July 10, 2015
A solution to the Greek crisis
.@Apple has $200B in cash. #Greece asks for $55B. iGREECE, baby! pic.twitter.com/fARsoFblCs
— David Weinberger (@dweinberger) July 10, 2015
July 10, 2015
.@Apple has $200B in cash. #Greece asks for $55B. iGREECE, baby! pic.twitter.com/fARsoFblCs
— David Weinberger (@dweinberger) July 10, 2015
November 7, 2013
We now know that the Google barges are “interactive learning spaces.” That narrows the field. They’re not off-shore data centers or Google Glass stores. They’re also not where Google keeps the porn (as Seth Meyers reported) and they’re not filled with bubblewrap for people to step on, although that would be awesome.
So here’s my hope for what “interactive learning spaces” means: In your face, Apple Store!
Apple Stores manifest Apple’s leave-no-fingerprints consumerist ideal. Pure white, squeaky clean, and please do come try out the tools we’ve decided are appropriate for you inferior Earth creatures.
Google from the beginning has manifested itself as comfortable with the messy bustle of the Net, especially when the bustlers are hyper-geeky middle class Americans.
So, I’m hoping that the “interactive learning spaces” are places where you can not only get your email on a Chromebook keyboard, play a game on an Android tablet, and take a class in how to use Google Glass, but is a place where you can actually build stuff, learn from other “customers,” and hang out because the environment itself — not just the scheduled courses — is so stimulating and educational. Have hackathons there, let the community schedule classes and talks, make sure that Google engineers hang out there and maybe even some work there. Open bench everything!
That’s what I hope. I look forward to being disappointed.
April 28, 2013
In my continuing series “How to Be an Idiot,” here’s what not to do when installing a new hard drive into your MacBook Pro.
I started off right. I had everything prepared: a new 500gB hybrid drive, a fresh Time Machine backup, and an 8gB USB stick with the Mac Mountain Lion installer on it. I still managed to fail maybe 20 times over the course of two days booting from everything I could find, re-installing Lion onto the stick, backing up from Time Machine, etc. The closest I came was when I installed off the repair partition over a backup drive. The Mac started up its install process, but got stopped with a message that said that Apple was unable to confirm that my computer is authorized for an OS install. At least, that’s what I think it meant; it’s not a very clear message, and, no I didn’t write it down :(
This made me think that the problem was that I was trying to install the wrong version, although I was pretty durn sure that I had upgraded to Mountain Lion a few weeks earlier, having resisted the blandishments of Lion. Maybe Apple was confused, although I couldn’t see why. I installed the prior version of the OS on my USB drive. Nope.
And now for the answer. And it’s not going to make me look smart, that I promise you.
You see, kids, for Apple to verify my machine, it has to get onto the Internet. It turns out that if during the install process you give your Mac a choice of wifi hotspots to connect to, it picks an open one without asking for your say-so. As a result, it happened to pick a hotspot that requires a login on a web site, but there’s no browser available during the install process. Once I pointed the Mac to another hotspot, it was able to connect and authorize my machine, enabling the installation to proceed.
Sure it was dumb of me. But it’s also dumb of Apple to give us an error message that says that it’s unable to authorize, rather than that it was unable connect. (I also didn’t see a relevant message in the Installer log, but I may have missed it.)
Fortunately, each of the things I tried took a relatively long time to fail, so I was able to get a lot done while trying. Still, the moment of victory was definitely a forehead-slapper for me.
March 28, 2013
Dan Gillmor is giving a Berkman lunchtime talk about his Permission Taken project. Dan, who has been very influential on my understanding of tech and has become a treasured friend, is going to talk about what we can do to live in an open Internet. He begins by pointing to Jonathan Zittrain’s The Future of the Internet and Rebecca MacKinnon’s Consent of the Networked [two hugely important books].
