Firesheep, enterprise software and other broken models

Posted by Unknown Sabtu, 13 November 2010 0 komentar

There has been a lot of fuss about FireSheep, a browser plugin that show how easy it is to intercept packets on the internet, and masquerade as someone else. The idea is nothing new: EtherPeg—which intercepts wifi traffic and shows the JPEGs and other images passing by—is over 10 years old. Annalee Newitz wrote a Wired story on people packet sniffing in coffee shops back in 2004.

The underlying design of the internet means that you don't know who will be able to see any packets you send. If you care about not being snooped on, you need an encrypted connection from your computer to the one serving you at the other end. The best way to do this on the web is to use HTTPS, which all browsers support, and most servers support with configuration changes. It's not perfect, but it's good enough.

However, much of the advice following on from FireSheep was misleading or outright wrong. I saw several articles saying:

  • Avoid Open WiFi
  • Turn on WPA encryption
  • Use a VPN to tunnel the traffic into a server elsewhere

These techniques may protect for a while against those nearby you in the Café, but by not securing the whole connection, they just change who is able to intercept your communications.

The security model here is the firewall one - the notion that there are trusted networks and untrusted networks, and as long as you're inside a trusted one, you'll be OK. This is an obsolete worldview. When computers were large fixed physical entities with software controlled by a specialist, and networks were wires under their control too, this had some correspondence with reality, but it was always tenuous - others within the firewall could be running compromised machines; outbound connections could still leak data.

If you VPN into a company or service to mask your outbound connections, that endpoint is an attractive point of attack, as it has collected a set of people who think their data needs securing. There's a clear example of this in this NYT article about a hacker who lured his friends to use an FBI VPN to track them down and arrest them.

This worldview connects with two other themes. The US Government is trying to pass a law requiring ISPs to enable your communications to be intercepted. The UK government is also working on legislation on retaining all email and web traffic. Similarly, many companies monitor internet traffic within and leaving their secure networks for legal compliance and employee monitoring. Such mandated backdoors, like the VPN tunnel, become attractive targets for other bad actors - remember the Greek government being spied on through a legally mandated interception backdoor in the phones they used?

This week, I spent a couple of days at the Enterprise 2.0 conference, hearing how open standards like Activity Streams and OpenSocial are being used to bridge separate business information systems both within and between companies, with OAuth used to enforce corporate policy.

This seems anathema to old-line IT managers who assume that they dictate who gets to see what, but the pragmatic realisation that many business people have more powerful and connected computing devices in their pockets as phones than on their desks from corporate IT was in evidence at E2.0 at least.

This brought to mind the great conversation we had with Josh Klein on TummelVision last week, discussing his book Hacking Work - breaking stupid rules for smart results:

one of the most common hacks we found: jumping IT’s firewall and working around their restrictions and tools in open computing environments, then bringing the work back over the firewall and presenting it to bosses as if the corporate tools had actually been used.

Ben Horowitz's article on enterprise sales in TechCrunch today tries to justify corporate practices, even as he recognizes the inversion of the innovation flow.

What this misses is the underlying economic justification for the existence of a corporation in the first place - the economic theories that build on Coase's work saying that firms exist because transaction costs are lower within them than external transactions mediated by the marketplaces. Pettifogging internal purchasing rules should be subject to this test: does the internal transaction cost of approving and purchasing something exceed the value of the thing being purchased?

Reading Ben's explanation of how corporate salespeople help institutions negotiate their own labyrinthine processes, I couldn't help but be reminded of John Hagel's Big Shift model, (also discussed on TummelVision), which continues to show a declining return on assets for corporations.

The challenge we have on the web is to maintain the kinds of open-to-all interoperable standards that empower us to work round these creaking bureaucracies. If we delegate our online identities to a few firms operating proprietary APIs, that they can revoke access to, or decide who can call them for reasons of corporate strategy, the lowered transaction costs suddenly get very high again.

Doc Searls's work on VRM (this week's TummelVision) is all about making sure that we can retain agency over our own information. I expect to discuss this in depth at Defrag next week.


Baca Selengkapnya ....

Geek Cinema: 'The Social Network' vs 'The Man in the White Suit'

Posted by Unknown Jumat, 01 Oktober 2010 0 komentar

I recently watched a film that dramatically evoked the disruption caused by geeky inventors, the difficulties they have getting funded, and the forces that combine to oppose them in the name of the status quo.

Sadly, this wasn't at last night's showing of The Social Network, but watching the 1951 Ealing comedy The Man In The White Suit on my phone while flying home.

The Social Network has zinging dialogue, tilt-shift rowing at Henley, and has lawyers as its most sympathetic characters. Most of its humour comes from heavy-handed prefiguring of Facebook's eventual success; clearly you can't spoil the ending, so the trailer just recaps the whole film:

The opening hacking scene, dramatized almost verbatim from Zuckerberg's blog at the time, is perhaps the best 'using a computer' scene in a movie yet - Mark should get a screenwriting credit. But the mythical girlfriend who dumped him and his reactions to that - 'cyberbullying', seeking fame, plaintively hitting refresh on the friend request - that frame the film are a disappointing narrative touch that duck the chance to try to explain his real motivation. Apart from the lawyer, all the women in this film are purely sex objects - when Zuck is asked 'What are the girls going to do?' and replies 'Nothing', that's clearly Sorkin talking.

