Archive for the ‘Technical’ Category

Tiles, the NSA and your iPhone – it’s a changing world

Monday, September 16th, 2013

“The agency, according to the documents and interviews with industry officials, deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products. The documents do not identify which companies have participated.”  from ProPublica

– dennis

= = = = = = = = = = = = = = = = = = =

As someone who thinks of himself as a futurist, I tend to keep my eyes peeled for patterns and connections which can, possibly, indicate something about our future.

There are two things going on now which I think are going to conjunct and increase the penetration into our personal lives of the nascent police states that most western democracies are steadily becoming.

The first thing

Is already visibly in motion.  That is the efforts of the American NSA to penetrate everyone and everything in the name of national security; as revealed by Edward Snowden’s documents.

It is now open knowledge that the NSA has broken most of the cryptology that we’ve depended on to keep our personal information safe from prying eyes.

This would include your computer passwords.

NSA

And any files you store in encrypted form.  And any files you send.  And any files you receive in encrypted form.

And, if they have access to your computer passwords, then they have full access to all your files and all your stored e-mail.

If they have all of that, then what do you have?

Bupkis – you don’t have much that’s yours, if they want it.

The criminal hackers of the world would be overjoyed to have that sort of access.   If they did, your computers would be full of malware, trojans and key loggers before you could blink.

I suppose we can just hope that the folks in the NSA that have access to this sort of power are using it exclusively for the public good.

The second thing

Has only just recently come into play.   These are the little devices called “Tilesthat you may have seen advertised.  They’ve been sold on-line now for a few months and the first deliveries are scheduled for winter 2013/2014.  I bought one recently for $18.95 USD out of curiosity.

Tile

Tiles help you find things.  They are about an inch square, made of white plastic, about 1/8 of an inch thick and they have a small hole on one corner so you can tie or attach them to things.  You can also stick them onto things with two-sided adhesive.

They have a non-replaceable battery in them that runs for about a year and they communicate back and forth via the Bluetooth short-range radio.   They come with an application program that runs on your iPhone and the program can help you find  one of your Tiles if you’ve lost it and whatever it is attached to like your keys, or your backpack or whatever.

If, for example, you’ve lost your keys, you fire up the Tile application program and ask it to locate the Tile attached to your keys.

If you are within about 50 to 150 feet or so of your keys (the range varies with terrain), the application program will show you on your iPhone where the Tile (and your keys) are … out in the garage.

Ah!  And then you remember that you laid them down on the work bench when your phone rang as you were getting the groceries out of your car.

One more thing about Tiles.  If you really lose something, like your motorcycle is missing through theft, and you were thoughtful enough to have had a Tile attached to it, you can contact the Tile people and they will put out an alert on that Tile.

Once a Tile has an alert on it, any iPhone in the world running the Tile application program that passes with 50 to 150 feet or so of your sought-after Tile, will silently send a message to the Tile people indicating that it ‘saw’ your Tile and provide the GPS location where it was.

The person carrying the iPhone running the Tile application program that located your Tile won’t even know any of this happened.

So, where ever folks are wandering around with the Tile application program on their iPhones, a quiet and constant search is being made all the time for lost Tiles (and whatever’s attached to them).

So, how does this link to the NSA and future developments?

Well, it goes like this.

The first thing to realize is that the NSA folks are certainly smarter than the average bear.  They could, and probably already have, made something very much like the Tile.  Something that’s a lot smaller, harder to detect, has better range, longer battery life and etc.  Let’s call these special NSA versions NSATiles.

The second thing to recognize is that the NSA already has the technology to break and enter into virtually any computer they want to; including our iPhones.

So, if they wish to, they can populate most of the world’s iPhones with a sweet little bit of hidden software that none of us would know about that does just what the Tile application program does; except for NSA’s purposes.

Mmm. Perhaps, I’m not thinking this through clearly?

Why should they need to insert new clandestine software into our iPhones from the outside?

The recent news from Edward Snowden has also revealed that the NSA has, under national security laws, forced some of the major software companies in the US to install ‘backdoors‘ into their software so the NSA can go in and look at what it wants to even while users of that software think their privacy is secure.   Moreover, the NSA has enjoined these companies to say nothing of this; again under the threat of national security laws.

So, why couldn’t the NSA have pressured Apple to add NSATile detection and reporting software?  They’ve done a lot of this sort of thing already.  And, Apple couldn’t warn us without breaking the law.

