Skip to content

Justin's Linklog Posts

Closed-Source Runtimes

Open Source: A good entry at sourcefrog.net describing some reasons people are driven to use open source — the closed-source component library one, in particular, drives me nuts.

I’ve run into this in the past — here’s an example I can point to. That’s a fixed version of Java 1.0’s java.util.StreamTokenizer class, to fix a bug where space cannot be treated as a special character. (Hopefully it’s now obsolete, seeing as I wrote that 9 years ago!)

Note that I probably do not have permission to use and redistribute that class. Also note that the bug fix I submitted to Java 1.0 probably never made it into the code, because I was an individual user and not a major corporate client. The bug may have been fixed independently, however, given that StreamTokenizer still exists, but I doubt my fix ever got near the dev team. (However it still means I can say I fixed a bug in James Gosling’s code ;)

Invariably, getting access to source, and being allowed to fix bugs in it, is a key issue — and one that continually drives developers to open source/free software libraries. RMS has been saying this for years, of course.

Music: A massive selection of links to mp3 blogs. gabba > Pod looks very interesting… they even had a copy of Egyptian Empire’s Horn Track recently, one of my favourites.

Markdown: another ‘Plain Text to HTML’ lib

Web: Plain text, transparently turned into nice markup, is an idea that’s clearly never going to go away.

Setext has been around for over a decade, I wrote EtText myself for use in WebMake and elsewhere (including this very weblog!), Zope came up with StructuredText, and more recently, there’s been Textile and reStructuredText. Now welcome the newest arrival: Markdown.

First impressions: looks an awful lot like EtText, TBH, but I’d presume that’s the shared heritage from Setext. ;)

My feedback: I’d recommend supporting ‘-‘ (dash) for list bullets — it turns out that’s a whole lot more widely supported than ‘*’ (asterisk), including in Vim. Also, automatic link inference is very handy; picking up http: URIs and turning email addrs into mailto: links may not look super-pretty, but saves a lot of typing, and EtText Auto links are pretty handy for stuff that’s never going to be anything other than a link (take uncommon nouns like ‘SlashDot‘, for example).

Irish MEPs and their votes on IP Enforcement

Ireland: Now that the IP Enforcement directive has passed, Irish readers might be interested to find out how their MEPs voted on it.

First off, the good ones:

  • PATRICIA MCKENNA – GREEN PARTY MEP (DUBLIN) since 1994
  • NUALA AHERN – GREEN PARTY MEP (LEINSTER) since 1994

Both of the Green MEPs voted along party lines on a key amendment, amendment 54, which would have limited enforcement to commercial-scale counterfeiting rather than individual infringement.

But on the other side, we have these, who voted for applicability of the directive to all ‘IPR’, according to FFII. The hall of shame:

  • JOE McCARTIN – FINE GAEL MEP (CONNACHT/ULSTER) since 1979
  • JOHN CUSHNAHAN – FINE GAEL MEP (MUNSTER) since 1989
  • DANA ROSEMARY SCALLON – INDEPENDENT MEP (CONNACHT/ULSTER) since 1999
  • NIALL ANDREWS – FIANNA FAIL MEP (DUBLIN) since 1984
  • GERARD COLLINS – FIANNA FAIL MEP (MUNSTER) since 1994
  • JIM FITZSIMONS – FIANNA FAIL MEP (LEINSTER) since 1984
  • LIAM HYLAND – FIANNA FAIL MEP (LEINSTER) since 1994

Unsurprising to see the conservative FFers (and Dana!) in there — but what do FG think they’re doing?

Considering that FFII read this as permitting ‘surprise raids on teenagers in the middle of the night by private security firms on the flimsiest of evidence’, as passed, this is a ‘hall of shame’ issue.

The moral: vote Green!

More on the new EU IP Enforcement Directive

EU: EU Reporter (PDF) thoroughly trashes the new law:

The legislation as structured is opposed by lawyers and judges, who have said that large corporations will be able to slap pre-emptive injunctions on small manufacturers and put them out of business without any fear of having to pay compensation if their action proves to be no more than to gain commercial advantage.

Music companies will get the right to demand raids merely on suspicion of a breach including on private homes.

