? https://www.reality2cast.com/articles/reality-2-0-newsletter-march-25-2021-how-did-disinformation-become-the-truth Thu, 25 Mar 2021 11:00:00 -0400 podcast@reality2cast.com e3af2d8d-c2bd-4aab-8f7d-56d8f3ac60be And why is it so believable? We talk disinformation from a cybersecurity perspective, and IoT device vulnerability. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 62: How Did Disinformation Become the Truth?

Katherine Druckman and Doc Searls talk to Prof. Chris Bronk, Ph.D. and Petros Koutoupis about disinformation and cyber security, and how they impact our lives, as well as IoT vulnerabilities and voice recognition technology.

Please remember to subscribe via the podcast player of your choice.


In general, I don't believe people understand well when they are trading away their privacy.

Last week, we spoke to Dr. Chris Bronk, Associate Professor at the University of Houston, about online disinformation from his perspective as a technologist and cybersecurity scholar. We sought to unpack both how disinformation campaigns function, and how dangerous they can be. Dr. Bronk has a particular interest in the topic, and we were happy to get a chance to have a fun chat about these and other fairly meaty issues.

In “America must improve defense against Russia's information warfare”, a 2017 editorial in The Hill, he wrote:

The bad news in all of this is that the U.S. and other Western democracies appear woefully unprepared to blunt or deter Russian propaganda. The Russians have all sorts of domestic information controls, but we largely don’t. That does not mean other elements of civil society – academics, activists, and technologists – can’t begin to identify and flag propaganda floated through gray sources, however.

Not that long ago, we collectively thought of disinformation threats as typically the work of foreign actors, but fast forward a bit, and we’re forced to look at domestic sources as meme campaigns, or “the billboards of the internet,” as Chris calls them, seem to have taken over as a significant source of truth for many. In an astute observation, Dr. Bronk is quoted in the Houston Chronicle as follows:

Bronk said it’s become increasingly clear that reforms are needed to counter domestic hate groups and hostile foreign governments that use social media to ply the American public with disinformation.

But when the same politicians who regulate the industry are also being flagged for making false or misleading statements, Bronk sees little room for agreement.

“I got a tweet this morning at seven whatever, the president put out there and it just said, ‘I won the election.’ Is that true?” said Bronk, a former foreign service officer with the State Department. “The internet has allowed us to divorce ourselves from some sets of facts.”

These and other ideas are the springboard from which we launched our conversation in this recent episode. We had great fun talking with Dr. Bronk, and we hope to welcome him back, so please send any questions you have for him our way and we’ll explore them in a future episode.

Please send us our thoughts here in a comment, or on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]> Reality 2.0 Newsletter - March 19, 2021: The Future of Authentication https://www.reality2cast.com/articles/reality-2-0-newsletter-march-19-2020-the-future-of-authentication Thu, 18 Mar 2021 15:00:00 -0400 podcast@reality2cast.com 997a33e7-c50b-4684-b401-c3f4f2670b31 We talk to Dave Huseby about a new way of verifying identity and authenticating data. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 61: The Future of Authenticating Your Data

Katherine Druckman and Doc Searls talk to Dave Huseby about the authentic data economy, and the future of authentication.

Please remember to subscribe via the podcast player of your choice.

"The crux of self-sovereign identity is to gain our privacy back or to engineer it for us to be in control of our own data and to be masters of our own privacy."

We talked to returning guest, Dave Huseby, last week about data authentication. Our conversation was largely inspired by his article, The Authentic Data Economy. In it, and in our conversation, he describes a new and lightweight solution to cryptographic proofs that he hopes will change the way we prove the authenticity of our personal data.

Well, one of the classic examples in SSI [Self-sovereign Identity] is when you go to say a bar, the bouncer asks to see your driver's license, you're handing over verified data, right? This is data that the DMV has verified to be true. And it's presented in a form that's independently verifiable. They put it under the black light to make sure that it's not been tampered with, but all that data on there now is available to the bouncer. And what they normally do now is just scan the barcode in the back, which captures all the data, right? It captures all that data in a database. They don't need it. All they need to do is know that you're old enough to get in there. And, and so this is, this is where the crux of the problem, the crux is SSI is to gain our privacy back or to engineer it for us to be in control of our own data and to be masters of our own privacy.

For a little background, I’ll borrow this definition of a zero-knowledge proof from Wikipedia:

In cryptography, a zero-knowledge proof or zero-knowledge protocol is a method by which one party (the prover) can prove to another party (the verifier) that they know a value x, without conveying any information apart from the fact that they know the value x. The essence of zero-knowledge proofs is that it is trivial to prove that one possesses knowledge of certain information by simply revealing it; the challenge is to prove such possession without revealing the information itself or any additional information.

The hope is that a new cryptographic technique will allow for such proofs to have a much smaller data footprint in order to be more portable and accessible to users as a method of identity verification. You’ll have to listen to the episode to get the full, detailed picture, but it should be an hour well-spent. And, if you’d like to dig even deeper than Dave’s article and our recent podcast episode, Doc’s extensive writing on the subject of identity can be found over on his blog.

We’d like to reach out to you, our readers and listeners for your comments and questions for the next time Dave joins us on the show. Let’s see if we can move these ideas forward together!

Please send us our thoughts here in a comment, or on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List

  • The Authentic Data Economy. Universal Digital Trust at Global Scale | by dwh | Feb, 2021 | Medium — To this day — even with mass computerization — trust-based interactions stubbornly resist digitization and remain at human scale simply because of the way we keep and maintain authentic data records. Tasks such as opening a bank account, having a document notarized, or signing a contract typically involves an in-person meeting to present the authentic data records (e.g. government identification, proof of funds, etc) and to sign a “wet” signature. However, now that we live in a reality twisted by the DNA strands of the COVID-19 virus, how do we ever hope to get back to in-person business as usual and trust as usual? Even if we can vaccinate against the virus and restore normal human interaction, the need for a more lasting technological solution for establishing trust remotely and transmitting it over great distances still exists. This, I believe, is the last great problem in technology and solving it will create the next crop of billion-dollar companies and billionaire founders.

  • IIW — The Internet Identity Workshop has been finding, probing and solving identity issues twice every year since 2005. We meet in the Computer History Museum in Mountain View, CA. Every IIW moves topics, code and projects downfield. Name an identity topic and it’s likely that more substantial discussion and work has been done at IIW than any other conference!

  • Merkle tree - Wikipedia — In cryptography and computer science, a hash tree or Merkle tree is a tree in which every leaf node is labelled with the cryptographic hash of a data block, and every non-leaf node is labelled with the cryptographic hash of the labels of its child nodes. Hash trees allow efficient and secure verification of the contents of large data structures. Hash trees are a generalization of hash lists and hash chains.

  • A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation — Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.

  • Doc’s writings on identity — Doc has covered ideas related to self-sovereign identity extensively, and this is a link to many of his posts on the subject.


