All posts filed under “Treacherous computing

The Hacker’s Amendment

The Hacker’s Amendment

Congress shall pass no law limiting the rights of persons to manipulate, operate, or otherwise utilize as they see fit any of their possessions or effects, nor the sale or trade of tools to be used for such purposes. From Artraze commenting on this Slashdot […]

comments 3
Biting Apple

Biting Apple

Interesting to see the BBC’s summary of the current iPhone update story: “Apple issues an update which damages iPhones that have been hacked by users”. I’m not sure that’s quite how Apple’s PR people would have put it, but it’s interesting to see that whoever […]

comments 8
Dishonourable discharge?

Dishonourable discharge?

Long overdue, I’m currently reading Bruce Schneier‘s excellent Beyond Fear, and realising that in many ways, security thinking overlaps with architectures of control: the goal of so many systems is to control users’ behaviour or to deny the user the ability to perform certain actions. […]

comments 5
Some links

Some links

First, an apology for anyone who’s had problems with the RSS/Atom feeds over the last month or so. I think they’re fixed now (certainly Bloglines has started picking them up again) but please let me know if you don’t read this. Oops, that won’t work… […]

comments 2
Digital control round-up

Digital control round-up

Some developments in – and commentary on – digital architectures of control to end 2006: Peter Gutmann’s ‘A Cost Analysis of Windows Vista Content Protection’ (via Bruce Schneier) looks very lucidly at the effects that Vista’s DRM and measures to ‘protect’ content will have – […]

comment 1
Uninnovate – engineering products to do less

Uninnovate – engineering products to do less

Image from uninnovate.com I’ve just come across a very interesting new blog, uninnovate.com, which focuses on the phenomenon of “engineering expensive features into a product for which there is no market demand in order to make the product do less.” The first few posts tackle […]

comment 0
The illusion of control

The illusion of control

Scott Adams recounts an anecdote illustrating the ‘illusion of control’ and how important it is to many people – even to the extent that it is the single defining characteristic of mankind which one might use to explain human behaviour to aliens: “The maintenance man […]

comments 4
The Privacy Ceiling

The Privacy Ceiling

Scott Craver of the University of Binghamton has a very interesting post summarising the concept of a ‘privacy ceiling’: “This is an economic limit on privacy violation by companies, owing to the liability of having too much information about (or control over) users.” It’s the […]

comment 1
Use of RFID in DRM

Use of RFID in DRM

Via Dave Farber’s Interesting People, a brief New Scientist article outlines Sony’s continuing obsession with restricting and controlling its customers (the last one didn’t go too well): “A patent filed by Sony last week suggests it may once again be considering preventing consumers making “too […]

comment 1
Review: Everyware by Adam Greenfield

Review: Everyware by Adam Greenfield

This is the first book review I’ve done on this blog, though it won’t be the last. In a sense, this is less of a conventional review than an attempt to discuss some of the ideas in the book, and synthesise them with points that […]

comments 10
Friend or foe: Battery-authentication ICs?

Friend or foe: Battery-authentication ICs?

Via MAKE, an article from Electrical Design News looking at lithium battery authentication chips in products such as phones and laptops, designed to prevent users fitting ‘non-genuine’ batteries. Now, the immediate response of most of us is probably “razor blade model!” or even “stifling democratic […]

comments 3
Oh yeah, that Windows Kill Switch

Oh yeah, that Windows Kill Switch

I know the furore surrounding Microsoft’s ‘Windows Genuine Advantage’ is a few days old, and perhaps I should have blogged about it at the time, specifically the rumoured ‘Kill Switch’ which would remotely deactivate any PCs apparently running ‘non-genuine’ copies of XP. That’s certainly a […]

comments 3