WITHOUT PROOF factories could be closed, assets and bank accounts frozen by opportunist actions based on patents claims, Greg Perry, Director General of the Brussels-based European Generic Medicines Association told EU Reporter. …

Pressure from the current 15 Member States is being blamed by a large swathe of industry for rushing bad legislation into law. Surprisingly, one of Britain’s largest corporations has slammed both parliament and Council saying: ‘It will take many years to undo the damage that this legislation has the potential to do.’ Unsurprisingly the corporation, normally close to the British Government, refused to be named.

‘Group Coca-Cola Schemes’, and the EU IP Enforcement Directive passes

Ireland: Bad news from home.

A truly ground-breaking concept, the ‘Group Broadband Scheme’, has been watered down into a shadow of what it could be with a requirement that all community internet access schemes be operated in association with ‘an Internet Service Provider or Authorised Operator’.

In other words, rather than a radical new way to provide affordable non-profit, community-owned high-speed internet access in rural areas, it’s just business as usual:

‘With the launch of the 1st Call for Group Broadband Scheme proposals, it is clear the Minister intends to require that any application for funding under the group broadband scheme initiative be made in association with an Internet Service Provider (ISP) or Authorised Operator (AO)’, said (Ireland Offline) chairman Christian Cooke, ‘a so-called Broadband Internet Service Provider (BISP)’. …..

Experience in the UK has shown that the commercial provision of broadband in rural areas is not financially viable. Low population and wide dispersal lead to lower margins than can be supported by a profit-oriented enterprise. ….

Ireland Offline warned that the prerequisite of partnering with a BISP as a condition of GBS funding, there is a very real danger of companies cherry-picking more lucrative areas, leaving communities for which the funding should have been made available … without any services.

‘In short, in its current form, the group broadband scheme initiative bears no resemblance to the group water schemes, to rural broadband provision’, said Cooke, ‘and every resemblance to the packaging of subsidized local monopolistic franchises, monopolistic because no competitor could go head-to-head with a subsidized service. It is therefore better to think of them as not so much like group water schemes as ‘group coca-cola schemes’.’

IrelandOffline press release here.

In other EU news — the EU Parliament has approved the IP Enforcement Directive. The Greens report:

  • Patents are included within the scope of the directive.
  • only 3 parts of the directive are limited to ‘commercial scale’. This means that the provisions of Articles 7(1), 8 and 9 can potentially be used against consumers. In the US this kind of legislation has been used to target, amongst others, children and their parents for downloading music.
  • there are concerns amongst ISPs that they can be attacked for ‘providing’ the means to download content which is protected by copyright.

James Heald: ‘Exactly what will now happen, and exactly what surprises it may lead to, will now depend on the different details of how the directive is now implemented from member country to member country across Europe.’

Back to the drawing board, pt XVII

Security: Educated Guesswork forwards a great illustration of real-world security-measure subversion.

Public places with relatively unattended and un-secured toilet facilities, like train stations, have historically had a problem with intravenous drug users using the cubicles to inject. So about 10 years ago, some bright spark came up with the idea of lighting these places with ultraviolet lights, under which the blue blood in someone’s veins cannot be seen.

Apparently, this works — or at least worked until recently, when the IV drug users figured out an ingenious circumvention technique — highlight your veins beforehand using a UV marker. In normal lighting, the ink is invisible — but once in the UV-lit area, it shows up, apparently better than the veins show up under normal lighting anyway!

As EKR says: ‘remember, folks, your opponent will change his behavior to oppose you. That’s why he’s called your opponent.’

Health: An oldie from 1998. City Limits: 7 1/2 Days. An undercover investigative reporter gets incarcerated as a mental patient in Brooklyn — for a lot longer than he planned. Horrific.

Life: yesterday, I saw Mohammed Ali in the flesh. I was totally star-struck.

Sharing With Social Networks

Social: Next-Generation File Sharing with Social Networks. One thing — the central server is not actually required, as WASTE showed. Otherwise good stuff…

I have a feeling that whatever clients are built to implement social-network-based sharing will need a way to deal with a user being a member of multiple indepedent networks, where Network A has a policy that would not permit Network B’s users to connect, but User X is a member of both.

MS Word’s change history feature strikes again

Security: SCO accidentally leaked their previous lawsuit plans — to sue Bank of America — through MS Word’s ability to retain prior changes in a Word document.