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]> Reality 2.0 Newsletter - March 4, 2021: A Developer Reading List https://www.reality2cast.com/articles/reality-2-0-newsletter-march-4-2020-a-developer-reading-list Thu, 04 Mar 2021 11:00:00 -0500 podcast@reality2cast.com 7bbaac04-5ea3-4fbc-aa22-62df80bbfe00 Book recommendations for inspiring great work. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 59: FOSS, Mentorship, and Doing Great Work

Katherine Druckman and Doc Searls talk to Travis Carden and Petros Koutoupis about maintaining open source projects, mentoring contributors, Drupal, and automated testing.

Please remember to subscribe via the podcast player of your choice.


The first step toward getting involved in an open source project is likely getting past the inevitable impostor syndrome. Gill Corkindale’s “Overcoming Impostor Syndrome,” published in Harvard Business Review is an enduring resource for understanding this phenomenon that plagues most of us.

It starts with recognising it in yourself and others. Imposter syndrome can be defined as a collection of feelings of inadequacy that persist despite evident success. ‘Imposters’ suffer from chronic self-doubt and a sense of intellectual fraudulence that override any feelings of success or external proof of their competence. They seem unable to internalize their accomplishments, however successful they are in their field. High achieving, highly successful people often suffer, so imposter syndrome doesn’t equate with low self-esteem or a lack of self-confidence. In fact, some researchers have linked it with perfectionism, especially in women and among academics.

The Reading List

Last week’s podcast was all about contributing to open source and doing great work, and as there was much to discuss, we didn’t get a chance to talk about Travis’s book recommendations, so we’ll include them here. Happy coding!

On software construction/clean code:

On software testing:

  • Test Driven Development: By Example is a great resource for anyone getting started driving their own development or struggling "where the rubber meets the road". It's hands-on and practical.

  • xUnit Test Patterns: Refactoring Test Code is the most comprehensive and authoritative book I know of on unit testing--for those who want to get really good at it. It's a long read at 833 pages, but it covers most issues you're likely to encounter on your way to proficiency. It's organized in such a way that it can be used as a cookbook or pattern library even if you don't read it straight through.

As always, we encourage you to send us our thoughts here in a comment, or on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Links

  • acquia/orca: A tool for testing a company's software packages together in the context of a realistic, functioning, best practices Drupal build — ORCA (Official Representative Customer Application) is a tool for testing a company's Drupal-adjacent software packages. It ensures their cross compatibility and correct functioning by installing all of them together into a realistic, functioning, best practices Drupal build and running automated tests and static code analysis on them. Its guiding design principle is to use company packages as a customer would. It installs the latest recommended versions via Composer and performs no manual setup or configuration.

  • Liskov substitution principle - Wikipedia — Substitutability is a principle in object-oriented programming stating that, in a computer program, if S is a subtype of T, then objects of type T may be replaced with objects of type S (i.e., an object of type T may be substituted with any object of a subtype S) without altering any of the desirable properties of the program (correctness, task performed, etc.). More formally, the Liskov substitution principle (LSP) is a particular definition of a subtyping relation, called (strong) behavioral subtyping, that was initially introduced by Barbara Liskov in a 1987 conference keynote address titled Data abstraction and hierarchy.

  • Drupal Cloud: Acquia CMS - YouTube — Preview of Acquia CMS.


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]> Reality 2.0 Newsletter - February 24, 2021: A Harrowing Tale https://www.reality2cast.com/articles/reality-2-0-newsletter-february-24-2020-a-harrowing-tale Wed, 24 Feb 2021 12:00:00 -0500 podcast@reality2cast.com 5f931c73-f73c-46dc-8d5b-940535e7df48 We talk through real world identity theft, and ways to harden your personal security. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 58: So Someone Stole Your Identity

Katherine Druckman and Doc Searls talk to Shawn Powers and Kyle Rankin about protecting yourself online, password and security best practices, and a tragic tale. Don’t miss this opportunity to learn how to improve your own security practices!

Please remember to subscribe via the podcast player of your choice.


More on Passwords

Our latest episode recounts a rather unfortunate story of a personal data breach with possible identity theft, and we discussed password strategies as a means to protect oneself from similar incidents. For a more detailed presentation on password best practices, we suggest enjoying this presentation from regular Reality 2.0 guest, Kyle Rankin.

Speaking of passwords and password managers, we discussed LastPass as a popular favorite password management app, and one used by both Shawn Powers and Katherine Druckman. Coincidentally, just after recording the episode, LastPass announced some pretty major changes to its policies for free accounts. Starting March 16th, free account holders will have to choose whether to use LastPass on computers or mobile devices, but their accounts will not sync across those device types. This is a huge hurdle to usability, and eliminates much of the benefit of using LastPass, so you might want to consider alternatives unless you are interested in a paid LastPass subscription.

Shawn Powers wrote Password Managers. Yes You Need One. in 2019, and it remains relevant. Shawn’s pick was Bitwarden, and lists the following pros:

  • One developer for all apps.

  • Open-source!

  • Cloud-based access.

  • Works offline if the "cloud" is unavailable.

  • Free version isn't crippled.

  • Browser plugin works very well.

Barry Collins of Forbes also recommends Bitwarden:

My recommended course of action is to switch to one of LastPass’s rivals, such as Bitwarden. I’ve written about the brilliant Bitwarden before: it’s free, open source and it works with almost any device you can name.

Bitwarden does offer a premium account ($10 per year) which unlocks extra features, but I’ve been running on a free account for well over a year and it’s perfectly functional without these extras.

Finally, as Kyle Rankin mentions in the episode, his preference is the KeePass format, and thank you to Anthony M. on librem.one for this advice:

@reality2cast @katherined @doc @kyle great episode. Like @kyle I’ve also kept my passwords in a KeePass DB format for a long time. In the last two years I’ve even managed to get my non-tech friends and family to use it as well. I’ve used the following clients with excellent integration to their environments:

Android: KeePass2Android
iOS: Strongbox
Windows & Linux: KeePassXC

All support TOTP natively as well, for management and use of your 2FA credentials.

If you get one takeaway from our harrowing tale, we hope it will be to use a password manager and two-factor or multi-factor authentication where available.

As always, we encourage you to send us our thoughts here in a comment, or on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - February 19, 2021: Facial Recognition Powered By YOU https://www.reality2cast.com/articles/reality-2-0-newsletter-february-19-2020-facial-recognition-powered-by-you Fri, 19 Feb 2021 06:00:00 -0500 podcast@reality2cast.com 5a0a0647-4fb8-4010-9f0b-62bc000eee16 This week we talk exposing.ai, an app that uncovers facial recognition datasets. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 57: You Look Familiar, Did I See You on the Internet?

Katherine Druckman and Doc Searls talk facial recognition AI using our photos for training, and how we collectively negotiate our own privacy online.

Please remember to subscribe via the podcast player of your choice.


"consider going back in time to the moment you took these photos... I would have never considered that this was something that I needed to worry about at that time. You know... we posted these things in good faith from a place of positivity, and all of these years later it feels so icky."

