All posts filed under “Technical protection measures

Design with Intent presentation from Persuasive 2008

Design with Intent presentation from Persuasive 2008

Dan Lockton: Design With Intent (Persuasive 2008) view presentation (tags: environment affordances sustainability lockton) EDIT: I’ve now added the audio! Thanks everyone for the suggestions on how best to do it; the audio is hosted on this site rather than the Internet Archive as the […]

One-way turn of the screw

One-way turn of the screw

One-way screws, such as the above (image from Designing Against Vandalism, ed. Jane Sykes, The Design Council, London, 1979) are an interesting alternative to the usual array of tamper-proof ‘security fasteners’ (which usually require a special tool to fit and remove). There’s a very interesting […]

Skinner and the Mousewrap

Skinner and the Mousewrap

Dontclick.it, an interesting interface design experiment by Alex Frank, included this amusing idea, the Mousewrap, to ‘train’ users not to click any more “through physical pain”. It did make me think: is the use of anti-sit spikes on window sills, ledges, and so on, or […]

Finestrino Bloccato

Finestrino Bloccato

Italian railway operator Trenitalia has a simple way of locking the windows shut in some of its older carriages with (retro-fitted?) air-conditioning. This was on a train from Florence to Pisa; the sticker probably cost more than the screw. I like that. It also allows […]

Dishonourable discharge?

Dishonourable discharge?

Long overdue, I’m currently reading Bruce Schneier‘s excellent Beyond Fear, and realising that in many ways, security thinking overlaps with architectures of control: the goal of so many systems is to control users’ behaviour or to deny the user the ability to perform certain actions. […]

On the level

On the level

A tilt-detector from this 1984 US patent, with intended application on a packing box. The liquid detection stickers in mobile phones, which allow manufacturers and retailers to ascertain if a phone has got wet, and thus reject warranty claims (whether judiciously/appropriately or not), seem to […]

Biting Apple

Biting Apple

Interesting to see the BBC’s summary of the current iPhone update story: “Apple issues an update which damages iPhones that have been hacked by users”. I’m not sure that’s quite how Apple’s PR people would have put it, but it’s interesting to see that whoever […]

The right to click

The right to click

English Heritage, officially the Historic Buildings and Monuments Commission for England, and funded by the taxpayer and by visitors to some of its properties, does a great deal of very good work in widening public appreciation of, and engagement with, history and the country’s heritage. […]

Another charging opportunity?

Another charging opportunity?

Last month, an Apple patent application was published describing a method of “Protecting electronic devices from extended unauthorized use” – effectively a ‘charging rights management’ system. New Scientist and OhGizmo have stories explaining the system; while the stated intention is to make stolen devices less […]

Digital control round-up

Digital control round-up

Mac as a giant dongle At Coding Horror, Jeff Atwood makes an interesting point about Apple’s lock-in business model: It’s almost first party only– about as close as you can get to a console platform and still call yourself a computer… when you buy a […]

Destroy everything you touch

Destroy everything you touch

We can’t help but be familiar with the concept of ‘malicious code’ in the context of computer security and programming, but in general the idea of products or technology which, as they’re used, sabotage or degrade the performance of a ‘rival’, is intriguing and not […]