Start up: writing clickbait, search v the law, IAB disses AdBlock Plus, Android’s future in 2010, and more

Bitcoin: a failed experiment, or still going strong? Photo by portalgda on Flickr.

You can now sign up to receive each day’s Start Up post by email. You’ll need to click a confirmation link, so no spam.

A selection of 12 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

The resolution of the Bitcoin experiment » Medium

Mike Hearn:

Why has Bitcoin failed? It has failed because the community has failed. What was meant to be a new, decentralised form of money that lacked “systemically important institutions” and “too big to fail” has become something even worse: a system completely controlled by just a handful of people. Worse still, the network is on the brink of technical collapse. The mechanisms that should have prevented this outcome have broken down, and as a result there’s no longer much reason to think Bitcoin can actually be better than the existing financial system.

Hearn’s article – in which he describes how he has gone from being an enthusiast and believer who left a safe job at Google to work on bitcoin – points to a looming problem: Chinese miners control over 50% of mining capability (the level where fakery becomes possible) and new proposals on fee payments could lead to transaction reversals.

I haven’t seen any adequate rebuttals of Hearn’s post (there are lots of ad hominem “don’t let the door hit you on the way out” responses, or others saying “everything’s GREAT, shuddup”), though this by “Bit Credit” makes a vague attempt. It also contains this passage:

from an economic interest it makes no sense to undermine bitcoin by fracturing it. And so surprise, suprise, bitcoin participants are making rational economic decisions. Bitcoin is not a democracy where 51% rules. In fact that is Bitcoin in a state of attack.

Bitcoin isn’t a democracy, in that its rules are determined by the core developers. But it is a democracy in that if 51% of miners start mucking about, bad things happen. And “attack”? Odd choice of word.
link to this extract

 


How Peach onboards new users » User Onboarding

Peach is the darling of the app world right now, and their onboarding has been heralded as one of the best ever from a newcomer. Care to see why?

Without further ado, here is…

How Peach Onboards New Users

Well, it has sort of fallen out of “darling” status, but any app designer will learn from this – especially the “what is this? What does that word mean? Am I saying this to the whole world? HELLPPP!” It is 120 slides, but easy to click through.
link to this extract

 


‘Shocking celebrity nip slips’: secrets I learned writing clickbait journalism » Broadly

Kate Lloyd:

Laura, another celebrity journalist who has worked online for popular tabloids, explains there are other times when she has had to sex up stories about celebrity women who weren’t even trying to be especially provocative. “You could do a red carpet round-up of ‘all these women look great in these dresses’ but you’d change it to ‘plunging necklines’ or ‘high splits,'” she explains. “Marriage announcements would be sexed up with ‘cleavage enhancing’ or ‘revealing’ outfit descriptions. You’d add in words like ‘nip slip’ even if nipples are nowhere near having a slip because that’s what people are searching for. It was literally just for SEO, and it was soul destroying.”

One journalist told me she worked on a site where every picture of a female celebrity — including those in full coverage outfits — was tagged with the word ‘panties.’

While you’re groaning at clickbait “shows her ex what he’s missing in tiny bikini” headlines, there’s a whole new level of trickery that lurks behind them. For example, a female celebrity recently posed for a tasteful set of nude photos with a glossy magazine, who published the story with an empowering, “you go girl!” headline. The page’s URL, however, was a chain of sexy keywords that simply ended with “nude-photos.” Things get especially murky once you delve even deeper into the behind-the-scenes sorcery. One tabloid journalist told me she worked on a site where every picture of a female celebrity—including those in full coverage outfits—was tagged with the word “panties.” I’ll also admit to using the phrase “nearly-naked” in headlines just to hit the search term “naked”.

And just when you’re wondering what the world would look like if women were in charge of search engine algorithms:

…Tabloid journalist Laura explains that while the amount of sexualized content about women isn’t decreasing, she’s starting to produce more sexualized content about men.

link to this extract

 


A few keystrokes could solve the crime. Would you press enter? » Just Security

Jonathan Zittrain:

Suppose a laptop were found at the apartment of one of the perpetrators of last year’s Paris attacks. It’s searched by the authorities pursuant to a warrant, and they find a file on the laptop that’s a set of instructions for carrying out the attacks.

The discovery would surely help in the prosecution of the laptop’s owner, tying him to the crime. But a junior prosecutor has a further idea. The private document was likely shared among other conspirators, some of whom are still on the run or unknown entirely. Surely Google has the ability to run a search of all Gmail inboxes, outboxes, and message drafts folders, plus Google Drive cloud storage, to see if any of its 900 million users are currently in possession of that exact document. If Google could be persuaded or ordered to run the search, it could generate a list of only those Google accounts possessing the precise file — and all other Google users would remain undisturbed, except for the briefest of computerized “touches” on their accounts to see if the file reposed there.

A list of users with the document would spark further investigation of those accounts to help identify whether their owners had a role in the attacks — all according to the law, with a round of warrants obtained from the probable cause arising from possessing the suspect document.

So, if you’re the person receiving the search request at Google, should you run it? Zittrain takes you around the back-and-forth, which is subtle.
link to this extract

 


The Long Goodbye » Anne Wheaton dot Com

Anne Wheaton:

I chose to be on Twitter. I am not a celebrity. I am a middle-aged woman who’s a retired hairdresser who now runs a non-profit, is on the Board of Directors at Pasadena Humane Society, has a house FULL of rescue animals, and has two wonderful boys. I do not have a job I need to promote, nor am I looking for a job to take on. I have a full life with an amazing husband and family, wonderful friends, and a successful business I run. If something I choose to do on the side isn’t fun, I need to walk away from it because my free time is pretty scarce. Twitter used to be the fun thing I did on the side, and for the most part, it just isn’t fun anymore, so I need to walk away from it and that’s okay.

