Internet matters

In an illustration of combinatorial mathematics, what3words.com will represent any location on Earth as a set of three simple English words. It’s intended to help in cities that lack formal maps and street names. The points it distinguishes are close enough together that for a building of any size you get various choices. The Toronto […]

{ 0 comments }

I have been curious about picking up a Raspberry Pi one board computer. They are the standard hardware for nodes on the Toronto Mesh network, so with a suitable USB radio transceiver I could use it in small areas as a bridge to their network via the IPv6 Hyperboria network. I could also use it […]

{ 4 comments }

For two years I have been working on an art project. I’m not sure whether the concept predated when I first heard James Allard’s lecture on Mary Shelley’s Frankenstein, but the lecture is a great demonstration of how labeling does interpretive work when it comes to art. Presented with a digital file, we may struggle […]

{ 5 comments }

I see enormous appeal in Google’s new advanced protection system for accounts. It requires a physical token to access your account, adds further screening of attachments, and has a much tougher account recovery process for anybody who legitimately loses access to their own account. It augments the security provided by their two-factor smartphone app by […]

{ 0 comments }

I suppose it’s at least as old as the letter, but communications anxiety (COMANX) has some notable features. Whenever one feels it is possible that a psychologically difficult message will arrive via any medium — whether it’s by mail, telephone, email, text, or Facebook — it sets up the mind to be constantly apprehensive. Every […]

{ 0 comments }

It seems the WPA2 encryption system used by most WiFi networks is badly broken: New KRACK Attack Against Wi-Fi Encryption KRACK! Wifi’s go-to security, WPA2, is fatally flawed, and will probably never be patched in many places WPA2: Broken with KRACK. What now? ‘All wifi networks’ are vulnerable to hacking, security expert discovers This follows […]

{ 6 comments }

I left Facebook a long time ago. I’m back now because I think many of my potential PhD interview subjects will check me out there. Transparency and consultation have been critical parts of this project from the beginning:

{ 3 comments }

A somewhat obvious rule of internet security to add to the first three: Against a sophisticated attacker, nothing connected to the internet is secure. Everything is internet now. You should probably worry more about being attacked online by your own government than by any other organization. Sensitive data about you is largely on the computers […]

{ 1 comment }

It’s crazy how demanding web browsers have become. Both my main computers are somewhat old, but they can run modern 3D games at low graphics settings and perform computationally-intensive tasks like converting RAW files to JPG. Nonetheless, I find both my iMac and my MacBook Pro routinely struggling to run GMail in Safari, Firefox, or […]

{ 1 comment }

One mechanism of control used by the Chinese government is censorship of the media and the internet. Reportedly, this has been so comprehensive and successful that young people in China are unlikely to know about the Tiananmen Square protests of 1989. This is an important example of how governments are often the biggest threat to […]

{ 4 comments }