Start up: Theranos’s last days?, Samsung’s water-unproof S7 Active, the Pokemon Go craze, and more


Planning a crewed lunar mission? There’s some code for you on Github! Photo from Nasa Goddard Space Research Centre on Flickr.

You can now sign up to receive each day’s Start Up post by email. You’ll need to click a confirmation link, so no spam.

A selection of 12 links for you. Apply topically. I’m charlesarthur on Twitter. Observations and links welcome.

Theranos dealt sharp blow as Elizabeth Holmes is banned from operating labs • WSJ

John Carreyrou, Michael Siconolfi and Christopher Weaver:

»Silicon Valley startup Theranos Inc. is fighting for its life after regulators decided to revoke its license to operate a lab in California because of unsafe practices and to ban founder Elizabeth Holmes from the blood-testing business for at least two years.

The sanctions were laid out in a letter to Theranos released Friday by the agency that oversees US labs, the Centers for Medicare and Medicaid Services. Theranos said it is still seeking to resolve its issues with the regulator.

One sanction, a monetary fine of $10,000 a day until all deficiencies have been corrected, goes into effect July 12. The most serious sanctions, such as the ban of Ms. Holmes, won’t go into effect for 60 days.

If it fails to reach a settlement with the government, Theranos’s options are limited. Almost any course it takes will dramatically reshape the company that Ms. Holmes founded in 2003 as a Stanford University dropout and grew to a valuation of more than $9 billion in a 2014 fundraising round.

«

The first version of this that I saw at 0643 BST (0143 EST) Friday had a single byline (Siconolfi’s) and began more tamely: “US federal health regulators dealt a major blow to Theranos by banning founder Elizabeth Holmes from operating a blood-testing laboratory for at least two years and pulling regulatory approval for the company’s California lab.”

Clearly, the addition of two reporters and 18 hours sharpened up the intro (“lede” in the US; first paragraph to everyone else) quite a bit. And gave them time to put a very spooky picture of Holmes at the top.

And Theranos indeed looks cooked.
link to this extract


DNA sequencing costs plotted over time • National Human Genome Research Institute (NHGRI)

»

To illustrate the nature of the reductions in DNA sequencing costs, each graph also shows hypothetical data reflecting Moore’s Law, which describes a long-term trend in the computer hardware industry that involves the doubling of ‘compute power’ every two years (See: Moore’s Law [wikipedia.org]). Technology improvements that ‘keep up’ with Moore’s Law are widely regarded to be doing exceedingly well, making it useful for comparison.

In both graphs, note: (1) the use a logarithmic scale on the Y axis; and (2) the sudden and profound outpacing of Moore’s Law beginning in January 2008. The latter represents the time when the sequencing centers transitioned from Sanger-based (dideoxy chain termination sequencing) to ‘second generation’ (or ‘next-generation’) DNA sequencing technologies. Additional details about these graphs are provided below.

These data, however, do not capture all of the costs associated with the NHGRI Large-Scale Genome Sequencing Program. The sequencing centers perform a number of additional activities whose costs are not appropriate to include when calculating costs for production-oriented DNA sequencing. In other words, NHGRI makes a distinction between ‘production’ activities and ‘non-production’ activities. Production activities are essential to the routine generation of large amounts of quality DNA sequence data that are made available in public databases; the costs associated with production DNA sequencing are summarized here and depicted on the two graphs.

«

We’re good at sequencing, but less good at understanding what genomes tell us. That hasn’t improved as quickly.
link to this extract


Samsung Galaxy S7 Active fails Consumer Reports water-resistance test • Consumer Reports

Jerry Bellinson put not one but two successive Galaxy S7 Actives into the equivalent of five feet of water for 30 minutes. They didn’t make it:

»For a couple of days following the test, the screens of both phones would light up when the phones were plugged in, though the displays could not be read. The phones never returned to functionality.

Samsung says it has received “very few complaints” about this issue, and that in all cases, the phones were covered under warranty.

“The Samsung Galaxy S7 active device is one of the most rugged phones to date and is highly resistant to scratches and IP68 certified,” the company said in a written statement. “There may be an off-chance that a defective device is not as watertight as it should be.” The company says it is investigating the issue.

The Active is one of three versions of the Samsung Galaxy S7, and it was the only one to fail our water-immersion test.

«

Could be two lemons, but that doesn’t speak well to the quality control. Waterproofing seems to be a popular feature with testers, at least, because you can.. test it.
link to this extract


Teen playing new Pokémon game on phone discovers body in Wind River • County 10

»Shayla [Wiggins] tells County 10 that she woke up this morning and began playing a game on her cell phone called Pokémon Go, an augmented reality game that encourages the user to capture as many Pokémon as possible. “The Pokémon are all over Riverton,” she said. Shayla showed County 10 the game on her cellphone which displayed a map of Riverton where these Pokémon are located.

“I was trying to get a Pokémon from a natural water resource,” she explained. She said that she jumped over the fence to go towards the river in search of a Pokémon.

“I was walking towards the bridge along the shore when I saw something in the water,” Shayla said. “I had to take a second look and I realized it was a body.” She said the figure was floating about three feet from the shore and it looked like an average size male body. She reports that she thinks the man was native, but she can’t be certain. She saw a black shirt and black pants. All of the body was reportedly submerged except for part of his back and butt.

«

This game is taking people into bizarre situations. There are even reports of people setting up armed robberies (unproven) and using it while on patrol against Isis with Kurdish militias (verified). I’m amazed; Pokemon seems to me so transparently stupid – a set of Top Trump cards – that I’m amazed anyone over the age of 12 indulges in it. And yet…
link to this extract


A malicious ‘Pokémon Go’ app is installing backdoors on Android devices • Motherboard

Joshua Kopstein:

»wannabe Pokémon masters should take heed: amid high demand for the game as it slowly rolls out across the globe, security researchers have discovered a malicious version of the Pokémon GO app floating around that installs a backdoor on Android phones, allowing hackers to exploit Poké-hype to completely compromise a user’s device.

The security firm Proofpoint discovered the malicious application, or APK, which was infected with DroidJack, a remote access tool (RAT) that compromises Android devices by silently opening a backdoor for hackers. The malicious app was uploaded to an online malware detection repository on July 7, less than 72 hours after Nintendo released the game in Australia and New Zealand.

To install it, a user needs to “side-load” the malicious app by disabling an Android security setting that normally prevents the installation of unverified third-party apps from “unknown sources.”

This is potentially a huge deal, since the game’s slow roll-out to different regions has led some impatient players to download the app from third-party websites instead of waiting for the official release on Android’s Play store, which requires side-loading to install. Proofpoint notes that several major news outlets have even provided instructions on how to find and install the app from a third party.

«

link to this extract


Original Apollo 11 Guidance Computer (AGC) source code • Github

Lots of people are cloning it and improving it – just in case they, you know, need to pilot a lunar lander mission.
link to this extract


We need to talk about AI and access to publicly funded data-sets • TechCrunch

Natasha Lomas with a hugely important analysis:

»DeepMind says it will be publishing “results” of the Moorfields research [on eye disease] in academic literature. But it does not say it will be open sourcing any AI models it is able to train off of the publicly funded data.

