Mac: Rien de Moof plus.
Justin's Linklog Posts
Open Source: A good entry at sourcefrog.net describing some reasons people are driven to use open source — the closed-source component library one, in particular, drives me nuts.
I’ve run into this in the past —
here’s an example I can point to. That’s a fixed version of Java
1.0’s java.util.StreamTokenizer
class, to fix a bug where space cannot
be treated as a special character. (Hopefully it’s now obsolete, seeing
as I wrote that 9 years ago!)
Note that I probably do not have permission to use and redistribute
that class. Also note that the bug fix I submitted to Java 1.0 probably
never made it into the code, because I was an individual user and not a
major corporate client. The bug may have been fixed independently,
however, given that StreamTokenizer
still exists, but I doubt my fix ever got near the dev team.
(However it still means I can say I fixed a bug in James Gosling’s code ;)
Invariably, getting access to source, and being allowed to fix bugs in it, is a key issue — and one that continually drives developers to open source/free software libraries. RMS has been saying this for years, of course.
Music: A massive selection of links to mp3 blogs. gabba > Pod looks very interesting… they even had a copy of Egyptian Empire’s Horn Track recently, one of my favourites.
Web: Plain text, transparently turned into nice markup, is an idea that’s clearly never going to go away.
Setext has been around for over a decade, I wrote EtText myself for use in WebMake and elsewhere (including this very weblog!), Zope came up with StructuredText, and more recently, there’s been Textile and reStructuredText. Now welcome the newest arrival: Markdown.
First impressions: looks an awful lot like EtText, TBH, but I’d presume that’s the shared heritage from Setext. ;)
My feedback: I’d recommend supporting ‘-‘ (dash) for list bullets — it turns out that’s a whole lot more widely supported than ‘*’ (asterisk), including in Vim. Also, automatic link inference is very handy; picking up http: URIs and turning email addrs into mailto: links may not look super-pretty, but saves a lot of typing, and EtText Auto links are pretty handy for stuff that’s never going to be anything other than a link (take uncommon nouns like ‘SlashDot‘, for example).
eVoting: Craig passes on this link: apparently thousands of Orange County voters were given the wrong ballots in last week’s election. The result is that in 21 precincts, there were more ballots cast than registered voters. It gets better — apparently the voting machine vendor has said it will be impossible to figure out how many ballots are invalid as a result. It’d be funny if it wasn’t such a big deal…
Ireland: Now that the IP Enforcement directive has passed, Irish readers might be interested to find out how their MEPs voted on it.
First off, the good ones:
- PATRICIA MCKENNA – GREEN PARTY MEP (DUBLIN) since 1994
- NUALA AHERN – GREEN PARTY MEP (LEINSTER) since 1994
Both of the Green MEPs voted along party lines on a key amendment, amendment 54, which would have limited enforcement to commercial-scale counterfeiting rather than individual infringement.
But on the other side, we have these, who voted for applicability of the directive to all ‘IPR’, according to FFII. The hall of shame:
- JOE McCARTIN – FINE GAEL MEP (CONNACHT/ULSTER) since 1979
- JOHN CUSHNAHAN – FINE GAEL MEP (MUNSTER) since 1989
- DANA ROSEMARY SCALLON – INDEPENDENT MEP (CONNACHT/ULSTER) since 1999
- NIALL ANDREWS – FIANNA FAIL MEP (DUBLIN) since 1984
- GERARD COLLINS – FIANNA FAIL MEP (MUNSTER) since 1994
- JIM FITZSIMONS – FIANNA FAIL MEP (LEINSTER) since 1984
- LIAM HYLAND – FIANNA FAIL MEP (LEINSTER) since 1994
Unsurprising to see the conservative FFers (and Dana!) in there — but what do FG think they’re doing?
Considering that FFII read this as permitting ‘surprise raids on teenagers in the middle of the night by private security firms on the flimsiest of evidence’, as passed, this is a ‘hall of shame’ issue.