NOTE: Live-blogging. Getting things wrong. Missing points. Omitting key information. Introducing artificial choppiness. Over-emphasizing small matters. Paraphrasing badly. Not running a spellpchecker. Mangling other people’s ideas and words. You are warned, people. |
He says that the intersection of convenience and freedom is narrowing. He goes through a “parade of horribles” [which I cannot keep up with]. He pauses on Loic Le Meur’s [twitter:loic] tweet: “A friend working for Facebook: ‘we’re like electricity.'” If that’s the case, Dan says, we should maybe even think about regulation, although he’s not a big fan of regulation. He goes through a long list of what apps ask permission to do on your mobile. His example is Skype. It’s a long list. Bruce Schneier says when it comes to security, we’re heading toward feudalism. Also, he says, Skype won’t deny it has a backdoor. “You should assume they do,” he says. The lock-in is getting tighter and tighter.
We do this for convenience. “I use a Kindle.” It makes him uncomfortable but it’s so hard to avoid lock-in and privacy risks. The fight against SOPA/PIPA was a good point. “But keep in mind that the copyright cartel is a well-funded smart group of people who never quit.” He says that we certainly need better laws, rules, and policies. “That’s crucial.” But his question this afternoon is what we as individuals can do. Today he’s going to focus on security countermeasures, although they’re not enough. His project â?? which might become a book â?? will begin simply, because it’s aimed at the broad swath of people who are not particularly technically literate.
“Full disk encryption should be the default. It’s not. Microsoft charges extra for it. Mac makes it pretty easy. So does Ubuntu.”
Disable intrusive browser extensions.
Root your phone. That’s not perfect. E.g., it makes you vulnerable to some attacks. But the tradeoff is that you now control your phone.
Dan blocks apps from particular permissions. Sometimes that keeps the app from working. “I accept that.” This is a counter to vendors insisting that you give them all the rights.
Use Tor [The Onion Router], even though “I assume some of the exit nodes” being run by the CIA. Tor, he explains, is a way of browsing the Web with some reasonable likelihood your ISP doesn’t know what you’re actually looking at, and what you’re looking at doesn’t know where you’re coming from.” This he says is important for whistleblowers, etc.
When loyalty cards came out, he and his friend used to randomly swap them to make the data useless. The last time he got one, he filled in his address as 1600 Pennsylvania Ave., and the guy in the store said, “It’s amazing how many people live there.” If you use a false address with a card, it may not work. If you do it on line, you’re committing a felony under the Computer Fraud and Abuse Act. The revisions are going in the wrong direction. “This is terrifying…We have to do something collectively.”
Pick your platform carefully. “I was the biggest Apple person around…I was a Mac bigot for years.” At prss events, he’d be the only person (beside John Markoff) to have a Mac. Many things happened, including Apple suing websites wanting to do journalism about Apple. Their “control freakery” and arrogance with the iPhone was worse. “Now that everyone except me at a press event has a Mac, I get worried.” Now the Mac is taking on the restrictions of the iPhone operating system (IOS). “I want to do what I want with my own computer.” All computer makers are moving to devices that you can’t even open them. “Everyone wants to be Apple.”
Own your own domain. Why are journalists putting their work on Facebook or other people’s platforms? Because it brings distribution and attention. “We do these things on ‘free’ platforms at their sufferance.” “We all should have a place on the Web that is owned by us,” even if we don’t do most of our work there. Dan is going to require students to get their own domain name.
Dan says his book/project is going to present a gradient of actions. At the further end, there’s Linux. Dan switched last year and has found it almost painless. “No one should have to use the command line if they don’t want to,” and Linux isn’t perfect about that yet. “Even there it’s improving.” He says all the major distributions are pretty. He uses Ubuntu. “Even there there’s some control-freakery going on.” Dan says he tried Linux every year for 10 years, and how he finds it “ready for prime time.” He says some control features being introduced to Windows, for reasonable reasons, is making life harder for Linux users. [I’m not sure what he’s referring to.]
Dan says the lockdown is caused by self-interest, not good vs. evil. He hopes that we can start to make the overlap of convenient and freedom larger and larger.
Q&A
Q: If you should have your own domain, you should also do your own hosting, run your own Apache server, etc.
A: You can’t be independent of all external services unless you really want that. There’s a continuum here. My hosting is done by someone I know personally. We really need systematic and universal encryption in the cloud, so whoever is storing your stuff can’t muck with it unless you give them permission. That raises legal questions for them.