Which means that data might well end up fueling the future profits of one of the world’s wealthiest technology companies. Instead of that value remaining in the hands of the public, whose data it is.

And not just that — early access to large amounts of valuable taxpayer-funded data could potentially lock in massive commercial advantage for Google in healthcare. Which is perhaps the single most important sector there is, given it affects everyone on the planet. If you don’t think Google has designed on becoming the world’s medic, why do you think it’s doing things like this?

Google will argue that the potential social benefits of algorithmically improved healthcare outcomes are worth this trade off of giving it advantageous access to the locked medicine cabinet where the really powerful data is kept.

But that detracts from the wider point: if valuable public data-sets can create really powerful benefits, shouldn’t that value remain in public hands?

«

Yes. Exactly. This is a key point which is being ignored: data is the necessity for Google and the British government is not seeking sufficiently clear repayment for it.
link to this extract


AI, Apple and Google • Benedict Evans

Quite a long musing on where we are with AI – which typically never quite arrives, because every time it does something smart (understands speech, identifies faces) we say “oh, that’s just computing“:

»A common thread for both Apple and Google, and the apps on their platforms, is that eventually many ‘AI’ techniques will be APIs and development tools across everything, rather like, say, location. 15 years ago geolocating a mobile phone was witchcraft and mobile operators had revenue forecasts for ‘location-based services’. GPS and wifi-lookup made LBS just another API call: ‘where are you?’ became another question that a computer never has to ask you. But though location became just an API – just a database lookup – just another IF statement – the services created with it sit on a spectrum. At one end are things like Foursquare – products that are only possible with real-time location and use it to do magic. Slightly behind are Uber or Lyft – it’s useful for Lyft to know where you are when you call a car, but not essential (it is essential for the drivers’ app, or course). But then there’s something like Instagram, where location is a free nice-to-have – it’s useful to be able to geotag a photo automatically, but not essential and you might not want to anyway. (Conversely, image recognition is going to transform Instagram, though they’ll need a careful taxonomy of different types of coffee in the training data). And finally, there is, say, an airline app, that can ask you what city you’re in when you do a flight search, but really needn’t bother.

In the same way, there will be products that are only possible because of machine learning, whether applied to images or speech or something else entirely (no-one at all looked at location and thought ‘this could change taxis”). There will be services that are enriched by it but could do without, and there will be things where it may not be that relevant at all (that anyone has realised yet). So, Apple offers photo recognition, but also a smarter keyboard and venue suggestions in the calendar app – it’s sprinkled ‘AI’ all over the place, much like location. And, like any computer science tool, there will be techniques that are commodities and techniques that aren’t, yet.

«

link to this extract


Exclusive: why Microsoft is betting its future on AI • The Verge

Casey Newton got to meet lots of people at Microsoft who are working on bots and AI:

»I meet with Kirk Koenigsbauer, corporate vice president of marketing for Office. He shows me a range of ways where intelligence is making Office easier to use. In September 2014 Microsoft introduced Delve, a kind of Fitbit for productivity that is included with Office 365. The app analyzes how much time you spend in email and in meetings, and highlights times on your calendar where you have extended periods of time to do more complicated, meaningful work. It tells you what percentage of people you sent an email to actually read it, and how quickly. It will suggest reaching out to colleagues that you haven’t emailed in a while. It even shows you response times for your colleagues, and for yourself.

If your organization lives in Google Apps, as do many big Silicon Valley companies, browsing Delve felt like a revelation. You don’t have to be a numbers nerd to find this kind of information useful. If you’re a manager, Delve can tell you at a glance how much time you’ve spent with each of your employees over the past week. This kind of intelligence isn’t as sexy as a general AI that anticipates your every need — but it’s here today, it works, and it makes Google Apps look like a neglected backwater by comparison.

«

1) Google Apps pretty much is a neglected backwater
2) would love to know if the statistics gathered by Delve actually have any meaning in the real world, or are just numbers collected because they can be.
link to this extract


Security Flaw in OS X displays all keychain passwords in plain text • Medium

Brenton Henry:

»This afternoon, a friend learned the hard way that you don’t let an unofficial company take control of your computer to provide “support”. However, it was what I learned that shocked me the most.

There is a method in OS X that will allow any user to export your keychain, without sudo privileges or any system dialogs, to a text file, with the username and passwords displayed in plain text. As of this writing, this method works in at least 10.10 and 10.11.5, and presumably at the least all iterations in between.

«

I tried his method; I had to click an “Allow” dialog for every single item in my keychain, which wasn’t a trivial number. So this exploit isn’t one to think deeply about. More to the point: what happened to his friend? Was it keychain-related?
link to this extract


How the Feds use Photoshop to track down paedophiles • Motherboard

Joseph Cox:

»The most innocent clues can crack a case. In 2012, a holiday photo of a woman and child holding freshly caught fish ended up being a key lead in a child pornography investigation.

Found within a cache of illegal, explicit material, the photo would eventually point detectives to a outdoor camping site in Richville, Minnesota, and result in the victims’ rescue, and suspect’s conviction in December 2012.

But first, detectives had to determine where the photo was taken. To do that, they cropped out the fish, sanitized the image, and sent it to Cornell University for identification, Jim Cole, the National Program Manager for Victim Identification at US Immigration and Customs Enforcement (ICE), an agency within the Department of Homeland Security (DHS), recalled to Motherboard in a phone call.

The university determined the species of fish, which was found in a particular region. Investigators then edited the suspect and victim out of the photo, Cole said, and distributed it to advertisers for camping grounds in the area, one of which recognized the location.

When detectives arrived, the same photo was on the wall of the camping office, Cole added.

“It’s all about making the haystack smaller, so we can find the needle,” he said.

«

A logo on a sweatshirt? A bottle of pills in the background? It can all contribute to cracking the case
link to this extract


Exclusive: Google is building two Android Wear smartwatches with Google Assistant integration • Android Police

David Ruddock has a strong and detailed rumour:

»The inevitable question with these Google smartwatches is “why?” I’m afraid I don’t have a concrete answer for you. But I can speculate. As Android Wear has evolved, manufacturer interest in it has not skyrocketed as Google likely hoped it would. At best, it appears to be holding steady. Once considered Wear’s strongest partner, LG has announced no new mainstream Wear device since the old Urbane last spring (the LTE is unashamedly niche with limited availability, and was heavily delayed). The number of new Wear OEMs announced lately has been modest, aside from a few niche fashion products that are unlikely to have a major impact on Wear’s distribution.

By building its own smartwatches, Google can implement exactly the hardware and features it believes will best demonstrate Android Wear’s capabilities.

«

Good luck with that. The OEMs aren’t doing it because they aren’t selling. (Unless they’re selling in China, in which case Google will have trouble too.)
link to this extract


Errata, corrigenda and ai no corrida: none notified

Start up: Tor for iOS 9?, Google wins book appeal, HTC’s new (i)Phone, DNA suspects, and more


A crucial part of some fake Amazon reviews. Photo by Joe Shlabotnik on Flickr.