The moral: vote Green!
EU: EU Reporter (PDF) thoroughly trashes the new law:
The legislation as structured is opposed by lawyers and judges, who have said that large corporations will be able to slap pre-emptive injunctions on small manufacturers and put them out of business without any fear of having to pay compensation if their action proves to be no more than to gain commercial advantage.
Music companies will get the right to demand raids merely on suspicion of a breach including on private homes.
WITHOUT PROOF factories could be closed, assets and bank accounts frozen by opportunist actions based on patents claims, Greg Perry, Director General of the Brussels-based European Generic Medicines Association told EU Reporter. …
Pressure from the current 15 Member States is being blamed by a large swathe of industry for rushing bad legislation into law. Surprisingly, one of Britain’s largest corporations has slammed both parliament and Council saying: ‘It will take many years to undo the damage that this legislation has the potential to do.’ Unsurprisingly the corporation, normally close to the British Government, refused to be named.
Security: Educated Guesswork forwards a great illustration of real-world security-measure subversion.
Public places with relatively unattended and un-secured toilet facilities, like train stations, have historically had a problem with intravenous drug users using the cubicles to inject. So about 10 years ago, some bright spark came up with the idea of lighting these places with ultraviolet lights, under which the blue blood in someone’s veins cannot be seen.
Apparently, this works — or at least worked until recently, when the IV drug users figured out an ingenious circumvention technique — highlight your veins beforehand using a UV marker. In normal lighting, the ink is invisible — but once in the UV-lit area, it shows up, apparently better than the veins show up under normal lighting anyway!
As EKR says: ‘remember, folks, your opponent will change his behavior to oppose you. That’s why he’s called your opponent.’
Health: An oldie from 1998. City Limits: 7 1/2 Days. An undercover investigative reporter gets incarcerated as a mental patient in Brooklyn — for a lot longer than he planned. Horrific.
Life: yesterday, I saw Mohammed Ali in the flesh. I was totally star-struck.
Ireland: Latest from the o2 Retail Kennedy Rd foneblog: the staff’s tattoos!
Architecture: For reasons which I won’t go into here, I wound up doing a Google Image Search for ‘toilet’ which turned up a link to this page: Toilets of the World. However, he’s missing one very important variety: the world-famous Goan ‘Hog Bog’.
Here’s a tasteful pic of an expectant pig waiting for lunch (local mirror) — and then, if your stomach can take it, a rather more graphic account here. (warning: not safe for lunch)
Ireland: Pledge to take a trip to Iceland. Daev says ‘pledge to visit Iceland as a tourist if they stop whaling’ — if he gets enough clicks on this campaign, he’ll get a trip on one of Greenpeace’s ships!
Security: SCO accidentally leaked their previous lawsuit plans — to sue Bank of America — through MS Word’s ability to retain prior changes in a Word document.
This seems as good a time as any to re-plug
find-hidden-word-text, a quick perl hack to use ‘antiword’
to extract hidden text from MS Word documents in an automated
fashion, based on
Simon Byers’ paper Scalable Exploitation of, and Responses to Information
Leakage Through Hidden Data in Published Documents. It works
well ;)
Safety: Great Malcolm Gladwell article on S.U.V.’s. My favourite bit:
when, in focus groups, industry marketers probed further, they heard things that left them rolling their eyes. …. what consumers said was ‘If the vehicle is up high, it’s easier to see if something is hiding underneath or lurking behind it.’
Bradsher brilliantly captures the mixture of bafflement and contempt that many auto executives feel toward the customers who buy their S.U.V.s. Fred J. Schaafsma, a top engineer for General Motors, says, ‘Sport-utility owners tend to be more like ‘I wonder how people view me,’ and are more willing to trade off flexibility or functionality to get that.’ According to Bradsher, internal industry market research concluded that S.U.V.s tend to be bought by people who are insecure, vain, self-centered, and self-absorbed, who are frequently nervous about their marriages, and who lack confidence in their driving skills.