Q: I really like what you’re saying. I’m not a specialist and it sounds like a conversation among a very small number of people who are refined specialists in this area. How do you get this out and more accessible? Could this be included in basic literacy in our public schools? On the other hand, I worry there’s a kind of individualism: You know how to do it, so you get to do it, but the rest don’t. How do we build a default position for people who can’t manage this for themselves.
A: Yes, I worry that this for geeks. But I’m not aiming this project at geeks. It’s more aimed at my students, who have grown up thinking Facebook is the Internet and that the MacBook Air gives them complete freedom [when in fact it can’t be opened and modified]. The early chapters will be on what you can do whatever it is that use. It won’t solve the problem, but it will help. And then take people up a ramp to get them as far as they’re comfortable doing. In really clear language, I hope. And it’d be a fine idea to make this part of digital literacy education. I’m a huge fan of CodeAcademy; Douglas Rushkoff wrote a wonderful book called “Program or Be Programmed,” and I think it does help to know some of this. [See Diana Kimball’s Berkman Talk on coding as a liberal art.] It’s not going to be in big demand any time soon. But I hope people can see what’s at risk, what they’re losing, and also what they gain by being locked down.
Q: Do you think freedom and convenience will grow further apart? What are the major factors?
A: Overall, the bad direction is still gaining. That’s why I’m doing this. I don’t think people are generally aware of the issues. It’ll help if we can get word out about what’s at risk and what the choices are. If people are aware of the issues and are fine with giving up their freedom, that’s their choice. We’ve been trading convenience of the illusion of security. “We put our hands up in scanners as if we’re being frisked.” There’s more money and power on the control side. Every major institution is aligned on the same side of this: recentralizing the technology that promised radical decentralization. That’s a problem. I’m going to try to convince people to use tech that doesn’t do that, and to push for better policies, but …
Q: What exactly are you concerned about? I feel free to do anything I want on the Internet. Maybe the govt is managing me. Marketers definitely are. I worry about hackers stealing my identity. But what are the risks?
A: “I think a society that is under pervasive surveillance is a deadened society in the long run.” It’s bad for us “in every way that I can imagine” except for the possibility that can stop a certain amount of crime. “But in dictatorships, the chief criminals are the govt and the police, so it doesn’t solve the problem.” The FBI wants a backdoor into every technology. If they get one, it will be used by bad people. This stuff doesn’t stay secret forever. The more you harden the defenses, the more room there is for really bad actors to get in. Those are some of the main reasons.
Q: How can Tor can help whistleblowers? Do you have other advice for journalists?
A: I have a chapter in a book that’s coming out about journalists and closed platforms. Journalists need to learn about security right away because they’re putting the lives of their sources at risk. The Committee to Protect Journalists has done important work on helping journalists understand the risks and mitigate them. It’s a crucial issue that hasn’t gotten enough attention inside the craft. although I had my PGP signature at the bottom of my column for 6 years and got 2 emails that used it, one of which said he just wanted to know if it worked. Also, you should be aware that you can’t anticipate every risk. E.g., if the US govt wants to find out what I’m talking about online, they’ll figure out a way to do it. They could break into my house and put up cameras. But like the better deadbolt lock stopping amateur criminals, better security measures will discourage some intrusions. When I do my online banking, I do it from a virtual machine that I use only for that; it has never gone anywhere else on the Internet. I don’t think that’s totally paranoid. There are still risks.
Q: The Supreme Court just affirmed first sale of materials manufactured outside of the US. Late stage capitalism want to literally own their markets, offline as well as online. How much of that wider context do you want to get into?
A: If the Court hadn’t affirmed first sale, every media producer would have moved all their production facilities offshore so that we wouldn’t be able to resell it. These days we buy licenses, not goods. Increasingly, physical goods will have software components. That’s an opportunity for the control crowd to keep you from owning anything you buy. In Massachusetts, the car repair shops got a ballot measure saying they get access to the software in cars; that was marvelous. BTW, I’m making common cause with some friends on the Right. Some of the more far-seeing people on the Right are way ahead in thinking about this. E.g., Derek Khanna. I will be an ally of anybody.
