2021-10-17

Supercalifragilisticexpialidocious NFT

 As best as I understand things, an NFT - "non-fungible token", is a string put into the blockchain.

Art NFTs are URL strings which point to the JPEG (or whatever).

The URL might break - what you really "own" is the string.  Actually putting the JPEG picture into the blockchain is very expensive because of the size.

I thought … why not put words or phrases into the blockchain?  Then you own that actual string.

My first choice for a word:  supercalifragilisticexpialidocious .

Ideally Disney issues the NFT for supercalifragilisticexpialidocious so it has a valuable origin.  (Anyone can issue a token for a word, but the whole point is to own the "official" token issued by the IP owner; as far as I can tell [I am not a lawyer] there is no trademark on supercalifragilisticexpialidocious.)  Fans would love it!  Supercalifragilisticexpialidocious has the benefit of being unique in Disney lore and instantly recognizable, so it's a good one to start with.  Other obvious choices would be "hakuna matata" and "The code is more what you’d call ‘guidelines’ than actual rules."

I thought this ideas was genius, and I hope someone at Disney agrees.  So far all of the computer savvy people I've bounced this off were unimpressed.  

But maybe they just aren't Disney fans.

  

2021-08-13

The battle lines have been drawn

Recently there was a story in the news about takedown of the plunder obtained by a ransomware hooligan:

https://www.cbsnews.com/news/colonial-pipeline-ransom-payments-hackers-seized-united-states/

Washington — The federal government has recovered millions of dollars in cryptocurrency paid in ransom to cybercriminals whose attack prompted the shutdown of the country's largest fuel pipeline and gas shortages across the southeastern U.S. last month, the Department of Justice announced Monday.

And I thought ... how hard would it be to make a "tainted BTC address list"?  Certainly the people paying a ransom know where it is going, so the first address in the money laundering chain is known, even if the owner is not.  And then one can follow transactions via the immutable blockchain and see where this money ends up.  I'm sure the FBI already does this.

But then ... I read about a service coming at the problem from the other side!  How do you make sure your money laundering is going well?

https://krebsonsecurity.com/2021/08/new-anti-anti-money-laundering-services-for-crooks/

A new dark web service is marketing to cybercriminals who are curious to see how their various cryptocurrency holdings and transactions may be linked to known criminal activity. Dubbed “Antinalysis,” the service purports to offer a glimpse into how one’s payment activity might be flagged by law enforcement agencies and private companies that try to link suspicious cryptocurrency transactions to real people.

I think in the early days cryptocurrencies were probably pretty useful for money laundering, but I think those days are ending.  Which is probably a good thing, as ransomware has done a lot of damage to real people.

Update:  I just read this from Bruce Schneier:

In a chain swap, the criminal transfers the bitcoin to a shady offshore cryptocurrency exchange. These exchanges are notoriously weak about enforcing money laundering laws and — for the most part — don’t have access to the banking system. Once on this alternate exchange, the criminal sells his bitcoin and buys some other cryptocurrency like Ethereum, Dogecoin, Tether, Monero, or one of dozens of others. They then transfer it to another shady offshore exchange and transfer it back into bitcoin. Voila­ — they now have “clean” bitcoin.

2020-10-19

A static digression

 After finally passing on various web site creation tools I figured I would do the simple thing:  post a static web site.

AWS allows you to use an S3 storage bucket as a static web site.  Sweet! What could be simpler?  I have a tool that allows me to map an S3 bucket into a Windows folder, so all I would have to do is update the folder to publish changes.  Even better, you can put Cloudfront in front of it which ensures HTTPS as well as HTTP requests are handled.

Sounds good ... but

  1. The instructions (at least at that time) left out the key fact that your bucket has to have the same name as your domain.
  2. My file uploader wasn't setting the metadata correctly.  That was fixable.
  3. It's a bit confusing to pick the right kind of certificate for HTTPS (wildcard or root only).
  4. "index.html" is only returned by default for the root bucket; so, for instance, https://www.above-the-garage.com/piano doesn't work - you have to specify https://www.above-the-garage.com/piano/index.html ; this broke some existing links out in the wild.
  5. DNS

Now let's see if I can explain this.

In the beginning, web sites tended to have "www." in front, like this:


"www." specified the protocol - world wide web.  You could have file transfer ("ftp.") or actually any prefix you wanted.

About a year ago Google announced they would stop displaying the "www." part.  Sounded good.  I made sure the following variations would link to my site:


Unfortunately, one of those doesn't work!  It's #2.  And the reason is the certificate doesn't match.

And it turns out it can't match.