In previous episodes, we have talked at length about the ethics of facial recognition technology, but last week’s episode addresses a slightly different angle. When it is our own photos fueling the AI that powers facial recognition datasets, we felt much closer to the ethical dilemma. Most of us leave traces of our lives around the internet, but when you include images of others in your online record, what is your responsibility to protect your photos’ subjects?

If you have used photo hosting platforms like Flickr, or even Facebook, for a while, you have probably shared photos of other people for much longer than facial recognition technology has been so frequently in the news. With that in mind, how do we change our habits to fit within our own ethical framework and respect the wishes of our acquaintances?

We hope you’ll listen to the episode and send us our thoughts here in a comment, or on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - February 11, 2021: Content Moderation is Complicated https://www.reality2cast.com/articles/reality-2-0-newsletter-february-11-2020-content-moderation-is-complicated Thu, 11 Feb 2021 12:00:00 -0500 podcast@reality2cast.com e22cfc90-d5e0-4e71-b400-8dfb69d2f0af This week we explore different ways to moderate web communication. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 56: The Age of the Moderator

Katherine Druckman, Doc Searls and Petros Koutoupis talk Twitter's new Birdwatch experiment, Signal's resistance to moderation, and Redditors' impact on the stock market.

Please remember to subscribe via the podcast player of your choice.


The problem with content moderation in giant silos is the giant silos. And the problem with moderating giant silos is that it can't be done. Quote from Doc Searls

Web platforms of all sizes struggle with moderating user content, but how much and what is appropriate? This week, we talked about Twitter’s new Birdwatch feature, which will try crowdsourcing content moderation and fact-checking, Signal’s reluctance to establish an abuse policy, and a financial app’s approach to a hoard of short squeezers. These issues are varied, but their common thread is their approach to controlling the flow of internet communication.

In an ideal world, we’d all like to keep the internet free and open, and ultimately a force for good, but that turns out to be a lofty goal. So, in order to get the internet we want, moderation of some kind is likely necessary. Twitter’s approach seems ambitious at their scale, but it will be an interesting experiment to watch. Is crowdsourced fact-checking possible without turning Twitter into a giant neighborhood full of Mrs. Kravitzes?


Signal is, of course, a different beast altogether. The platform exists to provide end-to-end encrypted messaging, so a hands-off approach seems appropriate there. We’d like to hear from you on this though. Is there an appropriate way to address platform abuse on a platform that exists to ensure privacy?

We hope you’ll listen to the episode and send us our thoughts here in a comment, or on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Links


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]> Reality 2.0 Newsletter - February 4, 2021: Digital Rights are Human Rights https://www.reality2cast.com/articles/reality-2-0-newsletter-february-4-2020-digital-rights-are-human-rights Thu, 04 Feb 2021 10:00:00 -0500 podcast@reality2cast.com 2070a75a-c90f-420b-b072-7013e74d150d We're back with two new episodes, one on digital rights and internet policy, and a new one about radio broadcasting. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 54: Digital Rights Are Human Rights

Doc Searls and Katherine Druckman talk to Evan Greer, Deputy Director of digital rights activism group Fight for the Future about Section 230, privacy, politics, de-platforming, and internet policy.

Episode 55: Radio Broadcasting

Doc Searls and Petros Koutoupis talk to Dean Landsman and Paul Walker about radio broadcasting, including long distance coverage.

Please remember to subscribe via the podcast player of your choice.


Digital Rights

We’re back after taking a break for the holidays and then some. In the meantime, we’ve published two new episodes on very different, but equally interesting topics.

While we’ve covered controversy surrounding Section 230 of the Communications Decency Act, we’ve never done it as well as with Evan Greer of Fight for the Future. Evan’s background in activism brings a much-needed perspective, and we hope you’ll listen with an open mind, as the complex issues of digital rights, privacy, and content moderation affect everyone, regardless of our political tendencies.

Beyond the more obvious threats to individual digital privacy like facial recognition, we are also collectively concerned about how recent events might add some unwanted fuel to the push by governments around the world for encryption backdoors. In our discussion, I hope we’ve shown why it’s important to push back against misplaced concern while respecting and addressing the fears that inspire it.

54-quote


Radio

Our most recent episode covers one of Doc’s favorite topics, radio broadcasting. Doc and Petros Koutoupis had a fun chat with Dean Landsman, and Paul Walker about a few topics related to radio, including long distance signals in remote areas. If radio is your thing, you’ll want to check it out!

As always, please keep in touch and send us feedback on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Links


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]> Reality 2.0 Newsletter - December 23, 2020: Happy Holidays! https://www.reality2cast.com/articles/reality-2-0-newsletter-december-23-2020-happy-holidays Wed, 23 Dec 2020 10:00:00 -0500 podcast@reality2cast.com cb87435d-97b6-449e-8a34-7aac107981bd This week we talked SolarWinds, Fragmentation, Surveillance and Apple IDFA. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Episode 52: Fragmentation and Outrage of the Week

Doc Searls and Katherine Druckman talk to Kyle Rankin about fragmentation and software development, the Amazon Halo, and surveilling school children.

Episode 53: The SolarWinds Attack

Doc Searls and Katherine Druckman talk to Kyle Rankin and Petros Koutoupis about the SolarWinds hack, and Facebook's reaction to Apple privacy initiatives.

Please remember to subscribe via the podcast player of your choice.


See You in January

Thank you to everyone for joining us in 2020. We are grateful for all our guests, subscribers, and everyone who listens, reads, and reaches out via email and social media. We’re especially grateful to our Patreon supporters who help us keep the podcast going. Everyone involved in Reality 2.0 wishes you the happiest holiday and an optimistic new year! This week we leave you with two new episodes to enjoy while we take a holiday break. We’ll be back in January after the new year with new episodes, and in the meantime please keep in touch and send us feedback on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List

  • Preventing Fragmentation with the Librem 5 – Purism — Fragmentation is a massive problem in computer software development that has only gotten worse with mobile computers. By fragmentation I’m referring to incompatible platforms that require a developer to maintain separate forks of their code. Twenty years ago if you wanted to write software for an end user, you had to decide whether to support Windows, Macs or Linux. Each of those platforms required you to build, test, and maintain different forks of your software.

  • Amazon’s Halo Band wearable tracks your voice and body fat, but isn’t helpful - The Washington Post — The Halo Band asks you to strip down and strap on a microphone so that it can make 3-D scans of your body fat and monitor your tone of voice. After all that, it still isn’t very helpful.

  • U.S. Schools Are Buying Cellebrite Phone-Hacking Tech — While companies like Cellebrite have partnered with federal and local police for years, that the controversial equipment is also available for school district employees to search students’ personal devices has gone relatively unnoticed—and serves as a frightening reminder of how technology originally developed for use by the military or intelligence services, ranging from blast-armored trucks designed for use in war zones to invasive surveillance tools, keeps trickling down to domestic police and even the institutions where our kids go to learn.

  • The Pros and Cons of Open-source Tools - THWACK — SolarWinds blog post that didn't age well. "Security becomes a major issue. Anyone can be hacked. However, the risk is far less when it comes to proprietary software. Due to the nature of open-source software allowing anyone to update the code, the risk of downloading malicious code is much higher. One source referred to using open-source software as “eating from a dirty fork.” When you reach in the drawer for a clean fork, you could be pulling out a dirty utensil. That analogy is right on the money."

