I came across an amusing blog post about why programming sucks. I actually like my job, but I have to say, this author really nailed what’s annoying about it.
Published on May 13, 2014
Published on April 12, 2014
This week, a major security bug called Heartbleed was discovered. Technology sites for programmers, system administrators, and security experts have been abuzz about it all week, but I haven’t seen much coverage of it in the mainstream press. I was able to find this article at CNN.com.
In a nutshell, Heartbleed affects a large fraction of the Web sites on the Internet. It enables an attacker to observe any supposedly-encrypted information that goes into or out of an affected Web site. You’ll notice that is pretty much the opposite of what encryption is supposed to do. Any data you send to an affected Web site — including your password, your financial information, Social Security number, anything — could have been seen and recorded by the Russian mob or those Nigerian scammers: anyone. There is no way to know who has been eavesdropping for how long, or what they’ve overheard. The bug existed, undetected, for over two years before it was discovered this week.
This is a big deal. It is potentially much more serious than the Target security breach that made front-page headlines last winter. In the case of Target, we know what data was disclosed (credit card information) and we even know the affected account holders, so we can start to repair the damage and move on. With Heartbleed, we don’t know what data was disclosed, so we don’t even know what the damage was, yet. I expect the aftershocks of this crisis will be felt for a long time to come. I suspect the reason mainstream media aren’t running with the story yet is they lack the imagination to immediately see its importance.
Security expert Bruce Schneier said of Heartbleed, “‘”Catastrophic’ is the right word. On the scale of 1 to 10, this is an 11.”
What You Need to Do
On affected Web sites, your secure Internet connection wasn’t secure: any data moving between your computer and that Web site could have been seen by an attacker. Since the Heartbleed bug is now known to approximately every black hat in the world, there’s a good chance someone eavesdropped on any site that had the bug, but didn’t fix it fast enough.
Account passwords are a high-value target and it is likely that many username/password pairs have been intercepted. The only way to rule out yours being among them is if you know how the Web server was configured. Most user’s don’t know that and most companies don’t tell.
This means you need to change all your passwords — but there is no point in doing that till after companies have fixed the Heartbleed bug. A fix is already available so it is just a matter of time until all the company’s servers are upgraded with the fix. According to this article from CNN/Money (posted yesterday, April 11), Yahoo, Amazon, Google, and OKCupid have finished rolling out their fixes and are now secure. You can change your passwords there immediately. For other sites, it’s hard to say: banks and financial companies are probably fixed by now, and the rest will have time to catch up over the weekend. So you should stay off secure Web sites until about Monday, and then change your passwords.
Since you have to change your passwords anyway, now is a good opportunity to improve your password practices.
Published on February 13, 2014
Today we’re having another winter storm here in New England. I was getting tired of all the advertising (and third-party tracking cookies) at the Weather Channel web site, weather.com. It finally occurred to me that all the weather alerts weather.com was sending to my cell phone come from the U.S. National Weather Service, and the National Weather Service has its own web site: weather.gov.
You can get all the same up-to-date weather information there, without the glitz and flummery of the Weather.com Web site, and without the advertising and tracking. Somehow it took me years to realize this, so I thought I would share.
Published on February 11, 2014
Today is the day we use the democratic process and our right of free speech to fight back against unconstitutional government surveillance. Please join me, the Electronic Frontier Foundation, the American Civil Liberties Union, and other technology and civil-rights groups in contacting your elected officials and demanding they restore the right to privacy.
If you come across this post and Feb. 11 is already over, it’s not really too late. Call or email your elected representative anyway. 🙂
If you live outside the United States, demand your government stand up for your rights and refuse to cooperate with US intelligence programs, data-sharing agreements, and telecommunications treaties.
Published on September 27, 2013
Right after my post yesterday about an anonymous search engine, I found a headline that a class-action lawsuit accusing Gmail of violating anti-wiretapping and privacy laws is set to go forward.
It’s better if you read the article for details, but the gist of the case is that Google uses software to scan, profile, and track email sent and received by Gmail users for purposes of advertising. Non-Gmail users who send to a Gmail address never agreed to have their messages scanned by a Google, the plaintiffs allege. Google’s lawyers moved to have the case dismissed, and the judge refused the motion. So, evidently, there will be a trial.
Published on September 26, 2013
I quit using Google for Internet searches a couple of months ago.
I did that because of yet another story in the tech press about Google customizing search results to each user. In a nutshell, what Google does — and has been doing for years — is build a detailed profile of each user’s search history, and try very hard to prioritize search results based on what it thinks that user likes. Why Google thinks this is a good idea is deeply unclear to me — the whole point of searching for information is to find things I didn’t know and haven’t seen before.
In fact, I would go so far as to say that tampering with search results to show different things to different people is manipulative. It offends me and makes me suspicious of Google’s motives.
