-
The next step in the Turkish twitter-block arms race.
Bridge relays (or “bridges” for short) are Tor relays that aren’t listed in the main Tor directory. Since there is no complete public list of them, even if your ISP is filtering connections to all the known Tor relays, they probably won’t be able to block all the bridges. If you suspect your access to the Tor network is being blocked, you may want to use the bridge feature of Tor. The addition of bridges to Tor is a step forward in the blocking resistance race. It is perfectly possible that even if your ISP filters the Internet, you do not require a bridge to use Tor. So you should try to use Tor without bridges first, since it might work.
(tags: tor privacy turkey bridging networking tor-bridges twitter filtering blocking censorship)
Adrian Cockroft’s Cloud Outage Reports Collection
The detailed summaries of outages from cloud vendors are comprehensive and the response to each highlights many lessons in how to build robust distributed systems. For outages that significantly affected Netflix, the Netflix techblog report gives insight into how to effectively build reliable services on top of AWS. [….] I plan to collect reports here over time, and welcome links to other write-ups of outages and how to survive them.
(tags: outages post-mortems documentation ops aws ec2 amazon google dropbox microsoft azure incident-response)
-
This looks like an excellent new feature for parents:
A supervised user is a special type of Chrome user who can browse the web with guidance. Under the supervision of the manager, a supervised user can browse the web and sign in to websites. Supervised users don’t need a Google Account or an email address because the manager creates a profile for the supervised user through the manager’s Google Account. As a manager of a supervised user, you can see the user’s browsing history, block specific sites, and approve which sites the user can see, all from the supervised users dashboard that is accessible from any browser.
(tags: users chrome supervision parental-control parents safety web browsing kids)
The Stony Brook Algorithm Repository
This WWW page is intended to serve as a comprehensive collection of algorithm implementations for over seventy of the most fundamental problems in combinatorial algorithms. The problem taxonomy, implementations, and supporting material are all drawn from my [ie. Steven Skiena’s] book ‘The Algorithm Design Manual’. Since the practical person is more often looking for a program than an algorithm, we provide pointers to solid implementations of useful algorithms, when they are available.
(tags: algorithms reference coding steven-skiena combinatorial cs)
The Overprotected Kid – The Atlantic
Great article.
There is a big difference between avoiding major hazards and making every decision with the primary goal of optimizing child safety (or enrichment, or happiness). We can no more create the perfect environment for our children than we can create perfect children. To believe otherwise is a delusion, and a harmful one; remind yourself of that every time the panic rises.
(tags: child-safety parenting safety kids education risk danger playgrounds the-land)
Issue 122 – android-query – HTTP 204 Response results in Network Error (-101)
an empty 204 response to a HTTP PUT will trigger this. See also https://code.google.com/p/android/issues/detail?id=24672, ‘”java.io.IOException: unexpected end of stream” on HttpURLConnection HEAD call’.
(tags: http urlconnection httpurlconnection java android dalvik bugs 204 head get exceptions)
-
‘The European election will take place between 22 and 25 May 2014. Citizens, promise to vote for candidates that have signed a 10-point charter of digital rights! Show candidates that they need to earn your vote by signing our charter!’
(tags: europarl ep digital-rights rights ireland eu data-privacy data-protection privacy)
anigifs animated gif retro cyberpunk gustavo-torres kidmograph fx video-art via:mlkshk)
Justin's Linklog Posts
-
‘Microsoft went through a blogger’s private Hotmail account in order to trace the identity of a source who allegedly leaked trade secrets.’ Bear in mind that the alleged violation which MS allege allows them to read their email was a breach of the terms of service, which also include distribution of content which ‘incites, advocates, or expresses pornography, obscenity, vulgarity, [or] profanity’. So no dirty jokes on Hotmail!
(tags: hotmail fail scroogled microsoft stupid tos law privacy data-protection trade-secrets ip)
Theresa May warns Yahoo that its move to Dublin is a security worry
Y! is moving to Dublin to evade GCHQ spying on its users. And what is the UK response?
“There are concerns in the Home Office about how Ripa will apply to Yahoo once it has moved its headquarters to Dublin,” said a Whitehall source. “The home secretary asked to see officials from Yahoo because in Dublin they don’t have equivalent laws to Ripa. This could particularly affect investigations led by Scotland Yard and the national crime agency. They regard this as a very serious issue.”
There’s priorities for you!(tags: ripa gchq guardian uk privacy data-protection ireland dublin london spying surveillance yahoo)
A Look At Airbnb’s Irish Pub-Inspired Office In Dublin – DesignTAXI.com
Very nice, Airbnb!
Internet Tolls And The Case For Strong Net Neutrality
Netflix CEO Reed Hastings blogs about the need for Net Neutrality:
Interestingly, there is one special case where no-fee interconnection is embraced by the big ISPs — when they are connecting among themselves. They argue this is because roughly the same amount of data comes and goes between their networks. But when we ask them if we too would qualify for no-fee interconnect if we changed our service to upload as much data as we download** — thus filling their upstream networks and nearly doubling our total traffic — there is an uncomfortable silence. That’s because the ISP argument isn’t sensible. Big ISPs aren’t paying money to services like online backup that generate more upstream than downstream traffic. Data direction, in other words, has nothing to do with costs. ISPs around the world are investing in high-speed Internet and most already practice strong net neutrality. With strong net neutrality, new services requiring high-speed Internet can emerge and become popular, spurring even more demand for the lucrative high-speed packages ISPs offer. With strong net neutrality, everyone avoids the kind of brinkmanship over blackouts that plague the cable industry and harms consumers. As the Wall Street Journal chart shows, we’re already getting to the brownout stage. Consumers deserve better.
(tags: consumer net-neutrality comcast netflix protectionism cartels isps us congestion capacity)
Micro jitter, busy waiting and binding CPUs
pinning threads to CPUs to reduce jitter and latency. Lots of graphs and measurements from Peter Lawrey
The Day Today – Pool Supervisor – YouTube
“in 1979, no-one died. in 1980, some one died. in 1981, no-one died. in 1982, no-one died. … I could go on”
(tags: the-day-today no-one-died safety pool supervisor tricky-word-puzzles funny humour classic video)
The colossal arrogance of Newsweek’s Bitcoin “scoop” | Ars Technica
Many aspects of the story already look like a caricature of journalism gone awry. The man Goodman fingered as being worth $400 million or more is just as modest as his house suggests. He’s had a stroke and struggles with other health issues. Unemployed since 2001, he strives to take care of basic needs for himself and his 93-year-old mother, according to a reddit post by his brother Arthur Nakamoto (whom Goodman quoted as calling his brother an “asshole”). If Goodman has mystery evidence supporting the Dorian Nakamoto theory, it should have been revealed days ago. Otherwise, Newsweek and Goodman are delaying an inevitable comeuppance and doubling down on past mistakes. Nakamoto’s multiple denials on the record have changed the dynamic of the story. Standing by the story, at this point, is an attack on him and his credibility. The Dorian Nakamoto story is a “Dewey beats Truman” moment for the Internet age, with all of the hubris and none of the humor. It shouldn’t be allowed to end in the mists of “he said, she said.” Whether or not a lawsuit gets filed, Nakamoto v. Newsweek faces an imminent verdict in the court of public opinion: either the man is lying or the magazine is wrong.
(tags: dorian-nakamoto newsweek journalism bitcoin privacy satoshi-nakamoto)
-
While going through her papa’s old belongings, a young girl discovered something incredible – a mind-bogglingly intricate maze that her father had drawn by hand 30 years ago. While working as a school janitor it had taken him 7 years to produce the piece, only for it to be forgotten about… until now.
34″ x 24″ print, $40 Continuous Delivery with ETL Systems
Lonely Planet and Dr Foster Intelligence both make heavy use of ETL in their products, and both organisations have applied the principles of Continuous Delivery to their delivery process. Some of the Continuous Delivery norms need to be adapted in the context of ETL, and some interesting patterns emerge, such as running Continuous Integration against data, as well as code.