Q: [harry lewis] Great project. Here’s your problem: What are you worried about? This is a different sort of surveillance society. This is the opposite of the Panopticon where everyone knows they’re being spied upon. People won;t be motivated until there are breeches. The incentive of the surveillors is to do it as unobtrusively as possible. You’ll never know why your life insurance premium is $100 higher than my. You want ever see the data paths that led to that, because the surveillance will be happening at a level that will be ompletely invisible to the individual. It’ll be hard to wake people up. “A surveillance society is a deadened society” only if people know they’re being surveilled.
A: If they don’t see a consequence, then they won’t act. If the govt a generation ago had told you that you will henceforth carry a tracking device so we can where you are at any time, there would have been an uproar. But we did it voluntarily [holding up a mobile phone]. The cell tower has to know where you are, but I’d like to find a way to spoof everything else for everyone else. (You should assume your email is being read on your employer’s server, Dan says.)
Q: I worry about creating a privacy of the elite that only a small segment can access. That creates a dangerous scenario. Should there be govt regulations to make sure we’re all operating with the same levels of privacy?
A: It’s an important point. The govt rules won’t be the ones you want. We need to create a market-based solutions. Markets work better than advice or edicts.
Q: But hasn’t the market spoken, and it’s the iPhone?
A: The iPhone has important security features. But people aren’t scared enough to create a market.
A: The ACLU should be advised on how to create pamphlets that will reach people.
A: So much of hacker culture and open source culture are based on things being difficult. Many of the privacy tools work but are too hard to use. There is a distinct lack of design, and we don’t see poorly designed things as legitimate. And that’s a fairly easy thing to fix. A: Yes.
Q: Younger people don’t seem to care about privacy. Is there a generational shift?
A: There are two possibilities for the future. My hope is that we’ll all start cutting each other more slack; everyone will recognize that we all did unbelievably stupid, even possibly criminal things, in our 20s. I still do plenty of stupid things. But it worries me that cultures sometimes grow less tolerant. This could be catastrophic, if the country goes toward the Right.
A: There are tools to make it easy to do this. E.g., CryptoParty.org, the Pirate Party. And are there alternatives to social media that are ready for prime time?
A: Still pretty geeky, but it’s a wonderful start. But many of the tools cost money.
Q: Any thoughts about ways to use govt and corporate interests to promote your goals. E.g., protect the children.
A: I’ll rename this Protect the Children and then everyone will do what I want :) Overall, the problem is that power is shifting, pulling back into the center. This has long term negative consequences. But speculating on what the consequences will be is never as effective as showing what’s going wrong now. I want the power to be distributed. “I’m pretty worried, although I’m a relentless optimist.” “I’m a resister.”
May 20, 2012
Yesterday Disk Utility told me to restart my Mac from a boot disk and run the disk repair function (= Disk Utility). Fine. Except I was unable to boot from any of my three Mac boot disks (including the original) whether they were in my laptop’s SuperDrive (= Apple’s plain old DVD drive) or in a USB-connected DVD drive. The system would notice the DVD when asked to look for boot devices (= hold down the Option key when starting up), but froze after I clicked on the DVD (= no change in the screen after 30 mins).
So, what the hell, I installed Lion, which I had been hoping to avoid (= my pathetic resistance to Apple’s creeping Big Brotherism). Thanks to the generosity of Guillaume Gète, I downloaded Lion DiskMaker, followed the simple instructions (= re-downloaded Lion, all part of Apple’s makings things hard by making them easy program), and now have a Lion boot disk. I was able to boot from it and fix my hard drive.
The whole episode was so reminiscent of why I left Windows (= Windows 7 looks pretty good these days).
June 9, 2011
This MG Siegler TechCrunch article really clarified Apple’s strategy for me. It makes much more sense here than I was getting from the coverage of Job’s talk. For example, it let me see the connection between the new Lion auto-incremental-save feature (which sounds incredibly useful on its own — I currently use ForeverSave to accomplish much the same) and iCloud: your applications will save invisibly, and will save to an invisible place.
Google’s mental model makes more sense to me: You should understand that you are saving your stuff to somewhere, rather than just have the confidence that they will show up on whatever set of devices you’re using. But my mental models for computing were formed back when computers were computers, not slates of glass that directly respond to the movement of your fingers as if the glass was skin. For those who think of laptops as iPads with non-removable keyboards, Apple’s strategy makes more sense. And the iPad generation is going to win simply by being smart enough to have been born later than me and my laptop buddies.