Here is an email from April 2019 from Pair Domains, my DNS provider, that explains things:

We are contacting you because there is a problem with DNS records for your

There is currently a CNAME record for @. DNS rules prohibit other records
from sharing the same host name with a CNAME record. With a record for @,
this means that MX records would not work and there could be e-mail
delivery problems for the domain.

We recently changed our DNS software, and the new software is more strict
about DNS rules. Before, CNAME records and MX records could coexist, but
not everyone would be able to actually deliver the e-mail. The new
software does not allow this, so if there is a CNAME for @, e-mail won't
work on the domain.

Well, I also use above-the-garage.com for email, and I want that to work, so I had to drop the CNAME which allowed www.above-the-garage.com to point to above-the-garage.com; and my cert was for above-the-garage.com (without the www.).

So what to do ... change DNS providers?  No, it looks like they are implementing the standard.  Aha!  Make the cert for the www version; and redirect any hits to the homepage to the https://www.above-the-garage.com name; the cert matches, and everything is great.  Except, sadly, case #2 above, where browsers see the https: label, and really want the cert to match the exact domain name.  It doesn't, so the redirect doesn't happen, and people get an error after it times out.  In general, this is probably not a big deal; but in the long run, people and browsers might enforce going to https://above-the-garage.com . Maybe I can put a second cert on there and all is well.  

The most important thing is what happens when you just type in "above-the-garage.com" to your browser address bar:  works in Chrome and Edge!

So, static web site mostly works.  w00t.

[Update 2024-05-06] What could go wrong with a static web site served out of an S3 bucket?  

Answer:

Oh, and since the bucket name had to match the web site name ... my bucket name was effectively public.

So rather than worry about that potential nightmare (AWS says they are working on a fix - that's good) I quickly copied everything out of the bucket into a small AWS Graviton instance and fired up nginx.  One and a half hours later I was moved over.  I still have the same DNS problem.  Ugh!]

[Update 2024-05-07 DNS issue fixed!  Did I really need CloudFront in front of my never visited web site?  NO!  Dropping CloudFront from the mix removed all the CNAME records and I can use A records and MX records together.  w00t!]

2020-09-26

A further digression

As I surveyed the accumulated blogging from the past many years, I remembered now why I really didn't like Squarespace; it was too hard to delete old posts!  

I think a blog like mine that has a lot of stream-of-consciousness in-the-moment material probably needs pruning, rather like forest overgrowth. There are 1,100 or so blog posts here! Many link to sites that don't exist anymore, and without that context, the post itself doesn't make any sense. 

I have (somewhere) a list of all my blog URLs; with Squarespace I could click on one to see the blog entry, decide if it had even a little bit of value, and delete it if not. Except it took way too many key presses to do the deletion.  Like I had to start in a different mode, search for the page, then delete it.  Too hard for something so unimportant! With Blogger it's just a couple of key presses, which is about the level of effort that seems appropriate for sweeping up some detritus. 

I don't know, now, if I have the gumption to go through 1,100 posts, but I probably will do it in small batches. Probably half of my posts should be deleted, even with the very low bar I've set.

2020-09-12

Talk about a digression

Today is September 12, 2020, and the western part of the state of Washington is shrouded in smoke that has blown north from California and Oregon.

Even with the global pandemic, it was possible to go outside in our yard or walk around the neighborhood (with proper physical distancing).  Not today!


(Source)

So, stuck inside, I brought this blog up-to-date.

I started blogging at my personal site Above the Garage in ... 1997?  The earliest archive of the site on the Way Back Machine is in 1998 and it looked like this:


There was a subdirectory of articles called "Random Blts"

My first edits were with Hot Dog because HTML was hard.  Except after producing a few articles with Hot Dog I saw that HTML was actually pretty easy.  Later I used Word and exported as HTML - this was before Word bloated the shit out of HTML.  I switched to Blogger in 2004.  Blogger had a little browser-extension button you could use to grab some text from a site you were visiting and use as a starting point for a post.  I did that a lot.

Facebook became a thing - I joined in 2007-ish.  At first it was very twitter-like - short posts.  Later you could mail pictures to it from your phone.  Eventually it consumed all of my posting time.  But I was still interested in blogging and I searched in vain for a new way to do it.  In 2012-06-12 I posted that I was moving to a MediaWiki blog.

Talk about your digressions!  I built a MediaWiki site and started writing articles with a hypertext structure to them.  Apparently I like linking, as I can see in this post.  In 1983/1984 I worked at a company called DayFlo; this was in the early days of the IBM PC and DayFlo's claim to fame was a hypertext editor.  It was built on a database and generally speaking links had to work.  The genius breakthrough of the modern Web is that links don't have to work.  If they don't have to work, you don't need a central database to make sure they work.  Thus the modern distributed web.