I deleted my Twitter account last night and immediately felt relieved.

She’s married to Wil Wheaton, who has been anti-Gamergate, on the basis that reasonable people don’t abuse women and other people pointlessly and unceasingly. Increasingly, Gamergate strikes me as Twitter’s id; untrammelled raging male idiocy, which is never reined in by any form of superego (such as “is this really a good idea?”). And the concern is that that superego will never arrive. (Another thought is that with American politics becoming increasingly polarised, Gamergate backers are more aligned with the extreme Republican line of thinking, and certainly with its refusal to engage with any other viewpoint.)

Read her post from April on how quickly just “being a woman on Twitter” turned into “being someone at whom people post random, vicious, worrying things for no other reason than to be vicious and worrying.”
link to this extract

 


Web-based OAuth is a security nightmare for apps » Terence Eden’s Blog

You know those apps where you go in and it asks you to authorise it using Twitter or whatever? Eden doesn’t like them:

In Periscope’s case, the user has to trust that the app hasn’t just ripped-off the Twitter website. There’s absolutely no way to verify that it is a genuine and secure login page.

Even if you have 2-Factor Authentication (where Twitter texts you a login code) you’re not safe. Why? Because if the app is intercepting your username and password, it can also intercept your 2FA code. Sure, it can only use it for a minute or so (with some restrictions) – but that’s enough time to completely take over your account.

As software developers, we have to stop encouraging this anti-pattern. Periscope is teaching users that it’s OK to type their password into any box which looks like it’s authentic.

link to this extract

 


IAB dis-invites us, disses compromise and buries dissent » Adblock Plus

Ben Willians:

Adblock Plus has some very good relationships within the IAB (Interactive Advertising Bureau), which is the trade organization that represents advertisers and publishers. We coach many IAB members about our Acceptable Ads guidelines for reasonable, nonintrusive ads, and we have spoken on some IAB panel discussions (especially in the UK).

Unfortunately, the top brass at the US IAB don’t want us coming to their Leadership Summit next week in Palm Desert, California. We attended last year, and we signed up again for their 2016 meeting … including paying the hefty entrance fee. We were fully confirmed and they even listed us on their website as a participant.

Then this week we got one of those sudden emails that land in your inbox innocently, then floor you with something weird, unbelievable or ridiculous when you click on them. This one came from an unfamiliar IAB address, and it informed us that our registration for the summit was canceled and our fee refunded.

The IAB hasn’t said anything about why, as of the time of this post. Apart from a statement which said that “The IAB Annual Leadership Meeting is for serious conversation among important digital industry stakeholders.” Does it think adblocking isn’t serious, or isn’t important?
link to this extract

 


There are no secure smartphones » Devever

Hugo Landau:

There are no secure smartphones.

This is a simple fact which is overlooked remarkably often.

Modern smartphones have a CPU chip, and a baseband chip which handles radio network communications (GSM/UMTS/LTE/etc.) This chip is connected to the CPU via DMA. Thus, unless an IOMMU [input-output memory management unit] is used, the baseband has full access to main memory, and can compromise it arbitrarily.

It can be safely assumed that this baseband is highly insecure. It is closed source and probably not audited at all. My understanding is that the genesis of modern baseband firmware is a development effort for GSM basebands dating back to the 1990s during which the importance of secure software development practices were not apparent. In other words, and my understanding is that this is borne out by research, this firmware tends to be extremely insecure and probably has numerous remote code execution vulnerabilities.

Thus, no smartphone can be considered secure against an adversary capable of compromising the radio link (called the Um link). This includes any entity capable of deploying Stingray-like devices, or any entity capable of obtaining control of a base station, whether by hacking or legal or other coercion.

It would, in my view, be abject insanity not to assume that half a dozen or more nation-states (or their associated contractors) have code execution exploits against popular basebands in stock.

Question then is how far up the stack you can get from the baseband.
link to this extract

 


August 2010: Android’s pursuit of the biggest losers » Asymco

Horace Dediu, writing back in the days when Nokia and Sony Ericsson made handsets, and BlackBerry was big, noting that LG and Motorola and Sony Ericsson had lost money, though Samsung was doing OK:

how likely are these disrupted ex-giants to recover and take Android forward? My bet: slim to none. Android does not offer more than a lifeline. It is not a foundation for long-term profitability as it presumes the profits accrue to the network and possibly to Google. Profit evaporation out of devices to Google may be a possibility at some time in the future, but only if the devices don’t need too much attention to remain competitive. But because they’re still not good enough (and they won’t be for years to come), it’s certain that attention to detail is what will be most important to stay abreast of Apple.

So here we have the real challenge to Android:  partnership with defeated incumbents whose ability to build profitable and differentiated products is hamstrung by the licensing model and whose incentives to move up the steep trajectory of necessary improvements are limited.

In other words, Android’s licensees won’t have the profits or the motivation to spend on R&D so as to make exceptionally competitive products at a time when being competitive is what matters most.

He also points out that Windows Mobile had the same problem, seven years earlier.

Five years later, the point about long-term profitability and R+D is being borne out. Only Samsung has managed to stay profitable – because of its components businesses.
link to this extract

 


Xiaomi finally releases 2015 sales stats » Tech in Asia

Erik Crouch:

The case of the missing phone statistics has finally been solved – today, Xiaomi revealed that it sold 70m smartphones in 2015, a number below even their most modest predictions.