… Toyota’s top marketing executive in the United States, Bradsher writes, loves to tell the story of how at a focus group in Los Angeles ‘an elegant woman in the group said that she needed her full-sized Lexus LX 470 to drive up over the curb and onto lawns to park at large parties in Beverly Hills.’
Social: Ted Leung: Google requires that its employees spend 20% of their working hours on ‘personal projects’. Wow.
Hardware: So IBM Thinkpads come with a predesktop area — a hidden 4GB partition of recovery files, Windows XP install disks, windows drivers, etc. taking up space on the hard disk.
I haven’t used Windows much at all on this machine, given that I don’t use Windows when I can avoid it, but I did pay several hundred dollars for it — since it’s now impossible once again to buy an IBM laptop without doing so (or without paying quite a lot extra). So I want to keep it around, and I want to make sure I can reinstall if things go wrong.
Having a hidden partition just isn’t quite safe enough for me — because I’ve had hard disks go belly-up before, or scribble on the partition table, or so on — these things happen. Thankfully it’s easy enough to get CD-ROMs shipped from IBM support if you ask nicely, so I did so yesterday afternoon at about 3pm.
This morning at 9am, there was a knock at the door, and I received a package shipped from Durham, NC containing the reinstall CDs.
It’s great dealing with professional hardware companies again ;)
Linux: wmctrl and Devil’s Pie — two nifty tools for window control. Both are command-line tools that use NetWM, a standard for X11 window managers, to hook into window manager policy and apply scriptable control to windows as they appear (in the Devil’s Pie case) or to pre-existing windows (in the wmctrl case).
I’ve just reverted back to sawfish from KWin recently, in order to get this control back; I probably wouldn’t have if I’d found these in time.
(In case you’re wondering why I reverted: specifically, sawfish allows the user to control window position very efficiently from the keyboard using corner.jl, and the KWin folks weren’t interested in a patch to do the same there. In addition, sawfish has wclass.jl , which allows windows to be controlled by name; it’s very handy to say ‘Show Mail’, and have xvoice de-iconify your mailreader in response. Both are killer features for rodent-free use of a UNIX desktop.)
Funny: Dr. Evil’s monologue about his childhood from the first Austin Powers movie. Sheer genius. ‘Sometimes he would accuse chestnuts of being lazy, the sort of general malaise that only the genius possess and the insane lament.’
Open Source: Tim Bray goes through a couple of open-source studies; first is the clueless ‘Where do you want to go, Aiden?’ essay I mentioned here a couple of days ago, but the second is a study from a couple of French economists I hadn’t heard of. I’ll just reproduce the translation:
Choosing software is not a neutral act. It must be done consciously; the debate over free and proprietary software can’t be limited to the differences in the applications’ features and ergonomics. To choose an operating system, or software, or network architecture is to choose a kind of society. We can no longer pretend that free and commercial software, or Internet standards and protocols, are just tools. We have to admit at least that they are political tools. After all, fire and the printing press are ‘just tools.’
Ireland: Some new Irish weblogs:
- The Invisible Acrobat — who is this mysterious acrobat? hmm! A Goon Show fan, I’d reckon.
