Long overdue, I’m currently reading Bruce Schneier‘s excellent Beyond Fear, and realising that in many ways, security thinking overlaps with architectures of control: the goal of so many systems is to control users’ behaviour or to deny the user the ability to perform certain actions. […]
All posts filed under “Treacherous computing”
Biting Apple
Interesting to see the BBC’s summary of the current iPhone update story: “Apple issues an update which damages iPhones that have been hacked by users”. I’m not sure that’s quite how Apple’s PR people would have put it, but it’s interesting to see that whoever […]
The Hacker’s Amendment
Congress shall pass no law limiting the rights of persons to manipulate, operate, or otherwise utilize as they see fit any of their possessions or effects, nor the sale or trade of tools to be used for such purposes. From Artraze commenting on this Slashdot […]
ZDNet: DRM train wrecks
ZDNet’s David Berlind has started to compile a Del.icio.us list of examples of ‘DRM train wrecks’, i.e. situations where the use of DRM has a distasteful corollary for consumers unaware of what they’re getting themselves into. “Most people don’t realize how much they’re giving up […]
‘Researchers develop prototype system to thwart unwanted video and still photography’
Via Boing Boing, ‘Researchers develop prototype system to thwart unwanted video and still photography’, news from Georgia Tech of a system that scans and finds the CCDs of digital imaging equipment and shines bright light (or a laser) into them in order to flood them […]
Interesting quote from Ted Nelson
Just looking up something else, I stumbled across this quote from Ted Nelson. From ‘Ted’s ComParadigm in OneLiners’: “A frying-pan is technology. All human artifacts are technology. But beware anybody who uses this term. Like “maturity” and “reality” and “progress”, the word “technology” has an […]
Digital control round-up
Some developments in – and commentary on – digital architectures of control to end 2006: Peter Gutmann’s ‘A Cost Analysis of Windows Vista Content Protection’ (via Bruce Schneier) looks very lucidly at the effects that Vista’s DRM and measures to ‘protect’ content will have – […]
Some links
First, an apology for anyone who’s had problems with the RSS/Atom feeds over the last month or so. I think they’re fixed now (certainly Bloglines has started picking them up again) but please let me know if you don’t read this. Oops, that won’t work… […]
Forcing functions designed to increase product consumption
A few days ago, Tim Quinn of Dangerous Curve posted an interesting observation on the Simple Control in Products page: “This may not be what you had in mind, but I immediately thought of such things as toothpaste pumps that ‘meter’ use to insure the […]
Use of RFID in DRM
Via Dave Farber’s Interesting People, a brief New Scientist article outlines Sony’s continuing obsession with restricting and controlling its customers (the last one didn’t go too well): “A patent filed by Sony last week suggests it may once again be considering preventing consumers making “too […]
The Privacy Ceiling
Scott Craver of the University of Binghamton has a very interesting post summarising the concept of a ‘privacy ceiling’: “This is an economic limit on privacy violation by companies, owing to the liability of having too much information about (or control over) users.” It’s the […]
The illusion of control
Scott Adams recounts an anecdote illustrating the ‘illusion of control’ and how important it is to many people – even to the extent that it is the single defining characteristic of mankind which one might use to explain human behaviour to aliens: “The maintenance man […]