It’s been apparent for a while that something went wrong for Xiaomi in 2015. In 2014, the company predicted that they would sell 100m phones in the coming year – an estimate that was promptly bumped down to 80m last March.

When late 2015 rolled around, and China’s techies eagerly awaited the company’s sales report, they were met with silence. CEO Lei Jun talked in December about how the company “does not emphasize goals such as smartphone sales anymore,” which certainly didn’t build anyone’s confidence that the company had met its targets.

As Crouch notes, 2016 could be make or break. With China’s smartphone market slowing down, it really needs to find something fresh.
link to this extract

 


Delicious changes » The Official Delicious Blog

Delicious was the original bookmarking service (admit it, you thought it had just vanished):

My name is Tony Aly, and I’m the CEO of Delicious Media, a new company formed in alliance between my company, Domainersuite, and Science, the company that has managed Delicious since 2013. Science has transitioned control of Delicious to our new entity so that my team and I can dedicate ourselves to the long-term success and stability of this wonderful, useful, trailblazing site.

As part of this transition, over the next few weeks, we will be a making a few fairly prominent changes to the site.

The first big change you’ll notice is our transition from the javascript front-end framework that has been powering the content at https://www.delicious.com. The engineers who crafted this version of the site are incredibly talented, and their code is amazing. It’s beautiful and powerful, but it has posed several significant challenges for us. For example, the search engines have a real problem reading our content, hindering users’ efforts to use Google or Bing to find what they’re looking for on Delicious.

Translation: “damn engineers.” Except what’s the point of search engines indexing a bookmarking site? Delicious has been through so many changes of ownership – bought by Yahoo in 2005, then sold to YouTube’s founders, then sold on and on. Never quite manages to regain momentum. I use Pinboard – reliable, cheap, doesn’t mess about. And has a terrific Twitter feed.

For what might have been, read Bobbie Johnson’s article from 2005 about Yahoo buying Delicious.
link to this extract

 


Wikipedia: an old-fashioned corner of truth on the internet » Telegraph

I wrote about Wikipedia’s 15th birthday (on Friday), and largely I have nothing but applause for its approach that anyone could write or edit, and its pursuit of the “neutral point of view”, and (especially) its ad-free ethos. Though:

That’s not to say it’s without faults. There are plenty, some deeply ingrained. Most of its editors are male, meaning topics relevant to women are underrepresented. As the site (and each editor) ages, it becomes harder to attract new editors as the existing clique becomes embedded. With no overall editor determining its direction or content, the topics and content can vary enormously. The world probably doesn’t need zillions of explanatory articles about the Japanese video game franchise Pokemon – but perhaps could do with some of the articles about less-simple concepts being rewritten to a more novice-friendly standard. That’s what the Encyclopaedia Britannica had that Wikipedia doesn’t: consistency.

But that’s also the web revealing our real character. Those who can be bothered to create are more interested in Pokemon than explaining maths or science. We peer into Wikipedia, and see ourselves peering back.

link to this extract

 


Errata, corrigenda and ai no corrida: none noted.

Start up: the $10 iPhone, the mobile data boom, Watch 2 in June? and more


Clickbait! (Translation optional, but it’s nothing too shocking.) Photo by pvantees on Flickr.

You can now sign up to receive each day’s Start Up post by email. You’ll need to click a confirmation link, so no spam.

A selection of 11 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

Walmart’s $10 smartphone has better specs than the original iPhone » Motherboard

Nicholas Deleon:

Walmart is now selling a TracFone-branded LG smartphone that costs $9.82 (it also ships free if your online order total tops $50). Now, there are a few reasons why you may not want such a smartphone—for one, it’s running an outdated version of Android that may make it vulnerable to hackers—but there’s no denying that it represents something pretty special.

For less than $10 (plus the cost of data access) the user gets access to the Google Play app store, giving him or her the power to summon transportation at the push of a button, instantly connect with friends, and watch livestreams from all over the world. A bona fide smartphone, in other words.

It’s perhaps even more impressive when you consider that its modest specs — a 3.8in display, 3G and Wi-Fi networking, and a 3-megapixel camera — surpass those of the original iPhone, which was referred to in the tech press at the time as the “Jesus phone.”

It’s been eight years, so, what, three Moore’s Law cycles? Impressive nonetheless.
link to this extract


Funniest new Twitter feed of the day: Clickbait Robot » Quirker

Michael Moran:

it’s easy to get sucked in – especially when a clickbait story piggybacks on a current trend and gets mixed in with genuine news.

Understandably, web users don’t much like it. And actually, most web professionals don’t like it much either.

Rob Manuel, is just such an internet professional. In the past he has devised quizzes, games and animations for B3ta and UsVsTh3m that might have been called clickbait, but generally did deliver on their promise.

And now he’s devised the ultimate clickbait machine. It scrapes Twitter’s current trending topics and boils them down into crazy-sounding headlines without any human intervention. It’s weird, and it’s very very funny…

link to this extract


A team of robots may learn to grasp a million objects » MIT Technology Review

Will Knight:

[Stefanie] Tellex [of Brown University] says robotics researchers are increasingly looking for more efficient ways of training robots to perform tasks such as manipulation. “We have powerful algorithms now—such as deep learning—that can learn from large data sets, but these algorithms require data,” she says. “Robot practice is a way to acquire the data that a robot needs for learning to robustly manipulate objects.”