- Eirepreneur
Spam: Kottke passes on news of the second coming — in spam:
It is now that blacklisting and filtering and blocking and Blocking of Port 25 and Blocking SMTP connections and filtering out email and anything related that does not allow any person in the United States of America to send email to anybody and then have opt-out or opt-in and that COMPLY with the CAN-SPAM Act of 2003 are doing something that is ILLEGAL and you are a CRIMINAL for doing this you have CRIMINAL LIABILITY and CIVIL LIABILITY and your company CANNOT protect you in the slightest. If your company asked you to murder somebody would you do this? Of course not for most. Then do NOT do illegal and criminal things now that are out side of the law and outside of Federal Law now with the passing of the CAN-SPAM Act of
- The corporate veil can be pierced and board members of the corporation and officers of the corporation and executives of the corporation and managers of the corporation and employees of the corporation that are involved in the slightest in the writing of or approval of or enforcement of Terms of Service or Policies or Procedures or Business Decisions or Business Practices or Zero Tolerance Policies that would or does interrupt or cancel or block or filter or blacklist or harass or defame the character of or slander Ted Jesus Christ GOD in the slightest from sending legal email now and into the future are COMMITTING A CRIME and have CIVIL LIABILITY also and can be pursued by the US Attorney and State Attorneys and District Attorneys and the FTC and also if doing certain things also the ATF and the FBI and more. If calling TJCG a SPAMMER and then BLACKLISTING or BLOCKING or FILTERING or putting into list or putting into any Product or Service anything related to stopping the emails of TJCG you are also committing DEFAMATION OF CHARACTER and LIBEL and SLANDER and damaging the good reputation of TJCG.
What, no divine retribution?
Networking: FOAF is really building steam now.
- LiveJournal is doing it
- Tribe.net itself is working on it
- Flickr also plan to support FOAF ‘once they’re stable’.
In the meantime, Tribe.net plans to announce RSS feeds and Jabber support this Friday.
It’s good to see some open-standards based stuff being used to compete. Given this, I think we might see more useful possibilities emerging as these sites become true web services.
eVoting: Are you an academic, or do you know any academics, working in the field
of computer science in Ireland? If so, you should consider signing, or
collecting signatures, on
this ICTE statement.
It’s eminently reasonable — ‘since computers are inherently subject to
programming and design error, equipment malfunction, and malicious
tampering, we join with (the ACM) in recommending that a voter-verified
audit trail be one of the essential requirements for deployment of new
voting systems.’ (thx for the pointer, Simon!)
Open Source: Clemens
Vasters: Where do you want to go, Aiden? Sadly, Clemens misses the
point dramatically.
Point one: I’ve worked on open-source and proprietary software. I still do. I work on them both simultaneously (or, at least, proprietary 9-5 and open-source outside work hours ;). I have a good few of the things you’re supposed to have ‘by the time you’re 30’.
It’s not an all-or-nothing thing; working on open source doesn’t mean retreating into a garrett and staying up all night. Nothing is black-and-white like that, and surely Clemens should be able to recognise that aspect of the real world by now. ;)
Point two: Open source work does found a career. It acts as a fantastic testament to your ability — especially if you’ve written good code or organised a team. I’d be much more happy to hire someone who had demonstrated that ability, over people who had no OS dev experience, if I was interviewing candidates in the day job. (In fact, I have in the past. ;)
For one thing, a tar.gz from Sourceforge is a lot easier to verify than some assertion that when you worked for some big company, you were Very Important and did Amazing Things, but sorry, they were all secret and proprietary so you have no proof.
Point three: ‘It doesn’t matter whether you love what you are doing and consider this the hobby you want to spend 110% of your time on: It’s exploitation by companies who are not at all interested in creating stuff. They want to use your stuff for free. That’s why they trick you into doing it.’
This is total FUD — pretty much just shouting ‘it’s an IBM conspiracy!’
For the record, I’ve never even talked to anyone from IBM about open source, as far as I know — aside from when I stood up once at a conference and attempt to ask an IBM manager about their crappy software patent policy and how it conflicted with their avowed support of open-source. (Obviously their payoff cheque was late that month ;)
More good comments on slashdot, believe it or not (with the threshold at 3, that is).
(finally, an aside: I suspect the guy’s name was ‘Aidan’ BTW.)
Linux: I’m really getting into KDE 3.2. I’ve been looking for a music player that is better at handling large collections of MP3s better than the venerable XMMS, without much luck:
iTunes is, of course, the ‘gold standard’, but is Mac/Windows only, so that’s not going to work on my Linux machine.