(Yet another aside - Roy Fielding and I had the same Ph.D. thesis advisor in college!)

I enjoyed the MediaWiki approach to blogging until I realized how much work it was to manage a MediaWiki site.  I had thought, how bad can it be?  Wikipedia uses it!  Never challenge worse, my wife says.  It was a matter of applying constant bug patches and dealing with weirdness with MySql which was a lot of sideways effort to the mission at hand.

So I looked for a WYSIWYG editor that could also embed audio and video clips, which was quite awkward back-in-the-day, requiring evil Flash plugins.  Squarespace fit the bill.  I imported the site from Blogger (basically abandoning everything that happened in the meantime on MediaWiki) and started onward from there.

Except ... for all that hassle and upgrades from Squarespace 5 to 7 ... I barely blogged at all.  Because of Facebook.  I posted some "Notes" on Facebook that in the past would have been blog entries.

Now Facebook is a cesspool, so I think I'm motivated to return to blogging.  I can't even remember all the blogging sites I have tried over the years that have come and gone.  (Here's one:  https://drstephencw.wordpress.com/ ) But blogger, in spite of Google's penchant for destroying great products, is still here!  And I was able to import the old blog archive and it worked!  Amazing!

I just now, today, while stuck in the smoky house, ported over the 17 articles I had written in Facebook (they have dates ranging from late 2012 to 2013 and I used their original dates).  I'll probably port over my Facebook notes too.*

And then we'll see.

2019-10-19

The seen and the unseen

“In the economic sphere an act, a habit, an institution, a law produces not only one effect, but a series of effects. Of these effects, the first alone is immediate; it appears simultaneously with its cause; it is seen. The other effects emerge only subsequently; they are not seen; we are fortunate if we foresee them.

There is only one difference between a bad economist and a good one: the bad economist confines himself to the visible effect; the good economist takes into account both the effect that can be seen and those effects that must be foreseen.

Yet this difference is tremendous; for it almost always happens that when the immediate consequence is favorable, the later consequences are disastrous, and vice versa. Whence it follows that the bad economist pursues a small present good that will be followed by a great evil to come, while the good economist pursues a great good to come, at the risk of a small present evil.”

—Frédéric Bastiat, “That Which Is Seen and That Which Is Unseen,” 1850

2017-10-22

Nano-Plasm Chapter 21

 

Chapter 21

“We found something in Stewart’s PC”, Pendleton said. “It took a long time to find because in fact it wasn’t encrypted; the cryptographic guys had been all over every file, searching for patterns. They finally got around to looking at the unused, extra space in each file; Stewart had stored an equation in one of those files about how a positive feedback situation could run out of control.”

Gillian blinked. “So Stewart was thinking about feedback. Our UFC forensics people found a picture on Stewart’s laptop in Nepal of video feedback. Let me quickly email our forensics guy and tell him to search for more possible hidden data in those pictures or elsewhere on the laptop or in Stewart’s digital camera. Rosenberg told me he had already done a Steganography scan, but he probably didn’t think to look for additional data in the unused parts of the files.”

Gillian went over to the desk and fired off an email to Phil Rosenberg, the forensics expert:

 

From: Gillian@pr.net

To:  pr@ufc.net

Subject: Re: Stewart’s Camera

Phil,

PMTC Security has found feedback equations in the unused file space on Stewart’s PC. Please check for a similar trick in the files on Stewart’s camera or laptop.

-- Gillian

 

Pendleton talked to Gillian while she typed. “I’ve asked one of Smythe’s apprentices to set up a little experiment for us in one of the product rooms. We’ve done a test that shows what happens when two feedback systems start to interact. We can reproduce the buzzing sound now. It’s not much, but it’s a start.”

Gillian finished typing and then replied, “That’s terrific actually. A reproducible test case for the buzzing sound was what Smythe was working on.  I hope you guys have been careful – we don’t want another fatality from all this.”

Pendleton replied, “We’ve been careful. But it isn’t that big a deal – it just makes a small buzzing sound. Still, as you’ve said before, you never know where something like this might lead.”

Pendleton and Gillian left her room and headed to the central hub. They turned down the purple hall to the product demonstration rooms.

Pendleton stopped off in Room A and picked up the fancy extruding mirror. First he slipped his hand between the wall and the mirror and turned it off – there was no point in having it extrude all over the place while they walked. Then he lifted it off the wall and they proceeded together down to Room E, which contained the more industrial nano-tech equipment.