Futhermore, Google (and the other tech giants, Apple, Yahoo, Microsoft, and most especially Facebook) make a great deal of their money by tracking and profiling their users. As my favorite security expert, Bruce Schneier, put it, “[t]he primary business model of the Internet is built on mass surveillance…” A lot of people seem concerned about the NSA spying on innocent citizens, yet many fewer people seem concerned when Google and Facebook do the same thing. I am puzzled by that reaction, because in my experience corporations are generally not more trustworthy than the government. And, the same Bruce Schneier article I quoted previously points out that a lot of the government spying is done by obtaining users’ profile data from tech companies. Google, Facebook, and Yahoo are handing over those detailed profiles they’ve built to the government on demand, even though it would be illegal for the government to collect that data itself.
In the Internet age, I firmly believe that we users should defend our privacy as much as possible. Anything we read can be used against us — to charge us higher prices and harass us with annoying advertisements, certainly. But think about the power that Google has. Tampering with search results is like changing the books on the library shelves before a patron walks in. It reminds me of the novel Fahrenheit 451, but much more subtle and insidious. Remember the power newspaper moguls of the early twentieth century wielded, and ask yourself: are Google and the other tech giants better citizens than that?
To replace the empty space where Google used to be, I’ve found DuckDuckGo. It’s a search engine whose business model is not based on mass surveillance, and who doesn’t tamper with your search results — it shows the same results to everyone. DuckDuckGo’s Web site does a much better job of explaining this than I have time to do. It explains why it’s against our interests to be tracked and why customized search results are a detriment, not a benefit. It also explains how they can possibly make money while bucking the surveillance trend. You can add it to your browser as a search plugin: here’s the one for Firefox.
Another alternative is to just use Wikipedia as your search engine of first recourse, and use the external sites linked on the Wikipedia page to get to authoritative sources. This works pretty well for finding hard, factual information. Back in the 1990s, this was called “surfing the web,” and it’s what everybody did to find everything before Google came along. There were search engines then, but they were terrible: they gave different results every time you searched, and always left out a lot of relevant pages. The more things change, the more they stay the same.
Published on May 13, 2013
I’ve been meaning to write more about computer security, but all the topics are complicated. That makes it time-consuming to write about, and potentially dry and confusing to a reader. So I’ve decided to try something new: to write short, narrow posts that address a smaller subset of the topic. In doing this, I realize I am becoming the thing I hate: most blogs annoy me because bloggers write short articles of 500 words or less not because that’s an appropriate length for the topic, but because that’s what’s easy to write in an hour or two.
Part of this short series will be titled “Security Myths and Realities.” My idea is to break through all the outdated and plain false information about computer security and help the regular user get up to date on how experts think.
Myth: Choose a Password That is Easy to Remember
Reality: Totally FALSE! If you are trying to remember all your passwords, you are doing it wrong.
2012 was a watershed year for the venerable password. Last year was the year when the mainstream technology press — periodicals like Wired and Ars Technica — began to publish opinion pieces suggesting that the whole concept of passwords is obsolete, ineffective, and wrong. I happen to agree, but in the near term, it’s irrelevant: passwords are not going away any time soon. To fully explore what’s wrong with passwords as a concept, and why the very idea of passwords is coming under fire, would be another entire article. I can point out the most obvious problem with passwords, though: everyone has too many of them.
For something as complicated to remember as a reasonably-strong password, “too many” is about four. The last I counted, I had 103 different passwords. Since I work as a programmer and I maintain a blog and a couple of other Web sites as a hobby, I admit I am kind of special. I have more passwords than the average user. If you take into account all the unique accounts a modern person has for online shopping, communities like forums and blogs, gaming accounts, banking accounts, and so on, I would not be surprised if the mythical “average user” had need for 20 different passwords. I wouldn’t even be surprised to hear a number like 50.
Don’t even bother to try remembering all your passwords. It’s infeasible, any anyone who tells you otherwise seriously misunderstands the security risks of today’s Internet.
Security Myths and Realities: Easy-to-Remember Passwords continued »
Published on May 6, 2013
Lately I’ve been playing a lot of the PC game, Crusader Kings II. Besides being a whole lot of fun, this game is a breath of fresh air in the strategy genre. It’s a game not just about war and conquest, but about alliances, betrayal, marriages, assassination plots, corruption, and medieval law. It’s the most original gameplay experience since … well, probably since Crusader Kings I.
In Crusader Kings II (hereafter, CK2), you play the leader of a medieval dynasty. When that leader dies, his heir becomes your character. The game covers a time span from 1066 to 1453 (corresponding to the historical period bracketed by the Norman Conquest of England and the Ottoman conquest of Constantinople), so you’ll pass through many generations of rulers as you play. The fortunes of your dynasty may rise and fall: it’s not uncommon to start as a lowly count, to climb to a duchy and then a throne through might and guile, and then see the kingdom crumble in a succession war or rebellion until you’re back down to one county again. Along the way, marriages and succession law are every bit as important as castles and armies.
I’ve read a number of great articles about this game that made me want to try it, and I’m very happy that I did. I’d recommend Why Crusader Kings II Should Be Game of the Year and How to Lose at Crusader Kings II. I would love to explain why this game is so great, but it’s better to show you than to tell you. Here’s what’s going on in my latest game.