You can now sign up to receive each day’s Start Up post by email. You’ll need to click a confirmation link, so no spam.

A selection of 9 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

New Tor apps for iOS 9 headed to iPhone, iPad » Daily Dot

Patrick Howell O’Neill:

The new iOS offering will come from a group led by Chris Ballinger, founder of ChatSecure and including Frederic Jacobs of Open Whisper Systems; Mike Tigas, who wrote Onion Browser; and Conrad Kramer, a former device jailbreaker. 

That group is working on iCepa, a system-wide iOS Tor client that can change the way every app on iOS connects to the Internet by routing traffic from each app through the Tor network.

Older versions of iOS lacked key capabilities that would allow for an effective Tor app, Freitas said. But certain changes implemented in iOS 9 — specifically the ability to incorporate Tor into multiple apps simultaneously — make the mobile operating system far more attractive for Tor developers.

“iOS has some new capabilities in it,” Freitas said. “You can create a device-wide [virtual private network], and it can be a Tor-based VPN. So we can create an Orbot-like service on iOS 9, which is exciting.”

Orbot empowers other Android apps to use Tor. It’s an anonymity amplifier that’s been impossible on iOS up until now because Tor could only run in a single app at a time.

link to this extract


Dear reader, we’re closing comments » IOL Beta

Adrian Ephraim, managing editor of the South Africa Independent:

Dear IOL reader, we need to talk …

I thought you should be the first to know that Independent Online (IOL) will be closing comments on its online articles with immediate effect.

It is a difficult but necessary decision to make and we arrived at it after careful consideration of all the factors at play.

The freedom of expression guaranteed by our Constitution was never meant to override the personal freedoms and human rights of our fellow citizens.

Let me be clear that commenting on an article is not a right, but a courtesy afforded to you by IOL as a reader.

If you are prone to being racist or sexist in your thinking, by all means express yourself on other platforms that may find such behaviour acceptable, but not on IOL.

We are of the view that instances of abuse in our comments section have become untenable.

..And another one. Just keeping tabs, really.
link to this extract


HTC One A9 photos leak: It’s an iPhone » BGR

Zach Epstein:

We’ve seen a number of leaked images of the upcoming HTC One A9 in the past, but the clearest pictures yet were just accidentally published by European wireless carrier Orange. HTC is already in deep trouble following its One M9 flop, but this phone may very well get the struggling smartphone maker sued into oblivion.

It really does look amazingly like an iPhone 6 (or 6S). Then again, so did the Galaxy S6. Hard to see it making any difference to HTC’s gradual demise.
link to this extract


Getting LEAN with Digital Ad UX » IAB

Scott Cunningham , svp of the Interactive Advertising Bureau’s Tech and Ad operations, begins this post “We messed up”. But the mea culpa also has a nostrum explicatum:

We engineered not just the technical, but also the social and economic foundation that users around the world came to lean on for access to real time information. And users came to expect this information whenever and wherever they needed it. And more often than not, for anybody with a connected device, it was free.

This was choice—powered by digital advertising—and premised on user experience.

But we messed up.

Through our pursuit of further automation and maximization of margins during the industrial age of media technology, we built advertising technology to optimize publishers’ yield of marketing budgets that had eroded after the last recession. Looking back now, our scraping of dimes may have cost us dollars in consumer loyalty.

Loose translation: “We did so much good that we made things worse.” Now the IAB is suggesting ads should be “light; encrypted; ad choice supported; non-invasive”. Nice idea. Not sure “encrypted” is necessary; is that to stop people like AdBlock Plus?
link to this extract


After undercover sting, Amazon files suit against 1,000 Fiverr users over fake product reviews » GeekWire

Jacob Demmitt:

Fiverr is an online marketplace that lets people sell simple services to strangers, like transcribing audio, converting photos or editing video. Amazon simply had to contact Fiverr users who advertised their review-writing services and set up the transaction.

The company said most people offered the undercover Amazon investigators 5-star reviews for $5 each.

One Fiverr.com user that went by bess98 offered to write the reviews from multiple computers, so as to deceive Amazon. Another user, Verifiedboss, unwittingly told the investigators, “You know the your [sic] product better than me. So please provide your product review, it will be better.”

As in the previous lawsuit, Amazon alleges that these reviewers often arranged to have empty boxes shipped to them in order to make it look like they had purchased the products.

Amazon is not suing Fiverr. The company noted in the court filing that these kinds of services are banned by Fiverr’s terms and conditions and Fiverr has tried to cut down on the practice.

Would love to know which products these people reviewed.
link to this extract


Appeals court gives Google a clear and total fair use win on book scanning » Techdirt

Mike Masnick:

The Authors Guild’s never-ending lawsuit against Google for its book scanning project has been hit with yet another blow. The 2nd Circuit appeals court has told the Authors Guild (once again) that Google’s book scanning is transformative fair use. This is not a surprise. Though this case has gone through many twists and turns, a few years ago it was also before the 2nd Circuit on a separate issue (over the appropriateness of it being a class action lawsuit) and the 2nd Circuit panel ignored that question, saying that it shouldn’t even matter because it seemed like this was fair use. Thus it was sent back to the district court, where Judge Danny Chin correctly said that the scanning was fair use. That ruling was appealed, and the AG trotted out some truly nutty legal theories (arguing that it wasn’t fair use because someone like Aaron Swartz might hack into Google’s computers and free the books).

These arguments did not work. The 2nd Circuit has affirmed the lower court ruling and given another nice appellate ruling establishing the importance of fair use — and a reminder that, yes, commercial uses can still be fair use:

Google’s making of a digital copy to provide a search function is a transformative use, which augments public knowledge by making available information about Plaintiffs’ books without providing the public with a substantial substitute for matter protected by the Plaintiffs’ copyright interests in the original works or derivatives of them.

Pretty convincing win for Google.
link to this extract


Your relative’s DNA could turn you into a suspect » WIRED

Brendan Koerner:

In [Michael] Usry’s case the crime scene DNA [from an unsolved killing in 1969] bore numerous similarities to that of Usry’s father, who years earlier had donated a DNA sample to a genealogy project through his Mormon church in Mississippi. That project’s database was later purchased by Ancestry, which made it publicly searchable—a decision that didn’t take into account the possibility that cops might someday use it to hunt for genetic leads.

Usry, whose story was first reported in The New Orleans Advocate, was finally cleared after a nerve-racking 33-day wait—the DNA extracted from his cheek cells didn’t match that of Dodge’s killer, whom detectives still seek. But the fact that he fell under suspicion in the first place is the latest sign that it’s time to set ground rules for familial DNA searching, before misuse of the imperfect technology starts ruining lives.

Mitch Morrissey, Denver’s district attorney and one of the nation’s leading advocates for familial DNA searching, stresses that the technology is “an innovative approach to investigating challenging cases, particularly cold cases where the victims are women or children and traditional investigative tactics fail to yield a solid suspect.”