August 12, 2009
Jason Calacanis has an excellent post making the case against Apple, from an Apple fan’s point of view. I’m basically with him.
Doc Searls has long said that the key to understanding Steve Jobs — and thus to understanding Apple — is that Job’s an artist. We understand when an artist wants to maintain complete, obsessive control over his creations, especially when they are as beautiful as some Apple products are. But it’s not just artistry at work at Apple. Apple tends towards totalitarianism.
You can see why in its computer architectures: Its products work because they’re relatively closed systems that run tightly controlled hardware, unlike Microsoft’s operating system that has to be able to work on just about every piece of hardware that comes along. And Apple’s stuff generally works beautifully. (I switched from Windows to the Mac about three years ago.) But the hardwired connection between the iPod and iTunes — only recently loosened — is there not to benefit users, but to meet the DRM needs of recording companies and to tether users to Apple. The hardwired connection between the iPhone and the App Store represents a disturbing direction for the industry, in which Apple acts in loco parentis to protect users from their own software decisions, and (apparently) to exclude products they believe hurt the business interests of their partners. The App Store’s success makes it particularly threatening; it’s easy to imagine Apple’s rumored tablet adopting the same strategy, then other companies following suit.
It’s not an unmixed picture, of course. The removal of the egregious DRM from iTunes is a step forward, and seems to have been a step Apple eagerly took, and the movement of the Mac’s OS onto Unix added admirable transparency. Plus, Apple makes some beautiful stuff that works beautifully.
I just wish that going forward, I felt more confident that Apple is on our side, not just as customers but as digital citizens.
May 23, 2009
Here’s a future I fear:
Apple comes out with the iBook, a netbook that’s also perfectly designed as an e-book. It’s a Kindle-killer because it’s an actual computer, as well as being way cool in the way of things Apple.
Apple extends its App Store approach to this seemingly semi-special purpose device: The only apps you can get have to come through Apple.
The Apple iBook becomes a huge success. It is the future of reading the way the iPod is the future (well, the present) of listening.
The iBook replaces many laptops. It becomes the primary computer for many people.
Thus we go from generativity to locked down computers.
March 29, 2008
For those who are keeping track (= me), the new new motherboard on my MacBook has not prevented the same old problems from recurring. I still am getting random app crashes, most well-behaved by an occasional crash to blue. (Actually, only Keynote crashes to blue.)
I’m feeling pretty certain that we’ve eliminated the mobo as the source of the problem. Since these same problems have occurred in two separate operating systems, including through a clean install of the second one, I don’t think it’s an OS thing. Since they’ve persisted through the creation of a clean user account, I don’t think it’s a software thing. Because the RAM has passed repeated testing by me and by the service professionals, I don’t think it’s a RAM problem.
I am therefore taking it personally.
January 20, 2008
Item #1
A cyberlawyer named Eric Menhart has trademarked “cyberlaw,” according to slashdot.
In response, the Berkman Center for Internet & Society at Harvard Law is changing its address from cyber.law.harvard.edu to eric.menhart.harvard.edu, will rename its annual conference to the EricMenhart conference, and is petitioning Google to do a search-and-replace on the 75,400 pages containing harvard berkman cyberlaw.
All your EricMenhartâ„¢ are belong to us.
[Legal notices: I don’t speak for the Berkman Center. And one of those jokes was Ethan Zuckerman‘s.]
Item #2
Inventors: Fadell; Anthony M.; (Portola Valley, CA)
Correspondence Name and Address:BEYER WEAVER LLP
P.O. BOX 70250
OAKLAND
CA
94612-0250
USAssignee Name and Adress: Apple Computer, Inc.
Serial No.: 485142
Series Code: 11
Filed: July 11, 2006Abstract
A processing system is described that includes a wireless communication interface that wirelessly communicates with one or more wireless client devices in the vicinity of an establishment. The wireless communication interface receives a remote order corresponding to an item selected by at least one of the wireless client devices. A local server computer located in proximity to the establishment generates instructions for processing the remote order received from the wireless communication interface. The local server computer then passes the processing instructions to an order processing queue in preparation for processing of the remote order.
Yes, Apple is patenting using a cellphone to order food.