All posts filed under “Monopoly

Dishonourable discharge?

Dishonourable discharge?

Long overdue, I’m currently reading Bruce Schneier‘s excellent Beyond Fear, and realising that in many ways, security thinking overlaps with architectures of control: the goal of so many systems is to control users’ behaviour or to deny the user the ability to perform certain actions. […]

In default, defiance

In default, defiance

‘Choice of default’ is a theme which has come up a few times on the blog: in general, many people accept the options/settings presented to them, and do not question or attempt to alter them. The possibilities for controlling or shaping users’ behaviour in this […]

Ticket off (reprise)

Ticket off (reprise)

Last year we looked at the way that the pricing structure of no-change-given ticket machines is often – apparently – designed to lead to overpayment, and I posed the question of whether councils/car park operators actually draw up their budget based on a significant proportion […]

Bad profits

Bad profits

The Gillette Sensor Excel not only comes with a dummy blade, it also only comes with two out of five possible blade slots filled. Images from Sevenblock on Flickr. The razor-blade model in general is something of an old chestnut as far as architectures of […]

Another charging opportunity?

Another charging opportunity?

Last month, an Apple patent application was published describing a method of “Protecting electronic devices from extended unauthorized use” – effectively a ‘charging rights management’ system. New Scientist and OhGizmo have stories explaining the system; while the stated intention is to make stolen devices less […]

Digital control round-up

Digital control round-up

Mac as a giant dongle At Coding Horror, Jeff Atwood makes an interesting point about Apple’s lock-in business model: It’s almost first party only– about as close as you can get to a console platform and still call yourself a computer… when you buy a […]

The Hacker’s Amendment

The Hacker’s Amendment

Congress shall pass no law limiting the rights of persons to manipulate, operate, or otherwise utilize as they see fit any of their possessions or effects, nor the sale or trade of tools to be used for such purposes. From Artraze commenting on this Slashdot […]

ZDNet: DRM train wrecks

ZDNet: DRM train wrecks

ZDNet’s David Berlind has started to compile a Del.icio.us list of examples of ‘DRM train wrecks’, i.e. situations where the use of DRM has a distasteful corollary for consumers unaware of what they’re getting themselves into. “Most people don’t realize how much they’re giving up […]

Digital control round-up

Digital control round-up

Some developments in – and commentary on – digital architectures of control to end 2006: Peter Gutmann’s ‘A Cost Analysis of Windows Vista Content Protection’ (via Bruce Schneier) looks very lucidly at the effects that Vista’s DRM and measures to ‘protect’ content will have – […]

Coercive atmospherics reach the bus shelter

Coercive atmospherics reach the bus shelter

Jonathan Zittrain discusses scented advertising in bus shelters: the California Milk Processor Board recently tried a campaign with chocolate-chip cookie-scented “aromatic strips”, intended to provoke a thirst for milk, in San Francisco before having to remove them after allergy/chemical sensitivity concerns. The use of scent […]