Internet matters

One fascinating dimension of software-defined radio is the ability to establish mesh networks: distributed data sharing systems where each computer involved is a node which can carry traffic on behalf of others. That means that as long as you have solid radio links you can establish a network that can transmit information independently from the […]

{ 1 comment }

Charlie Stross’s talk at the 34th Chaos Communications Congress highlights risks associated with artificial intelligence technologies in combination with factors like geolocation, the engineering of content online to produce emotional responses, and people with malicious objectives from manipulating elections to harassing women seeking abortions. It’s worth watching, and starting to think about what sort of […]

{ 0 comments }

As an experiment in living and in an effort to protect my sleep I have set my router to disable internet access from all my devices between 2:00am and 7:00am seven days a week. Especially when I am feeling down and wishing I could avoid things, there is a temptation to just keep clicking through […]

{ 0 comments }

In an illustration of combinatorial mathematics, what3words.com will represent any location on Earth as a set of three simple English words. It’s intended to help in cities that lack formal maps and street names. The points it distinguishes are close enough together that for a building of any size you get various choices. The Toronto […]

{ 0 comments }

I have been curious about picking up a Raspberry Pi one board computer. They are the standard hardware for nodes on the Toronto Mesh network, so with a suitable USB radio transceiver I could use it in small areas as a bridge to their network via the IPv6 Hyperboria network. I could also use it […]

{ 7 comments }

For two years I have been working on an art project. I’m not sure whether the concept predated when I first heard James Allard’s lecture on Mary Shelley’s Frankenstein, but the lecture is a great demonstration of how labeling does interpretive work when it comes to art. Presented with a digital file, we may struggle […]

{ 12 comments }

I see enormous appeal in Google’s new advanced protection system for accounts. It requires a physical token to access your account, adds further screening of attachments, and has a much tougher account recovery process for anybody who legitimately loses access to their own account. It augments the security provided by their two-factor smartphone app by […]

{ 0 comments }

I suppose it’s at least as old as the letter, but communications anxiety (COMANX) has some notable features. Whenever one feels it is possible that a psychologically difficult message will arrive via any medium — whether it’s by mail, telephone, email, text, or Facebook — it sets up the mind to be constantly apprehensive. Every […]

{ 0 comments }

It seems the WPA2 encryption system used by most WiFi networks is badly broken: New KRACK Attack Against Wi-Fi Encryption KRACK! Wifi’s go-to security, WPA2, is fatally flawed, and will probably never be patched in many places WPA2: Broken with KRACK. What now? ‘All wifi networks’ are vulnerable to hacking, security expert discovers This follows […]

{ 6 comments }

I left Facebook a long time ago. I’m back now because I think many of my potential PhD interview subjects will check me out there. Transparency and consultation have been critical parts of this project from the beginning:

{ 3 comments }