Rhythmbox is getting there as an iTunes clone, but right now is woefully incomplete. It fails to play lots of my music, has serious interface shortcomings — you can rate songs, but then there’s no way to use those ratings, and you cannot edit any of the tag metadata in the released version.
JuK is the new KDE music player app. Initially, I wrote it off — it uses the clunky interface of ‘one big list’, at first glance.
But after Rhythmbox managed to confuse itself sufficiently so that it would only open as a 3-pixel-high window (seriously!), I gave JuK another try. Summary: it kicks ass.
It turns out that the multi-pane ‘artists, albums, and tracks’ mode of iTunes and Rhythmbox isn’t actually necessary, since JuK improves on it using a very nifty dynamic ‘Tree View’ mode.
Another nice feature is the MusicBrainz integration; it has built-in support for querying MB’s servers to get correct tag data for your music. In fact, its tagging support is fantastic — this is unsurprising, as it looks like it started off as a tagging app.
Being a well-written KDE app, it exposes some nifty scripting support via DCOP, and a quick look-over with KDCOP reveals a nice set of APIs — for example, running dcop juk Player playingString tells me the name of the track and artist playing right now. I’m not sure if there’s a way to register for callbacks on events like ‘track change’ just yet, here’s hoping…
No sign of rating support just yet, though; my dream player would allow me to rate my tracks, and then make a dynamic playlist which selects tracks by rating, playing the top-rated ones more often and never playing the bottom-rated ones. Here’s hoping it’s in the pipeline ;)
All in all, though, it looks like I’ll be giving JuK a try.
Spam: filster: Linking reputations networks to email whitelists. Very interesting — a tool to use the social network data from Orkut, FOAFweb, Reputation Research Network, and CPAN to whitelist email senders in SpamAssassin. Only problems I can see:
- needs an anti-forging mechanism like SPF to avoid spammers forging their way through your whitelist — but the author does cover that.
- some of the site terms of service may prohibit scraping — Orkut’s, for example, is very strict.
Still, a very nifty idea, and one worth more investigation… the combination of FOAF and SPF in particular, given that tribe.net (if I recall correctly?) will be generating FOAF data, is quite cool.
Radio: Community Projects at Moertel Consulting: My new Radio VCR. That is so cool.
Interesting tidbits:
He records using Speex, the open-source speech-recording codec, in real-time. I wonder how well it’d work with a more music-oriented codec, like Ogg Vorbis. Bit-rate used is 16Kbps, which seems to be pretty reasonable according to the Speex folks.
The resulting output is 10 MB per hour. That works out as 1.4 years of radio time on one $95.00 hard disk, which strikes me as pretty excellent buffering room ;)
Next step: Retroactive Radio Recording.
However, I’m thinking a really nifty application of this would be a single drop-in Knoppix CD-ROM for radio stations to stream their output without paying up the big bucks to You Know Who and Those Other Guys.
Silly: The Moaning Goat Meter, by xiph.org — a load meter written in a proper programming language, and with an inexplicably spinning fish that stares at you.
* COMMODORE BASIC * 7167 BYTES FREE READY...
7k free. Hard to imagine these days; even my watch has more than that.
Insults: Tom takes issue with my assumption that ‘anyone not living in a hole would know that SpamAssassin includes a probabilistic classifier’. Hmm. OK, I should have made it clear I meant anyone following anti-spam filter development. Henceforth I’ll over-qualify every statement on this weblog accordingly.
But at least I know that badgers are CLEARLY down, since they do live in a hole. DO YOUR RESEARCH, FARRELL.
Green: There’s been a bit of chat on the intarweb recently about a new high-tech fuel source that avoids the fossil-fuel trap, namely thermal depolymerization. Here’s a couple of links that are relevant:
Sounds possibly useful although: (a) is there enough biomass produced to produce fuel in useful quantities, and (b) I bet it stinks downwind of that. ;)
Spam: the Caller-ID specs are now up on www.microsoft.com. Note patent license.