This seems as good a time as any to re-plug
find-hidden-word-text, a quick perl hack to use ‘antiword’ to extract hidden text from MS Word documents in an automated fashion, based on Simon Byers’ paper Scalable Exploitation of, and Responses to Information Leakage Through Hidden Data in Published Documents. It works well ;)

Safety: Great Malcolm Gladwell article on S.U.V.’s. My favourite bit:

when, in focus groups, industry marketers probed further, they heard things that left them rolling their eyes. …. what consumers said was ‘If the vehicle is up high, it’s easier to see if something is hiding underneath or lurking behind it.’

Bradsher brilliantly captures the mixture of bafflement and contempt that many auto executives feel toward the customers who buy their S.U.V.s. Fred J. Schaafsma, a top engineer for General Motors, says, ‘Sport-utility owners tend to be more like ‘I wonder how people view me,’ and are more willing to trade off flexibility or functionality to get that.’ According to Bradsher, internal industry market research concluded that S.U.V.s tend to be bought by people who are insecure, vain, self-centered, and self-absorbed, who are frequently nervous about their marriages, and who lack confidence in their driving skills.

… Toyota’s top marketing executive in the United States, Bradsher writes, loves to tell the story of how at a focus group in Los Angeles ‘an elegant woman in the group said that she needed her full-sized Lexus LX 470 to drive up over the curb and onto lawns to park at large parties in Beverly Hills.’

Social: Ted Leung: Google requires that its employees spend 20% of their working hours on ‘personal projects’. Wow.

IBM Service Rocks

Hardware: So IBM Thinkpads come with a predesktop area — a hidden 4GB partition of recovery files, Windows XP install disks, windows drivers, etc. taking up space on the hard disk.

I haven’t used Windows much at all on this machine, given that I don’t use Windows when I can avoid it, but I did pay several hundred dollars for it — since it’s now impossible once again to buy an IBM laptop without doing so (or without paying quite a lot extra). So I want to keep it around, and I want to make sure I can reinstall if things go wrong.

Having a hidden partition just isn’t quite safe enough for me — because I’ve had hard disks go belly-up before, or scribble on the partition table, or so on — these things happen. Thankfully it’s easy enough to get CD-ROMs shipped from IBM support if you ask nicely, so I did so yesterday afternoon at about 3pm.

This morning at 9am, there was a knock at the door, and I received a package shipped from Durham, NC containing the reinstall CDs.

It’s great dealing with professional hardware companies again ;)

X11 Window Managers, and Dr. Evil

Linux: wmctrl and Devil’s Pie — two nifty tools for window control. Both are command-line tools that use NetWM, a standard for X11 window managers, to hook into window manager policy and apply scriptable control to windows as they appear (in the Devil’s Pie case) or to pre-existing windows (in the wmctrl case).

I’ve just reverted back to sawfish from KWin recently, in order to get this control back; I probably wouldn’t have if I’d found these in time.

(In case you’re wondering why I reverted: specifically, sawfish allows the user to control window position very efficiently from the keyboard using corner.jl, and the KWin folks weren’t interested in a patch to do the same there. In addition, sawfish has wclass.jl , which allows windows to be controlled by name; it’s very handy to say ‘Show Mail’, and have xvoice de-iconify your mailreader in response. Both are killer features for rodent-free use of a UNIX desktop.)

Funny: Dr. Evil’s monologue about his childhood from the first Austin Powers movie. Sheer genius. ‘Sometimes he would accuse chestnuts of being lazy, the sort of general malaise that only the genius possess and the insane lament.’

Open Source: Tim Bray goes through a couple of open-source studies; first is the clueless ‘Where do you want to go, Aiden?’ essay I mentioned here a couple of days ago, but the second is a study from a couple of French economists I hadn’t heard of. I’ll just reproduce the translation:

Choosing software is not a neutral act. It must be done consciously; the debate over free and proprietary software can’t be limited to the differences in the applications’ features and ergonomics. To choose an operating system, or software, or network architecture is to choose a kind of society. We can no longer pretend that free and commercial software, or Internet standards and protocols, are just tools. We have to admit at least that they are political tools. After all, fire and the printing press are ‘just tools.’