Not sure if UK police would be able to demand access in the same way. Previously they didn’t need to – there was a national DNA database which included completely innocent people.
link to this extract


Apple’s iPhone finds more fans on Samsung’s home turf » MarketWatch

Jennifer Booton notes that the iPhone has hit a 14% sales share in South Korea over the summer:

Samsung was able to recoup some of the losses incurred from Apple by going after the smaller manufacturers, such as LG Electronics and Pantech. LG’s share slid to 22% from 29%, while Pantech’s nose-dived from 4% to 1%, according to the Counterpoint research. Apple’s influence is having an effect, though.

“Samsung still has a loyal following in Korea,” said Ramon Llamas, research manager at industry tracker IDC. “But Apple is certainly making a run.”

Apple’s share in South Korea, where users have long been accustomed to the Samsung Galaxy Note phablets and other larger-screen Galaxy phones, has been gaining ever since the launch of the 5.5-inch iPhone 6 Plus, Apple’s first large-screen iPhone, Kang said. Its share gain was most prominent right after the iPhone 6 Plus launched, growing sevenfold in the fourth quarter of 2014.

While the growth rate has since slowed, Kang said he believes there’s still room for Apple to grow there as the “iPhone ecosystem effect” — the idea that Apple’s interconnected operating systems and devices keep users within the Apple brand — begins to take hold.

“Mature smartphone users (mostly Android) have started to upgrade to Apple iPhones,” he said.

link to this extract


Soul of a virtual machine » Medium

Jerry Chen:

In 2005, as the product manager for VMware’s enterprise desktop business, I made the pilgrimage down to Round Rock, Texas to meet the executives running Dell’s PC business. This was a year before I created VDI (Virtual Desktop Infrastructure) and VMware was still the small but fast growing, and recently acquired division of EMC. For almost an hour I pitched Dell on the virtues of desktop virtualization. The Dell executives smiled, nodded politely, and at the end of the meeting they asked me, “You understand that we sell PCs here? Why would we ever want to commoditize our differentiation with virtualization?”

I collected my things and flew back to Palo Alto.

2015: Dell buys EMC, including VMWare, for $67bn, as its PC business keeps struggling. Now, VMWare didn’t kill off the PC business directly, but it certainly helped the move to the cloud that has forced Dell into this catchup acquisition.

Note how similar the Dell execs’ question is to Jerry Yang at Yahoo, who in 1997 told two guys with a new search algorithm “but we want people to click multiple search pages, because we can show them ads.” Larry Page and Sergey Brin didn’t come back. Yahoo isn’t dead, but it’s a zombie.
link to this extract


Start up: Wi-Fi Sense explained, another giant Android vulnerability, the US’s sleepiest cities, and more


What happens when you create a way for any programmer to analyse peoples’ DNA? (Hint: not good things.) Photo by micahb37 on Flickr.

A selection of 11 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

Wi-Fi Sense in Windows 10: Yes, it shares your passkeys; no, you shouldn’t be scared » Ars Technica

Sebastian Anthony:

For a start, when a Wi-Fi passkey is shared with your PC via Wi-Fi Sense, you never actually see the password: it comes down from a Microsoft server in encrypted form, and is decrypted behind the scenes. There might be a way to see the decrypted passkeys if you go hunting through the registry, or something along those lines, but it’s certainly not something that most people are likely to do.

Perhaps more importantly, though, just how sacred is your Wi-Fi password anyway? Corporate networks notwithstanding (and you shouldn’t share those networks with Wi-Fi Sense anyway), most people give out their Wi-Fi keys freely. You could even argue that Wi-Fi Sense is more secure: if I ask Adam for his Wi-Fi password, I am free to give it away to anyone. If I receive the password via Wi-Fi Sense, I can still connect to Adam’s network, but I can’t tell anyone else the password.

And it only goes to immediate-circle friends, not friends of friends of.. So probably not such a big thing to worry about.
link to this extract


Why Grooveshark failed » The Verge

Stephen Witt:

The Grooveshark streaming application launched in April of 2008 — several months ahead of Spotify. The service proved explosively popular from the outset. Users, especially younger users, loved on-demand music delivery, and Greenberg left school to focus on Grooveshark full time. But there was a problem: Grooveshark still relied on peer-to-peer infrastructure similar to Napster, Kazaa, and bitTorrent. In other words, although it functioned as a streaming service, it still sourced the music from its users’ file libraries. And to the record companies, that looked like copyright infringement.

Without approval from the labels, Grooveshark struggled to attract venture capital. In its first five years of existence, the company raised just under a million dollars. In the same time, Spotify, with equity buy-in from the music majors, raised a hundred times as much.

It didn’t “look like” copyright infringement; it clearly was infringement, in just the same way that the original Napster was. That’s why it was sued into the ground. Grooveshark never played by the rules (artists demanded their music be removed; Grooveshark staff re-uploaded it, or ignored new uploads). They failed because they could never stay inside the rules.
link to this extract


Drones and spyware: the bizarre tale of a brutal kidnapping » WIRED

Kevin Poulsen with a wonderful tale of how truth is stranger than fiction:

efforts to trace the new emails were in vain. The author boasted that he was using Tor as well as other anonymizing precautions that would withstand even an “Egotistical Giraffe exploit,” a reference to an NSA de-anonymizing technique that surfaced in the Edward Snowden leaks. He sent the messages through the Singapore-based anonymous remailer anonymousemail.com, and shared the photos—stripped of metadata—through the anonymous image sharing site Anony.ws.

Evidently unconvinced, the Vallejo police still insisted the crime was a put-on, but the FBI was also on the case. And, it turned out, despite his sophistication, the kidnapper had left a digital trail.

The kidnapper had slipped by using a disposable Tracfone to call Quinn after the abduction. The FBI reached out to Tracfone, which was able to tell the agents that the phone was purchased from a Target store in Pleasant Hill on March 2 at 5:39 pm. Target provided the bureau with a surveillance-cam photo of the buyer: a white male with dark hair and medium build. AT&T turned over records showing the phone had been used within 650 feet of a cell site in South Lake Tahoe.

But the real break in the case came when the kidnapper evidently struck again.

link to this extract


Trend Micro discovers vulnerability that renders Android devices silent » Trend Micro

Wish Wu (Mobile Threat Response Engineer):

We have discovered a vulnerability in Android that can render a phone apparently dead – silent, unable to make calls, with a lifeless screen. This vulnerability is present from Android 4.3 (Jelly Bean) up to the current version, Android 5.1.1 (Lollipop). Combined, these versions account for more than half of Android devices in use today. No patch has been issued in the Android Open Source Project (AOSP) code by the Android Engineering Team to fix this vulnerability since we reported it in late May.

This vulnerability can be exploited in two ways: either via a malicious app installed on the device, or through a specially-crafted web site. The first technique can cause long-term effects to the device: an app with an embedded MKV file that registers itself to auto-start whenever the device boots would case the OS to crash every time it is turned on.

In some ways, this vulnerability is similar to the recently discovered Stagefright vulnerability. Both vulnerabilities are triggered when Android handles media files, although the way these files reach the user differs.

Seems like the media file handling is where everyone is focussing for Android weaknesses just now.
link to this extract


September 2014: iPhone 6 and Android value » Benedict Evans

From September 2014:

with the iPhone 6 and iOS8, Apple has done its best to close off all the reasons to buy high-end Android beyond simple personal preference. You can get a bigger screen, you can change the keyboard, you can put widgets on the notification panel (if you insist) and so on. Pretty much all the external reasons to choose Android are addressed – what remains is personal taste.