  • Facebook’s Laughable Campaign Against Apple Is Really Against Users and Small Businesses | Electronic Frontier Foundation — Facebook has recently launched a campaign touting itself as the protector of small businesses. This is a laughable attempt from Facebook to distract you from its poor track record of anticompetitive behavior and privacy issues as it tries to derail pro-privacy changes from Apple that are bad for Facebook’s business.


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]> Reality 2.0 Newsletter - December 16, 2020: Having Too Much Fun https://www.reality2cast.com/articles/reality-2-0-newsletter-december-16-2020-having-too-much-fun Wed, 16 Dec 2020 11:00:00 -0500 podcast@reality2cast.com ea1aef9d-7726-43fd-b97d-7aa3e3f0bbf8 Be careful in the desert. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Katherine Druckman and Doc Searls had a fun chat with Petros Koutoupis about open source in space, digital detox, World War 2 cryptography, and poop in the desert. Please remember to subscribe via the podcast player of your choice.

Episode 51: Poop in the Desert


Petros in Space

In episode 51, Petros Koutoupis describes being contacted by the the developer of SEMC OS, an open source operating system designed for mission control.

SEMC, originally standing for Space Exploration Mission Control, is an Open Source project that aims to write software for Mission Control. That ranges from tracking flight paths, to managing communications, to writing custom drivers to get information from Earth to Mars. Although our goal has shifted past simply Mission Control to all of space, our ideology remains the same - to boldly code where no man has written before.

We are a part of Nexus Aurora, which is an Open Source Project, that recently won the 2020 Mars Society Competition (and the Grand Prize of $10 000). Our idea is to innovate in technology past what we have today.

As it turns out, the author of the OS was inspired by an article series Petros wrote for Linux Journal in 2018, which you can find at:

DIY: Build a Custom Minimal Linux Distribution from Source

and

Build a Custom Minimal Linux Distribution from Source, Part II

We think that’s pretty cool!


RIP Arecibo

If you haven’t seen this incredible footage of the iconic Arecibo Observatory’s telescope collapse, we recommend grabbing some tissues, and checking it out.


Pooping in the Desert is a Misdemeanor

If you hadn’t yet heard about the strange monoliths popping up all over the world, you are too late to see the Utah desert installation for yourself. And the California version was dismantled almost as soon as it was found. You may still have time to locate one elsewhere in the world, if only travel was still a thing. If you do venture out though, save the eco adventurers some work and please don’t poop in the desert.

What and/or who do you think is behind these monoliths?

As always, please share your thoughts with us by commenting here on this post, by visiting us on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List

  • NASA is paying startups for moon rocks. It's not what you think - CNN — NASA pledged in September to buy moon rocks from companies that can get robotic rovers to the lunar surface and scoop up samples of the dusty terrain, and the space agency asked for bids from companies all over the world. The winners were unveiled Thursday: California-based Masten, Lunar Outpost of Colorado, and two separate companies that are both called iSpace — one from Japan and the other from Luxembourg.

  • semissioncontrol/semcos: SEMC OS is an operating system for Space Exploration and beyond! — Space. The Final Frontier. Where man hesitates to go, for it is one of the most dangerous realms that can be found. Not a world, but a multitude of worlds, accessible through only one tool — the space rocket. But tools of great power rely on systems of even more tremendously large strength. These systems are the ones that are created here, at SEMC. The Space Exploration Mission Control organization strives to create powerful tools and services, Open Sourced. And this is SEMC OS. A from-scratch distro written to be fast and reliable. Why? Because large space agencies lack one. There should be a unification when it comes to softwares that control the future of humanity - and this is where SEMC OS comes in. Hooked? Read on!



The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - December 9, 2020: A Cultural Problem https://www.reality2cast.com/articles/reality-2-0-newsletter-december-9-2020-a-cultural-problem Thu, 10 Dec 2020 13:00:00 -0500 podcast@reality2cast.com 107fbdeb-29fa-45cf-abb2-db51b9ce58a0 Is this the Internet we want? To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Doc Searls spoke to Jon Lebkowsky about reality, social constructs, the evolution of the Internet, and disinformation. Please remember to subscribe via the podcast player of your choice.

What Happened to Cyber Utopia?


This Week in Bad Decisions

According to TechCrunch, privacy-respecting email provider Tutanota has become the target of a German court, generating frustrated sighs from privacy advocates around the world.

German e2e encrypted email provider Tutanota has been ordered by a regional court to develop a function that allows it to monitor an individual account.

Tutanota responded and clarified on Twitter and Reddit that this only affects “newly incoming and outgoing non-encrypted emails of one suspected criminal before these are being encrypted.” They also indicated plans to enable an automatic encryption feature in the near future.

As Jon says, “And it's not a technical problem. It's a cultural problem.” This German ruling seems like part of global a trend to undermine protections provided by end-to-end encryption. Let’s hope tech continues to find its way.

As always, please share your thoughts with us by commenting here on this post, by visiting us on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List



The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - November 25, 2020: Owned. https://www.reality2cast.com/articles/reality-2-0-newsletter-november-25-2020-owned Wed, 25 Nov 2020 15:00:00 -0500 podcast@reality2cast.com db429edc-4d0f-47d5-a277-b312b1cba003 What does it even mean? To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Doc Searls and Katherine Druckman spoke to regular guests Kyle Rankin and Petros Koutoupis about Parler and platform lock-in, the concept of data, software, and hardware ownership, and the open source social contract. Please remember to subscribe via the podcast player of your choice.

Parler, Ownership, and Open Source


This week’s conversation was rooted in the concept of ownership, including hardware, software, and in the case of platform lock-in, even ownership of ideas. Over the course of nearly an hour, we questioned our ownership of our social media profiles, our photo storage accounts, our MacBooks, and our code.

After recent news quickly spread that Apple devices running MacOS failed to launch apps as the result of a failed verification process where a MacBook effectively pings Apple to ask for permission, a bit of an uproar ensued. Imagine believing your device is your own, only to find out that something as simple as opening an application is not entirely under your control?

Our frequent guest, Kyle Rankin, put his thoughts on the subject in an article on the Puri.sm blog, Apple Users Got Owned, and expanded in the podcast episode.

You’ll often hear hackers say that they “owned” (or sometimes “pwned”) a computer. They don’t mean that they have the computer in their physical possession, what they mean is that they have compromised the computer and have such deep remote control that they can do whatever they want to it. When hackers own a computer they can prevent software from running, install whatever software they choose, and remotely control the hardware–even against the actual owner’s wishes and usually without their knowledge.

We also noted strong reactions elsewhere, such as Twitter.

Revelations like these are unsettling for users who value ownership of and dominion over their devices. And for people who value the freedoms open source software provides, it’s that much more unpleasant to feel controlled by hardware or software.

We delved into a few other related subjects, and I hope you’ll listen and reach out to us with your thoughts.