Ireland: Some new Irish weblogs:

Ted Jesus Christ GOD

Spam: Kottke passes on news of the second coming — in spam:

It is now that blacklisting and filtering and blocking and Blocking of Port 25 and Blocking SMTP connections and filtering out email and anything related that does not allow any person in the United States of America to send email to anybody and then have opt-out or opt-in and that COMPLY with the CAN-SPAM Act of 2003 are doing something that is ILLEGAL and you are a CRIMINAL for doing this you have CRIMINAL LIABILITY and CIVIL LIABILITY and your company CANNOT protect you in the slightest. If your company asked you to murder somebody would you do this? Of course not for most. Then do NOT do illegal and criminal things now that are out side of the law and outside of Federal Law now with the passing of the CAN-SPAM Act of
  1. The corporate veil can be pierced and board members of the corporation and officers of the corporation and executives of the corporation and managers of the corporation and employees of the corporation that are involved in the slightest in the writing of or approval of or enforcement of Terms of Service or Policies or Procedures or Business Decisions or Business Practices or Zero Tolerance Policies that would or does interrupt or cancel or block or filter or blacklist or harass or defame the character of or slander Ted Jesus Christ GOD in the slightest from sending legal email now and into the future are COMMITTING A CRIME and have CIVIL LIABILITY also and can be pursued by the US Attorney and State Attorneys and District Attorneys and the FTC and also if doing certain things also the ATF and the FBI and more. If calling TJCG a SPAMMER and then BLACKLISTING or BLOCKING or FILTERING or putting into list or putting into any Product or Service anything related to stopping the emails of TJCG you are also committing DEFAMATION OF CHARACTER and LIBEL and SLANDER and damaging the good reputation of TJCG.

What, no divine retribution?

E-Voting in Ireland: signatures needed!

eVoting: Are you an academic, or do you know any academics, working in the field of computer science in Ireland? If so, you should consider signing, or collecting signatures, on
this ICTE statement. It’s eminently reasonable — ‘since computers are inherently subject to programming and design error, equipment malfunction, and malicious tampering, we join with (the ACM) in recommending that a voter-verified audit trail be one of the essential requirements for deployment of new voting systems.’ (thx for the pointer, Simon!)

Clemens Vasters’ ‘Letter to Aiden’

Open Source: Clemens Vasters: Where do you want to go, Aiden? Sadly, Clemens misses the
point dramatically.

Point one: I’ve worked on open-source and proprietary software. I still do. I work on them both simultaneously (or, at least, proprietary 9-5 and open-source outside work hours ;). I have a good few of the things you’re supposed to have ‘by the time you’re 30’.

It’s not an all-or-nothing thing; working on open source doesn’t mean retreating into a garrett and staying up all night. Nothing is black-and-white like that, and surely Clemens should be able to recognise that aspect of the real world by now. ;)

Point two: Open source work does found a career. It acts as a fantastic testament to your ability — especially if you’ve written good code or organised a team. I’d be much more happy to hire someone who had demonstrated that ability, over people who had no OS dev experience, if I was interviewing candidates in the day job. (In fact, I have in the past. ;)

For one thing, a tar.gz from Sourceforge is a lot easier to verify than some assertion that when you worked for some big company, you were Very Important and did Amazing Things, but sorry, they were all secret and proprietary so you have no proof.

Point three: ‘It doesn’t matter whether you love what you are doing and consider this the hobby you want to spend 110% of your time on: It’s exploitation by companies who are not at all interested in creating stuff. They want to use your stuff for free. That’s why they trick you into doing it.’

This is total FUD — pretty much just shouting ‘it’s an IBM conspiracy!’

For the record, I’ve never even talked to anyone from IBM about open source, as far as I know — aside from when I stood up once at a conference and attempt to ask an IBM manager about their crappy software patent policy and how it conflicted with their avowed support of open-source. (Obviously their payoff cheque was late that month ;)

More good comments on slashdot, believe it or not (with the threshold at 3, that is).

(finally, an aside: I suspect the guy’s name was ‘Aidan’ BTW.)

Getting into KDE 3.2

Linux: I’m really getting into KDE 3.2. I’ve been looking for a music player that is better at handling large collections of MP3s better than the venerable XMMS, without much luck:

iTunes is, of course, the ‘gold standard’, but is Mac/Windows only, so that’s not going to work on my Linux machine.