Funny:
Craigslist: wanted: web designer (why this phrase may get your ass beat)
. ‘sneakily trying to advertise for a web designer to make you a
porn site is weak. just say in your ad that you want to show naked
pictures of women fucking dogs so i can decide, before i apply, if i want
to see that sort of thing, and not AFTER you’ve sent me a mentally and
emotionally scarring photo of a maybe-blonde (it was hard to tell, at that
angle) and a great dane, and THEN ask me if i am comfortable with that
kind of content.’ (via swhackit!)
Spam:
Slashdot: This will fail because… Tick the boxes to produce
a generic slashdot comment on a new anti-spam proposal. Very funny.
So, regarding the Noise Reduction probabilistic-classification tokenizer tweak posted on Slashdot yesterday — it does look interesting; basically, it operates by monitoring the ‘noisiness’ of the token stream, and if the current probabilities for the tokens from the stream differs from what’s defined as acceptable for too long, it ‘dubs’ them out. In other words, it ignores those tokens until another sequence of ‘useful’ tokens is encountered. Plus I’m totally down with the Janine ref ;)
However, it’s disappointing to come across this in the DSPAM FAQ
list:
Why Should I use DSPAM Instead of SpamAssassin? —
a lovely selection of anti-perl and anti-SpamAssassin FUD, generally
overlooking SpamAssassin‘s training components (‘leaves the
end-user with no means of recourse or satisfaction when they receive a
spam’), and in general taking a combative tone. Is that really
necessary?
BTW, in case you’ve been living in a hole for the last year — SpamAssassin does include a probabilistic classifier, in the form of the BAYES rules. It’s easy to train, uses good tokenizing and combining algorithms to get high accuracy (although doesn’t yet do multi-word windowing until we’ve determined that that works acceptably for the db size increase), and, importantly, has been measured on corpora that are not my own mail.
A story: way back when, in June 2001, the SpamAssassin README boasted of it’s 99.94% accuracy rate. This was true — it was measured on my mail feed over the course of a couple of months. However, once measured on someone else’s mail, that dropped pretty quickly. Measuring a spam filter on the developer’s mail feed, (where presence of HTML is a killer spam-sign!), is a sure-fire way to get (a) great but (b) non-portable accuracy figures.
Code: Berkeley DB, the de-facto std for open-source high-performance database files on UNIX, is displaying some odd behaviour — it appears to be sleeping for 1 second inside the database library code, under load, for some versions of libdb. If you’re curious, there’s More info here.
eVoting: Lore Brand Comics on e-voting. (thanks, Ben!)
eVoting: Highly recommended — Adrian Colley’s Lies, Damn Lies, and Six Independent Consultancies. Adrian debunks in a very clear, step-by-step fashion, the spin being produced by Ireland’s government on the e-voting furore. If you’re following the issue, don’t miss this page.
Work: Life Hacks: Tech Secrets of Overprolific Alpha Geeks, Danny O’Brien’s ETech talk.
Amazingly, despite not being an alpha geek ;), I already use all these things:
- a todo.txt file (anything else is inconvenient).
- everything incoming comes through email, including RSS (thanks to rss2email). Again, anything else is inconvenient; I couldn’t be bothered with another desktop app.
- I hack scripts for every repetitive task I run into
- I sync instead of backup; everything has a CVS repository running on a remote server, even my home dir
- I have a nasty tendency to web-scrape data
These tips definitely are good advice. Although I have a feeling the result is optimised to a weblogging UNIX geek who spends hours hacking perl/python scripts. ;)
I’m looking forward to LifeHacks.com when it does eventually go live… should be interesting.
Net: Great NYTimes article interviewing Bram Cohen about BitTorrent (u: sitescooper p: sitescooper). Good to see that it landed him a job with Valve, but let’s hope that’s not the last piece of free software from Bram…
One of the best things about the article, BTW, is that it does take notice that BT isn’t a tool for piracy. Refreshing, given how these things are often covered.
