Danelope Week Part VI

danelope_site_avatar_head.jpgOn October 22, 2001, Mr. Lope, in his longer-entries section, posted an entry concerning his purchase of a digital camera. It was a day which started with no hint of the ghastly events to come.

“As I wandered through the path shooting photos at various light levels and distances, I noticed that three squirrels had apparently become fixated with the camera, so I stopped to see how tight of a shot I could get. As I leaned over, talking to one squirrel to coax it nearer, it leapt onto my face (complete with requisite teeth-gnashing and claw-swiping) and latched onto my glasses, pulling them from my face and attempting to run away with them. After spouting several choice expletives and retrieving my specs, I decided that I’d had my fill of nature.”

Many moons later, Mr. Lope posted a photo of the ‘accursed rodent’ moments before the wild attack began.

White suits

QT trailer for CASSHERN at Apple Japan (via the Cartoonist, again!). Beautiful CGI visualized alternative-world thingy. Giant Robots! Grungy cities! Guys in body armor jumping around waving swords.

It looks like live-action anime. I’d love to know more.

Moonbase Alpha

Space 1999 Command Center. [via the Cartoonist].

Ah, that’s the stuff.

I forgot to mention – when we were in Snoqualmie last weekend, we stepped into a funky little antique joint by the trains – over the counter hung a wide selection of variously battered SF toys, including an awesome, nearly three-foot long Eagle toy that I recall as so impressive when I was little kid. I never owned one, by a playmate did, and the hugeness of the piece amazed me.

A slice of privacy

loaf is an email filtering verification system from Maciej and a partner, in early days yet. For the record, I love the ‘cantbedone.org’ URL.

I nearly did not blog this until I realized the underlying concept bothered me, and that I could explain why, in non-technical terms. It also fits broadly into my theme for the day: identity is the face we choose to show others, and privacy is the area of concerns that arise when that identity is challenged for one reason or another. Frustratingly, I’m in a hurry, and so I’m going to have to cover this very broadly and I hope I don’t misrepresent anything or mis-state a fact. If I do, I’ll clean it up as soon as I am aware of it.

The way that Loaf is described as working: an encrypted (or disguised, or hashed, at any rate it’s not human readable) copy of your whole email address book is appended to each one of your outbound email messages. When it’s recieved and parsed by another Loaf-using email system, the sender (you) is rated based, essentially, on your degree of familiarity to the recipient (or really, of course, to Loaf). The more familiar you are, the likelier it is that your message will get through.

It’s a pretty neat idea, and I can’t think of any reason, functionally, why this would be problematic.

However, I think there is a very good reason to mistrust the concept. It’s based on both legal approaches to privacy and ethical concerns underlying them. Forgive me a moment of digression.

Generally speaking, in the US, legal guidelines for organizations that gather and manage personally identifiable information (PII) are required to follow a specific set of practices with regard to how that information is gathered, stored, and made accessible for correction or deletion to the initial source of that data, generally the consumer. An example of that is COPPA, which is a law that effectively requires online data gatherers to either collect no PII from children under 13 or to ensure that parental permission has been granted for that data to be gathered.

It’s my opinion that the PII is the property of the consumer and that there is an ethical obligation to the consumer to permit some level of error-correction feedback mechanism. Additionally, there is an obligation on the part of the data maintainer to follow a ‘best-practices’ level of security with regards to the data, and practices which allow the data to move to a different organization with different privacy practices, while legal, are frowned upon. Of course, such data transfers happen all the time, notably in corporate acquisitions.

In practice, the response of most commercial organizations has been based on a desire to minimize the ancillary data-management costs of PII while making every effort to allow that data to be utilized within the business. It’s effectively a business asset, and as such is percieved as adding value to the organization. Thus your level of access to the data may be limited to writing a letter to the company to request that your record be deleted.

This is unsatisfactory for any number of reasons; adding to the problems with the current approach are the rumblings we hear about the possibility that data collections and methodologies may become available for proprietary protection under U.S. intellectual property law. This may mean, for example, that if in the context of a discussion of privacy management methodology I cited a sample record – or the structure of a specific PII database – I might be in violation of a proprietary concept or data object. But I’ll leave that bone for the EFF to worry at the moment, as vexing as it is.