Rhythmbox is getting there as an iTunes clone, but right now is woefully incomplete. It fails to play lots of my music, has serious interface shortcomings — you can rate songs, but then there’s no way to use those ratings, and you cannot edit any of the tag metadata in the released version.

JuK is the new KDE music player app. Initially, I wrote it off — it uses the clunky interface of ‘one big list’, at first glance.

But after Rhythmbox managed to confuse itself sufficiently so that it would only open as a 3-pixel-high window (seriously!), I gave JuK another try. Summary: it kicks ass.

It turns out that the multi-pane ‘artists, albums, and tracks’ mode of iTunes and Rhythmbox isn’t actually necessary, since JuK improves on it using a very nifty dynamic ‘Tree View’ mode.

Another nice feature is the MusicBrainz integration; it has built-in support for querying MB’s servers to get correct tag data for your music. In fact, its tagging support is fantastic — this is unsurprising, as it looks like it started off as a tagging app.

Being a well-written KDE app, it exposes some nifty scripting support via DCOP, and a quick look-over with KDCOP reveals a nice set of APIs — for example, running dcop juk Player playingString tells me the name of the track and artist playing right now. I’m not sure if there’s a way to register for callbacks on events like ‘track change’ just yet, here’s hoping…

No sign of rating support just yet, though; my dream player would allow me to rate my tracks, and then make a dynamic playlist which selects tracks by rating, playing the top-rated ones more often and never playing the bottom-rated ones. Here’s hoping it’s in the pipeline ;)

All in all, though, it looks like I’ll be giving JuK a try.

Using social-networking services to filter spam

Spam: filster: Linking reputations networks to email whitelists. Very interesting — a tool to use the social network data from Orkut, FOAFweb, Reputation Research Network, and CPAN to whitelist email senders in SpamAssassin. Only problems I can see:

  • needs an anti-forging mechanism like SPF to avoid spammers forging their way through your whitelist — but the author does cover that.
  • some of the site terms of service may prohibit scraping — Orkut’s, for example, is very strict.

Still, a very nifty idea, and one worth more investigation… the combination of FOAF and SPF in particular, given that tribe.net (if I recall correctly?) will be generating FOAF data, is quite cool.

Radio Tivo

Radio: Community Projects at Moertel Consulting: My new Radio VCR. That is so cool.

Interesting tidbits:

He records using Speex, the open-source speech-recording codec, in real-time. I wonder how well it’d work with a more music-oriented codec, like Ogg Vorbis. Bit-rate used is 16Kbps, which seems to be pretty reasonable according to the Speex folks.

The resulting output is 10 MB per hour. That works out as 1.4 years of radio time on one $95.00 hard disk, which strikes me as pretty excellent buffering room ;)

Next step: Retroactive Radio Recording.

However, I’m thinking a really nifty application of this would be a single drop-in Knoppix CD-ROM for radio stations to stream their output without paying up the big bucks to You Know Who and Those Other Guys.

Silly: The Moaning Goat Meter, by xiph.org — a load meter written in a proper programming language, and with an inexplicably spinning fish that stares at you.

READY…

Jeff Minter reminisces:

  * COMMODORE BASIC *

  7167 BYTES FREE

  READY...

7k free. Hard to imagine these days; even my watch has more than that.

‘Goblin-fancier’?

Insults: Tom takes issue with my assumption that ‘anyone not living in a hole would know that SpamAssassin includes a probabilistic classifier’. Hmm. OK, I should have made it clear I meant anyone following anti-spam filter development. Henceforth I’ll over-qualify every statement on this weblog accordingly.

But at least I know that badgers are CLEARLY down, since they do live in a hole. DO YOUR RESEARCH, FARRELL.

Thermal Depolymerization

Green: There’s been a bit of chat on the intarweb recently about a new high-tech fuel source that avoids the fossil-fuel trap, namely thermal depolymerization. Here’s a couple of links that are relevant:

Sounds possibly useful although: (a) is there enough biomass produced to produce fuel in useful quantities, and (b) I bet it stinks downwind of that. ;)

Craigslist genius

Funny: Craigslist: wanted: web designer (why this phrase may get your ass beat)
. ‘sneakily trying to advertise for a web designer to make you a porn site is weak. just say in your ad that you want to show naked pictures of women fucking dogs so i can decide, before i apply, if i want to see that sort of thing, and not AFTER you’ve sent me a mentally and emotionally scarring photo of a maybe-blonde (it was hard to tell, at that angle) and a great dane, and THEN ask me if i am comfortable with that kind of content.’ (via swhackit!)