Tellex also notes that there are around 300 Baxter robots in various research labs around the world today. If each of those robots were to use both arms to examine new objects, she says, it would be possible for them to learn to grasp a million objects in 11 days. “By having robots share what they’ve learned, it’s possible to increase the speed of data collection by orders of magnitude,” she says.

link to this extract


Ericsson Mobility Report » Ericsson

The Ericsson Mobility Report is one of the leading analyses of mobile network data traffic. It provides in-depth measurements from the world’s largest selection of live networks spread all around the globe, with analysis based on these measurements, internal forecasts and other relevant studies. The report provides insights into the current mobile network data traffic and market trends, applicable to both consumers and enterprises.

This one is for the third quarter: suggests 3.4bn smartphone subscriptions, up from 2.6bn last year, and 1.4GB of data per user on average per month, up from 1.0GB a year ago. In western Europe it’s 2.0GB per user per month. Lots of interesting data, including one about churn between iOS, Android and Windows Phone.

5G doesn’t look like a big winner though.
link to this extract


Encrypted messaging apps face new scrutiny over possible role in Paris attacks » The New York Times

David Sanger and Nicole Perlroth:

American and French officials say there is still no definitive evidence to back up their presumption that the terrorists who massacred 129 people in Paris used new, difficult-to-crack encryption technologies to organize the plot.

But in interviews, Obama administration officials say the Islamic State has used a range of encryption technologies over the past year and a half, many of which defy cracking by the National Security Agency. Other encryption technologies, the officials hint, are less secure than terrorist and criminal groups may believe, and clearly they want to keep those adversaries guessing which ones the N.S.A. has pierced.

Some of the most powerful technologies are free, easily available encryption apps with names like Signal, Wickr and Telegram, which encode mobile messages from cellphones. Islamic State militants used Telegram two weeks ago to claim responsibility for the crash of the Russian jet in the Sinai Peninsula that killed 224 people, and used it again last week, in Arabic, English and French, to broadcast responsibility for the Paris carnage.

This argument isn’t going to go away; it’s going to continue between privacy advocates and governments (who are always seeking to surveil and gather). Every incident like that in Paris becomes ammunition, in a near-literal sense.
link to this extract


The TalkTalk hack can’t be shrugged off » The Guardian

John Naughton:

Imagine a chemicals company that, as part of its operations, needs to process hazardous, carcinogenic materials, and therefore has to store them on site. Now imagine that some unscrupulous guy siphons off large quantities of the hazardous gunk and when this crime is revealed by the company, the boss is unable to tell reporters whether the tank containing the hazardous material was locked, or even covered.

If TalkTalk had been a chemicals producer and toxic chemicals had been stolen, the public outrage would be palpable. But because it’s a communications company, the response is just a resigned shrug. It’s just personal data, theft of which goes on every week: just think of the infidelity site Ashley Madison and the US health insurer Anthem. Stuff happens, move on.

The trouble is that personal data in the wrong hands is a very hazardous substance indeed. It’s the raw material that fuels a vast global industry, which uses it for phishing, pharming, malware distribution, hacking of corporate databases, extortion and blackmail.

Also worth it for the David Runciman quote about the difference between a scandal and a crisis.
link to this extract


​How to easily defeat Linux Encoder ransomware » ZDNet

Neat, from Steven Vaughan-Nichols:

just crack open your files yourself.

You see the would-be cyber-criminals made a fundamental mistake. Their encryption method uses a faulty implementation of Advanced Encryption Standard (AES) to generate the encryption key. Specifically, as the anti-virus company Bitdefender reported, the “AES key is generated locally on the victim’s computer. … rather than generating secure random keys and IVs [initialization vector], the sample would derive these two pieces of information from the libc rand() function seeded with the current system time-stamp at the moment of encryption. This information can be easily retrieved by looking at the file’s time-stamp.”

Armed with this, it’s trivial – well, for encryption experts – to find the key you need to restore your files. Since most of you don’t know your AES from your Playfair, Bitdefender is offering a free Python 2.7 script to obtain the Linux.Encoder key and IV for your containinated server.

They probably won’t make the same mistake next time, though.
link to this extract


We are not getting out of PCs, says Fujitsu exec » The Register

Paul Kunert:

Fujitsu is the latest bit part PC player to state its commitment to the product line, as it prepares to spin off the computer and mobile businesses into two separate subsidiaries.

The units were part of the Ubiquitous Solutions division but at some point in the next 12 months will be distinct entities sitting under the Product division, the company told us.

“We are super committed to the PC business,” said head of product EMEA, India and Africa, Michael Keegan.

“It’s a very big part of the overall P&L [account] but we recognise that it is a massively changing business and needs more focus.”

I think you’ll find Fujitsu’s PCs are probably part of the “loss” in P&L, which swung to a loss for the half-year. But as it’s splitting the mobile phone and PC businesses, we’ll be able to see more clearly in future.
link to this extract


Wearable devices becoming main growth driver for ODMs » Digitimes

Aaron Lee and Joseph Tsai:

Quanta and Compal together have already acquired over 50% of the overall notebook orders for 2016, but both are still pessimistic about overall shipments in 2016. In 2016, the market watchers expect the market will gradually lean toward both the entry-level and high-end segments. More inexpensive Windows-based notebooks and Chromebooks are expected to be introduced, while vendors will also focus more on high-end products such as gaming notebooks.

Meanwhile, wearable device shipments are also expected to grow dramatically. Quanta, the maker of the Apple Watch, is expected to see related orders surging in 2016 and the ODM reportedly has also received orders for Apple’s second-generation Apple Watch for the second quarter of 2016.