(tags: etl video presentations lonely-planet dr-foster-intelligence continuous-delivery deployment pipelines)
-
‘On March 9th a group posted a data leak, which included the trading history of all MtGox users from April 2011 to November 2013. The graphs below explore the trade behaviors of the 500 highest volume MtGox users from the leaked data set. These are the Bitcoin barons, wealthy speculators, dueling algorithms, greater fools, and many more who took bitcoin to the moon.’
(tags: dataviz stamen bitcoin data leaks mtgox greater-fools)
What We Know 2/5/14: The Mt. Chiliad Mystery
hats off to Rockstar — GTA V has a great mystery mural with clues dotted throughout the game, and it’s as-yet unsolved
(tags: mysteries gaming via:hilary_w games gta gta-v rockstar mount-chiliad ufos)
Make Your Own 3-D Printer Filament From Old Milk Jugs
Creating your own 3-D printer filament from old used milk jugs is exponentially cheaper, and uses considerably less energy, than buying new filament, according to new research from Michigan Technological University. […] The savings are really quite impressive — 99 cents on the dollar, in addition to the reduced use of energy. Interestingly (but again not surprisingly), the amount of energy used to ‘recycle’ the old milk jugs yourself is considerably less than that used in recycling such jugs conventionally.
-
This is a really good post on governmental computing, open data, and so on:
The fact that I can go months hearing about “open data” without a single mention of ETL is a problem. ETL is the pipes of your house: it’s how you open data.
(tags: civic open-data government etl data-pipeline tech via:timoreilly)
-
as TJ McIntyre noted: ‘€100 fine for a repeat spammer. Data Protection Commissioner calls this “strong protection”. With a straight face.’ Next will doubtless fork over the 100 Euros out of the petty cash drawer, then carry on regardless. This isn’t a useful fine. What a farce…
(tags: cheap farce dpc data-protection privacy anti-spam next spam convictions fines ireland)
-
The mass surveillance methods employed in [the UK, USA, and India], many of them exposed by NSA whistleblower Edward Snowden, are all the more intolerable because they will be used and indeed are already being used by authoritarians countries such as Iran, China, Turkmenistan, Saudi Arabia and Bahrain to justify their own violations of freedom of information. How will so-called democratic countries will able to press for the protection of journalists if they adopt the very practices they are criticizing authoritarian regimes for?
This is utterly jaw-dropping — throughout the world, real-time mass-monitoring infrastructure is silently being dropped into place. France and India are particularly pervasive(tags: journalism censorship internet france india privacy data-protection surveillance spying law snowden authoritarianism)
The Microservice Declaration of Independence
“Microservices” seems to be yet another term for SOA; small, decoupled, independently-deployed services, with well-defined public HTTP APIs. Pretty much all the services I’ve worked on over the past few years have been built in this style. Still, let’s keep an eye on this concept anyway. Another definition seems to be a more FP-style one: http://www.slideshare.net/michaelneale/microservices-and-functional-programming — where the “microservice” does one narrowly-defined thing, and that alone.
(tags: microservices soa architecture handwaving http services web deployment)
No, Nate, brogrammers may not be macho, but that’s not all there is to it
Great essay on sexism in tech, “brogrammer” culture, “clubhouse chemistry”, outsiders, wierd nerds and exclusion:
Every group, including the excluded and disadvantaged, create cultural capital and behave in ways that simultaneously create a sense of belonging for them in their existing social circle while also potentially denying them entry into another one, often at the expense of economic capital. It’s easy to see that wearing baggy, sagging pants to a job interview, or having large and visible tattoos in a corporate setting, might limit someone’s access. These are some of the markers of belonging used in social groups that are often denied opportunities. By embracing these markers, members of the group create real barriers to acceptance outside their circle even as they deepen their peer relationships. The group chooses to adopt values that are rejected by the society that’s rejecting them. And that’s what happens to “weird nerd” men as well—they create ways of being that allow for internal bonding against a largely exclusionary backdrop.
(via Bryan O’Sullivan)(tags: nerds outsiders exclusion society nate-silver brogrammers sexism racism tech culture silicon-valley essays via:bos31337)
Impact of large primitive arrays (BLOBS) on JVM Garbage Collection
some nice graphs and data on CMS performance, with/without -XX:ParGCCardsPerStrideChunk
(tags: cms java jvm performance optimization tuning off-heap-storage memory)
Anatomical Collages by Travis Bedel
these are fantastic
-
a utility to perform parallel, pipelined execution of a single HTTP GET. htcat is intended for the purpose of incantations like: htcat https://host.net/file.tar.gz | tar -zx It is tuned (and only really useful) for faster interconnects: [….] 109MB/s on a gigabit network, between an AWS EC2 instance and S3. This represents 91% use of the theoretical maximum of gigabit (119.2 MiB/s).
-
Abe Stanway crunches the stats on Citibike usage in NYC, compared to the weather data from Wunderground.
(tags: data correlation statistics citibike cycling nyc data-science weather)
NSA surveillance recording every single voice call in at least 1 country
Storing them in a 30-day rolling buffer, allowing retrospective targeting weeks after the call. 100% of all voice calls in that country, although it’s unclear which country that is
(tags: nsa surveillance gchq telephones phone bugging)
-
a file system that stores all its data online using storage services like Google Storage, Amazon S3, or OpenStack. S3QL effectively provides a hard disk of dynamic, infinite capacity that can be accessed from any computer with internet access running Linux, FreeBSD or OS-X. S3QL is a standard conforming, full featured UNIX file system that is conceptually indistinguishable from any local file system. Furthermore, S3QL has additional features like compression, encryption, data de-duplication, immutable trees and snapshotting which make it especially suitable for online backup and archival.
(tags: s3 s3ql backup aws filesystems linux freebsd osx ops)
-
good explanation of all the new features — I’m really looking forward to fixing up all the crappy over-verbose interface-as-lambdas we have scattered throughout our code
(tags: java java8 lambdas fp functional-programming currying joda-time)
-
a compressed full-text substring index based on the Burrows-Wheeler transform, with some similarities to the suffix array. It was created by Paolo Ferragina and Giovanni Manzini,[1] who describe it as an opportunistic data structure as it allows compression of the input text while still permitting fast substring queries. The name stands for ‘Full-text index in Minute space’. It can be used to efficiently find the number of occurrences of a pattern within the compressed text, as well as locate the position of each occurrence. Both the query time and storage space requirements are sublinear with respect to the size of the input data.
kragen notes ‘gene sequencing is using [them] in production’.(tags: sequencing bioinformatics algorithms bowtie fm-index indexing compression search burrows-wheeler bwt full-text-search)
How to turn your smartphone photos from good to great
some good tips
(tags: phone pictures photos tips smartphone iphone android)
How the Irish helped weave the web
Nice Irish Times article on the first 3 web servers in Ireland — including the one I set up at Iona Technologies. 21 years ago!
(tags: history ireland tech web internet www james-casey peter-flynn irish-times iona-technologies)
Health privacy: formal complaint to ICO
‘Light Blue Touchpaper’ notes:
Three NGOs have lodged a formal complaint to the Information Commissioner about the fact that PA Consulting uploaded over a decade of UK hospital records to a US-based cloud service. This appears to have involved serious breaches of the UK Data Protection Act 1998 and of multiple NHS regulations about the security of personal health information.