Amongst other things, this is a major cull of Steve Jobs’ sacred cows – lots of these are decisions he was deeply involved in. No-one was quicker than Steve Jobs himself to change his mind, but it’s refreshing to see so many outdated assumptions being thrown out. 

Meanwhile, with the iPhone 6 Plus (a very Microsofty name, it must be said) Apple is also tackling the phablet market head on. The available data suggests this is mostly important in East Asia but not actually dominant even there – perhaps 10-20% of units except in South Korea, where it is much larger.  Samsung has tried hard to make the pen (or rather stylus) a key selling point for these devices, but without widespread developer support (there is nothing as magical as Paper for the Note) it is not clear that these devices have actually sold on anything beyond screen size and inverse price sensitivity (that is, people buy it because it’s the ‘best’ and most expensive one). That in turn means the 6 Plus could be a straight substitute. 

Now we have Samsung’s results (out by the time you read this) and LG’s results, where the latter specifically says that sales were lower in South Korea than expected. Evans seems to have been borne out: the only differentiator between premium Android and iPhones was screen size.
link to this extract


Busy-ness data on Google search results » Google

Do you ever find yourself trying to avoid long lines or wondering when is the best time to go grocery shopping, pick up coffee or hit the gym (hint: avoid Monday after work)? You’re in luck!

Now, you can avoid the wait and see the busiest times of the week at millions of places and businesses around the world directly from Google Search. For example, just search for “Blue Bottle Williamsburg”, tap on the title and see how busy it gets throughout the day. Enjoy your extra time!

busy-ness data from Google

That’s very clever. (Location data from Android phones, one guesses.)
link to this extract


Android security, bugs and exploits » Google+

Adrian Ludwig is head of security for Android:

There’s common, mistaken assumption that any software bug can be turned into a security exploit.  In fact, most bugs aren’t exploitable and there are many things Android has done to improve those odds. We’ve spent the last 4 years investing heavily in technologies focused on one type of bug – memory corruption bugs – and trying to make those bugs more difficult to exploit. 

A list of some of those technologies that have been introduced since since Ice Cream Sandwich (Android 4.0) are listed here. The most well known of these is called Address Space Layout Randomization (‘ASLR’), which was fully completed in Android 4.1 with support for PIE (Position Independent Executables) and is now on over 85% of Android devices. This technology makes it more difficult for an attacker to guess the location of code, which is required for them to build a successful exploit.

What Ludwig doesn’t mention: the Stagefright bug. Is it right to say it could be used to take over a phone via MMS? Or would ASLR defeat that? You’d hope the head of security for Android would tackle this in a public blogpost talking about security. But he doesn’t. Which tends to make one think the worst.
link to this extract


Which cities get the most sleep? » The Jawbone Blog

Tyler Nolan:

One of the major findings in our study of city sleep was that people living in cities just don’t get enough. No major city in the United States averages above the NIH-recommended seven hours of sleep per night. But it’s only part of the picture. The vast majority of the suburban and rural counties have much healthier sleep numbers.

Geography has a profound effect on the routines we follow and the habits we form. Our sleep cycles adapt to the pace and lifestyle of the world we live in and the world by which we are surrounded. We look forward to further investigating the effects of geography and how it influences UP wearers in all parts of the world.

Technical Notes: This study was based on over one million UP wearers who track their sleep using UP by Jawbone. Less populous counties were blended with neighboring counties to generate significant results. This technique revealed patterns at finer granularity than the state level, such as time zone boundaries. All data is anonymized and presented in aggregate.

One still gets that little tingle of concern that your sleep data could be tracked directly back to you by someone malicious or stalker-y at Jawbone. (The visualisations are lovely, though.)
link to this extract


Brinks’ super-secure smart safes: not so secure » WIRED

Kim Zetter:

Vulnerabilities found in CompuSafe Galileo safes, smart safes made by the ever-reliable Brinks company that are used by retailers, restaurants, and convenience stores, would allow a rogue employee or anyone else with physical access to them to command their doors to open and relinquish their cash, according to Daniel Petro and Oscar Salazar, researchers with the security firm Bishop Fox, who plan to demonstrate their findings next week at the Def Con hacker conference in Las Vegas.

The hack has the makings of the perfect crime, because a thief could also erase any evidence that the theft occurred simply by altering data in a back-end database where the smartsafe logs how much money is inside and who accessed it. If done well, the only telltale sign of an attack would be left on security cameras—if anyone bothered to look.

They’re “smart” because they can tally how much money is put into them. Dumb because they run Windows XP Embedded. And there’s an external USB port for “troubleshooting”.
link to this extract


Retailer Acceptance » Contactless Life

Duncan Stevenson has compiled a gigantic table of which companies accept contactless and Apple Pay payments (and to what amount).

In theory Apple Pay should be accepted at all retailers that accept contactless, and this seems to be the case for Mastercard and Visa cards, however American Express cards are currently experiencing issues with Apple Pay in certain retailers (hence the existence of the “Amex Apple Pay” column).  I have a blog post coming soon covering the issues with American Express Apple Pay in the UK.

(It’s a real HTML table too.)
link to this extract


Your 23andMe DNA can be used in racist, discriminatory ways » BuzzFeed News

This week, an anonymous programmer posted on GitHub an early-stage program called Genetic Access Control. It basically worked as a log-in mechanism. The third-party program was designed to hook up to the company’s API and mine the 23andMe accounts of users who agreed to share their information, as they would agree to let apps connect to their Facebook or Twitter profiles. Websites using Genetic Access Control could scan that data for information about “sex, ancestry, disease susceptibility, and arbitrary characteristics” — and then restrict users’ access to the site based on this information.

For example, people with only the “right” amount of European ancestry would be allowed to access a website that used Genetic Access Control:

Ways to use 23andMe API

But 23andMe shut down the developer’s access to its API on Wednesday, two days after the code was published. 23andMe spokesperson Catherine Afarian told BuzzFeed News the program violated a policy that forbids use of the API for, among other things, “hate materials or materials urging acts of terrorism or violence.”

I think a programmer who actually wanted to cause trouble (as opposed to one, as here, just showing 23andMe how blithely trusting it is) could reasonably point out that they’re not creating hate materials or anything to do with terrorism or violence.

And – whoever they were – succeeded with a beautiful example of why you don’t really want to have open public access to a DNA database. As well as why 23andMe are twits for ever having thought so.
link to this extract


Start up: Instagram v skin colour, slow smartphone sales, Galaxy Note 5 in a rush, and more


Are you sure you’d want not to feel pain or have super-strong bones? Photo by Jlhopgood on Flickr.

A selection of 9 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

The quiet racism of Instagram filters » Racked

Morgan Jerkins:

Last year, Danity Kane’s Dawn Richards uploaded a selfie on Instagram that lead to plenty of backlash from her fans. Aside from the apparent plastic surgery, many suspected that she had bleached her skin. In response, Richards tweeted “Filter is the new bleach.”