As always, please share your feedback with us by commenting here on this post, by visiting us on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


See You After the Holiday

We’re taking a short break for the Thanksgiving holiday in the US, so there won’t be a new podcast episode this week, or a corresponding newsletter. So, we’ll see you in December!


This Week’s Reading List

  • Parler - Wikipedia — Parler is an American microblogging and social networking service launched in August 2018. Parler has a significant user base of Trump supporters, conservatives, and right-wing extremists. Posts on the service often contain far-right content, antisemitism, and conspiracy theories. Parler has been described as an alternative to Twitter, and is popular among people who have been banned from mainstream social networks or oppose their moderation policies.

  • davewiner.com

  • Scripting News — This is Scripting News. It's Dave Winer's blog.

  • Little Snitch - Makes the invisible visible!

  • Amazon.com: The Gift: How the Creative Spirit Transforms the World (9781984897787): Hyde, Lewis: Books — Drawing on examples from folklore and literature, history and tribal customs, economics and modern copyright law, Lewis Hyde demonstrates how our society—governed by the marketplace—is poorly equipped to determine the worth of artists’ work. He shows us that another way is possible: the alternative economy of the gift, which allows creations and ideas to circulate freely, rather than hoarding them as commodities.

  • Amazon.com: COMMON AS AIR (9780374532796): Hyde, Lewis: Books — Common as Air offers a stirring defense of our cultural commons, that vast store of art and ideas we have inherited from the past and continue to enrich in the present. Suspicious of the current idea that all creative work is "intellectual property," Lewis Hyde turns to America's Founding Fathers―men such as Adams, Madison, and Jefferson―in search of other ways to imagine the fruits of human wit and imagination. What he discovers is a rich tradition in which knowledge was assumed to be a commonwealth, not a private preserve.

  • macOS Big Sur launch appears to cause temporary slowdown in even non-Big Sur Macs | Ars Technica — When an Apple device can't connect to the network but you want to launch an app anyway, the notarization validation is supposed to "soft fail"—that is, your Apple device is supposed to recognize you're not online and allow the app to launch anyway. However, due to the nature of whatever happened today, calls to the server appeared to simply hang instead of soft-failing. This is possibly because everyone's device could still do a DNS lookup on ocsp.apple.com without any problems, leading the devices to believe that if they could do a DNS lookup, they should be able to connect to the OCSP service. So they tried—and timed out.

  • Apple Users Got Owned – Purism — You’ll often hear hackers say that they “owned” (or sometimes “pwned”) a computer. They don’t mean that they have the computer in their physical possession, what they mean is that they have compromised the computer and have such deep remote control that they can do whatever they want to it. When hackers own a computer they can prevent software from running, install whatever software they choose, and remotely control the hardware–even against the actual owner’s wishes and usually without their knowledge.


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - November 18, 2020: Myths, Humans, and Technology https://www.reality2cast.com/articles/reality-2-0-newsletter-november-18-2020-myths-humans-and-technology Wed, 18 Nov 2020 10:30:00 -0500 podcast@reality2cast.com d2138cd4-a51a-4c27-bf33-9690b2de0d00 An investigation. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Doc Searls and Katherine Druckman spoke with Dr. Barbara Cherry, lawyer and professor of communications at Indiana University, about political division, legislation and regulation, technical evolution, and even horses. Please remember to subscribe via the podcast player of your choice.

Episode 48: The Politics of Communication


Digging a Little Deeper

This week we diverged somewhat from our usual tech-focused subject matter to discuss some topics that are still inextricably linked to internet technologies and the way humans use them to interact. If you haven’t had the pleasure of listening to Dr. Barbara Cherry on our latest episode, I hope you’ll take the time. Among the themes we discussed was the idea of myths as a social glue, as described by Yuval Noah Harari in his book Sapiens: A Brief History of Humankind.

From the episode:

40m 50s Barbara Cherry [T]he Sapiens book, we've talked about an important thing that the author emphasizes is that when we stumbled on agriculture as a species that enabled us to live in groups in a much larger scale. So he emphasizes that we did not have enough time to allow an instinct for mass co-operation to evolve. So instead sapiens invented myths to provide the needed social links, to build networks of mass cooperation.

41m 30s Barbara Cherry And so basically our networks are all based on imagined orders or myths, shared myths. And one example of that, for example, he cites it like a declaration of independence, you know?

41m 45s Doc Searls Right. And that there is such a thing as rights. We made that one up too.

41m 49s Barbara Cherry And so basically he’s saying is that he believes that, functionally, imagined orders are the only way large numbers of humans can cooperate effectively. And what's happening is we have a war of myths going on now. We have certain myths. We have a certain order. The constitution itself reflects certain myths or orders, right? That we bought into as a country. But how have we tried to live within it? It required continual amendment like dealing with slavery, things like that. It keeps amending over time. We're through another period now where we've got a challenge of alternate myths now, and technology can make it more possible for certain myths to get distributed with greater ease than they might otherwise.

42m 43s Barbara Cherry And so one could argue when you look at it from the perspective, the big macro long-term horizon, like the sapiens book does, that we’re going through another iteration of trying to figure out what are the myths that are going to prevail? What's the imagined order that's going to prevail for mass co-operation? Now, we have a structure of governance based on certain myths in the US Constitution. Now, will that hold or can it continue to be modified or is there ultimately going to be such a serious rupture to that, that we have to start something else?

If you’d like to dive further into the ideas that inspired Dr. Harari’s book, I recommend the following video.


As always, please share your feedback with us by commenting here on this post, by visiting us on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - November 10, 2020: Technology Revolutions https://www.reality2cast.com/articles/reality-2-0-newsletter-november-10-2020-technology-revolutions Tue, 10 Nov 2020 10:30:00 -0500 podcast@reality2cast.com 612b20cd-6e54-494d-a39b-090b362cd805 The web finds a way. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Doc Searls, Katherine Druckman, and Petros Koutoupis spoke with Apache community member, Hadrian Zbarcea, about the evolution/revolution of web technologies, online communication, and protocols. Please remember to subscribe via the podcast player of your choice.

Episode 47: Revolutions


Having survived the past week with the US thankfully intact, and thus-far without any Romanian-style bloody revolutions as discussed in the podcast, we are collectively entering the next phase of our story. With all the angst, pomp, and circumstance leading to a presidential election, especially one so contentious as this, the denouement can feel a bit unsettling and exhausting.

Most of us look forward to an opportunity to start something new, regardless of our political leanings, and as we all plan for a difficult new year, still in the midst of a global pandemic, I hope we can continue to focus on making our digital world a better place, as we see it.

Any eyes that are not presently focused on COVID-19 seem to be turned toward the internet, social platforms, information and disinformation, journalism, and cybersecurity. The world keeps turning, and our digital world continues to be a confusing place. I don’t see that elections change that, but we as digital citizens can and do. I’d like to offer up a suggestion this week to really dig deep and ponder what kind of digital world we want to virtually live in. If you are reading this, the digital world is likely as important to your daily existence as the physical one. What do you want to make of it?