Slashdot Anti-FUSSP Form, and DSPAM’s FAQ

Spam: Slashdot: This will fail because… Tick the boxes to produce
a generic slashdot comment on a new anti-spam proposal. Very funny.

So, regarding the Noise Reduction probabilistic-classification tokenizer tweak posted on Slashdot yesterday — it does look interesting; basically, it operates by monitoring the ‘noisiness’ of the token stream, and if the current probabilities for the tokens from the stream differs from what’s defined as acceptable for too long, it ‘dubs’ them out. In other words, it ignores those tokens until another sequence of ‘useful’ tokens is encountered. Plus I’m totally down with the Janine ref ;)

However, it’s disappointing to come across this in the DSPAM FAQ list:
Why Should I use DSPAM Instead of SpamAssassin?
— a lovely selection of anti-perl and anti-SpamAssassin FUD, generally overlooking SpamAssassin‘s training components (‘leaves the end-user with no means of recourse or satisfaction when they receive a spam’), and in general taking a combative tone. Is that really necessary?

BTW, in case you’ve been living in a hole for the last year — SpamAssassin does include a probabilistic classifier, in the form of the BAYES rules. It’s easy to train, uses good tokenizing and combining algorithms to get high accuracy (although doesn’t yet do multi-word windowing until we’ve determined that that works acceptably for the db size increase), and, importantly, has been measured on corpora that are not my own mail.

A story: way back when, in June 2001, the SpamAssassin README boasted of it’s 99.94% accuracy rate. This was true — it was measured on my mail feed over the course of a couple of months. However, once measured on someone else’s mail, that dropped pretty quickly. Measuring a spam filter on the developer’s mail feed, (where presence of HTML is a killer spam-sign!), is a sure-fire way to get (a) great but (b) non-portable accuracy figures.

sleep(1) in Berkeley DB?

Code: Berkeley DB, the de-facto std for open-source high-performance database files on UNIX, is displaying some odd behaviour — it appears to be sleeping for 1 second inside the database library code, under load, for some versions of libdb. If you’re curious, there’s More info here.

‘Social networks’ spam filtering technique

Spam: /.: New Method of Spam Filtering: ‘A simple and easily implemented scheme for combating e-mail spam has been devised by two researchers in the United States. P. Oscar Boykin and Vwani Roychowdhury of the University of California, Los Angeles use their method to exploit the structure of social networks to quickly determine whether a given message comes from a friend or a spammer. The method works for only about half of all e-mails received – but in all of those cases, it sorts the mail into the right category.’

Abstract here. It appears it classifies 53% of the emails and leaves the other 47% as undiagnosed.

The problem with this scheme is that it relies on the data in the To, From, and CC fields being accurate. Currently, there’s no means to stop spammers faking those addresses.

A trivial way to get around this filter, similarly to the other filters that trust the From address, is for a spammer to send a message using your address in both the From and To fields. Most people would include themselves in their web of trust, hence the spam would get through.

A more resilient method uses IP addresses from the Received headers in conjunction with the From address. Once you do this, you can no longer use To and CC data — and the scheme becomes pretty much similar to SpamAssassin‘s auto-whitelist.

Life Hacks

Work: Life Hacks: Tech Secrets of Overprolific Alpha Geeks, Danny O’Brien’s ETech talk.

Amazingly, despite not being an alpha geek ;), I already use all these things:

  • a todo.txt file (anything else is inconvenient).
  • everything incoming comes through email, including RSS (thanks to rss2email). Again, anything else is inconvenient; I couldn’t be bothered with another desktop app.
  • I hack scripts for every repetitive task I run into
  • I sync instead of backup; everything has a CVS repository running on a remote server, even my home dir
  • I have a nasty tendency to web-scrape data

These tips definitely are good advice. Although I have a feeling the result is optimised to a weblogging UNIX geek who spends hours hacking perl/python scripts. ;)

I’m looking forward to LifeHacks.com when it does eventually go live… should be interesting.