For women of color, she’s right. Instagram users can choose from over 20 filters, but as subjects, we don’t have a choice in how our images are processed once a filter is in place. In the name of enhancing or beautifying our photos, filters inevitably alter our appearances beyond recognition.

People often think of technology as inherently unbiased, but photography has a history of racism.

Remember the story of Kodachrome film’s insensible racism? Repeated by computers.
link to this extract


TrendForce reports Q2 global smartphone shipments at 304m and revises annual shipment growth… » PRNewswire

Trendforce is a Taiwan-based research company:

The latest analysis from the global market research firm TrendForce finds smartphone shipments in the second quarter of 2015 grew 1.9% over the previous quarter to 304m units. Shipment growth in the second quarter slowed as vendors prepared to launch their flagship devices in this year’s second half. However, shipments of branded Chinese smartphones benefited from the Chinese Labor Day sales and their entries into the overseas markets. TrendForce reports the second quarter shipments of Chinese branded smartphones had an above global average growth of 15.6% with 126m units shipped.

TrendForce has also made downward revision to smartphone shipment growth for the entire 2015 from 11.6% to 8.2%. According to Avril Wu, TrendForce’s smartphone analyst, this revision is attributed to the negative global economic outlook for the second half of this year and weakening demands.

Lots more figures to come (IDC, Gartner, Counterpoint among others) but this is a surprising data point. (Thanks Mr McC on Twitter.)
link to this extract


How strong is Apple’s grip over mobile phones? » WSJ

Rani Molla (and the graphics team?) put together this nifty graphic of revenue share in the mobile phone industry.

mobile phone industry revenue share

Note again that it is revenue share, not unit share (one slow-witted commenter failed to comprehend this), or profit share, or OS share. And it’s for the whole industry, not just smartphones – but of course smartphones generate more revenue. (A graphic showing absolute revenue would be fun too. Might have a stab at that.)
link to this extract


These superhumans are real and their DNA could be worth billions » Bloomberg Business

Caroline Chen:

Steven Pete can put his hand on a hot stove or step on a piece of glass and not feel a thing, all because of a quirk in his genes. Only a few dozen people in the world share Pete’s congenital insensitivity to pain. Drug companies see riches in his rare mutation. They also have their eye on people like Timothy Dreyer, 25, who has bones so dense he could walk away from accidents that would leave others with broken limbs. About 100 people have sclerosteosis, Dreyer’s condition.

Both men’s apparent superpowers come from exceedingly uncommon deviations in their DNA. They are genetic outliers, coveted by drug companies Amgen, Genentech, and others in search of drugs for some of the industry’s biggest, most lucrative markets.

Their genes also have caused the two men enormous suffering.

Admit it, until that last sentence you were feeling envious.
link to this extract


LifeLock plunges after FTC alleges data security firm made false promises to consumers » Forbes

Antoine Gara:

the Federal Trade Commission said on Tuesday afternoon LifeLock both failed to deliver on its pledges, or live up to a 2010 regulatory sanction, which barred the company from making false claims about the quality of its data protection services.

LifeLock, the FTC said, falsely claimed it protected consumers’ identity 24/7/365 by providing alerts “as soon as” it received any indication there was a problem, and charged consumers $10-a-month for the service. The company even revealed its CEO’s social security number in advertising campaigns as a means to prove the quality of its data protection.

However, between October 2012 through March 2014, the FTC says LifeLock not only misled customers on their protection by equating its services with the types of protection consumers’ receive from larger financial institutions. It also violated the 2010 order by failing to establish and maintain a comprehensive information security program to protect its users’ credit card, social security, and bank account numbers.

Would be nice if the US had better personal data security. Or even a law that protected it.
link to this extract


How YouTube killed an extension with 300,000 users » The Next Web

Owen Williams:

three years after its inception, Streamus is dead. It’s been removed from the Chrome Web Store after Google revoked its API key.

Sean Anderson, a 25-year-old developer based in California bet everything on his tiny, but incredibly useful Chrome extension.

At first, the extension was picked up by a few friends but it quickly gained steam when TechCrunch covered it in January of 2014.

It was always somewhat questionable, because it played music in the background without the video that went with it — Anderson seemingly knew this, but had hoped he would one day be able to work something out with YouTube if it got big enough.

Shortly after the Techcrunch article was published, YouTube sent Anderson a cease and desist letter.

YouTube was upset for three reasons: Streamus was not back-linking to YouTube or showing video in the foreground while playing music and didn’t show its advertisements. Understandable requests.

After the initial cease and desist and an introduction to YouTube’s head of developer relations, the company went quiet.

Did Anderson truly think Google was just going to ignore this? That’s naive optimism taken to the extreme.
link to this extract


Ahead of schedule: Samsung to release Galaxy Note 5 one month ahead of schedule » BusinessKorea

Cho Jin-Young:

According to industry sources on July 21, Samsung Electronics will hold an event in New York on Aug. 13 to unveil the Galaxy Note 5 and the Galaxy S6 Edge Plus.

Recent reports suggest that the Galaxy Note 5 will feature a 5.7 inch QHD Super AMOLED display, its own Exynos 7422 processor, 4GB of RAM, and a 16 megapixel main camera with optical image stabilization (OIS), along with a stylus pen. The Galaxy S6 Edge Plus will be the Note without a stylus. It will feature a 5.7 inch display, Exynos 7420 processor, 3GM of RAM, and 16 megapixel main camera.

The release of the Galaxy Note series in Aug. is very exceptional for Samsung Electronics. Until now, the company has launched the Galaxy Note series after making the products debut in IFA, the world’s leading trade show for consumer electronics and home appliances, which takes place in Germany every Sept. However, the company decided to move up the release date of the Galaxy Note 5 by a month this year. Also, this is the first time for Samsung to launch a “Plus” version of the Galaxy S series.

Big question is whether the Note 5 will have a removable back/battery and SD card slot.
link to this extract


An Irish startup thinks it can stop you from blocking online ads » The Irish Journal

[Pagefair CEO Sean] Blanchfield says he noticed last year that Apple begun sending signals that it wasn’t interested in helping ad tech firms track users and serve them ads.
“In July last year we noticed a company called Disconnect, they are an extension, much like Adblock, for Chrome. A San Francisco company. Their focus is privacy, user privacy and behavioural tracking.

“People install them basically to block cookies. As a side-effect they have to block most ads, because most ads use cookies.

“In any case, in July last year they launched mobile versions on Android and on iOS, and they weren’t approved for the Play Store, Google blocked them.

But Apple put them through (into the App Store). And I spoke to them after, and they felt pretty confident that they had been given the approval to proceed essentially blocking ads. That’s not their core mission but it’s an essential piece.”

PageFair’s solution is to scrambles the ads and deliver them in a way that adblock software can’t “see”.

“So a programme like Adblock Plus can’t recognise it,” Blanchfield said.

And will this work even against Apple’s new preference option for Safari? ”Yes.”

But doesn’t it slow down speed at which a page loads ads?  ”No, it’s still instantaneous.”