Personally, I would start with reiterating the brilliant Eva Galperin:

I hope you’ll share what you discover with us by commenting here on this post, by visiting us on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List



The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - November 3, 2020: Is There a Place for Facial Recognition? https://www.reality2cast.com/articles/reality-2-0-newsletter-november-3-2020-is-there-a-place-for-facial-recognition Tue, 03 Nov 2020 10:15:00 -0500 podcast@reality2cast.com e62cde4b-e933-4e52-91a7-e946b3d98b98 This week we talk facial recognition in everyone's hands, digital rights, and the right to be forgotten. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

In our most recent episode, Doc Searls, Katherine Druckman, and Kyle Rankin discuss what happens when facial recognition and AI is in the hands of individuals to identify police, altering the balance of power. Other topics include surveillance and forensics tech, and privacy as it relates to photography. Please remember to subscribe via the podcast player of your choice.

Episode 46: Facial Recognition, Surveillance Technology, and the Balance of Power


When is Facial Recognition Technology Fair Game?

A recent New York Times article by Kashmir Hill featured examples of individuals turning facial recognition technology around on police officers. In one case, Chris Howell, a man from Porland, Oregon, developed software to identify local police officers who taped over their names during clashes with protesters. Interestingly, Portland recently banned the use of facial recognition technology by police departments and public-facing businesses, but this did not impact an individual’s right to write and use such software on their own. And while most discussion of the ethics around this technology has focused on powerful entities such as Clearview AI and law enforcement, the same technology in the hands of the underdogs is somewhat uncharted. Is turnabout fair play here? These questions are complex and the answers are not black and white.

Doc Searls explored facial recognition on his Harvard blog in 2019:

[C]omputers doing facial recognition are proving useful for countless purposes: unlocking phones, finding missing persons and criminals, aiding investigations, shortening queues at passport portals, reducing fraud (for example at casinos), confirming age (saying somebody is too old or not old enough), finding lost pets (which also have faces). The list is long and getting longer.

Yet many (or perhaps all) of those purposes are at odds with the sense of personal privacy that derives from the tacit ways we know faces, our reliance on short term memory, and our natural anonymity (literally, namelessness) among strangers. All of those are graces of civilized life in the physical world, and they are threatened by the increasingly widespread use—and uses—of facial recognition by governments, businesses, schools and each other.

These ethical issues are present whether the tech is used by a casino, a law enforcement investigator, or an individual, but at what point does an individual have the right to embrace its use for their own protection? We explore the answer to this question in the podcast this week, but we can’t say we’ve come to a conclusion, so we would love to know your thoughts. Where do you draw the ethical line?

An alternative, and likely even more interesting, approach to this ethical conundrum is the question of artistic merit. Artist Paolo Cirio, also mentioned in the New York Times article referenced above, attempted to draw attention to privacy ethics in an exhibition he called “Capture,” which publicly displayed photos of 4,000 police officers taken during protests in France.

The series of photos Capture is composed of French police officers’ faces. The artist, Paolo Cirio collected 1000 public images of police in photos taken during protests in France and processed them with Facial Recognition software. Cirio then created an online platform with a database of the resulting 4000 faces of police officers to crowdsource their identification by name. Cirio also printed the officers’ headshots as street art posters and posted them throughout Paris to expose them in the public space. Capture comments on the potential uses and misuses of Facial Recognition and Artificial Intelligence by questioning the asymmetry of power at play. The lack of privacy regulations of such technology eventually turns against the same authorities that urge the use of it. Ultimately, as an activist, Cirio introduced a campaign to ban Facial Recognition technology in all of Europe by organizing a petition in collaboration with privacy organizations.

The work itself is compelling in its dissonance, but the question of whether doxing is ever morally sound remains.

Similarly, the work of posthumously famous photographer Vivian Maier is compelling in its intimacy and voyeurism. Vivian was a quiet woman who worked as a nanny and had a secret talent. After her death, a young man named John Maloof bid on an old, abandoned box of negatives at auction, and thus discovered her work. The story is fascinating, both from a biographical perspective, as well as for its significance to contemporary art history and historic preservation. At its heart though, is a story of peeking into the intimate details of a person’s life when they are no longer around to consent. She never chose to be a recognized artist. Does the obviously tremendous artistic merit in her photographs justify the exposure of her life and her subjects? Do we have a right to view the world through her eyes?

We invite you to draw your own conclusions and join the conversation by commenting here on this post, by visiting us on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List

  • Activists Turn Facial Recognition Tools Against the Police - The New York Times — These activists say it has become relatively easy to build facial recognition tools thanks to off-the-shelf image recognition software that has been made available in recent years. In Portland, Mr. Howell used a Google-provided platform, TensorFlow, which helps people build machine-learning models.

  • Fawkes — The SAND Lab at University of Chicago has developed Fawkes1, an algorithm and software tool (running locally on your computer) that gives individuals the ability to limit how unknown third parties can track them by building facial recognition models out of their publicly available photos.

  • Mass Extraction - Upturn — To search phones, law enforcement agencies use mobile device forensic tools (MDFTs), a powerful technology that allows police to extract a full copy of data from a cellphone — all emails, texts, photos, location, app data, and more — which can then be programmatically searched. As one expert puts it, with the amount of sensitive information stored on smartphones today, the tools provide a “window into the soul.”

  • Doc Searls Weblog · About face — We know more than we can tell.

  • Vivian Maier Photographer | Official website of Vivian Maier | Vivian Maier Portfolios, Prints, Exhibitions, Books and documentary film

  • Welcome to the 21st Century: How To Plan For The Post-Covid Future - O'Reilly Media — So too, when we look back, we will understand that the 21st century truly began this year, when the COVID19 pandemic took hold. We are entering the century of being blindsided by things that we have been warned about for decades but never took seriously enough to prepare for, the century of lurching from crisis to crisis until, at last, we shake ourselves from the illusion that our world will go back to the comfortable way it was and begin the process of rebuilding our society from the ground up.



The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - October 27, 2020: Should Social Media Be Regulated? https://www.reality2cast.com/articles/reality-2-0-newsletter-october-27-2020-should-social-media-be-regulated Tue, 27 Oct 2020 11:00:00 -0400 podcast@reality2cast.com 24241082-0949-4c43-b007-e0610936051a This week we talk section 230, efforts to regulate social media, and social media's impact on journalism. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

In this week’s episode, Doc Searls, Katherine Druckman, and Petros Koutoupis attempt to uncover problems with social media and, by extension, journalism. We discuss recent attempts to reinterpret section 230 of the Communications Act, which was passed into law by the 1996 Communications Decency Act, and how that may affect social media and its relationship to journalism. We hope you’ll check it out and join the discussion. Please remember to subscribe via the podcast player of your choice.

Episode 45: Social Media Regulation and Journalism


But First You Must Define the Problem

We find the issues of social media regulation and ad tech’s negative impact on journalism to be somewhat intertwined. Traditional news sites rely heavily on inbound traffic funneled through the likes of Google, Facebook, Twitter, and other large social media intermediaries, and while they ultimately deliver the traffic, they take a chunk of advertising revenue along the way. Matt Stoller argues this relationship harms our democracy by delivering a financial blow to legitimate journalism, while allowing low-quality content to flourish.

