critical reading for the rude

ishush on qik, sousveillance, & equiveillance

Ishush has:

MONDAY, JUNE 01, 2009
qik & sousveillance

Sousveillance is about us all ‘at the bottom’ observing what goes on around and above us in an intentional way. Missteps by those in power (censorship, abuse, illegal moves of other kinds) can be recorded and cataloged just as well as the illegal moves of those ‘below’ — us — can be recorded and cataloged by those in power.

Qik may be a tool that takes sousveillance where it really needs to go — live feed. It’s got some kind of Facebook app too that I haven’t explored yet. Camera phones can be confiscated — but if the video is streaming live, then you can imagine that security may become reticent even to take said phone away, as long as doing so is an illegal act (or an embarrassment for the org or polis they may represent).

This could hold feet to fire. This could be a real tool for The People to document grievances against their states. “Equiveillance” is the term, I think.

They’re watching, and we’re watching too.

Sphere: Related Content

Qik… so friendly, so cute. Will be a political force.


June 1, 2009 Posted by | geo/pol, info sci, personomy, ubicomp | , | Leave a comment

gupta on palin

Vinay has it right:

A pox on both their houses

Brutal beat down on Lara Croft Sarah Connor Sarah Palin.


If you make it through the article, here’s my thinking: “Nobody ever went broke underestimating the intelligence of the American public.” I think people will vote for her as a mom-with-a-gun, as the VPILF (cough, hack) and as a symbol of America’s past and future – rugged, gun-toting frontier types, making their way through the world with nothing but a covered wagon, some corn meal, and a gigaton nuclear arsenal.

Grab popcorn and enjoy the show, this one’s gonna be a doozy.

August 31, 2008 Posted by | blogs, geo/pol | 1 Comment

Oh, just shut it.

‘”I hope to hold websites accountable for their actions and re-balance the power that a user has online. Free speech should be global and not just a concept for the outside world. A virtual forum should be no different than a coffee shop. And we wouldn’t stand for someone getting kicked out of a coffee shop because they said Linux sucks.”‘

No. Quit your whining. If you’re in my coffee shop and you piss me off, I kick you out. It’s my coffee shop. I am the proprietor. You enjoy coffee here on my terms, or you take your business (and comments) elsewhere. Freedom of speech in the public square — but in my coffee shop, I will bounce your ass right out for talking smack, and rightly so.

(via Wired)

November 30, 2007 Posted by | biz, info sci, personomy | , , , , | 3 Comments

ironic design

CSven had me going

Usually when I surf through the CGTalk forum I see plenty of creativity when it comes to character design, but when it comes to products/objects what I find are mostly attempts to model real world designs. There are plenty of Mercedes this and Ferrari that, but relatively speaking very few original product designs. Thus it’s difficult to not appreciate Kadeg Boucher’s “stupid object #1 : Lawn Mower schumacher” (shown above). What a great piece. For more images, check out the thread on CGTalk (Link).

I was all ready for him to launch into how great it is that the piece is such an excellent joke — that the irony ought to make us a little sad — that the designer is really clever to play on the red-state tension of wanting to zoom-fast-ride-the-hell-out-of-here-like-#3 but is always just stuck… mowing the yard. Clock in, clock out. Going to church. Catching the big race on teevee… never really going anywhere new.

But I don’t think that’s what he was getting at…

Boucher’s fanciful effort once again makes me wonder why corporations – in this case MTD, Toro, Snapper, John Deere and the rest – don’t add a little more flair to their products. To my consumer eye, those riding lawnmowers all look so… plain vanilla. This reminds me of those urban vinyl ketchup and mustard bottle sculptures that made regular condiment bottles seem excruciatingly stale.

This device is not fun — it’s scary. It reminds me for some reason of the Garth Ennis piece from Preacher about the Sheriff’s son who shot himself.

I think the Boucher mower’s title says it all — it’s stupid and really funny because of its stupidity. This mower’s design is great in its black humor. It’s a kind of Steven Barthelme joke. It’s great because it makes us laugh a little and feel sad a little at the same time.

Because it does that so well that it’s a total success. It’s not a success because it has “flair”.

November 16, 2007 Posted by | blogs, books | , , | Leave a comment


You could call it a “smarm mob”, I guess.

[See also: Sterling making the blogosphere into teenage chess club angst retribution.]

November 11, 2007 Posted by | blogs | Leave a comment

CheapID… State In a Box

There goes Vinay being brilliant again… and this time a little scary, too.

You should be reading The Gupta Option often.

“Technology becomes policy.”

From SIAB:


I believe we have less than 10 years of legal anonymous free speech on the Internet. People confuse the “Wild West” style properties of a new frontier with fundamental aspects of the digital space and, as court houses and law get built on the Internet, much of the current wildness is inevitably going away.

However, correctly leveraging PKI and the ISA creates the possibility of preserving the politically critical support of free speech with a reasonable expectation of anonymity, except when criminal acts are being performed.