They entered the room. There was no one else there.

“Langsford was supposed to meet us here. Well, like I said, it’s not really that big of a deal. I can demo it pretty easily.”

Gillian frowned. She wasn’t familiar enough with nano-tech to feel very comfortable with this kind of fooling around. Still, Pendleton had been around nano-tech for years and he seemed comfortable enough. She watched him approach the duplicating machine.

Pendleton turned on the scanning machine and the replicating machine and then pushed them a little closer together. “This is perfectly safe, but, as always, keep a few steps back just in case,” he said. Then he turned on the two machines.

He stepped back a bit, and then turned on the mirror. He waved his hand in front of the mirror and verified it was mimicking his movements. Then he slowly approached the duplicating machine.

“Check this out. The interactions here are more complicated because there are two interacting systems. I’m going to bring the mirror close to the scanning machine – but notice the mirror itself will be trying to make a shape like the scanning machine. We don’t normally put a nano-tech machine into one of these copiers. Normally it would just be a static shape. Putting the mirror in is going to drive the circuitry a bit bonkers and you’ll hear the buzzing sound as the two machines interact. The construction machine, which takes the data from the scanning machine, is also going to get confused, because the mirror will be moving around as the scanning machine scans it and the two interact.”

Pendleton slowly approached the scanning machine. He pointed the mirror at the scanning machine and the mirror extruded to make a shape somewhat like the shape of the scanner. Then he slid it into the scanner, mirror side up, and the mirror extruded upward. A swarm of nano-machines came out of the scanner and started to move across the mirror. This in turn caused the mirror to start to undulate as it responded to the motion of the other nano-machines. A slight buzzing sound could be heard.

Pendleton continued, “The replicating machine gets really confused now. Normally we store the scan and then turn on the replicator, but to save some time, I’ll just let the two things run in parallel. This should be pretty funny looking.”

So far Gillian didn’t see anything funny about it at all, but engineers had strange ideas about what constituted “funny.”

Pendleton pressed a red button on the replicator. A swarm of nano-machines came in from the sides and tried to make a shape like the mirror – but the mirror was undulating – vibrating really – and the nano-machines didn’t really have any solid data to lock onto and replicate. So the nano-machines in the replicator started vibrating too. And the buzzing sound increased.

“Check this out. The machines really hate this.” Pendleton stuck his hand in the scanning machine between the mirror and some of the electronics. The mirror tried to make a shape like his hand but with all of the other nano-machines swarming over it the result was fairly distorted.

“Anyway, that’s the demonstration. As you can see, we now have a reproducible test case for the buzzing sound, so some of our better engineers can start analyzing this and fooling with some formulas and system analysis on how the machines interact. This doesn’t really explain what happened to Smythe, though, because he didn’t have two kinds of machines interacting. He just had one kind of machine. I think someone reprogrammed them somehow, even though, as I said, the whole thing is impossible, except it happened. Because as you can see this is fairly benign.”

Pendleton reached into the scanner to take out the mirror. As he picked up the mirror, the swarm of nano-machines started to move from the mirror and to cover his arm.

“Hey, I’m being scanned,” he said.

With his free hand he reached up to turn off the scanner. He flipped the switch and most of the nano-machines stopped moving. But the ones on his hand kept crawling around.

“Hmm,” he said.

He used his free hand again to turn off the replicating machine. The particles continued to swarm on his arm, even though the machine had been turned off.

“Weird”, he said.

Suddenly Pendleton frowned. “Ouch”, he said. He dropped the mirror, which clattered to the floor.

Pendleton screamed. “Fuck this!” He was staring at his arm. There was an increase in the buzzing sound.

Gillian had no idea what to do. The machines were doing something to Pendleton’s arm and whatever it was it wasn’t good. Gillian looked around the lab. She saw an emergency button and ran over and hit it. An alarm sounded and a light in the hallway started flashing.

“Pendleton… what should I do?”

But Pendleton wasn’t listening. He had dropped to the floor and his face was contorted in agony. Gillian bit her lip to make sure she wasn’t dreaming again. She wasn’t.

As she watched, the nano-machines started to leave Pendleton’s arm. Gillian looked in horror to see that the entire top level of skin on Pendleton’s arm had been stripped away. The nano-machines swarmed onto the floor and then seemed to melt into the ground. There was only one thing left behind: a copy of Pendleton’s skin, reconstructed as if a taxidermist had somehow surgically removed it.

Gillian doubled over and threw up.

Two engineers ran into the room and saw Pendleton. One spoke into a phone and ordered emergency medical care.

Pendleton continued to scream.