In short, there’s no reason why the NSA cannot use our millions iPhone devices to clandestinely scan the world for NSATiles that the NSA is interested in tracking.

And, when your iPhone sees such an NSATile, it will silently “phone home”  to the NSA and report it along with its GPS coordinates.  Nice, eh?

So, we will be an entire world of folks wandering around with iPhones doing the NSA’s bidding and looking for anyone or anything that the NSA wants to track geographically.  Terrorists, demonstrators, spies, packages, books, animals, us … you name it.

And all of us doing NSA’s bidding unknowingly.

Will this happen?

The real question, I think, given that capabilities described already exist, is why wouldn’t it be happening now?   After all, knowledge is power and this is government we’re talking here.

In a related development

There’s a parallel development involving very similar technology, see this article which I just encountered today by coincidence.

It is about something called iBeacon which is part of Apple’s newly released iOS 7 software.

This new iBeacon technology will be coming to a shopping center near you soon and it’s going to be talking to your iPhone as you walk by the stores.  It’s going to be trying to sell  you things.

Personal – 13 Apr 2013

Friday, April 12th, 2013

– My partner, Colette, and I are wrapping up four months in Wellington, New Zealand, this weekend and preparing to spend two weeks touring New Zealand’s North Island by car before we travel across the Cook Strait via ferry to the South island and then by train back to Christchurch.

– I’ve really conceived a love for Wellington.  What a vibrant, beautiful and pleasant a city it is.  We’ve been over most of it on foot and by bus these four months.  We’ve sat in on Parliament’s question and answer sessions, visited endless coffee shops and restaurants, hosted a few friends with us, made use of the libraries, theaters, free concerts, talks and various cultural and ethnic street events.

– Another event that transpired during our time here was that Colette wrapped up 12 years with the New Zealand Ministry of Justice and is now a free agent.

– And yet another event was that it looks like I will finally be paid out for the apartment I lost in Christchurch in the February 2011 earthquake there.  And that money, when it arrives, will augment my income nicely and give me a bit more flexibility which is never a bad thing.

– While I’ve been here I’ve been digging into programming iPhone and iPad apps and I’ve come up to speed nicely.  In fact, just today, I bid my first job to write an app.

– That’s the news.

– Cheers from New Zealand, my friends,

-dennis

 

How to implement Globals in Objective-C – Updated

Monday, February 18th, 2013

– Oh, the embarrassment of premature technical wisdom ejaculation.

– Since I wrote all the stuff, below, I’ve had a big rethink about Globals and realized that the method of implementing them that I’d adopted was seriouly lame.

– I went back and thought through how I’d done it before in the Microsoft Win32 OOP world and I reasoned my way through to doing the same thing here, and, it is sooooo much simpler and way faster.  That’s what I get for cook-booking off someone else’s code without understanding it.

– It still baffles me, when you go searching for it, why the information out there about how to implement Globals in Objective-C is such a dog’s breakfast.

– But, I know how to do it now and I’m going to write it up here and maybe that will aid someone else on a search to answer the same question.

– So, below, you will find my new method and code and the old stuff is gone.

-dennis

*—————————————————–*

Create a class, UtlGen.  In it we put general utility methods that we can call from anywhere.

Create a file, globals.h, where we can declare our globals variables.  In it I have the following line:

UtlGen * g_pUtl;

This creates a pointer to an instance of the UtlGen class.

I want this pointer to be (globally) visible from anywhere in my program so I need to place it outside of any blocks.  I’d also like to put in a place that makes sense to other programmers.  To me, there are two obvious choices.  One is in the main.m file and the other is in the AppDelegate.m file.  Main.m is the first place where execution begin and the AppDelegate.m is the second.   I select the AppDelegate.m file because I think folks don’t generally expect you to mess with the main.m file.

Near the top of the AppDelegate.m file, I import the global.h file like so:

#import “myprogramAppDelegate.h”
#import “global.h”   <— global variables live here.
@implementation myprogramAppDelegate

We also instantiate and release the UtlGen object in the AppDelegate. module.   The very first method called in AppDelegate.m is:

-(BOOL) application( … and so on …

Inside this method, we add the line:

g_pUtl = [[UtlGen alloc] init]; 

This is how we instantiate the UtlGen object and assign its pointer to the global variable, g_pUtl.