BitTorrent

Net: Great NYTimes article interviewing Bram Cohen about BitTorrent (u: sitescooper p: sitescooper). Good to see that it landed him a job with Valve, but let’s hope that’s not the last piece of free software from Bram…

One of the best things about the article, BTW, is that it does take notice that BT isn’t a tool for piracy. Refreshing, given how these things are often covered.

Future Firefox Features

Web: More on the Firefox crappy-movie-now-web-browser thing, from Chris Blizzard:

  • A mind-controlled UI: but it only works if you think in russian!
  • Flashback mode: whenever you hear a helicopter overhead the browser will
    • redirect all page loads to web.archive.org, circa 5 years ago.
      • Stealth mode: using specially malformed headers, Firefox will load your web pages and web servers will be unable to log your vists.
      • Mach 6 Technology: advanced compression algorithms will make the web faster than it’s ever been before!
      • Arctic compliant: you can land firefox on an ice floe in the middle of the north atlantic. Not sure why you would need this, but hey, we had some extra bandwith.

Lovely Filelight

Linux: Doing my backups — it’s a good feeling to know your data will (probably) be safe if your computer suddenly carks it.

This time around, I have way too much data to actually back up the lot — so I’m being selective. Filelight is very helpful here; I can see exactly where my disk space is going, spot tmp files that I should have cleared up long ago, and so on.

One thing is clear — I have too many MP3s. How am I supposed to listen to all of those?

Firebird now Firefox

Web: Donncha notes that Mozilla Firebird has been renamed ‘Firefox’. Retro cruddy 80’s Cold War movie reference? check!

I like it. In fact, I’m looking forward to Linux kernel 2.6.2 ‘Red Dawn’.

BTW, my current favourite Firebird^H^H^H^Hfox extension: Session Saver. Load and save the current list of open tabs, and have them automatically saved when you quit the browser. Given that I often have a few tabs on stuff I’m researching, leaving them until I’m a bit less busy (which can take days!), this fits perfectly with my modus operandi.

Funny: This is GREAT!

And if that’s too much product placement for you, there’s Students for an Orwellian Society: ‘Because 2004 is 20 years too late.’

How To Increase Voter Turnout With New Technology – The Right Way

eVoting: One of the desired features for new voting mechanisms is that they will increase voter ‘turnout’, encouraging people to vote who are too busy (or too unmotivated) to visit a polling station.

This has been used to suggest internet voting (see the fiasco that was the now-scrapped SERVE project) and voting-by-phone. Both offer a scary number of vote-fixing opportunities and possible failure modes, and are fundamentally a bad idea.

However, it turns out there is a great system to implement absentee voting securely, reliably, conveniently (for the voter) and even cheaply! A comment on Bruce Schneier’s Crypto-Gram newsletter (scroll down to comment number 3) details this.

I’ve copied the entire mail here, since it’s hard to link to in the other location, and is well worth a page to itself:

From: Fred Heutte

Thanks for your cogent thoughts on ballot security. I almost completely agree and was one of the first signers of David Dill’s petition. I am also involved professionally in voter data — from the campaign side, with voter files, not directly with voting equipment — but we’re close enough to the vote counting process to see how it actually works.

I would only disagree slightly in one area. Absentee voting is quite secure when looking at the overall approach and assessing the risks in every part of the process. As long as reasonable precautions like signature checking are done, it would be difficult and expensive to change the results of mail voting significantly.

For example, in Oregon, ballots are returned in an inside security envelope which is sealed by the voter. The outside envelope has a signature area on the back side. This is compared to the voter’s signature on file at the elections office. The larger counties actually do a digitized comparison, and back that up with a manual comparison with a stratified random sample (to validate machine results on an ongoing basis), as well as a final determination for any questionable matches.

Certainly it is possible to forge a signature. However, this authentication process would greatly raise the cost of forged mail ballots, absent consent of the voter. In turn, interference or coercion with absentee voting would require much higher travel costs (at least) than doing so at a polling place, for a given change in the outcome.