Let’s see if ICO can ever do anything useful…. not holding my breath(tags: ico privacy data-protection dpa nhs health data ross-anderson)
Why Google Flu Trends Can’t Track the Flu (Yet)
It’s admittedly hard for outsiders to analyze Google Flu Trends, because the company doesn’t make public the specific search terms it uses as raw data, or the particular algorithm it uses to convert the frequency of these terms into flu assessments. But the researchers did their best to infer the terms by using Google Correlate, a service that allows you to look at the rates of particular search terms over time. When the researchers did this for a variety of flu-related queries over the past few years, they found that a couple key searches (those for flu treatments, and those asking how to differentiate the flu from the cold) tracked more closely with Google Flu Trends’ estimates than with actual flu rates, especially when Google overestimated the prevalence of the ailment. These particular searches, it seems, could be a huge part of the inaccuracy problem. There’s another good reason to suspect this might be the case. In 2011, as part of one of its regular search algorithm tweaks, Google began recommending related search terms for many queries (including listing a search for flu treatments after someone Googled many flu-related terms) and in 2012, the company began providing potential diagnoses in response to symptoms in searches (including listing both “flu” and “cold” after a search that included the phrase “sore throat,” for instance, perhaps prompting a user to search for how to distinguish between the two). These tweaks, the researchers argue, likely artificially drove up the rates of the searches they identified as responsible for Google’s overestimates.
via Boing Boing(tags: google flu trends feedback side-effects colds health google-flu-trends)
Implementing a web server in a single printf() call
clever hack — shellcode in a format string
(tags: printf hax coding web shellcode exploits assembly linux)
Ucas sells access to student data for phone and drinks firms’ marketing | Technology | The Guardian
The UK government’s failure to deal with spam law in a consumer-friendly way escalates further: UCAS, the university admissions service, is operating as a mass-mailer of direct marketing on behalf of Vodafone, O2, Microsoft, Red Bull and others, without even a way to later opt out from that spam without missing important admissions-related mail as a side effect. ‘Teenagers using Ucas Progress must explicitly opt in to mailings from the organisation and advertisers, though the organisation’s privacy statement says: “We do encourage you to tick the box as it helps us to help you.”‘ Their website also carries advertising, and the details of parents are sold on to advertisers as well. Needless to say, the toothless ICO say they ‘did not appear to breach marketing rules under the privacy and electronic communications regulations’, as usual. Typical ICO fail.
(tags: ucas advertising privacy data-protection opt-in opt-out spam direct-marketing vodafone o2 microsoft red-bull uk universities grim-meathook-future ico)
Good explanation of exponential backoff
I’ve often had to explain this key feature verbosely, and it’s hard to do without handwaving. Great to have a solid, well-explained URL to point to
(tags: exponential-backoff backoff retries reliability web-services http networking internet coding design)
Sacked Google worker says staff ratings fixed to fit template
Allegations of fixing to fit the stack-ranking curve: ‘someone at Google always had to get a low score “of 2.9”, so the unit could match the bell curve. She said senior staff “calibrated” the ratings supplied by line managers to ensure conformity with the template and these calibrations could reduce a line manager’s assessment of an employee, in effect giving them the poisoned score of less than three.’
(tags: stack-ranking google ireland employment work bell-curve statistics eric-schmidt)
Corporate Tax 2014: Irish Government’s “flawed premise” on Apple’s avoidance
According to our calculation about €40bn or over 40% of Irish services exports of €90bn in 2012 and related national output, resulted from global tax avoidance schemes. It is true that Ireland gains little from tax cheating but at some point, the US tax system will be reformed and a territorial system where companies are only liable in the US on US profits, would only be viable if there was a disincentive to shift profits to non-tax or low tax countries. The risk for Ireland is that a minimum foreign tax would be introduced that would be greater than the Irish headline rate of 12.5%. It’s also likely that US investment in Ireland would not have been jeopardized if Irish politicians had not been so eager as supplicants to doff the cap. Nevertheless today it would be taboo to admit the reality of participation in massive tax avoidance and the Captain Renaults of Merrion Street will continue with their version of the Dance of the Seven Veils.
(tags: apple tax double-irish tax-avoidance google investment itax tax-evasion ireland)
An online Magna Carta: Berners-Lee calls for bill of rights for web
TimBL backing the “web we want” campaign — https://webwewant.org/
(tags: freedom gchq nsa censorship internet privacy web-we-want human-rights timbl tim-berners-lee)
How the search for flight AF447 used Bayesian inference
Via jgc, the search for the downed Air France flight was optimized using this technique: ‘Metron’s approach to this search planning problem is rooted in classical Bayesian inference, which allows organization of available data with associated uncertainties and computation of the Probability Distribution Function (PDF) for target location given these data. In following this approach, the first step was to gather the available information about the location of the impact site of the aircraft. This information was sometimes contradictory and filled with ambiguities and uncertainties. Using a Bayesian approach we organized this material into consistent scenarios, quantified the uncertainties with probability distributions, weighted the relative likelihood of each scenario, and performed a simulation to produce a prior PDF for the location of the wreck.’
(tags: metron bayes bayesian-inference machine-learning statistics via:jgc air-france disasters probability inference searching)
How the NSA Plans to Infect ‘Millions’ of Computers with Malware – The Intercept
The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by The Intercept show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system – codenamed TURBINE – is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.” In a top-secret presentation, dated August 2009, the NSA describes a pre-programmed part of the covert infrastructure called the “Expert System,” which is designed to operate “like the brain.”
Great. Automated malware deployment to millions of random victims. See also the “I hunt sysadmins” section further down…(tags: malware gchq nsa oversight infection expert-systems turbine false-positives the-intercept surveillance)
-
Burrito Justice nerds out on ‘Goodnight Moon’. ‘Maybe the bunny and the old lady are actually in a space elevator, getting closer to the moon as he gets into bed? Or as suggested by @transitmaps, the bunny can bend space and time? I do not have a good answer to this conundrum, but that is what the comments are for.’
(tags: goodnight-moon moon space time space-elevators childrens-books books physics)
Inside the Mind of an anti-fluoridationist
An exceptionally well-researched and thorough disassembly of ‘Public Health Investigation of Epidemiological data on Disease and Mortality in Ireland related to Water Fluoridation and Fluoride Exposure’ by Declan Waugh, which appears to be going around currently
(tags: declan-waugh debunking flouride flouridation science mortality health ireland water)
David Robert Grimes on the flouride kerfuffle
Hilariously, “The Girl Against Flouride” and other antiflouridation campaigners now allege he’s a undercover agent of Alcoa and/or Glaxo Smith Kline, rather than dealing with any awkwardly hostile realities
(tags: flouride flouridation david-robert-grimes conspiracy funny science ireland alcoa glaxo-smith-kline)
-
fantastic piece of C=64 history — the “Ocean fast loader” by Paul Hughes, which allowed Commodore 64 games to load from tape at 4000 baud, far faster than the built-in system implementation, and with graphics and music at the same time
(tags: ocean-loader tapes c=64 commodore-64 history 1980s freeload paul-hughes)
IntelliJ IDEA 13.1 will support Chronon Debugger
This, IMO, would be a really good reason to upgrade to the payware version of IDEA – Chronon looks cool.
Chronon is a new revolutionary tool keeping track of running Java programs and recording their execution process for later analysis, which can be helpful when you need to thoroughly retrace your steps when dealing with complicated bugs.
(tags: chronon debugging java intellij idea ides coding time-warp time)
“Dapper, a Large-Scale Distributed Systems Tracing Infrastructure” [PDF]
Google paper describing the infrastructure they’ve built for cross-service request tracing (ie. “tracer requests”). Features: low code changes required (since they’ve built it into the internal protobuf libs), low performance impact, sampling, deployment across the ~entire production fleet, output visibility in minutes, and has been live in production for over 2 years. Excellent read
(tags: dapper tracing http services soa google papers request-tracing tracers protobuf devops)
-
‘a Japanese term that means “mistake-proofing”. A poka-yoke is any mechanism in a lean manufacturing process that helps an equipment operator avoid (yokeru) mistakes (poka). Its purpose is to eliminate product defects by preventing, correcting, or drawing attention to human errors as they occur.’
(tags: human-error errors mistakes poka-yoke failures prevention bugproofing manufacturing japan)
The Hands That Made The Moomins
lovely New Yorker writeup on Tove Jansson, author of those beautiful children’s books
(tags: tove-jansson moomins books childrens-books reading literature via:etienneshrdlu)
James Casey writes about working at CERN
I am very heartened by Minister of State for Research and Innovation Sean Sherlock’s recent announcement of a review of the costs and benefits of Ireland’s membership of international research organisations including CERN. I disagreed with the conclusion of the last review which suggested that costs outweighed the benefits to Ireland. I think it was an extreme oversight not to be a part of the engineering phase of the Collider during the period 1998-2008 – but it’s not too late. CERN will celebrate its 60th anniversary in 2014. There is no public scientific institution its equal in terms of the scale and complexity of problems being analysed and solved. No longer excluding young Irish people from being a part of this, from learning and growing from it, can only help Ireland.