In the -(void) dealloc method of the AppDelegate module, we add the following line:

[UtlGen release];

And that’s how we release the object’s memory when the app shuts down.

In the myprogram-Prefix.pch file, I place the following line in with the other imports:

#import “UtlGen.h”

This file contains the precompiled definitions that are visible to all modules.  Importing UtlGen.h here means that the methods (and their prototypes) available in the UtlGen object will be visible everywhere.

Now, we are ready to use any of the methods in the UtlGen object from any module.

Let’s use a hypothetical method called ‘twiceMe’ in the UtlGen object.

In the application, we have a class, someClass, which is implemented in the someClass.m file.  In this file is the implementation of a method, ‘doMath’.  In the doMath method, we will call the twiceMe method of the UtlGen object to double the value of an integer we pass to it.

In the someClass.m file we do this:

@implementation someClass
extern UtlGen * g_pUtl;

-(void) doMath
{
int n = [g_pUtl twiceMe:2];

The extern tells the compiler that the g_pUtl variable has been defined elsewhere (over in AppDelegate, remember?).  In doMath, we call the twiceMe property of the UtlGen object and pass it a ‘2’ and it returns a ‘4’ to us which we place into ‘n’.

That’s it.

 *——————————————————*

A Tale of Two Internets

Friday, February 15th, 2013

– I worked for a company up until a year ago that was heavily involved in e-Commerce.  They are a great group of people and I doubt that any of them would see themselves as adding to the world’s inequalities.  

– But as they say, “No single rain drop see itself as responsible for the flood.

– But they, like all such e-Commerce facilitators, are striving to develop the technology to ‘read’ the customer more and more.  And the quote, below, shows where some of this is going.  And it might not be pretty.

– dennis

= = = = = = = = = = = = = = = = = = = =

“For the past decade, e-commerce sites have altered prices based on your Web habits and personal attributes. What is your geography and your past buying history? How did you arrive at the e-commerce site? What time of day are you visiting? An entire literature has emerged on the ethics, legality and economic promise of pricing optimization. And the field is advancing quickly: last September, Google received a patent on technology that lets a company dynamically price electronic content. For instance, it can push the base price of an e-book up if it determines you are more likely to buy that particular item than an average user; conversely, it can adjust the price down as an incentive if you are judged less likely to purchase. And you won’t even know you are paying more than others for the exact same item.”

– To the original article in Scientific American:

New tech – hotspots

Monday, August 27th, 2012

I encountered a very cool technology today.   A cellular hot-spot.    

This is a cell phone that can access the Internet via the cellular system and which then rebroadcasts the Internet access to other devices around itself via WiFi.

In the case I’ve found, it is an Android HTC  phone, tethered to the T-Mobile network here in the U.S.   The app itself is called “Hot-Spot” and it came with the HTC Android phone.

I’m told that cell providers like AT&T and T-Mobile here in the U.S. are not enthusiastic about the “Hot-Spot” concept and they are working out how to either block folks from sharing their signal or to charge them for the extra devices accessing the Internet via the hotspot.

There are also free-lance apps around (not from the cell phone maker) that can do this but I’ve read that these can be buggy.  One such is “MyWi”.

If you know more about all of this or have corrections to what I’ve posted here, let me know.

Dennis

The greedy are everywhere…

Wednesday, July 4th, 2012

– In the U.S., in Europe, and even here in my beloved New Zealand.

– They put on suits, they carry a briefcase, they do ‘deals’ and it all looks brilliant and magical.

– But, sometimes, someone goes behind the scenes and traces some of this ‘business’ and finds that a lot of it is ‘funny business’.

– What would you think of an investment company that did big deals for the purpose of making profits for their investors and, when the dust had settled, the deals were done and all the contracts and the fine print were all read out and traced – you found out that the bankers and the company’s principals made far more profit from all of the money shuffling than any of their poor investors did?

– I think it stinks.   And yet I also think that many business types live and thrive in just this way and consider themselves brilliant,.  And that they consider the rest of us as just their sheep in need of a shearing and too dumb to know we’re being hard done by.

– This bit of fun happened here in New Zealand though the business itself reached around the globe to London as well.  

– No matter.  In fact, all the better.   The more abstract, the further afield, the less normal people can relate to the doings, the better.   Big money moving in the shadows.