Returning to Loaf: the concept relies on individual email users exposing their email address books to anyone they send email to. That information may or may not be unpackable to reconstitute the specific PII it contains in a way which is maliciously or unethically useful. From the lack of absolute language on the descriptive page I link to above, I’d be very surprised if it was impossible to do so.

Moreover, by deliberately placing the PII into a sharing-oriented environment, the strategy violates the legal and ethical guidelines I just sketched (however fuzzy my sketch might be), primarily by sharing a specifc element of that PII (your correspondent’s email address).

Therefore, it will be very difficult to deploy any solution based on this approach into commercial organizations that have been working to ensure compliance with the guidelines and regulations.

I am by no means an expert either in the sort of programming that Maciej (a good guy, by all accounts, and a hell of an online writer to boot) does, or, honestly, in online privacy. I do think that I have raised some valid points for discussion. I hope that Maciej or his partner can take the time to address them.

Danelope Week Part V

danelope_site_avatar_head.jpgOn October 3, 2000, Mr. Lope penned a few breif lines that directly contradict the central thesis of Being John Malkovich.

Of course, he’s also 2903.

This has nothing to do with Mr. Lope or anything, but my favorite part of Lawrence of Arabia is after Lawrence and the surviving boy under his, um, care pass through a blasted, abandoned Army base at the side of the Suez Canal, and emerge on the banks of the waterway. A lone motorcyclist on the opposite bank appears, and stops when hailed.

Cupping his hands, the British biker shouts over the unbridged gap of water and sand.

“Who are you?”

After a pause, he repeats the question with greater urgency. Lean cuts to a reverse-angle closeup of Lawrence’s face.

On Identity

The Statesman claims that Don Foster has fingered exposed unmasked uncovered revealed the author of Belle de Jour. Foster used computer-based linguistic analysis to deduce that Joe Klein wrote Primary Colors. [via Boing Boing]

USA Today Says Reporter Faked Stories [NYT]: Five-time Pulitzer nominee fired. Jack Kelley spent 21 years at USA Today, and judging by the fabrications cited in the article, had a knack for the dramatic moment:

For one of the stories that helped make him a Pulitzer Prize finalist in 2001, Kelley wrote that he was an eyewitness to a suicide bombing in Jerusalem and described the carnage in graphic detail. But the investigation showed that the man Kelley described as the bomber could not have been the culprit, and his description of three decapitated victims was contradicted by police.

The newspaper also said “the evidence strongly contradicted” other published accounts by Kelley: that he spent the night with Egyptian terrorists in 1997; met a vigilante Jewish settler named Avi Shapiro in 2001; watched a Pakistani student unfold a picture of the Sears Tower and say, “This one is mine,” in 2001; interviewed the daughter of an Iraqi general in 2003; or went on a high-speed hunt for Osama bin Laden in 2003.

And topping off our little collection, who wouldn’t be interested in reading what happens when a writer for The Stranger connives and cajoles Jayson Blair and Stephen Glass into meeting him for a beer at Brooklyn watering hole for a joint interview?

I think I have found my theme for the day; Charlie Kaufman sets the tone.

Meet "Ben"

Online Poker: Hold ‘Em and Hide ‘Em [NYT]

Excerpts from the opening (Quoted bold italics mine):

“Ben” sleeps five hours a night; the rest of the time he sits at his desk in his “Brooklyn” apartment playing online poker. He won $5…

“Ben” quit his “teaching” job five months ago and now makes around $100 an hour. Five days a week, he clocks 10-hour shifts of Texas Hold ‘Em on his Dell laptop computer. With reggae in the background and coffee mug in hand, he studies his competitors who sit in London, Copenhagen, Los Angeles and elsewhere, while the dealer in Costa Rica tosses cards.

Sure, thing, Ben. We know where “Brooklyn” is too, and it’s in the garden state, with a majestic view of the Pulaski Skyway. Such a transparent pseudonym.