It is true that precincts have poll watchers, and absentee voters do not. But consider this. Ballot boxes, which are often delivered by temporary poll workers from the precinct to the elections office, are occasionally stolen, but mail ballots are handled within a vast stream of other mail by employees with paychecks and pensions at stake. The relatively low level of mail fraud inside the postal system is a testament to its relative security, and the points where ballots are aggregated for delivery to the elections office are usually on public property and can also be watched by outside observers if need be.

Oregon has had some elections with 100% ‘vote by mail’ since 1996, and all elections since 1999. So far, no verifiable evidence of voter fraud has emerged, despite many checks and some predictions by those with a political axe to grind that we would be engulfed in a wave of election fixing.

The reality is that Oregon’s system, which is based on some common-sense security principles, has proven to be robust. The one lingering problem has been the need of some counties to make their voters use punch cards at home because of their antiquated vote counting equipment. But while this is a vote integrity issue — since state statistics show a much higher undervote and spoiled ballot total for punch cards as compared to mark-sense ballots — it is not a security issue per se. And with Help America Vote Act (HAVA) funding to convert to more modern vote counting systems, the Oregon chad remains in only one county and will go extinct after 2004.

The mark-sense (‘fill in the ovals’) ballots we have work well, and have low rates of over-votes and under-votes, despite the lack of automated machine checking that is possible in well-designed precinct voting systems. This suggests that reasonable visual design and human-friendly paper and pencil/pen home voting is a very reliable and secure system. When aided by automated counting equipment, we even have the additional benefit of very fast initial counts.

The increase in voter participation in Oregon since the advent of vote-by-mail — 10 to 30 percentage points above national averages, depending on the kind of election — leads to the only other issue, which is slow machine counts on election night after the polls close due to the surge of late ballots received at drop-off locations around the state. Oregon in fact isn’t really ‘vote by mail,’ it’s vote-at-home, with a paper ballot that can be mailed or left at any official drop-off point in the state, including county election offices, many schools and libraries, malls, town squares, etc.

The great advantage of the Oregon system is that it relies on the principle that if you appeal to the best instincts of the citizen, the overwhelming majority will ‘do our part’ to ensure the integrity of the democratic voting process, whether it is full consideration of the candidates and issues before voting, watching to make sure all ballots are securely transferred and counted, or favoring those laws and policies that insure that everyone eligible can vote, that their votes are counted, and that the candidates and measures with the most votes win.

The system is also cheaper than running traditional precinct elections. What’s not to like?

It’s so simple, and so sensible. Next time someone suggests ‘i-voting’ or ‘m-voting’ or whatever, you know what to point to…

Firebird Extension Idea

Web: I watched a hilarious Rob Corddry segment from The Daily Show last night, repeated from earlier in the week. Having not seen The Daily Show in a while, since dropping everything but basic cable, I went looking through The Daily Show video archives to see if I could find a few more good ones — with no luck.

Every link on the Video page links to something like this:

javascript:openMediaPop(‘/multimedia/tds/cord/cord_8065.html’,”,’SRM’,’high’);

Which opens a popup with this page. Now, the interesting thing is that I do have Real Player installed — but for some reason, Firebird hasn’t figured this out. If I could just get through the twisty-turny maze of Javascript ‘detection’ code, I could get the URL for the .ram file directly from the server and play it.

So this is where my idea for a new extension comes in. It should do this:

  • intercept Javascript calls to navigator.userAgent, navigator.plugins et al, and allow the user to select what plugins to report;
  • add a context (right-click) menu item to list the URIs used in data attributes of object tags, and allow those to be cut and pasted — or launched in any helper apps registered for that filename extension. Alternatively, it could just replace the object with a link to open that file in the helper app.

The first allows the user to choose what plugins to report are installed, and navigate their way past broken ‘detection’ scripts like Comedy Central’s and The BBC Radio Player’s.

The second then allows the user to get hold of the URL for future use, or pop it up in an external viewer.

David Hasselhoff’s role in ending the Cold War

Funny: The Beeb reports that ‘Baywatch star David Hasselhoff is griping that his role in reuniting East and West Germany has been overlooked.’

Speaking to Germany’s TV Spielfilm magazine, the 51-year-old carped about how his pivotal role in harmonising relations between the two sides of the divide had been overlooked.

‘I find it a bit sad that there is no photo of me hanging on the walls in the Berlin Museum at Checkpoint Charlie,’ he told the magazine.