This is going to be quite a war.
link to this extract


Apple figures out way to help you more easily move objects on a touchscreen » CNET

It’s a patent filing, as Lance Whitney explains:

Apple and other mobile device makers have long offered the ability to cut or copy and paste text. To do this, you can use your finger to zoom in on the text you wish to select, then expand or shrink the highlighted text, and then finally delete or move that text. But that type of operation doesn’t always go smoothly because your fingers are typically too large to perform such a granular task. So selecting text is more frustrating than it should be. Apple’s patented solution would remove the need to place your big finger on the touchscreen in the first place.

Here’s how it would work: Let’s say you want to select a specific section of text. With the cursor placed in the right spot, you’d tap the side or another non-touchscreen area of the device. Each time you tap the side, the cursor could move one character, thereby expanding the selection of the text on a more precise and granular level. Tapping the right side of the device would move the cursor to the left, while tapping the left would move the cursor to the right.

Unconvinced.
link to this extract


Start up: Seattle v the Quake, Nadella on phones, Apple Pay in UK, Google’s giant ad and more


Forgotten. But by who? Photo by theen… on Flickr.

A selection of 11 links for you. Follow The Overspill on Twitter (this isn’t optional). I’m charlesarthur on Twitter. Observations and links welcome.

Exclusive: CEO Nadella talks Microsoft’s mobile ambitions, Windows 10 strategy, HoloLens and more » ZDNet

Nadella tells Mary Jo Foley:

If anything, one big mistake we made in our past was to think of the PC as the hub for everything for all time to come. And today, of course, the high volume device is the six-inch phone. I acknowledge that. But to think that that’s what the future is for all time to come would be to make the same mistake we made in the past without even having the share position of the past. So that would be madness.

Therefore, we have to be on the hunt for what’s the next bend in the curve. That’s what, quite frankly, anyone has to do to be relevant in the future. In our case, we are doing that. We’re doing that with our innovation in Windows. We’re doing that with features like Continuum. Even the phone, I just don’t want to build another phone, a copycat phone operating system, even.

So when I think about our Windows Phone, I want it to stand for something like Continuum [which lets you plug a phone into a suitable dock/keyboard and have it render PC-sized screens]. When I say, wow, that’s an interesting approach where you can have a phone and that same phone, because of our universal platform with Continuum, and can, in fact, be a desktop. That is not something any other phone operating system or device can do. And that’s what I want our devices and device innovation to stand for.

Last week’s announcement was not about any change to our vision and strategy, but for sure it was a change to our operating approach.

That last bit puzzles me. What is your “operating approach”, if it isn’t the embodiment of your vision and strategy?
link to this


Sixty-five THOUSAND Range Rovers recalled over DOOR software glitch » The Register

John Leyden:

Jaguar Land Rover is recalling no less than 65,000 of its SUVs due to a software problem that caused the cars’ doors to unlock themselves – potentially while in motion.

The issue, which potentially creates a heightened theft-by-hijack risk, affects Range Rover and Range Rover Sport vehicles sold in the UK over the last two years, the BBC reports. The flaw means that doors can remain unlatched even when in the “closed” position so that they can open while the car is in motion, Automotive News explains.

The recall follows recent reports that car thieves were targeting Range Rovers and BMW X5s using readily obtainable black box kit that made it straightforward to unlock and start cars that relied on keyless ignition systems.

On the plus side, they sold 65,000? Should have said “oh, man, we have to recall TWO MILLION. Yes, very successful year, so sorry, got to go.”
link to this


UK launch of Apple Pay heralds start of something big » CCS Insight

Ben Wood of the analysis company:

UK consumers and retailers, unlike their US counterparts, are familiar with the concept of “tap and pay”; it’s not an unfamiliar mechanism that they need to be educated to adopt.

Add to that the huge number of iPhone users in the UK and it’s clear Great Britain is something of a “golden isle” for Apple. Our research suggests that more than half of active users on some mobile networks have an iPhone; even though many won’t have a model that works with Apple Pay, the fierce brand loyalty that Apple inspires could prompt many to upgrade to a compatible iPhone.

The allure of the Apple brand also means everyone wants to work with the company, or is pushed to do so. Barclays bank initially refused to support Apple Pay, instead favouring its own bPay service. Early this morning, on the launch day for Apple Pay and in the face of considerable customer pressure, Barclays tweeted to say that it would support Apple Pay in the future.

Further evidence of Apple’s clout and determination is getting Apple Pay to work with the complexities of the London Transport network and the body that runs it, TFL. Although Apple isn’t the first company to offer such support, its scale means that millions of people travelling around London now can pay for their travel using an Apple device.

That “more than half of active users on some networks have an iPhone” stat is one worth considering. Generally, iOS has about 30-35% of the smartphone install base in the UK. Another stat to record: UK contactless stats show that in December 2014

“£380.8m was spent in the UK in December using a contactless card. This is an increase of 25.8% on the previous month and 330.8% over the year.”

Let’s see how that changes.
link to this


Apple Pay » Transport for London

Note this part:

Always use the same device

If you use Apple Pay on more than one device, for instance when the same payment card is linked to both an iPhone and an Apple Watch, make sure to choose one device and use it every time you travel, so you:

• Avoid incomplete journeys
• Benefit from daily and weekly capping
Please be aware that you might receive payment notifications on all your devices, regardless of which one was used for touching in or out.

Seems to imply that a different token is created when you put the same card onto the phone and the watch. Which, in the longer term, would mean the watch could be completely independent of the phone (once you figure out how to embed the card..)
link to this


Why buying ‘death of PC’ hype is dangerous » Laptop Mag

Avram Piltch:

Even though people won’t stop using (or buying) computers any time soon, the widespread but incorrect belief that computers are on the way out has serious implications. Corporate executives, investors and developers read the same news stories as everyone else and change their plans accordingly. While the PC space needs more innovation and better apps, many companies that make software and publish Web tools will transition even more of their resources to mobile. Websites that today offer more content on the page for desktop could end up getting stripped down for all users, on the belief that phone screens are the only ones that matter.

“The challenge the PC has is that it isn’t attracting much in the way of apps that exploit its capabilities and resonate with a broad audience,” said Ross Rubin of Recticle Research.

News of the form factor’s demise certainly won’t help.

As investors jump on the anti-PC bandwagon, companies that make computer hardware will be under increased pressure to produce fewer and lower-quality products. Consumers will see fewer innovations like the Microsoft Surface and Lenovo Yoga, and more commodity laptops in their place.

Hate to break it to you, Avram, but customers aren’t generally buying the Surface and the Yoga. They’re already buying, as they have been for years, the commodity products – where NPD says (in the article) that the average desktop sells for $482, and laptop for $442.

