How To Change Your Facebook Settings To Opt Out of Platform API Sharing | EFF

With the Facebook scandal casting a shadow on anything even remotely tech related, we're not short on opinion. What's surprised me most about the whole situation, is that anyone should be surprised at all. What's more, I can't see how the proposed changes will do much.  The most expedient thing right now would seem to be sharing information like this from the Electronic Frontier Foundation. Locking your profile down, insofar as it can be locked down. While you defintely should — lock it down — sadly the horse has bolted, and with your data.

Over the weekend, it became clear that Cambridge Analytica, a data analytics company, got access to more than 50 million Facebook users' data in 2014. The data was overwhelmingly collected, shared, and stored without user consent. The scale of this violation of user privacy reflects how Facebook's terms of service and API were structured at the time. Make no mistake: this was not a data breach. This was exactly how Facebook's infrastructure was designed to work.

My point exactly, this is how it was designed to work. Nobody should be the least bit surprised at this situation. If you’re similarly cynical about the efficacy of the plan to address the situation, and at the same time caught in a bind like most people on the question of whether to keep using the service. The minimum requirement is another look over those settings.

You shouldn't have to do this. You shouldn't have to wade through complicated privacy settings in order to ensure that the companies with which you've entrusted your personal information are making reasonable, legal efforts to protect it. But Facebook has allowed third parties to violate user privacy on an unprecedented scale, and, while legislators and regulators scramble to understand the implications and put limits in place, users are left with the responsibility to make sure their profiles are properly configured.

Not only should you not have to do it, but you shouldn’t expect that settings will routinely change to such a degree that maintaining the level of privacy you desire requires you to check over it every time Facebook rearranges the furniture.


Alphabet’s ‘Outline’ Homebrew VPN Software Offers Open-Source, Easy Set-Up Privacy You Control

Alphabet's ‘Outline' looks an interesting project. I want to revisit some of the security/privacy recommendations on this site, my own perspective on private VPN companies has shifted since I last wrote about one in particular. I would agree this is not a ‘privacy panacea’, but have every intention of seeing if I can break it.

Jigsaw, the Alphabet-owned Google sibling that serves as a human rights-focused tech incubator, will now offer VPN software that you can easily set up on your own server—or at least, one you set up yourself, and control in the cloud. And unlike older homebrew VPN code, Jigsaw says it's focused on making the setup and hosting of that server simple enough that even small, less savvy organizations or even individual users can do it in minutes

The Laptop Locator You Probably Didn’t Know About Could Save You | Backblaze

The Laptop Locator You Probably Didn't Know About Could Save You – Something I haven’t spent enough time on here is the other kind of security, backups. If you’ve never needed anything from a backup you might not fully grok their value, let alone the peace of mind. It only takes one failure. Given the realtime backup capabilities of Backblaze, anything else is a bonus. But as far as bonus features go, you would be hard pressed to find a better one than the Backblaze Locate my Computer feature. This post from their blog highlights a few of the success stories. Where Find my Mac failed, Backblaze was still able to help. 1

While we kept hearing praise and thanks from our customers who were able to recover their data and find their computers, a little while passed before we would hear a story that was as incredible as the ones above. In July of 2016, we received an email from Una who told us one of the most amazing stories of perseverance that we’d ever heard. With the help of Backblaze and a sympathetic constable in Australia, Una tracked her stolen computer’s journey across 6 countries. She got her computer back and we wrote up the whole story: How Una Found Her Stolen Laptop.

Backblaze offers a 15-day free trial, then unlimited backup storage for US$5 per month.

  1. The location map is also encrypted with your private key, so there are no privacy issues either.

A Case Study in Phishing | MacSparky

A Case Study in Phishing | MacSparky — While this is a great example of how sophisticated phishing scams can look on the surface, just beneath the veneer are all the crude signs that scream scam. Perhaps the crudest is how greedy these scammers are, you might think they’d look up the subscription prices before trying to ape them.