Also, spot my name in lights ;)(tags: ireland cern science europe eu sean-sherlock james-casey www web history)
Digging for cryptocurrency: The newbie’s guide to mining altcoins
Mining Arscoins, dogecoins and litecoins — CPU/GPU mining apps and how to run ’em
(tags: currency bitcoin altcoins dogecoin crypto mining ars-technica)
A cautionary tale about building large-scale polyglot systems
‘a fucking nightmare’:
Cascading requires a compilation step, yet since you’re writing Ruby code, you get get none of the benefits of static type checking. It was standard to discover a type issue only after kicking off a job on, oh, 10 EC2 machines, only to have it fail because of a type mismatch. And user code embedded in strings would regularly fail to compile – which you again wouldn’t discover until after your job was running. Each of these were bad individually, together, they were a fucking nightmare. The interaction between the code in strings and the type system was the worst of all possible worlds. No type checking, yet incredibly brittle, finicky and incomprehensible type errors at run time. I will never forget when one of my friends at Etsy was learning Cascading.JRuby and he couldn’t get a type cast to work. I happened to know what would work: a triple cast. You had to cast the value to the type you wanted, not once, not twice, but THREE times.
(tags: etsy scalding cascading adtuitive war-stories languages polyglot ruby java strong-typing jruby types hadoop)
-
Attempting to cash out of Bitcoins turns out to be absurdly difficult:
Trying to sell the coins in person, and basically saying he ether wants Cash, or a Cashiers check (since it can be handed over right then and there), has apparently been a hilarious clusterfuck. Today he met some guy infront of his bank, and apparently as soon as he mentioned that he needs to get the cash checked to make sure it is not counterfeit, the guy freaked out and basically walked away. Stuff like this has been happening all week, and he apparently so far has only sold a single coin of several hundred.
(tags: bitcoin fail funny mtgox fraud cash fiat-currency via:rsynnott buttcoin)
Florida cops used IMSI catchers over 200 times without a warrant
Harris is the leading maker of [IMSI catchers aka “stingrays”] in the U.S., and the ACLU has long suspected that the company has been loaning the devices to police departments throughout the state for product testing and promotional purposes. As the court document notes in the 2008 case, “the Tallahassee Police Department is not the owner of the equipment.” The ACLU now suspects these police departments may have all signed non-disclosure agreements with the vendor and used the agreement to avoid disclosing their use of the equipment to courts. “The police seem to have interpreted the agreement to bar them even from revealing their use of Stingrays to judges, who we usually rely on to provide oversight of police investigations,” the ACLU writes.
(tags: aclu police stingrays imsi-catchers privacy cellphones mobile-phones security wired)
The Netflix Dynamic Scripting Platform
At the core of the redesign is a Dynamic Scripting Platform which provides us the ability to inject code into a running Java application at any time. This means we can alter the behavior of the application without a full scale deployment. As you can imagine, this powerful capability is useful in many scenarios. The API Server is one use case, and in this post, we describe how we use this platform to support a distributed development model at Netflix.
Holy crap.(tags: scripting dynamic-languages groovy java server-side architecture netflix)
ZooKeeper Resilience at Pinterest
essentially decoupling the client services from ZK using a local daemon on each client host; very similar to Airbnb’s Smartstack. This is a bit of an indictment of ZK’s usability though
(tags: ops architecture clustering network partitions cap reliability smartstack airbnb pinterest zookeeper)
FOI is better than tea and biscuits
Good post on the ‘FOI costs too much’ talking point.
I realise if you’re a councillor, tea and biscuits sounds much more appealing than transparency and being held accountable and actually having to answer to voters, but those things are what you signed up to when you stood for election.
(tags: foi open-data politics government funding)
Answer to How many topics (queues) can be created in Apache Kafka? – Quora
Good to know:
‘As far as I understand (this was true as of 2013, when I last looked into this issue) there’s at least one Apache ZooKeeper znode per topic in Kafka. While there is no hard limitation in Kafka itself (Kafka is linearly scalable), it does mean that the maximum number of znodes comfortable supported by ZooKeeper (on the order of about ten thousand) is the upper limit of Kafka’s scalability as far as the number of topics goes.’
(tags: kafka queues zookeeper znodes architecture)
Care.data is in chaos. It breaks my heart | Ben Goldacre
There are people in my profession who think they can ignore this problem. Some are murmuring that this mess is like MMR, a public misunderstanding to be corrected with better PR. They are wrong: it’s like nuclear power. Medical data, rarefied and condensed, presents huge power to do good, but it also presents huge risks. When leaked, it cannot be unleaked; when lost, public trust will take decades to regain. This breaks my heart. I love big medical datasets, I work on them in my day job, and I can think of a hundred life-saving uses for better ones. But patients’ medical records contain secrets, and we owe them our highest protection. Where we use them – and we have used them, as researchers, for decades without a leak – this must be done safely, accountably, and transparently. New primary legislation, governing who has access to what, must be written: but that’s not enough. We also need vicious penalties for anyone leaking medical records; and HSCIC needs to regain trust, by releasing all documentation on all past releases, urgently. Care.data needs to work: in medicine, data saves lives.
(tags: hscic nhs care.data data privacy data-protection medicine hospitals pr)
-
bookmarking as a future reference
(tags: timezones time world clock xkcd images midnight reference)
Only 0.15 percent of mobile gamers account for 50 percent of all in-game revenue
Nice bit of marketing from the day job:
The group of gamers responsible for half of all in-game revenue in mobile titles is frightening because it is so narrow, according to a survey by Swrve, an established analytics and app marketing firm. About 0.15 percent of mobile gamers contribute 50 percent of all of the in-app purchases generated in free-to-play games. This means it may even more important than game companies realized in the past to find and retain the users that fall into the category of big spenders, or “whales.” The vast majority of users never spend any money, despite the clever tactics that game publishers have developed to incentivize people to spend money in their favorite games.
(tags: swrve whales gaming games iap money mobile analytics)
-
‘EAT CELEBRITY MEAT! BiteLabs grows meat from celebrity tissue samples and uses it to make artisanal salami.’ Genius. (via John Looney)
(tags: via:john-looney meat startups food funny salami tissue-samples celebrity jennifer-lawrence)
‘Bobtail: Avoiding Long Tails in the Cloud’ [pdf]
‘A system that proactively detects and avoids bad neighbouring VMs without significantly penalizing node instantiation [in EC2]. With Bobtail, common [datacenter] communication patterns benefit from reductions of up to 40% in 99.9th percentile response times.’ Excellent stuff — another conclusion they come to is that it’s not the network’s fault, it’s the Xen hosts themselves. The EC2 networking team will be happy about that ;)
(tags: networking ec2 bobtail latency long-tail xen performance)
-
Charlie Stross on GCHQ’s 1984-esque webcam spying
(tags: webcams porn charlie-stross funny 1984 dystopian masturbation surveillance spying)
Big doubts on big data: Why I won’t be sharing my medical data with anyone – yet
These problems can be circumvented, but they must be dealt with, publically and soberly, if the NHS really does want to win public confidence. The NHS should approach selling the scheme to the public as if was opt-in, not opt-out, then work to convince us to join it. Tell us how sharing our data can help, but tell us what risk too. Let us decide if that balance is worth it. If it’s found wanting, the NHS must go back to the drawing board and retool the scheme until it is. It’s just too important to get wrong.
(tags: nhs uk privacy data-protection data-privacy via:mynosql big-data healthcare insurance)
Welcome to Algorithmic Prison – Bill Davidow – The Atlantic
“Computer says no”, taken to the next level.
Even if an algorithmic prisoner knows he is in a prison, he may not know who his jailer is. Is he unable to get a loan because of a corrupted file at Experian or Equifax? Or could it be TransUnion? His bank could even have its own algorithms to determine a consumer’s creditworthiness. Just think of the needle-in-a-haystack effort consumers must undertake if they are forced to investigate dozens of consumer-reporting companies, looking for the one that threw them behind algorithmic bars. Now imagine a future that contains hundreds of such companies. A prisoner might not have any idea as to what type of behavior got him sentenced to a jail term. Is he on an enhanced screening list at an airport because of a trip he made to an unstable country, a post on his Facebook page, or a phone call to a friend who has a suspected terrorist friend?