[P]hony Facebook pages illustrate the crisis of the free press and democracy: Advertising revenue that used to go to quality journalism is now captured by big tech intermediaries, and some of that money now goes to dishonest, low-quality and fraudulent content.

Some have argued that the role of social networks like Facebook and Twitter has become less of a neutral go-between, and more of a curator, thus significantly impacting the habits of both publisher and reader. This controversy has led politicians to question the liability protections afforded internet platforms in Section 230 of the Communications Act.

It is important to understand both the intended and actual functions of social networks, ad tech, and journalism so as not to confuse them, especially in the current political climate. In this week’s episode, we attempt to unpack some of these ideas, initiated in part by the short reading list we’ve included here.

We don’t view our podcast as a source of answers, but rather as a source of inspiration for further discussion, so, to that end, we invite you to draw your own conclusions and join the conversation by commenting here on this post, by visiting us on any of our social outlets, or via our contact form.

Site/Blog/Newsletter | Facebook | Twitter | YouTube | Mastodon


This Week’s Reading List

FCC chairman says he'll seek to regulate social media under Trump's executive order - CNN — The Federal Communications Commission (FCC) will draft regulations intended for social media companies following a petition earlier this year by the Trump administration, the agency's chairman said Thursday. In a tweet, FCC Chairman Ajit Pai indicated he will move forward with a rulemaking to "clarify" Section 230 of the Communications Act of 1934, which currently acts as a legal shield for tech companies' handling of user generated content.

Opinion | Tech Companies Are Destroying Democracy and the Free Press - The New York Times — Ad revenue that used to support journalism is now captured by Google and Facebook, and some of that money supports and spreads fake news.

BIG by Matt Stoller - Matt Stoller is an author with an impressive political resume. Find more of his work in his Substack newsletter.

Tim Hwang - Subprime Attention Crisis — Tim Hwang is a writer and researcher based in New York. He is the author of Subprime Attention Crisis, a book about the bubble of online advertising. He is currently a research fellow at the Center for Security and Emerging Technology (CSET) at Georgetown University.

Executive Order — Here is the full text of President Trump's executive order relating to social media, published by the White House on Thursday May 28, 2020.

Section 230 of the Communications Decency Act | Electronic Frontier Foundation — Tucked inside the Communications Decency Act (CDA) of 1996 is one of the most valuable tools for protecting freedom of expression and innovation on the Internet: Section 230.

Official Title 47 Section 230 PDF document — 230(c) - (1) Treatment of publisher or speaker No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.

47 U.S. Code § 230 - Protection for private blocking and screening of offensive material — Reference from Cornell Law.



The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Reality 2.0 Newsletter - October 20, 2020: Podcasts Killed the Radio Star https://www.reality2cast.com/articles/reality-2-0-newsletter-october-20-2020-podcasts-killed-the-radio-star Tue, 20 Oct 2020 11:00:00 -0400 podcast@reality2cast.com 57beeb4e-67ba-4f58-ba3b-d6983baec800 This week, we talk about podcasting's evolution and rise in popularity, as well as radio's decline. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

Our latest podcast episode explores the current state of podcasting and how we got here. We talk a bit about the medium itself, and how we put ours together, as well as its roots and evolution, especially as they relate to radio. We hope you’ll listen!

Episode 44: Podcasts Killed the Radio Star


A Little History

As many of our listeners already know, podcasting originated with an idea to add enclosures to an RSS feed. After much lobbying from former MTV personality Adam Curry, Dave Winer, creator of the RSS format, famously updated RSS version 0.92 in 2001 with the addition of an <enclosure> tag, and while it took a few years to catch on with widespread adoption thanks largely to the Apple iPod, the rest, as they say, is history.

Ars Technica published a retrospective on podcasting in 2014, and it’s well worth a look now.

“He had to beat me over the head to get me to listen to the idea,” Winer told Ars in a recent interview. “The whole idea of video on the Internet didn’t interest me due to the latency problem. At the time I thought video and audio whatever, the pipes were small. The whole idea of waiting for the thing to download would not be worth the wait. I had written off the idea at first—it took me a few times to listen. If those barriers are there for me [as a software developer], you can only imagine how they were for everybody else.”

Early into podcasting’s history, our own Doc Searls noted in September 2004, that the word “podcast” only returned 24 results on Google, and noted again in November of 2005, that the number of search results had grown to over a hundred million. That initial popularity explosion established podcasting as a format, but the response from some tech and media giants has been slower. A prime example of this (pun intended) is Amazon. Amazon dove head first into the video streaming wars years ago, but only added podcasts to Amazon music this year.

So, it seems that podcasting could be in the early stages of a renaissance. According to a recent Financial Times article:

But it is the fact that podcasting is an underdeveloped market that makes it appealing. The music business that is Spotify’s bread and butter has long been dominated by a handful of companies that own the copyright to all the world’s music. These music rights holders take about 70 cents of every dollar Spotify makes.  Podcasting, on the other hand, is a highly fragmented sector that is mostly owned by independent creators and dozens of small start-ups. This leaves Spotify with ample opportunity to enter a growing market that does not require pricey payments to someone else. There are exceptions, but most of the time Spotify does not pay podcast creators directly for their content. Podcasters instead make money from selling ads in their own shows. 

And while a new media giant like Spotify is right to spot the massive potential in podcasting, the nature of the established podcast creator and distributor model may be more inherently sovereign than they are prepared for. Doc’s words from his April 2017 Harvard blog post seem especially prescient today:

Nobody is going to own podcasting. By that I mean nobody is going to trap it in a silo. Apple tried, first with its podcasting feature in iTunes, and again with its Podcasts app. Others have tried as well. None of them have succeeded, or will ever succeed, for the same reason nobody has ever owned the human voice, or ever will. (Other, of course, than their own.)

Because podcasting is about the human voice. It’s humans talking to humans: voices to ears and voices to voices—because listeners can talk too. They can speak back. And forward. Lots of ways.

Podcasting is one way for markets to have conversations; but the podcast market itself can’t be bought or controlled, because it’s not a market. Or an “industry.” Instead, like the Web, email and other graces of open protocols on the open Internet, podcasting is all-the-way deep.

While podcasting has been in our vernacular for over fifteen years, it’s still very early. The longest-running shows are teenagers, perhaps still figuring it all out while still blazing their trails, and the next generation is carving its own path. Where we collectively go from here remains to be seen, but we’re excited to be a part of the evolving podcasting universe.


Podcast Time Machine

For a peek into the early world of podcasting featuring some early pioneers, listen to Dave Winer’s August 6, 2006 episode of his Morning Coffee Notes podcast:

A Morning Coffee Notes podcast with Doc Searls, Mike Kowalchik, Jason Calacanis, Steve Gillmor. It contains breaking news about a new career move by Doc Searls. And an ad for Digg by Jason Calacanis. Steve is a tinny voice on the Blackberry and he takes a few cheap shots at Scoble. "At this point I smell a lawsuit," says Calacanis.