In contrast, The Man in the White Suit has Alec Guinness inventing a monomolecular fibre that can't break and naturally repels dirt. To do this he has to get to work into labs at textile factories under false pretenses, and when he eventually succeeds, provokes a hostile reaction from both the factory owners and the unionized employees, who want to suppress his work. If you haven't seen it, Amazon and Netflix have it.

Here, the motivation to invent something new and exciting is expressed well, and the technology behind it is plausibly explained. Guinness inspires Joan Greenwood with his idea, and she researches it and champions him to get his work funded. The women in this sixty-year-old film are well-drawn characters, with motivations of their own. They are peers and colleagues to Guinness's Stanley, not sex objects; indeed that is directly challenged. The film is stronger and more emotionally powerful for it.

Both films capture the ascetic geek intensity and focus well, but Sorkin and Fincher want to tear it down, whereas MacDougal and MacKendrick see the Innovators Dilemma clearly 45 years before Christensen did. As Lessig says, The Social Network portrays a legal system that preys on invention, not supporting it; the Man in the White Suit has the inventor's notebooks establishing rights that he needs to be paid for.

Conversely, to get his invention out to people, Stanley needs to convince the very industry he is disrupting to adopt it, whereas the existence of the Internet and it's open protocols mean that Zuckerberg was able to get his idea adopted by thousands with a small loan from a friend.

Technology has made a lot of progress in 60 years, but judging by this new film, law and women's roles have gone backwards.


Baca Selengkapnya ....

Mobile Ad Market Share

Posted by Unknown Senin, 27 September 2010 0 komentar
There have been some interesting statistics floating around lately, such as how Apple makes such a large percentage of smartphone profits with a much smaller market percentage of sales (with the popular iPhone). Another one I came across recently is the market share of mobile ads.


Google and Apple are tied in first place with 21% each!!!

What surprised me was how Google and Apple each have more than Yahoo and Microsoft combined. Also, Nokia (with it's larege mobile phone sales volume, had a relatively small market share of mobile ads.

Regardless of how fancy a mobile device or smartphone can look, and how great the advertising for them is, nothing speaks a great truth than numbers.

Baca Selengkapnya ....

Happy Birthday!

Posted by Unknown Minggu, 26 September 2010 0 komentar
Happy birthday to you,
happy birthday to you,
happy birthday dear Google,
happy birthday to you!!!

...and many more!!!!!!!!!


Yes, Google just turned 12. Wow, almost a teenager. Like dealing with a child, Google will be going through puberty soon, and emotions might run high. Google will probably feel like they know more than the rest of us, and that none of us understand them and what they're going through. There might be some crying episodes for no apparent reason and possibly some quiet times too when Google just doesn't want to talk to anyone.

Google, as you deal with these growing times, we are here for you. Don't worry about your temporary awkwardness or zits, we know you will outgrow all of this. Just hang in there, stay close with your friends, and listen to your parent's advice.

HAPPY 12th BIRTHDAY Google!

Baca Selengkapnya ....

An Apple a day keeps the profits - Hurray!

Posted by Unknown Rabu, 22 September 2010 0 komentar
When it comes to sales of all smartphones, Apple doesn't actually make up a huge percentage of what people buy. In fact, Apple's iPhones only account for about 3% of all smartphones sold. True!



The pie-chart above shows the breakdown of smartphone sales for all the big players, and as you can see, Apple certainly isn't the biggest - not even in the top three! But wait, there's more... the story gets stranger.

Even though Apple's iPhone sales are a miniscule (tongue in cheek) 3% of all smartphone sales, Apple made a whopping 39% of all smartphone profits!

Nokia, Samsung and LG phones made up 2/3 of all sales, but only 1/3 of all profits!!!

It looks like Apple's business model of providing a pricier product works better than their competitor's plan of selling as many devices as possible. Of course, the iPhone has also been highly praised by most people that own one, even though it's one of the most expensive mobile devices out there!

Baca Selengkapnya ....

Cold War - Apple vs Google

Posted by Unknown Senin, 20 September 2010 0 komentar
Remember some story from a long time ago about Eve presenting Adam an apple and saying "eat this dear!" Even today, an apple can be very dangerous, especially when we are talking about the company Apple! When it comes to the mobile device market, it looks like kill or be killed!

It appears that Apple is buying as many shares as possible of a Swedish company called Polar Rose. This company holds numerous patents, one of which enables extracting 3D features from a 2D image. This is how they operate their face-recognition platform that accesses a library of photos, such as your iPhone pictures, Facebook or Twitter.

Apple can obviously reap the benefits of adding this technology to some of their existing/developing facial recognition software. Another bonus for Apple is that if they own this company, Google doesn't! Specifically, it won't be on the Android.

I suspect in the next year we will see more of these companies playing the offensive against one another just to stop the other from having something that they don't. I refer to this as the Cold War, Apple versus Google!

Baca Selengkapnya ....

ⓕⓛⓘⓟ ⓑⓤⓑⓑⓛⓔ

Posted by Unknown Minggu, 19 September 2010 0 komentar
Flip Bubble is a very cool little iPhone app that takes whatever you type and either flips it upside down or puts a bubble around each character. You can then easily copy the text to paste into an SMS message, email, or post directly to Facebook or Twitter.


Make your friends hold their iPhones upside down to read your texts!



Cute little bubbles around each character!

This application is still free on the iTunes site, but the free trial ends very soon! Get this app today - it totally sʞɔıʞ ⓑⓤⓣⓣ !

Baca Selengkapnya ....
Trik SEO Terbaru support Online Shop Baju Wanita - Original design by Bamz | Copyright of apk zenonia 5.