(tags: privacy data big-data algorithms machine-learning equifax experian consumer society bill-davidow)
RTE star Sharon Ni Bheolain stalked for six months – Independent.ie
as @Fergal says: ‘[this] case shows (a) the internet isn’t anonymous, (b) we [ie. Ireland -jm] have laws to deal with threats and harassment’
(tags: law ireland harassment internet twitter email abuse cyberstalking)
ImperialViolet – Apple’s SSL/TLS bug
as we all know by now, a misplaced “goto fail” caused a critical, huge security flaw in versions of IOS and OSX SSL, since late 2012. Lessons: 1. unit test the failure cases, particularly for critical security code! 2. use braces. 3. dead-code analysis would have caught this. I’m not buying the “goto considered harmful” line, though, since any kind of control flow structure would have had the same problem.
(tags: coding apple osx ios crypto ssl security goto-fail goto fail unit-testing coding-standards)
Comcast’s deal with Netflix makes network neutrality obsolete
in a world where Netflix and Yahoo connect directly to residential ISPs, every Internet company will have its own separate pipe. And policing whether different pipes are equally good is a much harder problem than requiring that all of the traffic in a single pipe be treated the same. If it wanted to ensure a level playing field, the FCC would be forced to become intimately involved in interconnection disputes, overseeing who Verizon interconnects with, how fast the connections are and how much they can charge to do it.
(tags: verizon comcast internet peering networking netflix network-neutrality)
Data visualization: breaking down The Economist’s classic chart style
nice piece of classic graph design
Netflix packets being dropped every day because Verizon wants more money | Ars Technica
With Cogent and Verizon fighting, [peering capacity] upgrades are happening at a glacial pace, according to Schaeffer. “Once a port hits about 85 percent throughput, you’re going to begin to start to drop packets,” he said. “Clearly when a port is at 120 or 130 percent [as the Cogent/Verizon ones are] the packet loss is material.” The congestion isn’t only happening at peak times, he said. “These ports are so over-congested that they’re running in this packet dropping state 22, 24 hours a day. Maybe at four in the morning on Tuesday or something there might be a little bit of headroom,” he said.
(tags: packet-loss networking internet cogent netflix verizon peering)
Hospital records of all NHS patients sold to insurers – Telegraph
The 274-page report describes the NHS Hospital Episode Statistics as a “valuable data source in developing pricing assumptions for ‘critical illness’ cover.” It says that by combining hospital data with socio-economic profiles, experts were able to better calculate the likelihood of conditions, with “amazingly” clear forecasts possible for certain diseases, in particular lung cancer. Phil Booth, from privacy campaign group medConfidential, said: “The language in the document is extraordinary; this isn’t about patients, this is about exploiting a market. Of course any commercial organisation will focus on making a profit – the question is why is the NHS prepared to hand this data over?”
(tags: nhs privacy data insurance uk politics data-protection)
-
‘A Monumental Land Art Installation in the Sahara Desert’, by the D.A.S.T. Arteam in 1997. More correctly, near the Red Sea resort of El Gouna — so possible to visit!
(tags: el-gouna sahara deserts land-art art via:colossal desert-breath spirals)
Harvard Research Computing Resources Misused for ‘Dogecoin’ Mining Operation
A member of the Harvard community was stripped of his or her access to the University’s research computing facilities last week after setting up a “dogecoin” mining operation using a Harvard research network, according to an internal email circulated by Faculty of Arts and Sciences Research Computing officials.
(tags: harvard dogecoin bitcoin mining misuse abuse supercomputers)
-
turn Youtube videos into animated GIFs (via Waxy)
(tags: via:waxy gifs youtube video animated-gifs images web)
‘Scaling to Millions of Simultaneous Connections’ [pdf]
Presentation by Rick Reed of WhatsApp on the large-scale Erlang cluster backing the WhatsApp API, delivered at Erlang Factory SF, March 30 2012. lots of juicy innards here
(tags: erlang scaling scalability performance whatsapp freebsd presentations)
Traffic Graph – Google Transparency Report
this is cool. Google are exposing an aggregated ‘all services’ hit count time-series graph, broken down by country, as part of their Transparency Report pages
(tags: transparency filtering web google http graphs monitoring syria)
-
I want to emphasize that if you use redis as intended (as a slightly-persistent, not-HA cache), it’s great. Unfortunately, more and more shops seem to be thinking that Redis is a full-service database and, as someone who’s had to spend an inordinate amount of time maintaining such a setup, it’s not. If you’re writing software and you’re thinking “hey, it would be easy to just put a SET key value in this code and be done,” please reconsider. There are lots of great products out there that are better for the overwhelming majority of use cases.
Ouch. (via Aphyr)(tags: redis storage architecture memory caching ha databases)
-
I’m going to need this pretty soon — lots of white spots showing up with the current BenQ :(
(tags: projectors video home hardware reviews)
Belkin managed to put their firmware update private key in the distribution
‘The firmware updates are encrypted using GPG, which is intended to prevent this issue. Unfortunately, Belkin misuses the GPG asymmetric encryption functionality, forcing it to distribute the firmware-signing key within the WeMo firmware image. Most likely, Belkin intended to use the symmetric encryption with a signature and a shared public key ring. Attackers could leverage the current implementation to easily sign firmware images.’ Using GPG to sign your firmware updates: yay. Accidentally leaving the private key in the distribution: sad trombone.
(tags: fail wemo belkin firmware embedded-systems security updates distribution gpg crypto public-key pki home-automation ioactive)
-
On-the-fly video transcoding during live streaming. They’ve done a great job of this!
At the beginning of the development of this feature, we entertained the idea to simply pre-transcode all the videos in Dropbox to all possible target devices. Soon enough we realized that this simple approach would be too expensive at our scale, so we decided to build a system that allows us to trigger a transcoding process only upon user request and cache the results for subsequent fetches. This on-demand approach: adapts to heterogeneous devices and network conditions, is relatively cheap (everything is relative at our scale), guarantees low latency startup time.
(tags: ffmpeg dropbox streaming video cdn ec2 hls http mp4 nginx haproxy aws h264)
GPLv2 being tested in US court
The case is still ongoing, so one to watch.
Plaintiff wrote an XML parser and made it available as open source software under the GPLv2. Defendant acquired from another vendor software that included the code, and allegedly distributed that software to parties outside the organization. According to plaintiff, defendant did not comply with the conditions of the GPL, so plaintiff sued for copyright infringement. Defendants moved to dismiss for failure to state a claim. The court denied the motion.
(tags: gpl open-source licensing software law legal via:fplogue)
Latest Snowden leak: GCHQ spying on Wikileaks users
“How could targeting an entire website’s user base be necessary or proportionate?” says Gus Hosein, executive director of the London-based human rights group Privacy International. “These are innocent people who are turned into suspects based on their reading habits. Surely becoming a target of a state’s intelligence and security apparatus should require more than a mere click on a link.” The agency’s covert targeting of WikiLeaks, Hosein adds, call into question the entire legal rationale underpinning the state’s system of surveillance. “We may be tempted to see GCHQ as a rogue agency, ungoverned in its use of unprecedented powers generated by new technologies,” he says. “But GCHQ’s actions are authorized by [government] ministers. The fact that ministers are ordering the monitoring of political interests of Internet users shows a systemic failure in the rule of law.”
(tags: gchq wikileaks snowden privacy spying surveillance politics)
“Hackers” unsubscribed a former Mayor from concerned citizen’s emails
“The dog ate my homework, er, I mean, hackers hacked my account.”
Former Mayor of Kildare, Cllr. Michael Nolan, has denied a claim he asked a local campaigner to stop e-mailing him. Cllr. Michael Nolan from Newbridge said his site was hacked and wrong e-mails were sent out to a number of people, including Leixlip based campaigner, John Weigel. Mr. Weigel has been campaigning, along with others, about the danger of electromagnetic radiation to humans and the proximity of communications masts to homes and, in particular schools. He regularly updates local politicians on news items relating to the issue. Recently, he said that he had received an e-mail from Cllr. Nolan asking to be removed from Mr. Weigel’s e-mail list. The Leader asked Cllr. Nolan why he had done this. But the Fine Gael councillors said that “his e-mail account was hacked and on one particular day a number of mails a were sent from my account pertaining to be from me.”