All three of them stared. They had no idea what to do.

It seemed like hours but just a few minutes later a paramedic entered the room and shot some morphine into Pendleton.

“What the fuck…” the paramedic said as he looked around. But then he composed himself, and said, “I’ll treat this like a burn.” He placed a cast-like wrapping on Pendleton’s arm to immobilize it. He placed a mitten-like wrapping on Pendleton’s hand. The morphine affected Pendleton quickly and he stopped screaming.

Pendleton looked at Gillian. “This is not my idea of positive feedback,” he whispered, and then passed out.

(C) Copyright 2013 Stephen Clarke-Willson

 

 

2017-05-23

Compliments (by Garrison Keillor)

#34.  For fear of what it might do to me, you never paid a compliment, when other people did, you beat it away from me with a stick.  

"He certainly is looking nice and grown up."  He'd look a lot nicer if he did something about his skin. 


"That's wonderful that he got that job."  Yeah, well, we'll see how long it lasts.


You trained me so well, I know perform this service for myself.  I deflect every kind word directed to me, and my denials are much more extravagent than the praise.  


"Good speech."  Oh it was way too long, I didn't know what I was talking about, I was just blathering on and on, I was glad when it was over. 


I do this under the impression that it is humility, a becoming quality in a person.  Actually, I am starved for a good word, but after the long drought of my youth, no word is quite good enough.  "Good" isn't enough.  Under this thin veneer of modesty lies a monster of greed.  I drive away faint praise, beating my little chest, waiting to be named Sun-God, King of America, Idol of Millions, Bringer of Fire, The Great Haji, Thun-Dar the Boy Giant.  I don't want to say, "Thanks, glad you liked it."  I want to say, "Rise, my people. Remove your faces from the carpet, stand, look me in the face."  


- Garrison Keillor, Lake Wobegon Days


(Some formatting changes for readability.)

2017-02-13

Adrenium / Elemental Engine Title List

At Adrenium Games (RIP), we developed the entire Azurik game from soup to nuts in 20 months.  That means starting with empty offices, buying computers, hiring 30 people, and delivering a gold master that went through certification the first time on hardware that had only recently been finalized.

The engine was extended over the years and used in all these titles:

Shipped

  • Azurik
  • Samurai Jack
  • Lemony Snicket
  • Digimon Rumble Arena 2
  • Sims2 PSP
  • Pirates PSP
  • Eragon PSP
  • Lord of the Rings Tactics PSP
    Over the Hedge: Hammy Goes Nuts PSP
  • Indiana Jones PSP
  • Spiderman Web of Shadows PS2/Wii
  • Princess and the Frog Wii
  • Assassins Creed PSP
  • X-Men Origins: Wolverine Wii
  • X-Men Origins: Wolverine PSP (not the same game as Wii)
  • Shrek the 3rd PSP
  • Where the Wild Things Are X360/PS3/Wii
  • Marvel Super Hero Squad: The Inifnity Gauntlet X360/PS3/Wii
  • Marvel Super Hero Squad: Comic Combat X360/PS3/Wii (uDraw tablet)
  • Atari: Warlords XBLA, PSN
Cancelled
  • Smash Baseball
  • Interstellar P.I.G.
  • Mary Kate and Ashley (Fizz Factor)
  • Ninja Warriors

2016-09-18

The ility's

I found this great list of the “ility’s” - the things that make writing industrial strength software hard:

  • Reliability
  • Integrity
  • Usability
  • Maintainability
  • Testability
  • Interoperability
  • Flexibility
  • Reuseability
  • Portability
  • Clarity
  • Modifiability
  • Understandability (isn’t that Clarity?)
  • Validity
  • Functionality
  • Generality
And some that don’t end with “ity”:
  • Correctness (but maybe that is reliability?)
  • Documentation
  • Economy
  • Efficiency
Source: “The Profession of IT: Software Quality”, Communications of the ACM, Vol 59, No 9, September 2016, Page 23

2016-07-06

Neural spelling corrector

My spelling corrector, which uses a neural network as the underlying algorithm, miscorrects four of the 49,168 words in the dictionary. The thing about this neural net is it is constructed logically rather than from a massive learning set. As an acceptance test, I have it validate that every word in the dictionary corrects to itself. (The “training” of the neural net takes about 100 ms - that is, the time to load the dictionary and make the connections.)

(Try it here: http://ec2-54-221-105-181.compute-1.amazonaws.com/?word=kayler ; put in your own word instead of “kayler”. )
Below are the only errors it makes in my test set of 49,000 words. These words look identical to the neural network. Luckily this is uncommon!