Web: More on the Firefox crappy-movie-now-web-browser thing, from Chris Blizzard:
- A mind-controlled UI: but it only works if you think in russian!
- Flashback mode: whenever you hear a helicopter overhead the browser will
- redirect all page loads to web.archive.org, circa 5 years ago.
- Stealth mode: using specially malformed headers, Firefox will load your web pages and web servers will be unable to log your vists.
- Mach 6 Technology: advanced compression algorithms will make the web faster than it’s ever been before!
- Arctic compliant: you can land firefox on an ice floe in the middle of the north atlantic. Not sure why you would need this, but hey, we had some extra bandwith.
Linux: Doing my backups — it’s a good feeling to know your data will (probably) be safe if your computer suddenly carks it.
This time around, I have way too much data to actually back up the lot — so I’m being selective. Filelight is very helpful here; I can see exactly where my disk space is going, spot tmp files that I should have cleared up long ago, and so on.
One thing is clear — I have too many MP3s. How am I supposed to listen to all of those?
Web: Donncha notes that Mozilla Firebird has been renamed ‘Firefox’. Retro cruddy 80’s Cold War movie reference? check!
I like it. In fact, I’m looking forward to Linux kernel 2.6.2 ‘Red Dawn’.
BTW, my current favourite Firebird^H^H^H^Hfox extension: Session Saver. Load and save the current list of open tabs, and have them automatically saved when you quit the browser. Given that I often have a few tabs on stuff I’m researching, leaving them until I’m a bit less busy (which can take days!), this fits perfectly with my modus operandi.
Funny: This is GREAT!
And if that’s too much product placement for you, there’s Students for an Orwellian Society: ‘Because 2004 is 20 years too late.’
eVoting: One of the desired features for new voting mechanisms is that they will increase voter ‘turnout’, encouraging people to vote who are too busy (or too unmotivated) to visit a polling station.
This has been used to suggest internet voting (see the fiasco that was the now-scrapped SERVE project) and voting-by-phone. Both offer a scary number of vote-fixing opportunities and possible failure modes, and are fundamentally a bad idea.
However, it turns out there is a great system to implement absentee voting securely, reliably, conveniently (for the voter) and even cheaply! A comment on Bruce Schneier’s Crypto-Gram newsletter (scroll down to comment number 3) details this.
I’ve copied the entire mail here, since it’s hard to link to in the other location, and is well worth a page to itself:
From: Fred HeutteThanks for your cogent thoughts on ballot security. I almost completely agree and was one of the first signers of David Dill’s petition. I am also involved professionally in voter data — from the campaign side, with voter files, not directly with voting equipment — but we’re close enough to the vote counting process to see how it actually works.
I would only disagree slightly in one area. Absentee voting is quite secure when looking at the overall approach and assessing the risks in every part of the process. As long as reasonable precautions like signature checking are done, it would be difficult and expensive to change the results of mail voting significantly.
For example, in Oregon, ballots are returned in an inside security envelope which is sealed by the voter. The outside envelope has a signature area on the back side. This is compared to the voter’s signature on file at the elections office. The larger counties actually do a digitized comparison, and back that up with a manual comparison with a stratified random sample (to validate machine results on an ongoing basis), as well as a final determination for any questionable matches.
Certainly it is possible to forge a signature. However, this authentication process would greatly raise the cost of forged mail ballots, absent consent of the voter. In turn, interference or coercion with absentee voting would require much higher travel costs (at least) than doing so at a polling place, for a given change in the outcome.
It is true that precincts have poll watchers, and absentee voters do not. But consider this. Ballot boxes, which are often delivered by temporary poll workers from the precinct to the elections office, are occasionally stolen, but mail ballots are handled within a vast stream of other mail by employees with paychecks and pensions at stake. The relatively low level of mail fraud inside the postal system is a testament to its relative security, and the points where ballots are aggregated for delivery to the elections office are usually on public property and can also be watched by outside observers if need be.