A Fun Bit of Radio History

In the latest podcast episode, we briefly mentioned Voice of Peace Radio, a radio station that broadcast from the Mediterranean off the coast of Israel from 1973-1993. The station was operated by its founder, Abie Nathan, an Israeli peace activist. The following short video gives a little more background on this period of radio history.

I’ve translated the Hebrew parts, spoken by Abie Nathan below:

Opening: This is the Voice of Peace. At sunset The Voice of Peace station will stop broadcasting for 30 seconds in memory of the victims of violence in our region and around the world.

[1:00] Our crew today is much better than what we used to have before.

We feel like a family and it's hard, inviting people from all over the world, putting them on the ship in the middle of the sea and each time replacing them. 

[2:14] So we have listeners in Egypt, Jordan, Damascus, Lebanon, Cyprus, and in Israel. In this past year I felt some despair. We thought that after ten years we could do some more serious work on shore. We had hopes and each time in today’s situation with a ship that is not new, we had to sit in the middle of the sea in danger. So we worried more about how our ship will hold together rather than what we would do. Every two years we dock, and every time there is the fear, “How much will it cost?” We are succeeding today on income from advertising to maintain the ship and to donate to a variety of institutions, either in the form of money or other favors from the ship. 

[4:19] I believe in the broadcast station, that it has tremendous power of persuasion. You can warm people up to wars or you can calm them down, and you can talk to them about peace. 


Our Workflow

If you’re curious, these are the primary tools we use to create, edit, and publish our podcast:

Zoom - video conferencing that works for us

Audacity - open source audio editor

Fireside.fm - podcast hosting


The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]> Reality 2.0 Newsletter - October 13, 2020: The Journey Begins https://www.reality2cast.com/articles/reality-2-0-newsletter-october-13-2020-the-journey-begins Tue, 13 Oct 2020 10:00:00 -0400 podcast@reality2cast.com f4263772-9c94-4211-a294-d6dcbb1fd3b8 This week we explore ad tech, privacy, and user agency. To get this weekly dose of Reality delivered by email, sign up on our Substack page.

A Quick Plug

In case you missed it, Episode 43: Ad Tracking Runs Deep is now available. Doc and Katherine talked to Dr. Augustine Fou about his privacy analysis app, Page X-Ray, ad tracking, and data privacy.

For more background and a brief guide to Page X-Ray, see our short blog post:

Page X-Ray Data Privacy Analysis Featured in Episode 43

Page X-Ray differs from typical consumer-oriented privacy apps, like The Markup’s recently published Blacklight in that it not only detects trackers that are loaded by the page, but also the trackers that are called by other trackers, giving a more extensive view of tracking activity and data collection.

This depth of analysis provides the striking visual below, taken from a report gathered via smithsonianmag.com.

Tree graph of trackers found on smithsonianmag.com

Figure 1. A complete tree graph of smithsonianmag.com


More on Ad Tech

Episode 43 was all about ad tech, so we’d like to share a few of the privacy tools we use to take back some control over our online lives.

The following are well worth a look if you aren’t already a user:

In ad fraud news, file the following article under, “Yes, ad tech can be harmful.”

From Forbes.com: Android Users Beware: Delete These 240 Malicious Apps Now

The RAINBOWMIX apps appear at first to be legit, as they work as they are supposed to, although their quality is poor. Many of them are Nintendo (NES) emulators ripped from legitimate sources or low quality games, the researchers said. The ads themselves also appear to be legit—they seem to come from trusted apps and services such as Chrome or YouTube.

This enabled the fraudsters to bypass certain security protocols and fly under the radar, leading to millions of downloads and ad impressionsper day at the peak of the campaign. 

Doc Searls on Ad Tech

Doc has written extensively on the subject of ad tech, its impact on journalism and the publishing industry, and its threat to digital privacy and user agency. You’ll find many of his articles under the People vs. Adtech link on his Harvard blog. It’s worth bookmarking for easy reference.

The Reality 2.0 Podcast explores how tech, privacy, and security impact reality in a post-COVID world. Subscribe now and don't miss a thing! We welcome your feedback at our contact page.

]]>
Page X-Ray Data Privacy Analysis Featured in Episode 43 https://www.reality2cast.com/articles/page-xray-data-privacy-analysis Fri, 09 Oct 2020 09:15:00 -0400 podcast@reality2cast.com 8f91fce8-3e54-424d-b52d-3563f173c316 Dr. Augustine Fou joins us for Episode 43 of Reality 2.0 to walk us through his Page XRay app, a data visualization tool that maps web site trackers. Dr. Augustine Fou joins us for Episode 43 of Reality 2.0 to walk us through his Page X-Ray app, a data visualization tool that maps web site trackers.

This is Dr. Fou’s second time visiting with us on the podcast, and I encourage you to listen to both episodes:

Episode 13: Surveillance Marketing

Episode 43: Ad Tracking Runs Deep

Page X-Ray differs from typical consumer-oriented privacy apps, like The Markup’s recently published Blacklight in that it not only detects trackers that are loaded by the page, but also the trackers that are called by other trackers, giving a more extensive view of tracking activity and data collection.

This depth of analysis provides the striking visual below, taken from a report gathered via smithsonianmag.com.

Tree graph of trackers found on smithsonianmag.com
Figure 1. A complete tree graph of smithsonianmag.com

Instead of only seeing the first level of trackers, Page X-Ray goes deeper and follows each tracker with a crawler, executing all the javascript, and thus uncovering everything else that’s being loaded. The graphs begin with the first layer of trackers being called by the site, and beyond that, show what each of those scripts loads. The app records every network call, and it translates the result into a tree graph indicating the relationship between what is loading and being loaded.

Some reports, like Smithsonian pictured above, go many layers deep.

Detail of tree graph of trackers found on smithsonianmag.com
Figure 2. The connecting lines, urls, and circled numbers provide additional useful information.

You’ll note that some of the lines are gray, orange, and red, and each url may be gray, blue, orange, or red.

Gray indicates that no cookie is set, and this is the preferred condition that we like to see.

Orange indicates that a third-party cookie was set, meaning it is set by a domain other than the site you are currently visiting.

The white circles indicate the number of times a tag was loaded. If the circle is highlighted yellow, it means this tracker was loaded ten or more times.

A blue url indicates an ad server request, while orange is another analytics tracker. If it’s gray, the nature of the server is unknown.

The flag icons show the country where a specific tracker is called from or where the data is sent, which is especially interesting when information is sent across borders, as privacy regulations differ.

Finally, a fingerprint icon indicates that a script is exfiltrating user data, and logging user behavior, thus creating a digital “fingerprint.” Sometimes this type of tracking is used with good intentions to improve UX, but the clear downside is that data is being sent that potentially includes logins and passwords. These are indicated by corresponding red lines.

While Page X-Ray is geared toward the needs of privacy and ad fraud researchers, it’s worth looking at for anyone curious about the data any site is potentially collecting and sharing. We explore its potential in-depth, and other related topics in Episode 43, and I hope you’ll join us!

]]>