_intended_
_indented_

_unintended_
_unindented_


Benchmarking is fun:
On a Raspberry Pi 3 using just one core, the time to validate the dictionary is 1h 1m 38s. With all four cores running, the time is 17m 26s (not quite a 4x speedup but close).
On an AWS X1.32xlarge instance using just one core, the time to validate is 7m 6s. A single core on the AWS machine beats the Raspberry Pi’s four cores.
With all 128 cores running, the time is 14s. An X1.32xlarge rents for (in late 2018) about $13 / hour.
Raspberry Pi3 single core: 1 hour and a minute. X1.32xlarge at AWS with 128 cores: 14s.

2015-01-14

One look is worth a thousand reports

"[...] I visited the troops near Coutances on the twenty-ninth and found an armored division sitting on a road, while its Headquarters, secreted behind an old church, was deeply engrossed in the study of maps. I asked why they had not crossed the Sienne.  They told me they were making a study  of it at the moment, but could not find a place where it could be forded. I asked what effort they had made to find such a place and was informed that they were studying the map to that end. I then told them I had just waded across it, that it was not over two feet deep, and that the only defense I knew about was one machine gun which had fired very inaccurately at me. I repeated the Japanese proverb: 'One look is worth one hundred reports,' and asked them why in hell they had not gone down to the river personally. They learned the lesson and from then on were a very great division."

War As I Knew It, George S. Patton Jr., Bantom Books (Mass Market Paperpback Edition, May 1, 1983)

 

 

---

 

I've been misquoting this:  Patton said one look is worth one hundred reports; I rounded it up, rather liberally, to one thousand.  I probably confused this saying with 'A picture is worth a thousand words' and that induced the rounding error.

 

Regardless of the magnitude of the value of the reports vs direct experience, the lesson is still valid.  Here are other ways of thinking about it:

2014-08-03

A brief selection from Economics in One Lesson, by Henry Hazlitt

Economics in One Lesson is a 218 page book by Henry Hazlitt; my wife has an early edition of it.  (http://www.amazon.com/Economics-One-Lesson-Shortest-Understand/dp/0517548232)   I've never read it, because I've never had to get past the initial premise, which is adapted from an essay by Frédéric Bastiat written in 1848: What Is Seen and What Is Not Seen (http://www.econlib.org/library/Bastiat/basEss1.html).  Also 218 pages doesn't strike me as one reasonably sized lesson.  (My wife found her copy and I flipped through it:  "The lesson" is only about 15 pages; the rest of the book is examples of bad policy.)

I would argue that a major goal of systems programming is finding the unseen behaviors in the code; the obvious stuff is easy.  The unseen stuff is hard.  I think you can replace "economist" with "programmer" and "policy" with "module" in the following.

2014-06-21

A letter to a friend about intellectual property

 What is property?  Let's say, simply, it's something you own, and we can tell you own it because you control it.  For someone else to take it, they have to take it by force.
 

Can ideas be property?  Sure, but not because the state says so.  Only because you can control them.

 

First, you can keep your ideas secret.  So you have control until you disclose them.

 

You can disclose them contractually, and try to keep control that way.  That works a fair bit of the time if you're dealing with fair minded people, which is generally a good idea.

 

Suppose you invent free energy.  It converts sand into energy without any pollution.  This has huge value!  You can donate your idea humanity if you want, or you can try to keep control of your idea.  If you donate the idea to humanity, terrorists also get it.

 

If you manufacturer your device, or work with a trusted partners to manufacture your free energy device, then you can try to keep control.  You can only sell it with contractual restrictions against disclosure.  Still, a bad guy would be highly motivated to steal your idea, since for very little work, he would get free energy.

 

You can increase the cost of stealing the idea by protecting the idea with physical restrictions such that stealing the idea for the formula involves breaking and entering and possibly destruction of physical property.  That will give you an excuse to go after him.  Still, say he passes it to a third party before you catch him, and the cat is out of the bag.  Well, that's pretty much going to happen eventually, but ideally, by applying your entrepreneurial spirit, you're already cashing in.

 

If I figure out how to light the first candle ever, that has huge value, even though other candles can be lit from mine without lessening my candle.  Does that mean you can light your candle from mine without permission?  No, it does not - that would involve force.  And I can contractually restrict you from lighting other people's candles with the fire that originated with mine. And I can even make it economically to your advantage to send them to me, by sharing some of my income from my candle lighting business.  Or you can steal the light from my candle, sell it, and cash in, but in so doing you have labeled yourself a thief, so you better decide if it is worth it, since as word spreads, no one will trust you again. And if your candle burns out, and you don't understand how to restart it except by stealing the light from someone else, you're screwed.