Jeez, talk about burying the intro. “APPLE WATCH 2 TO SHIP IN APRIL?” is the way to write this. Although that rumour is already doing the rounds.
link to this extract


Google to contest Russia’s antitrust ruling on Android » Reuters

Maria Kiselyova:

Google will contest in court a ruling by Russia’s antitrust agency that it broke competition law by abusing its dominant position with its Android mobile platform, the U.S. technology company said on Tuesday.

Russia’s competition watchdog ruled in September that Google had broken the law by requiring pre-installation of certain applications on mobile devices running on Android.

“We intend to contest this decision and explain in court why we consider it unfounded,” Google said in its official Russian blog.

Google has until Dec. 18 to amend its contracts with smartphone manufacturers in order to comply with the ruling in the case that was launched by local rival Yandex.

link to this extract


Google removes another app from the Play Store for dodgy reasons, this time it’s the notorious Tasker » Android Police

Rita El Khoury:

the app isn’t just useful for gimmicks and even if many of us feel overwhelmed by it or don’t need it, it’s still part of the foundation of Android and the poster child for all the possibilities you have with the platform.

Taking Tasker out without a notice isn’t just reckless, it’s being stupidly blind to the entire history of Android, especially when the grounds for removal are dodgy at best. We’ve contacted Pent, Tasker’s developer to see what’s going on, and so far the story is as weird as it gets.

Pent didn’t get a warning regarding the removal and in the Developer Console, he sees this explanation:

“This app has been removed from Google Play for a violation of the Google Play Developer Programme Policy regarding Dangerous Products. Please review the Optimising for Doze and App Standby article, modify your app’s manifest and resubmit. More details have been emailed to the account owner.”

It seems that the removal was based on the existence of a dangerous permission that disables Doze in the app’s manifest: android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS. The same reason was given to Stefan Pledl for the removal of his app LocalCast from the Play Store.

However, and here’s the weird part, that permission isn’t in the Play Store version of Tasker. As a matter of fact, Pent tells us the app wasn’t published in any form to the Play Store with that permission.

People will be up in arms about this, right? Update: as of Wednesday morning, it’s back.
link to this extract


Errata, corrigenda and ai no corrida: none notified.

Start up: lightening YouTube, more Flash vulnerability, farewell to Apple’s store fan, NSA cracking, and more


“Yeah, pretty frazzled after a long day writing clickbait headlines. You?” Photo by peyri on Flickr.

You can now sign up to receive each day’s Start Up post by email. You’ll need to click a confirmation link, so no spam.

A selection of 8 links for you. Hand-picked by fingers. I’m charlesarthur on Twitter. Observations and links welcome.

Page weight matters » Chris Zacharias

At YouTube, Zacharias was challenged to get the standard 1.2MB page down below 100KB:

Having just finished writing the HTML5 video player, I decided to plug it in instead of the far heavier Flash player. Bam! 98KB and only 14 requests. I threaded the code with some basic monitoring and launched an opt-in to a fraction of our traffic.

After a week of data collection, the numbers came back… and they were baffling. The average aggregate page latency under Feather had actually INCREASED. I had decreased the total page weight and number of requests to a tenth of what they were previously and somehow the numbers were showing that it was taking LONGER for videos to load on Feather. This could not be possible. Digging through the numbers more and after browser testing repeatedly, nothing made sense. I was just about to give up on the project, with my world view completely shattered, when my colleague discovered the answer: geography.

The explanation is rather smart.
link to this extract


Forbes: a quick adtech video » Medium

Rob Leathern wanted to read an article – you know, one of those text things – on Forbes:

In order for me to read that one article I had to receive 1,083 URL calls from 197 different domains adding up to 18.3 Megabytes of data, summarized here in an Excel spreadsheet. I closed any videos as soon as I could if they had the ability to do so.

Is it worth it? I like Alex Konrad and the article was probably a good one, but given I’m not sure where my data is going, or who some of these entities are (jwpltx.com? wishabi.com?) I just don’t know.

link to this extract


Auto-generating clickbait with recurrent neural networks » Lars Eidnes’ blog

To generate clickbait, we’ll train such an RNN [recurrent neural network] on ~2,000,000 headlines, scraped from Buzzfeed, Gawker, Jezebel, Huffington Post and Upworthy.

How realistic can we expect the output of this model to be? Even if it can learn to generate text with correct syntax and grammar, it surely can’t produce headlines that contain any new knowledge of the real world? It can’t do reporting? This may be true, but it’s not clear that clickbait needs to have any relation to the real world in order to be successful. When this work was begun, the top story on BuzzFeed was “50 Disney Channel Original Movies, Ranked By Feminism“. More recently they published “22 Faces Everyone Who Has Pooped Will Immediately Recognized“. It’s not clear that these headlines are much more than a semi-random concatenation of topics their userbase likes, and as seen in the latter case, 100% correct grammar is not a requirement.

The training converges after a few days of number crunching on a GTX980 GPU. Let’s take a look at the results.

The results are spooky – such as “Taylor Swift Becomes New Face Of Victim Of Peace Talks” and “This Guy Thinks His Cat Was Drunk For His Five Years, He Gets A Sex Assault At A Home”. Because, you know, if you looked out of the corner of your eye, isn’t that what was on some site somewhere? (They weren’t.)

One feels Eidnes’s work should have happened in a Transylvanian laboratory in a thunderstorm. Next you get a machine to write the story that fits the headline, and.. we can all knock off for the century.
link to this extract


Broadband in the UK ‘to stay top of the 5 major EU countries until 2020’ » ISPreview UK

Mark Jackson:

A new BT-commissioned report from telecoms analyst firm Analysys Mason has perhaps unsurprisingly found that the take-up and availability of superfast broadband (30Mbps+) connectivity in the United Kingdom is ahead of Spain, Germany, Italy and France, and will remain there until at least 2020.