Set the rapid improvements in mobile (cameras, processors, form factors, sensors) against the dead-end nature of most PC tasks, and you can see why developer resources in hardware and software are going into mobile. There’s a lot of uncharted territory to explore.
link to this


The earthquake that will devastate Seattle » The New Yorker

Kathryn Schulz:

Under pressure from [tectonic plate] Juan de Fuca, the stuck edge of North America is bulging upward and compressing eastward, at the rate of, respectively, three to four millimetres and thirty to forty millimetres a year. It can do so for quite some time, because, as continent stuff goes, it is young, made of rock that is still relatively elastic. (Rocks, like us, get stiffer as they age.) But it cannot do so indefinitely. There is a backstop—the craton, that ancient unbudgeable mass at the center of the continent—and, sooner or later, North America will rebound like a spring. If, on that occasion, only the southern part of the Cascadia subduction zone gives way—your first two fingers, say—the magnitude of the resulting quake will be somewhere between 8.0 and 8.6. That’s the big one. If the entire zone gives way at once, an event that seismologists call a full-margin rupture, the magnitude will be somewhere between 8.7 and 9.2. That’s the very big one.

Flick your right fingers outward, forcefully, so that your hand flattens back down again. When the next very big earthquake hits, the northwest edge of the continent, from California to Canada and the continental shelf to the Cascades, will drop by as much as six feet and rebound thirty to a hundred feet to the west—losing, within minutes, all the elevation and compression it has gained over centuries. Some of that shift will take place beneath the ocean, displacing a colossal quantity of seawater.

• Last earthquake involving Juan de Fuca: 315 years ago.
• Usual frequency of earthquakes involving Juan de Fuca: every 243 years.
• Variance of quake timing: not given (but known by someone at Oregon State University).
• Value of real estate in Seattle and Oregon: probably falling by the time you read this.
• To put the tech lens on this, consider that Microsoft and Amazon are both headquartered in Seattle. Now wipe them off the map. Pause.
link to this


Google accidentally reveals data on ‘right to be forgotten’ requests » The Guardian

Sylvia Tippman and Julia Powles:

Less than 5% of nearly 220,000 individual requests made to Google to selectively remove links to online information concern criminals, politicians and high-profile public figures, the Guardian has learned, with more than 95% of requests coming from everyday members of the public.

The Guardian has discovered new data hidden in source code on Google’s own transparency report that indicates the scale and flavour of the types of requests being dealt with by Google – information it has always refused to make public. The data covers more than three-quarters of all requests to date.

Previously, more emphasis has been placed on selective information concerning more sensational examples of so-called right to be forgotten requests released by Google and reported by some of the media, which have largely ignored the majority of requests made by citizens concerned with protecting their personal privacy.

These include a woman whose name appeared in prominent news articles after her husband died, another seeking removal of her address, and an individual who contracted HIV a decade ago.

In other words, the “Right to be forgotten” is overwhelmingly about ordinary people who don’t want to be indexed. This is so telling about the PR spin that has gone on around this (“the ruling has already been criticised after early indications that around 12% of applications were related to paedophilia. A further 30% concern fraud and 20% were about people’s arrests or convictions… many other applications have come from corrupt public figures and criminals desperate to hide their past.
An actor who had an affair with a teenager, a celebrity’s child who was convicted of criminal offices and a man who tried to kill members of his family were among the first requests.
” Where do you think the Daily Mail got those details?).

And guess what happened when they queried Google about it?

“The underlying source code has since been updated to remove these details.”

link to this


Google’s largest shopping ad EVER spotted on the SERPs » Wordstream

Margot da Cunha:

giant ad on RHS of Google result
the new ad format takes up just about the entire right side of the page. But, don’t get too excited, if you look closely you’ll see that this isn’t just one ad for one advertiser, but rather a price comparison between different e-commerce sites and stores. So no, one advertiser cannot pay to completely dominate the right side of the page, but rather can be included in the product comparison sponsored ad on the right side. It looks like regular, non-sponsored Knowledge Graph results, but it’s definitely sponsored. Google started experimenting with adding ads to the bottom of Knowledge Graph results early back in 2014, but most of the info there was still organic.

“The way Google lists the pricing in these makes it much more obvious which options are the less expensive ones, so advertisers will probably have to ensure they have the least expensive option if they take advantage of this new format,” says Slegg.

Clever: advertisers will have to bid more to get placement, yet price lower to be chosen, thus eroding their margins. The only winning strategy long-term is to not need to be found through search. (SERPS in the headline, if you don’t know, is “Search Engine Results Page[s]”.)
link to this


Xiaomi success inspires every man and his dog to make smartphones in China » Reuters

Yimou Lee and Paul Carsten:

The call of the world’s biggest smartphone market is proving irresistible for entrepreneurs in China, where even purveyors of concrete mixers, refrigerators and rock music are mimicking local trailblazer Xiaomi with their own handsets.

But the market shrank in early 2015 for the first time in six years and sales have fallen at one-time leader Xiaomi. That sudden about-turn raises questions over whether there is any chance for the likes of construction machinery maker SANY Group Co Ltd, Gree Electric Appliances Inc of Zhuhai and veteran rockstar Cui Jian.

The slowdown may be too much for all but the largest handset makers, much less a plethora of me-toos, some analysts say. In a crowded market plagued by price wars, entrants will have to convince buyers to abandon established brands with phones that surpass even premium models, US research firm Gartner said.

“It’s not that easy to go bankrupt making phones, but it’s also not easy to be profitable,” said Taiwan-based Gartner analyst CK Lu, who covers the mainland smartphone market. “If you don’t have good differentiation, you’re putting yourself in a saturated market.”

China had 155 smartphone brands selling over 1,000 handsets a month as at end-March, from 110 two years ago, said analyst Neil Shah of Counterpoint Research. In neighbouring India, there were 103 brands, over half of which are Chinese.

There will be a shakeout, but quite when is a separate question.
link to this


Kuwait announces mandatory DNA database for its citizens » DNAForce

The recent suicide bombing that slain 26 innocent people during Friday prayers on the 26th of June has finally reached its ultimatum as the Kuwaiti legislature has now implemented a law that calls for a mandatory DNA testing on every single Kuwaiti citizen including its foreign residents.

The law states that security agencies must help the government to create a database on all 1.3 million Kuwaiti citizens and 2.9 million foreign residents in order to make faster arrests when it comes to criminal cases.

It is also stated that for those who refuse to give out their sample will be sent to jail for a year. It will also come with a fine of $33,000 or €29,700. If a citizen is proven guilty of faking their sample, they are entitled to be imprisoned for seven years.

Note how the foreign residents greatly outnumber the nationals. Will it apply to visitors too? This is a really slippery slope, and Kuwait has put itself halfway down it straight away.
link to this


The real threat posed by powerful computers » The New York Times

Quentin Hardy:

the real worry, specialists in the field say, is a computer program rapidly overdoing a single task, with no context. A machine that makes paper clips proceeds unfettered, one example goes, and becomes so proficient that overnight we are drowning in paper clips.

In other words, something really dumb happens, at a global scale. As for those “Terminator” robots you tend to see on scary news stories about an A.I. apocalypse, forget it.

“What you should fear is a computer that is competent in one very narrow area, to a bad degree,” said Max Tegmark, a professor of physics at the Massachusetts Institute of Technology and the president of the Future of Life Institute, a group dedicated to limiting the risks from A.I.

In late June, when a worker in Germany was killed by an assembly line robot, Mr. Tegmark said, “it was an example of a machine being stupid, not doing something mean but treating a person like a piece of metal.”

link to this