 

It's really not fair to talk about ideas as property in a solely abstract way, just as it is not fair to talk about physical property in a totally abstract way. "Property is theft", say the Marxists, but that doesn't mean anything.  "Ideas can be copied without harming anyone" also doesn't mean anything.  It strips away authorship and credit which are hugely valuable to people, and people who appreciate that, respect it.  Other's don't, but they are uncivilized.

 

That's my $0.02 on intellectual property.  Patents are crap, but that doesn't mean there is no such thing as intellectual property.

2014-04-12

What is money? Nobody knows

From:  Too Different for Comfort, by Louis-Vincent Gave, which you can read here: 

http://www.zerohedge.com/sites/default/files/images/user5/imageroot/2014/01/Too%20Different%20For%20Comfort.pdf


(This post is also about robots!)


Excerpt:


The question of what constitutes money has pre-occupied much finer minds than ours. For example, a wall display in the Bank of England museum notes on the debate on the nature of money between William Pitt the Younger and Charles James Fox that: “Fox argues, quite rightly, that every note issued by the Bank should be backed by gold. Pitt, on the other hand, maintains that the Bank should issue as many notes as are needed.” 


Obviously, times have changed and the “quite rightly” seems somewhat at odds with the philosophy currently prevailing at the Old Lady. The fact that the Bank of England could, two centuries later, feel so differently about the core issue at the very center of its own existence than the faith professed on its own walls is a revelation in itself. By comparison, we doubt that there will ever be a Pope in the Vatican who will state publicly that perhaps Jesus-Christ did not multiply bread, or that he was not born from the Virgin Mary. This illustrates how difficult it is to define the nature of money. For centuries, we have used money to measure value, to store wealth, and to exchange goods, but no-one can really say why money has any value at all; a paradox which has trumped the greatest minds in Western civilization.


Aristotle was the first to try and tackle the topic and expressed the view that money had to have a high cost of production in order to make it valuable, and to allow it to represent a lot of value in a small physical format. He also argued that everybody had to accept money as a means of payment, as a store of value or as a standard of value. This drew Aristotle, the first famous gold-bug of sorts, to the conclusion that only gold and silver could be accepted as money. But even a gold standard leaves us with the quandary of a farmer selling his wheat for something that is essentially useless? Aristotle also does not explain why it would make sense, and generate wealth, for people to spend resources and time to dig up holes in mountains, and then take the proceeds of their efforts to bury them in another hole somewhere else? Even more alarmingly, it seems that the core of the Aristotelian argument is that gold/silver have value because they take a lot of effort to extract; in other words, at another time, Aristotle might have been a paid-up subscriber to the Marxist labor theory of value, a theory that we now know to be an intellectual dead-end.


Indeed, as the Austrian school amply demonstrated, the labor theory of value (the idea that the price of things should be determined by the amount of effort that was put into producing them) is not worth the amount of time that the classical economists and later Marx spent on the topic. Incidentally, this makes it ironic that so many people who claim to be Austrian economists also happen to be gold bugs. Indeed, one can be a disciple of Aristotle, Ricardo or Marx and be a gold bug; but one cannot claim to be a follower of Ludwig von Mises and argue that gold is the answer. Indeed, the founding stone of Austrian economics is that value is totally subjective. So how can we have a world in which all values are subjective—except one, gold, which would be objective?


The Aristotelian explanation thus falls short. The reality is that gold and silver do not have a value because of the time, resources and cost involved in producing them. Instead, gold and silver have value because everybody believes they do.  This is not at all the same thing and leads us to the second view, namely that of Plato.


For Plato, money is just a social convention and has no intrinsic value except the one that people ascribe to it. This is a lot more acceptable, and very close to the marginal theory of value. Thus, for Plato, money is little more than a social convention and money itself need not have value, except the one that people wish it to have; which only brings us back to the debate between Fox and Pitt immortalized on the walls of the Bank of England and quoted above.


2013-11-24

Conspiracy Theories

A 911 Truth video recently popped up on Facebook (as these things are wont to do):

Old dead link: http: // topinfopost.com/2013/07/03/911-explosive-evidence-experts-speak-out

We live in strange times.  "Conspiracy Theories" abound.  Some turn out to be true (I'm looking at you NSA).

I'm fascinated by the 911 "Truther" stories.  The story told at a site like http://www.911truth.org/ is far more interesting than the official story.  It's also sickening to think our government would have blown up the twin towers so most people will never even look at it.