(tags: dog-ate-my-homework hackers funny kildare newbridge fine-gael michael-nolan email politics ireland excuses)
-
very good, workable tips on how to remote-work effectively (both in the comments of this thread and the original article)
(tags: tips productivity collaboration hn via:lhl remote-working telecommuting work)
Disgraced Scientist Granted U.S. Patent for Work Found to be Fraudulent – NYTimes.com
Korean researcher Hwang Woo-suk electrified the science world 10 years ago with his claim that he had created the world’s first cloned human embryos and had extracted stem cells from them. But the work was later found to be fraudulent, and Dr. Hwang was fired from his university and convicted of crimes. Despite all that, Dr. Hwang has just been awarded an American patent covering the disputed work, leaving some scientists dumbfounded and providing fodder to critics who say the Patent Office is too lax. “Shocked, that’s all I can say,” said Shoukhrat Mitalipov, a professor at Oregon Health and Science University who appears to have actually accomplished what Dr. Hwang claims to have done. “I thought somebody was kidding, but I guess they were not.” Jeanne F. Loring, a stem cell scientist at the Scripps Research Institute in San Diego, said her first reaction was “You can’t patent something that doesn’t exist.” But, she said, she later realized that “you can.”
(tags: patents absurd hwang-woo-suk cloning stem-cells science biology uspto)
-
‘Testing applications under slow or flaky network conditions can be difficult and time consuming. Blockade aims to make that easier. A config file defines a number of docker containers and a command line tool makes introducing controlled network problems simple.’ Open-source release from Dell’s Cloud Manager team (ex-Enstratius), inspired by aphyr’s Jepsen. Simulates packet loss using “tc netem”, so no ability to e.g. drop packets on certain flows or certain ports. Still, looks very usable — great stuff.
(tags: testing docker networking distributed distcomp enstratius jepsen network outages partitions cap via:lusis)
-
what US airports are causing the most misery? Looks like that old favourite, storms in ORD, right now…. (via Theo Schlossnagle)
(tags: via:postwait misery air-travel travel flying ord weather maps)
-
This sounds amazing. I hope it makes it to some kind of “semi-finished”.
A semi-roguelike game inspired by Jorge Borges, Umberto Eco, Neal Stephenson, Shadow of the Colossus, Europa Universalis and Civilization. Although currently in its early stages, URR aims to explore several philosophical and sociological issues that both arose during the sixteenth and seventeenth century (when the game is approximately set), and in the present day, whilst almost being a deep, complex and highly challenging roguelike. To do this the game seeks to generate realistic world histories, though ones containing a few unusual happenings and anomalous experiences. The traditional roguelike staple of combat will be rare and deadly – whilst these mechanics will be modeled in detail, exploration, trade and diplomacy factors will have just as much effort put into them.
(tags: games ultima-ratio-regum roguelikes borges umberto-eco worlds ascii-art)
-
It is interesting to note that the fake UK network was the only one detected by Verrimus. However, given that IMSI Catchers operate multiple fake towers simultaneously, it is highly likely that one or more Irish networks were also being intercepted. Very often a misconfiguration, such as an incorrect country code, is the only evidence available of an IMSI Catcher being deployed when forensic tools are not being used to look for one.
(tags: privacy imsi-catchers surveillance bugging spying gsocgate gsoc ireland mobile-phones)
-
An extremely congested local network segment causes the “TCP incast” throughput collapse problem — packet loss occurs, and TCP throughput collapses as a side effect. So far, this is pretty unsurprising, and anyone designing a service needs to keep bandwidth requirements in mind. However it gets worse with Riak. Due to a bug, this becomes a serious issue for all clients: the Erlang network distribution port buffers fill up in turn, and the Riak KV vnode process (in its entirety) will be descheduled and ‘cannot answer any more queries until the A-to-B network link becomes uncongested.’ This is where EC2’s fully-uncontended-1:1-network compute cluster instances come in handy, btw. ;)
(tags: incast tcp networking bandwidth riak architecture erlang buffering queueing)
Irish Law Society takes a stand for “brand owners IP rights”
The Law Society will attend a meeting of the Oireachtas Health Committee today to outline its strong opposition to the Government proposals to introduce legislation that will require tobacco products to use plain packaging. The society’s director general Ken Murphy will be its principal representative at the meeting today to discuss its submission on the legislation, and to discuss its concerns that a plain packaging regime will undermine registered trade mark, and design, systems and will amount to an “expropriation of brand owners intellectual property rights’. Speaking ahead of the meeting, Mr Murphy told The Irish Times the views contained in it represent those of the Law Society as a whole, and its 10,000 members, and have been endorsed by the society as a whole, rather than the committee. Mr Murphy also said the purpose of the Law Society submission was not to protect the tobacco industry, rather the wider effect and impact such a law would have on intellectual property rights, trade marks, in other areas. “There is a real concern also that plain packaging in the tobacco industry is just the beginning of a trend that will severely undermine intellectual property owners’ rights in other sectors such as alcohol, soft drinks and fast foods.”
Judging by some reactions on Twitter, “endorsed by the society as a whole” may be over-egging it a little.(tags: law-society gubu law ireland ip packaging branding trademarks cigarettes health tobacco)
British American Tobacco – Plain packaging of tobacco products
Compare and contrast with the Law Society’s comments:
We believe we are entitled to use our packs to distinguish our products from those of our competitors. Our brands are our intellectual property which we have created and invested in. Plain packaging would deny us the right to use brands. But also, a brand is also an important tool for consumers. As the British Brands Group has stated , plain packaging legislation “ignores the crucial role that branding plays in providing consumers with high quality, consistent products they can trust”. The restriction of valuable corporate brands by any government would risk placing it in breach of legal obligations relating to intellectual property rights and, in most cases, international trade.
(tags: law-society branding ip ireland tobacco cigarettes law trademarks)
Why dispute resolution is hard
Good stuff (as usual) from Ross Anderson and Stephen Murdoch. ‘Today we release a paper on security protocols and evidence which analyses why dispute resolution mechanisms in electronic systems often don’t work very well. On this blog we’ve noted many many problems with EMV (Chip and PIN), as well as other systems from curfew tags to digital tachographs. Time and again we find that electronic systems are truly awful for courts to deal with. Why? The main reason, we observed, is that their dispute resolution aspects were never properly designed, built and tested. The firms that delivered the main production systems assumed, or hoped, that because some audit data were available, lawyers would be able to use them somehow. As you’d expect, all sorts of things go wrong. We derive some principles, and show how these are also violated by new systems ranging from phone banking through overlay payments to Bitcoin. We also propose some enhancements to the EMV protocol which would make it easier to resolve disputes over Chip and PIN transactions.’
(tags: finance security ross-anderson emv bitcoin chip-and-pin banking architecture verification vvat logging)
CJEU in #Svensson says that in general it is OK to hyperlink to protected works without permission
IPKat says ‘this morning the Court of Justice of the European Union issued its keenly awaited decision in Case C-466/12 Svensson […]: The owner of a website may, without the authorisation of the copyright holders, redirect internet users, via hyperlinks, to protected works available on a freely accessible basis on another site. This is so even if the internet users who click on the link have the impression that the work is appearing on the site that contains the link.’ This is potentially big news. Not so much for the torrent-site scenario, but for the NNI/NLI linking-to-newspaper-stories scenario.
(tags: ip svensson cjeu eu law pirate-bay internet web links http copyright linking hyperlinks)
Migrating from MongoDB to Cassandra
Interesting side-effect of using LUKS for full-disk encryption: ‘For every disk read, we were pulling in 3MB of data (RA is sectors, SSZ is sector size, 6144*512=3145728 bytes) into cache. Oops. Not only were we doing tons of extra work, but we were trashing our page cache too. The default for the device-mapper used by LUKS under Ubuntu 12.04LTS is incredibly sub-optimal for database usage, especially our usage of Cassandra (more small random reads vs. large rows). We turned this down to 128 sectors — 64KB.’
(tags: cassandra luks raid linux tuning ops blockdev disks sdd)
-
Good to see the guys cracking on without me ;) ‘2014-02-11: SpamAssassin 3.4.0 has been released adding native support for IPv6, improved DNS Blocklist technology and support for massively-scalable Bayesian filtering using the Redis backend.’