The benchmarking report marks the United Kingdom as the “most competitive broadband market of all the countries it features“, although there are a few caveats to its findings. For example, the report overlooks most of Europe’s other states, including those with superior broadband infrastructure to ours, and seems to only focus on fixed line networks.

Furthermore it also makes an assumption that the current roll-out progress will hold to the Government’s promised targets, which may well be the case but we won’t know for certain until 2020. In addition, the study only appears to consider “superfast” services (defined as 30Mbps+ in the report), which overlooks the important area of “ultrafast” (100Mbps+) connectivity.

BT tweeted this headline and added “thanks to BT’s rollout of fibre”, and the culture/media/sport minister Ed Vaizey retweeted it without comment.

Is it really healthy that during an Ofcom examination of BT’s position a minister is doing that? Meanwhile Jackson’s longer analysis provides much-needed scepticism about the claims, and the lack of data in the report.
link to this extract


Adobe Flash Player security vulnerability: how to protect yourself » BGR

Zach Epstein:

The fun never ends with Adobe Flash.

Just one day after Adobe released its monthly security patches for various software including Flash Player, the company confirmed a major security vulnerability that affects all versions of Flash for Windows, Mac and Linux computers. You read that correctly… all versions. Adobe said it has been made aware that this vulnerability is being used by hackers to attack users, though it says the attacks are limited and targeted. Using the exploit, an attacker can crash a target PC or even take complete control of the computer.

And now for the fun part: The only way to effectively protect yourself against this serious security hole is to completely uninstall Flash Player from your machine.

Here’s the security note: “Adobe is aware of a report that an exploit for this vulnerability is being used in limited, targeted attacks. Adobe expects to make an update available during the week of October 19.” Spear phishing, no doubt; but Flash really is beginning to look like the worst thing you can have on your machine, especially if you’re in any sort of sensitive work.
link to this extract


Why Google is wrong to say advertisers should shift 24% of their TV budgets to YouTube » Business Insider

Lindsey Clay in chief executive of Thinkbox, which just happens to be a commercial TV marketing body, and doesn’t like Google’s suggestion:

why would an advertiser remove a quarter of the money they invest in the most effective part of their advertising and give it to something that hasn’t shown any proof of actually selling anything? 

However, it needs a response lest anyone believes Google on this. Here are some things to consider:

This is Google’s data. We’ve asked to see the data itself, but usually Google doesn’t share. If and when it does, we’ll comment on it but we obviously need to comment now. We understand the TV elements are based around a panel of Google users managed by Kantar that does not measure all TV and that the YouTube element is provided by Google themselves.

If that isn’t flaky and biased enough, it is also unaudited. They even called it the “Google Extra Reach Tool”; it is a self-fulfilling prophecy. And does it take account of the 50% of online ads that are not seen by humans? And how does it square with the report in the FT recently revealing that YouTube has been selling fraudulent ad views to advertisers?

Their recommendation also seriously challenges common sense when official industry sources including comScore show that YouTube accounts for 7.5% of 16 to 24-year-olds’ video time, with TV at 65%. The numbers for the whole population are 3.5% and 81%. Ad minutage on commercial TV is approximately 15% of that time, but is much lower on YouTube, and that is before you consider users’ impatient use of its ‘Skip ad’ button.

Clay is hardly impartial, but she raises worthwhile points.
link to this extract


Apple’s biggest fan has died » The Washington Post

Michael Rosenwald:

There are plenty of goofballs — like me — who stand outside Apple stores all night waiting for the company’s latest, thinnest, must-have offering.

There was nobody like Gary Allen, who died Sunday from brain cancer at 67.

Allen didn’t care so much about Apple’s new products (though he bought many of them.) He cared about the stores, the sleek and often innovative ways Apple presented itself to the world — the winding staircases, the floor-to-ceiling glass, the exposed brick.

Allen, a retired EMS dispatcher, traveled around the world — obsessively and expensively — to be among the first in line at the company’s new stores. He attended more than 140 openings, collecting all sorts of trivia. He could even tell you where Apple store tables are made (Utah; he stopped by the factory once to say thanks).

The headline is a trifle unfair; Allen was a fan of the stores, and their design. Rosenwald recounts a story of someone who just liked paying attention to detail; it’s a delightful mini-obituary.
link to this extract


How is NSA breaking so much crypto? » Freedom To Tinker

Alex Halderman and Nadia Heninger:

The Snowden documents also hint at some extraordinary capabilities: they show that NSA has built extensive infrastructure to intercept and decrypt VPN traffic and suggest that the agency can decrypt at least some HTTPS and SSH connections on demand.

However, the documents do not explain how these breakthroughs work, and speculation about possible backdoors or broken algorithms has been rampant in the technical community. Yesterday at ACM CCS, one of the leading security research venues, we and twelve coauthors presented a paper that we think solves this technical mystery.

The key is, somewhat ironically, Diffie-Hellman key exchange, an algorithm that we and many others have advocated as a defense against mass surveillance. Diffie-Hellman is a cornerstone of modern cryptography used for VPNs, HTTPS websites, email, and many other protocols. Our paper shows that, through a confluence of number theory and bad implementation choices, many real-world users of Diffie-Hellman are likely vulnerable to state-level attackers.

Estimated cost: $100m for a system that could break a single Diffie-Hellman key per year. But after two years, with the correctly chosen keys, you could passively eavesdrop on 20% of the top million HTTPS sites. Don’t underestimate the NSA. But of course, don’t underestimate the Chinese, Russians, and so on..
link to this extract


Start up: Samsung’s S6, why clickbait works, the music industry’s pain, Lenovo’s clean pledge, and more


What happens when you don’t have enough people in these? The music business hurts. Photo by eldeeem on Flickr.