Oregon has had some elections with 100% ‘vote by mail’ since 1996, and all elections since 1999. So far, no verifiable evidence of voter fraud has emerged, despite many checks and some predictions by those with a political axe to grind that we would be engulfed in a wave of election fixing.
The reality is that Oregon’s system, which is based on some common-sense security principles, has proven to be robust. The one lingering problem has been the need of some counties to make their voters use punch cards at home because of their antiquated vote counting equipment. But while this is a vote integrity issue — since state statistics show a much higher undervote and spoiled ballot total for punch cards as compared to mark-sense ballots — it is not a security issue per se. And with Help America Vote Act (HAVA) funding to convert to more modern vote counting systems, the Oregon chad remains in only one county and will go extinct after 2004.
The mark-sense (‘fill in the ovals’) ballots we have work well, and have low rates of over-votes and under-votes, despite the lack of automated machine checking that is possible in well-designed precinct voting systems. This suggests that reasonable visual design and human-friendly paper and pencil/pen home voting is a very reliable and secure system. When aided by automated counting equipment, we even have the additional benefit of very fast initial counts.
The increase in voter participation in Oregon since the advent of vote-by-mail — 10 to 30 percentage points above national averages, depending on the kind of election — leads to the only other issue, which is slow machine counts on election night after the polls close due to the surge of late ballots received at drop-off locations around the state. Oregon in fact isn’t really ‘vote by mail,’ it’s vote-at-home, with a paper ballot that can be mailed or left at any official drop-off point in the state, including county election offices, many schools and libraries, malls, town squares, etc.
The great advantage of the Oregon system is that it relies on the principle that if you appeal to the best instincts of the citizen, the overwhelming majority will ‘do our part’ to ensure the integrity of the democratic voting process, whether it is full consideration of the candidates and issues before voting, watching to make sure all ballots are securely transferred and counted, or favoring those laws and policies that insure that everyone eligible can vote, that their votes are counted, and that the candidates and measures with the most votes win.
The system is also cheaper than running traditional precinct elections. What’s not to like?
It’s so simple, and so sensible. Next time someone suggests ‘i-voting’ or ‘m-voting’ or whatever, you know what to point to…
Web: I watched a hilarious Rob Corddry segment from The Daily Show last night, repeated from earlier in the week. Having not seen The Daily Show in a while, since dropping everything but basic cable, I went looking through The Daily Show video archives to see if I could find a few more good ones — with no luck.
Every link on the Video page links to something like this:
javascript:openMediaPop(‘/multimedia/tds/cord/cord_8065.html’,”,’SRM’,’high’);
Which opens a popup with this page. Now, the
interesting thing is that I do have Real Player installed — but for
some reason, Firebird hasn’t figured this out. If I could just get
through the twisty-turny maze of Javascript ‘detection’ code, I could get
the URL for the .ram
file directly from the server and play it.
So this is where my idea for a new extension comes in. It should do this:
- intercept Javascript calls to
navigator.userAgent
,navigator.plugins
et al, and allow the user to select what plugins to report; - add a context (right-click) menu item to list the URIs used in
data
attributes ofobject
tags, and allow those to be cut and pasted — or launched in any helper apps registered for that filename extension. Alternatively, it could just replace the object with a link to open that file in the helper app.
The first allows the user to choose what plugins to report are installed, and navigate their way past broken ‘detection’ scripts like Comedy Central’s and The BBC Radio Player’s.
The second then allows the user to get hold of the URL for future use, or pop it up in an external viewer.
Funny: The Beeb reports that ‘Baywatch star David Hasselhoff is griping that his role in reuniting East and West Germany has been overlooked.’
Speaking to Germany’s TV Spielfilm magazine, the 51-year-old carped about how his pivotal role in harmonising relations between the two sides of the divide had been overlooked.
‘I find it a bit sad that there is no photo of me hanging on the walls in the Berlin Museum at Checkpoint Charlie,’ he told the magazine.