All posts filed under “Razor blade model

Dishonourable discharge?

Dishonourable discharge?

Long overdue, I’m currently reading Bruce Schneier‘s excellent Beyond Fear, and realising that in many ways, security thinking overlaps with architectures of control: the goal of so many systems is to control users’ behaviour or to deny the user the ability to perform certain actions. […]

Bad profits

Bad profits

The Gillette Sensor Excel not only comes with a dummy blade, it also only comes with two out of five possible blade slots filled. Images from Sevenblock on Flickr. The razor-blade model in general is something of an old chestnut as far as architectures of […]

Another charging opportunity?

Another charging opportunity?

Last month, an Apple patent application was published describing a method of “Protecting electronic devices from extended unauthorized use” – effectively a ‘charging rights management’ system. New Scientist and OhGizmo have stories explaining the system; while the stated intention is to make stolen devices less […]

BBC: Bram Cohen on network neutrality

BBC: Bram Cohen on network neutrality

This BBC Newsnight story, by Adam Livingstone, about the possibilities of a two-tier internet – ‘BitTorrent: Shedding no tiers’ – has an interesting fictional ‘architectures of control’ example to illustrate the possibilities of price discrimination in networks (see also Control & Networks): “So there’s me […]

Limiting frequency of cigarette use

Limiting frequency of cigarette use

 Images from nicostopper.com and Popgadget Nicostopper is an electronic dispenser which holds up to 10 cigarettes, and releases them one at a time at programmed intervals, to help pace and restrict the smoker. The screen “will also flash “self-help” messages each time to make you […]

Dependence

Dependence

Karel Donk has some intriguing thoughts on ‘maximising the upside’ of life, by reducing dependence on other people, status and possessions, so that there is less to lose: So one of the important things in life is to be as independent as possible and rely […]

A bright idea?

A bright idea?

UPDATE: See this more recent post for information and photos of how to get a 2-pin bulb to fit in a BC3 fitting. This may well be the example which involves the most different ‘architecture of control’ issues so far – by a long way. […]

Useful terminat-ology

Useful terminat-ology

Image from Black Flag website. Sometimes there’s very useful terminology in one field, or culture, which allows clearer or more succinct explanation of concepts in another. In the UK we don’t have Roach Motels. There are doubtless similar products, but they don’t have such a […]

Use of RFID in DRM

Use of RFID in DRM

Via Dave Farber’s Interesting People, a brief New Scientist article outlines Sony’s continuing obsession with restricting and controlling its customers (the last one didn’t go too well): “A patent filed by Sony last week suggests it may once again be considering preventing consumers making “too […]