The first tool you need in fighting Spam is common sense. YouTube Red does not cost $149.99/month, and a simple search will tell you that. If there is any question, also take a closer look at the details. The sender lists their name as “App Store” but disclosing the actual email address; it’s “”. Does that really sound like an address Apple would send you to confirm a subscription? Also, it lists “Payment Method” as “By Card”, not the usual xxxx-xxxx-1234 you usually see. It also creates this sense of urgency, explaining I'm on a free trial but I will be charged $150 in just two days if I don't act. While I can see how this email may fool some people, on the barest scrutiny, it starts looking shady.


Do Not, I Repeat, Do Not Download Onavo, Facebook’s Vampiric VPN Service

Old news, yes I know. However if anything bears repeating, this is over qualified. If clarification is needed, the Onavo VPN does not enable any kind of new practice from Facebook. No, it simply makes it dramatically more efficient for Facebook to do what they always do, track everything. What’s particularly nauseating in this instance, is how they’re taking advantage of general misunderstanding around security and privacy. To my mind, this meets the modern definition of a lie. Onavo is spyware.

If you’re someone who can’t live without Facebook or simply can’t find the courage to delete it, the Onavo appears under the “Explore” list just above the “Settings” menu. I’d recommend you never click it. Facebook is already vacuuming up enough your data without you giving them permission to monitor every website you visit.

Show and Tell – Wednesday, 10 Jan 2018

Anyone wondering when more content might be added to this site, fear not. Like any sane person with a family, I took a little time away from the desk over the past few weeks. Having returned to task this week I have been feverishly working in the background, putting more permanent fixes in place for some of the things I mentioned last month. Dealing with amateur mistakes I made when both setting up this site initially, and migrating it to WordPress. 1 Even if there is still work to be done, by now the site should be much faster for most users, and in subtle ways it should look nicer. If you are having any trouble viewing the site, please drop me a line here

Now that I am able to get back to the writing, I have a lot to share. In the meantime, here is some of the Show and Tell backlog I have been sitting on.

We Know Where You Live

Amazon wants a key to your house. I did it. I regretted it. | The Washington Post — Never has that subtitle been more apt. Another in case you missed it link, but not for the reason you might think. Sometimes I despair. You’d think this was a critical look at the idea of totalising one’s life with a tech shopping company. Alas, it appears more of a thinly disguised lament that using one place to shop doesn’t allow you to get the best prices. If this is your only concern here, I fear you are lost.

Cryptojacking WordPress | WIRED  — Ordinarily I’m opposed to neologisms, but sometimes somebody nails it. To be fair, I’m much more opposed to Cryprojackers.

Meltdown and Spectre: What Apple Users Need to Know  — By now this is everywhere, and the patches are arriving. This whole issue is remarkable for how long these vulnerabilities have existed. Whenever you hear that crazy relative of yours telling people not to upgrade their OS, remind them of these vulnerabilities.

What Spectre and Meltdown Mean For WebKit | WebKit — More technical insight into how this all works.

Worst Passwords of 2017: From ‘123456' to ‘starwars' | the Independent  — This also did the rounds, but it bears sharing again. I realise how unlikely it is that anyone reading this would engage in such practices, but we all know somebody who needs a little help with this stuff.

Haven: Keep Watch  — This is interesting. I’d like to think we could see it on Apple devices, but that seems incredibly unlikely. In fact, it’s the first development in some time that has me casting an envious eye at the ugly green robot.

Snowden-Backed App ‘Haven' Turns Your Phone Into a Home Security System | WIRED  — See above

Group Madness

Elon Musk Shows Off the Tesla Roadster He's Prepping for Space  — I’m a space fan, but sorry this is fucking stupid. If you look closely you will notice a disturbing ideology that says we need to send junk to Mars, because we have too much junk down here. If we want to become a multi-planetary civilisation, it can’t be so we don’t have to sort our shit out on this planet.
To be clear, I want to see people on Mars, I was once a single digit child who wanted a laser sword. But I don’t want us to go there just so we have two planets to fuck up.