– Here in New Zealand, the National Government, under John Key, a former Wall Street type, wants to sell public assets to raise money.   After reading this expose on the investment company, EPIC, I’ll be most curious to  ‘follow the money’ when the Key government does begin to sell those assets.  

– Who will be doing the deals and who will be making enormous profits from the fees along they way?  Why do I suspect that they will be business types like Key?  Types who are telling themsleves all along the way that the fact that they are getting rich is only incidental to the good they are doing for the country.

– Yeah, right.

– Dennis

– – – – – – – – – – – – – – –

The rather curious case of Epic’s fee payments

(this from stuff.co.nz an opinion piece by Tim Hunter)

OPINION: After years of study, there is growing acceptance that homo sapiens has evolved into two distinct branches. One comprises the vast bulk of humanity, the other comprises individuals known as bankers.

Although superficially alike, the latter can be distinguished by their skin, which is thicker than normal. It also has special properties giving unusual adhesion to most forms of money.

In tests using a drained swimming pool filled with Zimbabwean currency, bankers were found to emerge from the pool with up to 25 per cent more cash sticking to them than the non-banking control group.

Scientists initially hypothesised an epidermal layer of tiny hooks, like Velcro, to explain the effect, but now favour a theory of electro-magnetic attraction at the cellular level.

Edinburgh University’s department of parapsychology is also testing observations that bankers can detect the contents of a wallet within a range of about five metres, even through stud walls.

These attributes are an advantage in financial transactions, and Chalkie reckons there could be something like this going on in an investment structure called Equity Partners Infrastructure Company (Epic). Basically, Chalkie’s study of accounts and documents with small print suggests Epic has paid out millions more in fees to bankers and their ilk than it has to its investors.

– Definitely, you should read more here…

Scrap heap may be last stop for secret slice of Navy history

Monday, April 30th, 2012

– An interesting bit of U.S. Naval history.  It’s hard to imagine all the secret projects that are carried out that we’ll never hear anything about.   Here’s one which the curtains, finally, have been taken down on so we can see what was done.  

– I’m not much for military stuff but I admit I found this fascinating and spent a long time poring through the interior shots of this one-of-a-kind ship.

– Dennis

= = = = = = = = = = = =

A secret chapter in American naval research could soon reach an ignoble close when a rusty barge and its once-classified contents leaveSuisun Bay for the scrap heap.

Slipping through the sea like a black mirage on catamaran legs, the 164-foot Sea Shadow looks like something Darth Vader might fly. It is the world’s only ship built to be invisible, assembled secretly in Redwood City in 1985 by the U.S. Navy and contractor Lockheed Martin at an estimated cost of $50 million.

Sea Shadow’s purpose was to test radar-cloaking technology and other naval engineering innovations. Many of its breakthroughs can be seen in present-day Navy warships.

Even at nearly 30 years old, Sea Shadowremains the most radical ship afloat.

– More…

– Direct to the photos…

 

Supreme Court Shoots Down Warrantless GPS Tracking

Tuesday, January 24th, 2012

The U.S. Supreme Court might have delivered a big blow Monday to GPS surveillancetechniques used by law enforcement.

In effect, the justices ruled that long-term surveillance of a vehicle by attaching a GPS device without an extended warrant is a violation of the Fourth Amendment.

In three separate opinions, the nine justices confirmed that law enforcement’s placement in 2004 of a GPS tracking device on the vehicle of accused drug trafficker Antoine Jones’ vehicle for a period of 28 days constituted a “search,” as defined by previous case law concerning the Fourth Amendment.

The justices differed, however, on the particulars of how the GPS technology was utilized.

A joint FBI-police team in Washington, D.C., had a warrant, but it was only authorized for use within a 10-day period and only in the District of Columbia. Officers waited until the 11th day to attach the GPS device and did so in Maryland, outside of the warrant’s jurisdiction.

Writing for a five-justice majority, Antonin Scalia, joined by Chief Justice John Roberts and Justices Anthony Kennedy, Clarence Thomas and Sonia Sotomayor, believed that further justification was needed before using a GPS device in the situation.

– More…

 

The High Cost of Low Bandwidth

Tuesday, January 24th, 2012

As more and more information is finding its way onto the Web, great swaths of our physical infrastructure are becoming obsolete. 