(tags: antispam open-source spamassassin apache)
193_Cellxion_Brochure_UGX Series 330
The Cellxion UGX Series 330 is a ‘transportable Dual GSM/Triple UMTS Firewall and Analysis Tool’ — ie. an IMSI catcher in a briefcase, capable of catching IMSI/IMEIs in 3G. It even supports configurable signal strength. Made in the UK
(tags: cellxion imsi-catchers imei surveillance gsocgate gsm 3g mobile-phones security spying)
-
‘an interesting approach to a common problem, that of securely passing secrets around an infrastructure. It uses GPG signed files under the hood and nicely integrates with both version control systems and S3.’ I like this as an approach to securely distributing secrets across a stack of services during deployment. Check in the file of keys, gpg keygen on the server, and add it to the keyfile’s ACL during deployment. To simplify, shared or pre-generated GPG keys could also be used. (via the Devops Weekly newsletter)
(tags: gpg encryption crypto secrets key-distribution pki devops deployment)
java – Why not use Double or Float to represent currency?
A good canonical URL for this piece of coding guidance.
For example, suppose you have $1.03 and you spend 42c. How much money do you have left? System.out.println(1.03 – .42); => prints out 0.6100000000000001.
(tags: coding tips floating-point float java money currency bugs)
“I’m Sorry for what I said when I was Hungry” tee-shirt
I can relate to this
(tags: tee-shirts apparel etsy hangry)
-
‘One case involved Julian Assange’s current home at the Ecuadorian Embassy in London, where visitors were surprised to receive welcome messages from a Ugandan telephone company. It turned out the messages were coming from a foreign base station device installed on the roof, masquerading as a cell tower for surveillance purposes. Appelbaum suspects the GCHQ simply forgot to reformat the device from an earlier Ugandan operation.’
via T.J. McIntyre.(tags: surveillance nsa privacy imsi-catchers gchq london uganda mobile-phones julian-assange ecuador embassies)
The Spyware That Enables Mobile-Phone Snooping – Bloomberg
More background on IMSI catchers — looking likely to have been the “government-level technology” used to snoop on the Garda Ombudsman’s offices, particularly given the ‘detection of an unexpected UK 3G network near the GSOC offices’:
The technology involved is called cellular interception. The active variety of this, the “IMSI catcher,” is a portable device that masquerades as a mobile phone tower. Any phone within range (a mile for a low-grade IMSI catcher; as much as 100 miles for a passive interception device with a very large antenna, such as those used in India) automatically checks to see if the device is a tower operated by its carrier, and the false “tower” indicates that it is. It then logs the phone’s International Mobile Subscriber Identity number — and begins listening in on its calls, texts and data communications. No assistance from any wireless carrier is needed; the phone has been tricked. […] “network extender” devices — personal mobile-phone towers — sold by the carriers themselves, often called femtocells, can be turned into IMSI catchers.
Via T.J. McIntyre(tags: via:tjmcintyre imsi-catchers surveillance privacy gsocgate mobile-phones spying imsi)
Git is not scalable with too many refs/*
Mailing list thread from 2011; git starts to keel over if you tag too much
Survey results of EU teens using the internet
A lot of unsupervised use:
Just under half of children said they access the internet from their own bedroom on a daily basis with 22pc saying they do so several times a day.
(tags: surveys eu ireland politics filtering internet social-media facebook children teens cyber-bullying)
-
a pretty thought-provoking article from Linux Journal on women in computing, and how we’re doing it all wrong
(tags: feminism community programming coding women computing software society work linux-journal children teaching)
-
leading Bitcoin exchange “Magic The Gatherine Online Exchange” turns out to suffer from crappy code, surprise:
why does Mt. Gox experience this issue? They run a custom Bitcoin daemon, with a custom implementation of the Bitcoin protocol. Their implementation, against all advice, does rely on the transaction ID, which makes this attack possible. They have actually been warned about it months ago by gmaxwell, and have apparently decided to ignore this warning. In other words, this is not a vulnerability in the Bitcoin protocol, but an implementation error in Mt. Gox’ custom Bitcoin software.
The rest of the article is eyeopening, including the MySQL injection vulnerabilities and failure to correctly secure a Prolexic-defended server. https://news.ycombinator.com/item?id=7211286 has some other shocking reports of Bitcoin operators being incompetent, including ‘Bitomat, the incompetent exchange that deleted their own [sole] amazon instance accidentally which contained all their keys, and thus customer funds’. wtfbbq(tags: mtgox security bitcoin standards omgwtfbbq via:hn bitomat)
-
The side-effects of algorithmic false-positives get worse and worse.
What’s more, he adds, the NSA often locates drone targets by analyzing the activity of a SIM card, rather than the actual content of the calls. Based on his experience, he has come to believe that the drone program amounts to little more than death by unreliable metadata. “People get hung up that there’s a targeted list of people,” he says. “It’s really like we’re targeting a cell phone. We’re not going after people – we’re going after their phones, in the hopes that the person on the other end of that missile is the bad guy.”
(tags: false-positives glenn-greenwald drones nsa death-by-metadata us-politics terrorism sim-cards phones mobile-phones)
IBM’s creepy AI cyberstalking plans
‘let’s say that you tweet that you’ve gotten a job offer to move to San Francisco. Using IBM’s linguistic analysis technologies, your bank would analyze your Twitter feed and not only tailor services it could offer you ahead of the move–for example, helping you move your account to another branch, or offering you a loan for a new house — but also judge your psychological profile based upon the tone of your messages about the move, giving advice to your bank’s representatives about the best way to contact you.’
Ugh. Here’s hoping they’ve patented this shit so we don’t actually have to suffer through it. Creeeepy. (via Adam Shostack)(tags: datamining ai ibm stupid-ideas creepy stalking twitter via:adamshostack)
-
This is bananas. Confirmation bias running amok.
Brandon Mayfield was a US Army veteran and an attorney in Portland, OR. After the 2004 Madrid train bombing, his fingerprint was partially matched to one belonging to one of the suspected bombers, but the match was a poor one. But by this point, the FBI was already convinced they had their man, so they rationalized away the non-matching elements of the print, and set in motion a train of events that led to Mayfield being jailed without charge; his home and office burgled by the FBI; his client-attorney privilege violated; his life upended.
(tags: confirmation-bias bias law brandon-mayfield terrorism fingerprints false-positives fbi scary)
A patent on ‘Birth of a Child By Centrifugal Force’
On November 9 1965, the Blonskys were granted US Patent 3,216,423, for an Apparatus for Facilitating the Birth of a Child by Centrifugal Force. The drawings, as well as the text, are a revelation. The Patent Office has them online at http://tinyurl.com/jd4ra and I urge you – if you have any shred of curiosity in your body – to look them up. For conceiving what appears to be the greatest labour-saving device ever invented, George and Charlotte Blonsky won the 1999 Ig Nobel Prize in the field of Managed Health Care.
This is utterly bananas. (via christ)(tags: via:christ crazy patents 1960s centrifuge birth medicine ignobels)
A Linguist Explains the Grammar of Doge. Wow.
In this sense, doge really is the next generation of LOLcat, in terms of a pet-based snapshot of a certain era in internet language. We’ve kept the idea that animals speak like an exaggerated version of an internet-savvy human, but as our definitions of what it means to be a human on the internet have changed, so too have the voices that we give our animals. Wow.
(tags: via:nelson language linguist doge memes internet english)
Big, Small, Hot or Cold – Your Data Needs a Robust Pipeline
‘(Examples [of big-data B-I crunching pipelines] from Stripe, Tapad, Etsy & Square)’
(tags: stripe tapad etsy square big-data analytics kafka impala hadoop hdfs parquet thrift)
Realtime water level data across Ireland
Some very nice Dygraph-based time-series graphs in here, along with open CSV data. Good job!
(tags: open-data water-levels time-series data rivers ireland csv)
The Gardai haven’t requested info on any Twitter accounts in the past 6 months
This seems to imply they haven’t been investigating any allegations of cyber-bullying/harassment from “anonymous” Twitter handles, despite having the legal standing to do so. Enforcement is needed, not new laws
(tags: cyber-bullying twitter social-media enforcement gardai policing harassment online society law government)
QuakeNet IRC Network- Article – PRESS RELEASE: IRC NETWORKS UNDER SYSTEMATIC ATTACK FROM GOVERNMENTS
QuakeNet are not happy about GCHQ’s DDoS attacks against them.