Oh, and by the way, Musk wants to Nuke the joint too, I guess he really is serious about getting it ready for humans. The funniest response to this I have seen was this: “Shouldn't we try to blow up the moon first?”

First Digital Pill Approved to Worries About Biomedical ‘Big Brother' | New York Times  — It says a lot about this historical moment that such a monumental breakthrough should be legitimately accompanied with this kind of suspicion.

The Attention Economy is the Addiction Economy | Medium — That more people involved in tech are starting to wake up to this isn encouraging. If it’s a bit much to suggest articles like this never go far enough, we have to start the conversation one ay or another.

Clean Energy Is a Bright Spot Amid a Dark Tech Cloud | WIRED – An actual example of Blockchain being applied to something other than destructive speculation.

Now Look Here

Panic Blog | the Future of Transmit iOS  — This has been about the wires the past week or so. In case you missed it, Panic will stop updating Transmit for iOS. The app will keep working for sometime, but it won’t be getting any further love unless something changes. This is a shame, but it’s sad to say that by the sounds of things, it won’t affect many people. One imagines — at least one hopes — that the iOS Files app will gradually develop to takeover the crucial functionality that pro users might miss. On top of which apps like Workflow and Pythonista can step in.

Remote Control a Mac From an iPhone via Workflow | Six Colors  — This is probably the year we will learn the fate of Workflow. Here’s hoping this kind of inventiveness adds to the case for its continued development and success, in whatever form that may be.

Marxico | Markdown Editor for Evernote — Having written up a guide for how to leave the green elephant behind, I thought I might engage some irony. This is pretty neat actually, if you’re an Evernote user who wants to use Markdown this is an option. As a bonus, sometime ago I write up intersections for turning web apps into native apps. 2

And Now For Something Completely Different

The Last Jedi Trailer Song in GarageBand iOS | YouTube — I’ve been threatening to write about iOS music apps for some time. The things you can now do on the iPad, even with GarageBand, are incredible.

How BeatMaker Caught the iOS Music Trend Before It Even Started | CDM Create Digital Music  — BeatMaker 3 is one of my favourite iOS apps full stop, let a one music apps. Whether you’re into music making on iOS or interested in development, this is an interesting insight into the history of development on the platform

New App Descript Lets You Edit Audio Like a Word Document –  – If anyone can explain to me how this works?

The Smallest PaaS Implementation You've Ever Seen | Dokku  — This is awesome

Star Wars Episode IV.1.d: The Pentesters Strike Back | CyberPoint International on Vimeo  — Something that brings together two very specific geek spheres. You know who you are.

  1. And all the other amateur mistakes in between. 
  2. So to speak, if you was to split hairs they’re not actually native. 

Ad targeters are pulling data from your browser’s password manager | The Verge

This from The Verge. Not for nothing, I urge the use of a password manager, but I have never been an advocate of the built version from your browser. Even if this method is new, unfortunately browsers are generally under siege,

The researchers examined two different scripts — AdThink and OnAudience — both of are designed to get identifiable information out of browser-based password managers. The scripts work by injecting invisible login forms in the background of the webpage and scooping up whatever the browsers autofill into the available slots. That information can then be used as a persistent ID to track users from page to page, a potentially valuable tool in targeting advertising.


Apple Blows Security | The Mac Observer

I get this is old news, this is more appreciation for the Mac Observer's rounded coverage. Not much I can add. The security lapses over the past few weeks have been appalling. The Mac Observer is unusual, with so much commentary on Apple offered by fans with an almost religious devotion to the company 1, these guys are a welcome breath of fresh air at times.

This post covers the past few weeks of security blunders at Apple. Mistakes that are all the more serious for how readily we are fleeced by absurd margins to use Apple hardware. I love the tech. The business, not so much. This categorisation seems pretty accurate,

In what could only be described as the worst security blunder in the history of commercial computing, Apple released macOS High Sierra on September 25, 2017. Unknown to users, included in that operating system was that no password was required to gain super user root access. This might be likened to leaving your front door open with a sign that says “Please, please rob me.”