When we attempt to understand the implications of the Internet Age, the first thing we need to do is recognize that office buildings, retail stores, air travel, lecture halls, and paper are just clunky, expensive, and low-bandwidth interconnections.

Allow me to explain. Many things that seem as solid as the Rock of Gibraltar are, in fact, information proxies in disguise. We can view these information proxies as two separate pieces: an information-sensitive piece, and a second piece with a valuable function that cannot be displaced by better virtual environments.The Internet peels away the information-carrying portions of these physical things and institutions. Frequently it leaves behind skeletons of little value. In the process, the Internet restructures and renders much of our physical infrastructure obsolete.

For example, there are lots of reasons to go to a retail store. The shopper may go to a clothing store because he enjoys the experience of looking at the merchandise. He might want to find out what is available and how much it will cost, or feel the material, or leave the store with a suit he can wear the next day. Many, but not all, of the reasons he went shopping were to gather important information, yet there’s a lot of infrastructure associated with delivering that data. There’s the store itself and the shelving and display cases piled high with merchandise; employees to answer questions and operate the cash register; logistics systems and delivery trucks that carry merchandise to the store. Then there are the costs of keeping the stores lit, cool in the summer, warm in the winter, and clean at all times. Of course, the customer could not avail himself of all these information services without getting in a car, driving to the store, parking it in a garage, and buying gas.

Most of that information can be obtained without the car, without the shelving, without the employees. One of the reasons online retailing has been so effective is that it reduces many of these infrastructure costs while delivering the information the customer needs about price, availability, and size. Retailers engaged in the sale of commodities like books, CDs, blue jeans, and running shoes will find it increasingly difficult in the face of Internet competition. Some will be spared — the stores where customers really do want to see and feel the goods, and leave with them right away. (Upscale boutiques, for example, where the shopping experience is paramount, will be affected less.)

It’s not just retailers who will be transformed by the unbundling of information dissemination from physical locations. The need and function of places that support/reinforce interconnectedness will similarly diminish and change. An office building is both an information warehouse and an information exchange. In the future, the most important function it will perform is to provide a comfortable and productive location for face-to-face interaction. With more of us carrying our file cabinets in our laptops, cramming our overloaded out baskets into our PC’s and doing jobs for ourselves that administrative assistants used to do, the office of the past will probably become a warren of comfortable meeting rooms surrounded by temporary desks for those who choose to come to work that day. Those laptops will become smaller and lighter as files and applications move into the cloud.

In the case of a university, it is relatively easy to see the large-lecture classes, a strictly information-carrying portion of the educational process, being displaced by virtual courses. The university of the future will probably focus much of its energy on mentoring, small seminars, and guiding student laboratory and research experiences. A university where the vast proportion of the educational process focuses strictly on transferring information could well melt into virtual space.

The future will look very different as we strip the information-carrying functions out of proxies and reduce them to their bare essentials. Entertainment centers will be redefined. Libraries will take on new charters. Educational institutions will be restructured. Cities will be transformed. This will happen because much of our physical infrastructure was just a low-bandwidth interconnection disguised as something real.

– To the original…

 

Cameras May Open Up the Board Room to Hackers

Monday, January 23rd, 2012

One afternoon this month, a hacker took a tour of a dozen conference rooms around the globe via equipment that most every company has in those rooms; videoconferencing equipment.

With the move of a mouse, he steered a camera around each room, occasionally zooming in with such precision that he could discern grooves in the wood and paint flecks on the wall. In one room, he zoomed out through a window, across a parking lot and into shrubbery some 50 yards away where a small animal could be seen burrowing underneath a bush. With such equipment, the hacker could have easily eavesdropped on privileged attorney-client conversations or read trade secrets on a report lying on the conference room table.

In this case, the hacker was HD Moore, a chief security officer at Rapid7, a Boston based company that looks for security holes in computer systems that are used in devices like toaster ovens and Mars landing equipment. His latest find: videoconferencing equipment is often left vulnerable to hackers.

Businesses collectively spend billions of dollars each year beefing up security on their computer systems and employee laptops. They agonize over the confidential information that employees send to their Gmail and Dropbox accounts and store on their iPads and smartphones. But rarely do they give much thought to the ease with which anyone can penetrate a videoconference room where their most guarded trade secrets are openly discussed.

– More…

– Research thanks to Gerry B.