A selection of 10 links for you. Adjust for daylight savings. I’m charlesarthur on Twitter. Observations and links welcome.

Samsung Galaxy S 6 and Galaxy S 6 edge » Business Insider

The Galaxy S 6 is made entirely of metal and glass and will come in two variations: The “regular” Galaxy S 6 and the Galaxy S 6 edge, which has a curved screen.

Samsung started designing the Galaxy S 6 from the ground up about a year ago under a program it called Project Zero. Whereas the last few Galaxy models were designed with the previous model in mind, the Galaxy S 6 is entirely new. Samsung even abandoned some of its earlier principles in order to highlight the design of the Galaxy S 6. It’s not waterproof. You can’t swap out the battery. And there’s no slot to insert extra memory.

Both models do all the same stuff, except the Galaxy S 6 edge has a few extras. It lets you swipe over from the curved portion of the screen to view a list of your favorite contacts and get alerts when you have a missed call or text from one of them. Other than that, Samsung says the curved screen doesn’t serve any function other than to look good. (It’ll also be more expensive, but Samsung hasn’t said how much either phone will cost yet.)

Besides the physical design, Samsung has cleaned up its software too. The phone isn’t bogged down with a bunch of unnecessary features and extras. The new version of Samsung’s TouchWiz skin for Android is cleaner and easier to navigate. All the basic apps like email, calendar, and music have a new look. Plus, the phone will ship with some of Microsoft’s Android apps like OneNote, OneDrive, and Skype.

As expected (and using its own Exynos processor), though Samsung appears to have used the iPhone 6 as its design template – from some angles you wouldn’t know which was which. I linked to Business Insider because it was the only site I could find easily which had a concise and balanced overview of what’s there in the phone and what’s not.

The list of features it has dumped from previous Galaxy flagships is now longer than those still there. Stuff that’s been dumped yet was previously “essential”: waterproofing, battery swapping, SD card slot, and of course things weird software “features” such as Air View, Air Gesture, Smart Stay and so on.

I have a feeling that this will actually be a bigger success for Microsoft than Samsung. “A curved screen that just looks good”?


Lenovo’s promise for a cleaner, safer PC » Lenovo Newsroom

After that Superfish shenanigans:

by the time we launch our Windows 10 products, our standard image will only include the operating system and related software, software required to make hardware work well (for example, when we include unique hardware in our devices, like a 3D camera), security software and Lenovo applications.  This should eliminate what our industry calls “adware” and “bloatware.”  For some countries, certain applications customarily expected by users will also be included. 

Lenovo is the biggest PC maker in the industry. Rival companies including Acer preinstall third-party apps. Will this force them to stop those installations, with the consequent impact on their margins? If so, that’s going to make it harder for them to thrive against Lenovo – which will get bigger, until Acer (and Asus?) are forced into a niche in the industry.


Why the Music Aficionado was to blame for declining music sales in 2014 » Music Industry Blog

Mark Mulligan:

Music Aficionados are consumers that spend above average time and money with music. They represent just 17% of all consumers but a whopping 61% of all recorded music spending. These consumers shape the fortunes of the music business. In the past this did not matter so much because:

• So many passive majority music fans were spending strongly
• Aficionados were behaving predictably

Now that has all changed. Passives are sating their appetites on YouTube while Aficionados are making major changes to their buying habits. Last year 14% of Aficionados said they were stopping buying CDs while 23% said they were buying fewer albums of any kind and 23% also said they were buying fewer downloads. The 2014 revenue numbers show us just what impact these changes had.

If we extrapolate those percentages to Aficionados’ share of spending in those markets in 2014 we see:

• Aficionados spent $192m less on CDs, which was 67% of the total $326m lost CD spend in 2014
• Aficionados spent $250m less on downloads, which was 86% of the total $290m lost CD spend in 2014

Amazing how concentrated it is – rather like the games app industry which relies on “whales”.


Yes to the Dress? » Medium

Paul Ford, in a masterful piece about media organisations’ reactions to That Story About The Dress (about which in two years’ time we’ll all say, “oh, yeah, wasn’t that stupid?”), and how Buzzfeed got 25 million page views in a day for it:

What I saw, as I looked through the voluminous BuzzFeed coverage of the dress, is an organization at the peak of a craft they’ve been honing since 2006. They are masters of the form they pioneered. If you think that’s bullshit, that’s fine—I think most things are bullshit too. But they didn’t just serendipitously figure out that blue dress. They created an organization that could identify that blue dress, document it, and capture the traffic. And the way they got those 25 million impressions, as far as I can tell from years of listening to their people, reading their website, writing about them, and not working or writing for them, was something like: Build a happy-enough workplace where people could screw around and experiment with what works and doesn’t, and pay everyone some money.

Great!

This is not said as an endorsement of BuzzFeed.

Oh. But it is an endorsement of building organisations that work. Trouble is, most media organisations experiment, but they don’t do it scientifically. That’s the real, fundamental fault.


Microsoft to cut 9,000 Nokia jobs in China » MarketWatch

Microsoft plans to shut two mobile-handset manufacturing plants in China formerly run by Nokia Corp., cutting about 9,000 jobs in total, various reports said Thursday. Microsoft, which bought Nokia’s handset business last April, scheduled the closure of the plants – located in Beijing and the southeastern city of Dongguan – earlier this month and plans to ship some of the manufacturing equipment there to Vietnam, according to a report in the government-run Beijing Youth Daily.