One can only hope they sort out their QA problems.

  1. It can border on disturbing

Show and Tell – Thursday, 07 Dec 2017

Fewer links this week, as I get on with other things.

How to Irritate People

Laptop bans in class seem to be topic of the week:

Why I'm Not a Fan of Laptop Bans | Confessions of a Community College Dean — Naturally, I’m not a fan either. Neither can I concede the point about not shining a light on accessibility users. I can’t see a way in which a ban that included an exception for only a few users with different abilities wouldn’t be a floodlight that says ‘this person is not the same’. Here’s an idea, make your class interesting enough for students to pay attention and you won’t have as many on Facebook. Sure, that’s not easy, but banning technology won’t make your material worth absorbing.

Lecture, Attention, Recall … It's Complicated | Just Visiting – I’ve been thinking a lot about attention lately, and very little about teaching. Then again, I have plenty of thoughts on teaching to turn to. One recurring thought is triggered when I hear this nonsense about banning devices I lectures. I know I’m repeating myself. But, when I come across such a proposal, it recalls the overwhelming sense one gets that universities, and their most institutionalised educators are so often of the mind that there is something wrong with the student. The student must be fixed. Indeed they must be saved from attention grabbing technology. I call bullshit, which is why I was so pleased to read this paragraph:

If we’re going to lecture, aren’t we better striving for triggering a mind-blowing experience and not worry so much about recall. Let the mind-blowing experience that sends the student into a vortex of thought and reflection so deep they can’t pay attention to whatever else is happening be our goal.

Nobody Expects the Spanish Inquisition

“I Am Root”: A Retrospective on a Severe Mac Vulnerability | the Mac Security Blog – Some more detailed information on that root bug, and the machinations that caused it. With apologies, this website has some appalling design issues, especially if you’re on an iPad . I advise using reader mode.

Uber Data Hack | Schneier on Security – Bruce Scneiers roundup on Uber’s hack

Idle at Work

Editorial Workflow | post to – This is for a small subset of an already small audience. If you use, and editorial, somebody made a useful workflow for you

And now, for Something Completely Different

Dressing Up as Batman May Help Boost Your Productivity | Gizmodo Australia – And you wonder why Im so sarcastic about the cult of productivity



Personal info of 31 million people leaked by popular virtual keyboard Ai.type

By now you have probably heard this happened. This is a shocking leak, and exactly the kind of thing that proves the point I was making about facial recognition data. There were objections to the headline of the Washington post article about ‘Apple sharing face data with apps’. Objections along the lines that it’s actually you who shares the data. As ever, the truth is in the middle. Decisions are made at the source to make such things possible, but yes, you can opt to not use third-party apps that need private data to operate. There are indeed warnings on the box, as there was in this case.

It made me think of Smile software’s borderline flippant help article about the scary keyboard warning for allowing full access to keyboards. Ultimately, that article explains the need for the warning, although I’m not sure they do themselves any favours with the headline. This keyboard app is case study that makes the point with an exclamation mark. It is a fuck-up of the highest order,

the app’s database server was left online without any form of authentication. This meant anyone could access the company’s treasure-trove of personal information, which totals more than 577 gigabytes of data, without needing a password.

Yes, you read that right. It gets worse,

Some information is worryingly personal. It contains the precise location of the user, their phone number and cell provider, and according to Whittaker, the user’s IP address and ISP, if they use the keyboard while connected to Wi-Fi.

For reasons unclear, it also uploaded a list of each app installed on the phone, allowing the makers to, in theory, determine what banking and dating apps were being used.

Ai.type effectively enumerated the device it was being used on. It also uploaded hundreds of millions of phone numbers and e-mail addresses, suggesting that the keyboard was accessing the users’ contact information.

Apparently this affected mostly free users, which should 1 serve as a good illustration of the adage that if you’re not paying for a product, you are the product.

Here is some more detail. Please — for the love of god — read those permission messages and think about the access an app has to what, and why. Stay safe.

  1. But won’t