Yesterday we learned … that GCHQ, the British intelligence agency, are performing persistent social and technological attacks against IRC networks. These attacks are performed without informing the networks and are targeted at users associated with politically motivated movements such as “Anonymous”. While QuakeNet does not condone or endorse and actively forbids any illegal activity on its servers we encourage discussion on all topics including political and social commentary. It is apparent now that engaging in such topics with an opinion contrary to that of the intelligence agencies is sufficient to make people a target for monitoring, coercion and denial of access to communications platforms. The … documents depict GCHQ operatives engaging in social engineering of IRC users to entrap themselves by encouraging the target to leak details about their location as well as wholesale attacks on the IRC servers hosting the network. These attacks bring down the IRC network entirely affecting every user on the network as well as the company hosting the server. The collateral damage and numbers of innocent people and companies affected by these forms of attack can be huge and it is highly illegal in many jurisdictions including the UK under the Computer Misuse Act.
-
Good to know; this generic anti-flap damping algorithm has a name.
A proportional-integral-derivative controller (PID controller) is a generic control loop feedback mechanism (controller) widely used in industrial control systems. A PID controller calculates an “error” value as the difference between a measured process variable and a desired setpoint. The controller attempts to minimize the error by adjusting the process control outputs.
(tags: control damping flapping pid-controller industrial error algorithms)
German IT Industry Looks for Boom from Snowden Revelations – SPIEGEL ONLINE
This is a great idea — Neelie Kroes suggesting that there be a certification mark for EU companies who have top-of-the-line data protection practices.
(tags: data-protection privacy certification marks eu neelie-kroes)
GCHQ slide claiming that they DDoS’d anonymous’ IRC servers
Mikko Hypponen: “This makes British Government the only Western government known to have launched DDoS attacks.”
(tags: ddos history security gchq dos anonymous irc hacking)
RTE internal memo to unhappy staff re Pantigate
‘I want to reassure you that RTÉ explored every option available to it, including right of reply. Legal advice was sought and all avenues were explored, including an offer to make a donation to a neutral charity.’ And they folded. Notable lack of testicular fortitude by our national broadcaster.
(tags: fail rte leaks memos pantigate panti-bliss homophobia libel defamation ireland)
A looming breakthrough in indistinguishability obfuscation
‘The team’s obfuscator works by transforming a computer program into what Sahai calls a “multilinear jigsaw puzzle.” Each piece of the program gets obfuscated by mixing in random elements that are carefully chosen so that if you run the garbled program in the intended way, the randomness cancels out and the pieces fit together to compute the correct output. But if you try to do anything else with the program, the randomness makes each individual puzzle piece look meaningless. This obfuscation scheme is unbreakable, the team showed, provided that a certain newfangled problem about lattices is as hard to solve as the team thinks it is. Time will tell if this assumption is warranted, but the scheme has already resisted several attempts to crack it, and Sahai, Barak and Garg, together with Yael Tauman Kalai of Microsoft Research New England and Omer Paneth of Boston University, have proved that the most natural types of attacks on the system are guaranteed to fail. And the hard lattice problem, though new, is closely related to a family of hard problems that have stood up to testing and are used in practical encryption schemes.’ (via Tony Finch)
(tags: obfuscation cryptography via:fanf security hard-lattice-problem crypto science)
Little’s Law, Scalability and Fault Tolerance: The OS is your bottleneck. What you can do?
good blog post on Little’s Law, plugging quasar, pulsar, and comsat, 3 new open-source libs offering Erlang-like lightweight threads on the JVM
(tags: jvm java quasar pulsar comsat littles-law scalability async erlang)
Target Hackers Broke in Via HVAC Company
Avivah Litan, a fraud analyst with Gartner Inc., said that although the current PCI standard does not require organizations to maintain separate networks for payment and non-payment operations (page 7), it does require merchants to incorporate two-factor authentication for remote network access originating from outside the network by personnel and all third parties.
Target shared the same network for outside contractor access and the critical POS devices. fail. (via Joe Feise)(tags: via:joe-feise hvac contractors fraud malware 2fa security networking payment pci)
Yahoo! moving EMEA operations to Dublin
Like many companies, the structure of Yahoo’s business is driven by the needs of the business. There are a number of factors which influence decisions about the locations in which the business operates. To encourage more collaboration and innovation, we’re increasing our headcount in Dublin, thus continuing to bring more Yahoos together in fewer locations. Dublin is already the European home to many of the world’s leading global technology brands and has been a home for Yahoo for over a decade already.
Via Conor O’Neill
-
zero-install, one-click video chat, using WebRTC. nifty
(tags: conference webrtc chat collaboration video google-chrome conferencing)
Opinion: How can we get over ‘Pantigate’?
The fact that RTÉ had agreed to pay damages (€80,000 in total, according to reports yesterday) to the ‘injured parties’, only came to light in an email from the [far-right Catholic lobby group Iona Institute] to its members last Tuesday. Given the ramifications of the decision to make any kind of payment – regardless of the amount – both for the TV licence payer and those who voice contrarian opinions, the lack of coverage in print media as soon as the Iona email came to light marked a low point for print journalism in Ireland. Aside from a lead story on the damages printed in this paper last Wednesday and ongoing debate online, the media has been glacially slow with commentary and even reportage of the affair. The debacle has untold ramifications for public life in this country. That many liberal commentators may now baulk at the opportunity to speak and write openly and honestly about homophobia is the most obvious issue here. Most worrying of all, however, is the question that with a referendum on the introduction of gay marriage on the horizon, how can we expect the national broadcaster to facilitate even-handed debate on the subject when they’ve already found themselves cowed before reaching the first hurdle?
(tags: homophobia politics ireland libel dissent lobbying defamation law gay-marriage iona-institute journalism newspapers)
-
Rest.li is a REST+JSON framework for building robust, scalable service architectures using dynamic discovery and simple asynchronous APIs. Rest.li fills a niche for building RESTful service architectures at scale, offering a developer workflow for defining data and REST APIs that promotes uniform interfaces, consistent data modeling, type-safety, and compatibility checked API evolution.
The new underlying comms layer for Voldemort, it seems.(tags: voldemort d2 rest.li linkedin json rest http api frameworks java)
Hardened SSL Ciphers Using ELB and HAProxy
ELBs support the PROXY protocol
(tags: elb security proxying ssl tls https haproxy perfect-forward-secrecy aws ec2)
-
“A data scientist is a statistician who lives in San Francisco” – slide from Monkigras this year. lols
(tags: data-scientist statistics statistician funny jokes san-francisco tech monkigras)
The Million Dollar Deal – YouTube
My mate Luke’s doc on the World Series of Poker — now online in full. it’s great.
A documentary about the World Series Of Poker in Las Vegas. Featuring Andrew Black, Donnacha O’Dea, Mike Magee, “Mad” Martyn Wilson, Mark Napolitano, Amarillo Slim, Scotty Nguyen, Dave “Devilfish” Ulliott & Matt Damon. Narrated by John Hurt. Directed by John Butler, Produced by Luke McManus
(tags: documentaries film poker world-series-of-poker mike-magee andrew-black donnacha-odea matt-damon)
How to invoke section 4 of the Data Protection Acts in Ireland
One wierd trick to get your personal data (in any format) from any random organisation, for only EUR6.35 and up to 40 days wait! Good to know.
Hospitals and doctors’ offices in Ireland will give a person their medical records if they ask for them. Mostly. Eventually. When they get to it. And, sometimes, if you pay them over €100 (for a large file). But, like so much else in the legal world, there is a set of magic words you can incant to place a 40 day deadline on the delivery of your papers and limit the cost to €6.35 — you invoke the Data Protection Acts data access request procedure.
(tags: data-protection privacy data-retention dpa-section-4 data ireland medical law dpa)
Save 10% on rymdkapsel on Steam
rymdkapsel is a game where you take command of a space station and its minions. You will have to plan your expansion and manage your resources to explore the galaxy.
recommended by JK.(tags: steam games recommended space gaming)