Internet matters

Charlie Stross’s talk at the 34th Chaos Communications Congress highlights risks associated with artificial intelligence technologies in combination with factors like geolocation, the engineering of content online to produce emotional responses, and people with malicious objectives from manipulating elections to harassing women seeking abortions. It’s worth watching, and starting to think about what sort of […]

{ 0 comments }

As an experiment in living and in an effort to protect my sleep I have set my router to disable internet access from all my devices between 2:00am and 7:00am seven days a week. Especially when I am feeling down and wishing I could avoid things, there is a temptation to just keep clicking through […]

{ 0 comments }

In an illustration of combinatorial mathematics, what3words.com will represent any location on Earth as a set of three simple English words. It’s intended to help in cities that lack formal maps and street names. The points it distinguishes are close enough together that for a building of any size you get various choices. The Toronto […]

{ 0 comments }

I have been curious about picking up a Raspberry Pi one board computer. They are the standard hardware for nodes on the Toronto Mesh network, so with a suitable USB radio transceiver I could use it in small areas as a bridge to their network via the IPv6 Hyperboria network. I could also use it […]

{ 7 comments }

For two years I have been working on an art project. I’m not sure whether the concept predated when I first heard James Allard’s lecture on Mary Shelley’s Frankenstein, but the lecture is a great demonstration of how labeling does interpretive work when it comes to art. Presented with a digital file, we may struggle […]

{ 12 comments }

I see enormous appeal in Google’s new advanced protection system for accounts. It requires a physical token to access your account, adds further screening of attachments, and has a much tougher account recovery process for anybody who legitimately loses access to their own account. It augments the security provided by their two-factor smartphone app by […]

{ 0 comments }

I suppose it’s at least as old as the letter, but communications anxiety (COMANX) has some notable features. Whenever one feels it is possible that a psychologically difficult message will arrive via any medium — whether it’s by mail, telephone, email, text, or Facebook — it sets up the mind to be constantly apprehensive. Every […]

{ 0 comments }

It seems the WPA2 encryption system used by most WiFi networks is badly broken: New KRACK Attack Against Wi-Fi Encryption KRACK! Wifi’s go-to security, WPA2, is fatally flawed, and will probably never be patched in many places WPA2: Broken with KRACK. What now? ‘All wifi networks’ are vulnerable to hacking, security expert discovers This follows […]

{ 6 comments }

I left Facebook a long time ago. I’m back now because I think many of my potential PhD interview subjects will check me out there. Transparency and consultation have been critical parts of this project from the beginning:

{ 3 comments }

A somewhat obvious rule of internet security to add to the first three: Against a sophisticated attacker, nothing connected to the internet is secure. Everything is internet now. You should probably worry more about being attacked online by your own government than by any other organization. Sensitive data about you is largely on the computers […]

{ 2 comments }