It quoted an unidentified Microsoft China executive as saying the closures and transfer of production capacity to Vietnam would likely be completed by the end of March. The layoffs are part of an estimated 18,000 job cuts which Microsoft announced in the wake of its purchase of the Nokia unit for $7.2bn.

At one time, according to Tomi Ahonen, it was the largest and most modern handset manufacturing facility in the world. Not sure when that time was, though. Think there are probably lots more factories making handsets now.


Why is the internet overrun with clickbait? » The Makegood

Tom Hespos:

I have an undergrad degree in journalism, I’ve been a business journalist for over 15 years, and I’ve worked at newspapers and even started my own. So I like to think I’m a decent headline writer. I wrote the original headlines for a handful of content pieces and watched the numbers roll in.

Some pieces bombed. Others did well. On the suggestion of our sales rep, we decided to test multiple headlines for each content piece. So we wrote 10-12 new headlines for each piece and tested them in isolation. Some of those headlines were typical of what a newspaper editor might write after reading the content. Others were deliberately controversial or, in some cases, playing to fear or uncertainty. You might even say they were starting to skirt the “clickbait” line.

So everything else was kept the same – the visual, the content, the media environments and everything else.  We just ran different headlines. Sure enough, the provocative headlines outperformed campaign averages. Big time. As in 15x lift.

We like to make fun of done-to-death lines like “You’ll never guess what happens next…” or “You’ve been doing [X] wrong your whole life…” We might even wonder out loud how many people actually click on such things. Perhaps we shouldn’t make fun.

I wonder what would happen if newspapers were to do the same with their headlines. You can see it being done by organisations like Taboola, where you can see an evolutionary progression going on with the headlines trying to get people to click through to stories.

Then again, businesses that rely simply on clicks are going to create clickbait. It’s as logical as night following day.


Futures of text » Whoops

Jonathan Libov:

I’m skeptical of a future where we communicate with computers primarily by voice. The visions in 2001: A Space Odyssey and the Her portray voice as the most effortless interaction, but voice actually requires a lot more cognitive and physical effort than pointing with a mouse, typing on a keyboard, or tapping on app icon and then navigating the UI. Consider all those times you’ve exchanged a million texts with someone while making plans when voice would have resolved it much more quickly. Text is often more comfortable even if it’s less convenient.

I believe comfort, not convenience, is the most important thing in software, and text is an incredibly comfortable medium.

Great piece looking at developments in messaging.


Cybergeddon: why the Internet could be the next “failed state” » Ars Technica

Sean Gallagher:

“If we think our kids and grandkids are going to have as awesome and free an Internet as the one we have, we really have to look at why we think that,” Jason Healey, director of the Cyber Statecraft Initiative at the Atlantic Council of the United States, told Ars.

The alternative futures for the Internet are not pretty. In presentations at multiple security conferences, Healey has suggested that the Internet could “start to look like Somalia”—a failed state where security is impossible, going about daily life is hazardous, and armed camps openly wage war over the network.

Healey’s analysis has been reinforced by events over the past two years: record data breaches, zero-day vulnerabilities released that affected a preponderance of Internet services, and visibility into the vast state surveillance of the Internet. The Internet has been “weaponized,” not just by the NSA and its foreign counterparts but by other states and Internet crime organizations. A thriving market for vulnerabilities attracts the bright and ambitious to work on discovering “zero days” for profit.

Sometimes you need an “e-” prefix, sometimes you need “cyber-“. Odd how “cyber-” wins for bad news – cyberwarfare, cyberhacking, and “e-” wins for the nice stuff. Apart from email, obviously.


Google just bought the entire .app web domain for $25m » Cult of Android

Killian Bell:

Fancy a .app web address? You’re going to be buying it from Google. The search giant has splashed out just over $25m on the entire .app web domain, which is around $19m more than any other company has paid for a top-level domain so far.

The actual figure Google paid to the Internet Corporation for Assigned Names and Numbers (ICAAN) is $25,001,000. The second-most expensive domain is .tech, which sold for $6.76m, and the third-most expensive is .reality, which sold for $5,588,888.

Google applied for the top-level domain (TLD) back in 2012, Business Insider reports, four years after ICAAN decided to expand the overall number of TLDs. The company also applied for .docs, .android, .free, .fyi, .foo, and others around the same time.

Makes sense, though now it has all the fun of being a registrar. Will all Google Play apps automatically get a .app address to make them visible in search?

Also, most expensive? Has nobody bought .sex?


Samsung’s rise and fall » Business Insider

Terrific, detailed piece by Steve Kovach:

The success of Samsung’s Mobile in the US began a rift with the Korean headquarters. Sources say the more successful Samsung was in the US, the more complicated the relationship with headquarters got. Instead of getting credit, the US team felt they were being chastised for doing their jobs well. (Samsung declined to comment on this story.)

It got so bad, a source told us, that Samsung flew a plane full of executives to the mobile division’s office in Dallas for an unannounced audit that lasted three weeks in 2012. The Dallas-based employees had to go through all materials they used to sell and market Samsung’s mobile products. They were accused of falsifying sales, bribing the media, and a bunch of other damaging actions that hurt morale in the office. The same US-based office that helped turn Samsung into a brand as recognizable as Apple was suddenly being punished for its work…

…during one meeting with the global teams at Samsung’s headquarters in Korea, executives made the US team stand up in front of several hundred of their peers in an auditorium. The executives told the employees to clap for the US team as encouragement since they were the only group failing the company, even though it was clear to everyone the opposite was true.

Jawdropping.