Friday, January 3rd, 2020
Thursday, November 21st, 2019
Surveillance giants: How the business model of Google and Facebook threatens human rights | Amnesty International
Amnesty International have released a PDF report on the out-of-control surveillance perpetrated by Google and Facebook:
Google and Facebook’s platforms come at a systemic cost. The companies’ surveillance-based business model forces people to make a Faustian bargain, whereby they are only able to enjoy their human rights online by submitting to a system predicated on human rights abuse. Firstly, an assault on the right to privacy on an unprecedented scale, and then a series of knock-on effects that pose a serious risk to a range of other rights, from freedom of expression and opinion, to freedom of thought and the right to non-discrimination.
This page on the Amnesty International website has six tracking scripts. Also, consent to accept tracking cookies is assumed (check dev tools). It looks like you can reject marketing cookies, but I tried that without any success.
The stone PDF has been thrown from a very badly-performing glass house.
Friday, August 2nd, 2019
Wednesday, March 20th, 2019
Ah, what a wonderful treasure trove this is! PDF scans of Apollo era press kits from a range of American companies.
- Official NASA
- Lunar Module
There’s something so fascinating about the mundane details of Isolation/Quarantine Foods for Apollo 11 Astronauts from Stouffer’s.
Sunday, January 6th, 2019
Friday, December 28th, 2018
Well, this an interesting format experiment—the latest Black Mirror just dropped, and it’s a PDF.
Saturday, January 13th, 2018
From the proceedings of the Electronic Computer Symposium in 1952, the remarkable Ida Rhodes describes a vision of the future…
My crystal ball reveals Mrs. Mary Jones in the living room of her home, most of the walls doubling as screens for projected art or information. She has just dialed her visiophone. On the wall panel facing her, the full colored image of a rare orchid fades, to be replaced by the figure of Mr. Brown seated at his desk. Mrs. Jones states her business: she wishes her valuable collection of orchid plants insured. Mr. Brown consults a small code book and dials a string of figures. A green light appears on his wall. He asks Mrs. Jones a few pertinent questions and types out her replies. He then pushes the start button. Mr. Brown fades from view. Instead, Mrs. Jones has now in front of her a set of figures relating to the policy in which she is interested. The premium rate and benefits are acceptable and she agrees to take out the policy. Here is Brown again. From a pocket in his wall emerges a sealed, addressed, and postage-metered envelope which drops into the mailing chute. It contains, says Brown, an application form completely filled out by the automatic computer and ready for her signature.
Monday, October 2nd, 2017
Alan Kay’s initial description of a “Dynabook” written at Xerox PARC in 1972.
Sunday, August 20th, 2017
Sunday, January 15th, 2017
A 1983 article from 73 Magazine on the surprisingly plausible Rube Goldberg/Heath Robinson device created by E.T. to call home.
Wednesday, December 28th, 2016
The many formats of Resilient Web Design
If you don’t like reading in a web browser, you might like to know that Resilient Web Design is now available in more formats.
Oliver Williams has created a MOBI version. That’s means you can read it on a Kindle. I plugged my old Kindle into my computer, dragged that file onto its disc image, and it worked a treat.
Oh, and there’s the podcast. I’ve only released two chapters so far. The Christmas break and an untimely cold have slowed down the release schedule a little bit.
If you think the book should be available in any other formats, and you fancy having a crack at it, please feel free to use the source files.
Monday, December 19th, 2016
You can print out this PDF and then have the satisfaction of ticking off each item on the list as you build your website.
Sunday, December 4th, 2016
Well, look at these fresh-faced lads presenting their little hypertext system in 1992. A fascinating time capsule.
Saturday, October 29th, 2016
We find that the detected signals have exactly the shape of an ETI signal predicted in the previous publication and are therefore in agreement with this hypothesis.
Monday, February 8th, 2016
Good news for net neutrality from India:
No service provider shall enter into any arrangement, agreement or contract, by whatever name called, with any person, natural or legal, that has the effect of discriminatory tariffs for data services being offered or charged to the consumer on the basis of content.
Sunday, December 6th, 2015
It’s a PDF and it’s an academic paper, but this rousing call to arms is a remarkably clear and engrossing read.
With few exceptions, the atomic scientists who worked on disarmament were not the same individuals as those who built the bomb. Their colleagues—fellow physicists—did that. Cryptographers didn’t turn the Internet into an instrument of total surveillance, but our colleagues—fellow computer scientists and engineers—did that.
It concludes with a series of design principles for the cryptographic community:
- Attend to problems’ social value. Do anti-surveillance research.
- Be introspective about why you are working on the problems you are.
- Apply practice-oriented provable security to anti-surveillance problems.
- Think twice, and then again, about accepting military funding.
- Regard ordinary people as those whose needs you ultimately aim to satisfy.
- Be open to diverse models. Regard all models as suspect and dialectical.
- Get a systems-level view. Attend to that which surrounds our field.
- Learn some privacy tools. Use them. Improve them.
- Stop with the cutesy pictures. Take adversaries seriously.
- Design and build a broadly useful cryptographic commons.
- Choose language well. Communication is integral to having an impact.
We need to erect a much expanded commons on the Internet. We need to realize popular services in a secure, distributed, and decentralized way, powered by free software and free/open hardware. We need to build systems beyond the reach of super-sized companies and spy agencies. Such services must be based on strong cryptography. Emphasizing that prerequisite, we need to expand our cryptographic commons.
Saturday, November 7th, 2015
We have made a radio reconnaissance of the star KIC 8462852 whose unusual light curves might possibly be due to planet-scale technology of an extraterrestrial civilization.
Nothing to report yet.
Tuesday, October 27th, 2015
This is something that has been bugging me ever since reading the book:
While Andy Weir does a good job of representing the risks faced by Mark Watney, stranded on Mars and confronting one life-threatening challenge after another, he is silent on the threat of radiation, not just to Mark but particularly to the crew of the Hermes as they contemplate executing a daring rescue mission that more than doubles their time in deep space.
Well, this paper answers all my questions.
Wednesday, August 5th, 2015
Kelli Anderson’s thesis on the Human Interference Task Force project set up to mark nuclear waste sites for future generations (a project I’ve referenced in some of my talks).
Monday, April 13th, 2015
A PDF of Clarke’s classic essay on the follies of prediction. From the 1972 collection The Futurists, edited by Alvin Toffler.