The benefit in this case is the convenience of single sign on across all Internet (and perhaps other) electronic services.

How is this to be achieved? Consider the OpenID standard, a distributed (or, more correctly, federated) ID system which hangs off the Domain Name System namespace. An OpenID identity provider gives out URLs, each one of which has a username and a password. The URL is given out to third parties as the “identity” and back-channel communication occurs between the third party and the OpenID provider to enable log in.

OpenID has about 10 million operational accounts and is being integrated into projects like Wikipedia. It is likely to succeed widely. If not, something else like it is going to take its place, in all probability. The email address has the same basic properties (of hanging off the DNS namespace) and has been used as a default ID namespace up to this point, with much the same properties Ð for most web sites, if I can read the email associated with Account X, then I am that person.

Hanging off the DNS namespace is an interesting thing, because it basically makes personal identities part of the DNS hierarchy. Part of the freedom people feel on the Internet is that, on the Internet, you are a “citizen” of the DNS Government Ð DNS creates the political unit of your email account provider or, if you operate your own domain, yourself. In the event of an investigation, queries follow the DNS chain of command: first WHOIS to identify the domain owner, then an enquiry to the domain owner about the conduct or identity of a given user.

This usually results in either a real name, or an IP address, which is then mapped back to service providers, then billing records, then an actual hard physical identity. Internet users typically feel rather violated by having their online actions tracked back to their physical location because it is a cross-namespace violation, rather like having a foreign nation state come and enforce its laws on you. These illusions have built up through common custom and the largely privileged academic communication which was the initial environment of the internet. That separateness is largely collapsing as the Internet becomes a part of the “real world” and the new privileged spaces are massively multi-player online roleplaying games like Warcraft, Second Life and Everquest.

Authentication for these systems is extremely problematic. Computer security is very ineffective for most home users, and falsely authorized emails generated by viruses, for example, are a common problem. Online banking security is constantly under attack from criminals compromising home computer security over unaccountable emails. This situation cannot go on indefinitely.

The solution is simple: a special, privileged class of Single Sign On Identity Providers who require an ISA-style blind contract before they will provide you single sign-on services. An identity with these groups is indicated by a cryptographic signature from the vendor attesting that they have a CheapID contract on file and will reveal it under a specified set of conditions, usually a court order in their native jurisdiction.

Ideally, this move would be coupled with a definitive upgrade in authentication. Pseudo-random number generators, when used for security applications like as the common SecureID tag are subject to man in the middle attacks, so probably we are going to wind up with an additional PKI level, perhaps small USB-type tokens. In any case it would be nice to indicate the level of authentication in the account so that third parties could judge for themselves how much trust they want to put into a log in from a particular SSO provider.

Common Operations

Identity Recovery

Upon display of proof that a given account has engaged in an activity which requires an identity to be revealed (i.e. presentation of a court order) the sign on service returns the original ISA-style blind contract, with associated CheapID Identity Card to the court to decrypt.

Electronic Democracy

With sufficiently secure SSO services, including perhaps specially created government-backed SSO accounts along the lines of the Estonian system, it should be possible to do secure electronic voting over a variety of devices including cell phones. Challenges pertaining specifically to this project will be the subject of another paper. In essence, this discussion is about extending the reach of the Professional Witness to transactions at a remote site like your home, using the media of a cell phone or other computing device as the intermediary. This is non-trivial and may involve windows of revocation in which coercion can be reported, for instance.

Technical Challenges

There are no difficult technical challenges specifically related to the ISA aspects of this system.

October 3, 2007 Posted by | blogs, geo/pol, info sci, ubicomp | , , , , , , , | 1 Comment

ape regards ape

September 14, 2007 Posted by | personomy | Leave a comment

independent state of caledon

UPDATE | I haven’t even seriously started looking at all the funked-up sociocultural perversions in SL.  Plenty of folks have been looking anecdotally for a while now.  I guess I won’t really be interested until I can see culturally distinct groups using it then expressing their own subcultures (as opposed to a dominant culture’s subculture’s uses of the space).  Also, interested in SL searching and info-literacy in different communities.  Must come back to all this sometime soon.  |

Steampunk enclave in SL:

September 10, 2007 Posted by | info sci, personomy | Leave a comment

cool librarians

Vanity googling, I found myself on a list of “cool librarians” over at the Lemur Love Wiki. I’m honored to be in that number! (though I always thought I was a geeky librarian… same thing?)


August 9, 2007 Posted by | libraries, personomy | 1 Comment

James Kotecki gives them hell

I won’t attempt to restate or interpret what he’s doing here.  But watch this video.  This guy just won’t stop, and thank goodness for that.  At the moment, I’d rank James Kotecki as more relevant and important than 4/5ths of all the candidates running, and maybe even tied with Bill Clinton (don’t let it go to yr head, JK!).

Keep giving them hell and holding their feet to the fire, man.

August 2, 2007 Posted by | blogs, geo/pol, video | 3 Comments