I like to refer to Conspiracy Theories as Conspiracy Hypotheses.  A hypothesis is the beginning of a theory; a hypothesis becomes theory with proof.

Personally I don't think our government blew up the twin towers.  What would be the purpose?  To get us to attack Iraq?  The government doesn't need excuses like that; it invades for perfectly ordinary trumped-up reasons.

One of the ideas I find most fascinating about the hypothesis of a controlled demolition of the twin towers is that a new kind of nano-tech thermite was used.  Some have speculated it was painted on the interior walls during regular maintenance and then somehow triggered wirelessly.

I love the boldness of that idea.  Since I wrote a novel about nano-tech I keep an eye out for nano-tech stories and the idea of nano-thermite is very compelling from a storytelling point of view.

If I were to write a sequel to Nano-Plasm it would focus on how this amazing nano-thermite could be used and, of course, as a techno-thriller, on how it could be abused.

This imaginary nano-thermite stuff has trigged all kinds of imaginative flights for me.  One idea I would tie in is that maybe there is a paint that is non-volatile until it comes into contact with aluminum - the outer skin of airplanes.  Maybe flight 93 spontaneously combusted and that's why there isn't much wreckage.  Likewise for the flight that crashed into the Pentagon.  Poof!  No evidence.  How about taking out huge numbers of electrical substations simply by painting this evil, remotely controllable, explodable paint on them.  How about painting nuclear power plant containment domes with it.  It's pretty easy to imagine lots of ways this evil paint could be used.

My story, which would be the main thread for a Nano-Thermite book, goes beyond what 911 truthers propose.  In my story a foreign government would have brought down the twin towers with a controlled implosion and that is what our government is covering up (you know, because we can't appear weak).

In my story, which has several layers, the airplanes would have been a cover for the controlled implosion.  The foreign government planned the plane attack so ordinary Americans would think the towers collapsed from the planes.

Secretly, this foreign power told our leaders what they had done, and emphasized they could bring down any building at any time, particularly our seats of power and of course football stadiums.  This message would have been communicated just after both towers fell (or maybe between towers 1 and 2).  And the icing on the cake of the threat would have been the collapse of WTC 7.  "See?", the foreign power would have said, "just in case you silly people believe the airplanes caused the collapse, we will tell you in advance that we are going to drop WTC 7," and then they went and did it.

Originally, when I was thinking up my story premise, I figured the reason to bring down WTC 7 would be if the twin towers operation had been run from the emergency center housed in WTC 7 (yes, there really was one).  Then it would make sense to implode WTC 7 to cover up the evidence.  That wasn't compelling enough to me.  It didn't really make sense to me that something as clever as imploding the twin towers would need a command center that was a whole floor in WTC 7.

Aside:  We had basically already won the war with Japan when we dropped nukes on two of their cities. One hypothesis is that we did it to impress Russia with our power.  Now imagine a foreign power doing the same thing:  telling us they can drop any building at any time and then proving it on TV.  ("And if you don't believe us,", they would say, "check out the video of WTC 7.")

My story is quite a bit scarier than "our government is the enemy".  Because even in that scenario we imagine we might someday find the rotten tomatoes and throw them out.  The idea that we were attacked by a foreign power and instantly brought to our knees is much scarier.

Which foreign power?  In my story I would make Putin the bad guy.  He's got the resources, the craziness, a country full of smart people who could invent this nano-paint, and he hasn't hesitated to poison his enemies (with plutonium, no less).  I'd wind in some kind of genesis of the whole thing going back to the cold war.

I'm not a crazy person - I can tell imagination from reality.  But this happened:

Back in the day I was playing the beta of Neil Young's (the game guy, not the singer) Majestic, which was an augmented reality game (ARG) that intermixed story with the real world via web sites and even phone calls to you, the player.  The story was about an evil corporation making micro-electro-mechanical-systems (mems).  The morning of 9/11 I received an email alert from the New York Times that one of the World Trade Center towers had collapsed.  And I assumed this email was from Neil's game.  It was only when the second email alert arrived that I looked more closely and saw it really was from the New York Times and that's when I finally turned on the TV and was shocked by what I saw. So it was hard to tell story from fact that morning.

When it comes to compelling narratives about what happened on 9/11/2001 I can't really tell which, if any, story is correct.  I don't believe any of them.  I'll give the 911 Truth people props for more compelling storytelling; and if you like science fiction at all, I recommend you visit http://www.911truth.org/ and explore it.  Think of it as an ARG.  And if you come away after that with lots of doubts, well, that's probably a good thing too.

And here is a video summary of the NIST study of WTC 7.

For me, though, all of the 9/11 stories, including the official one, are still in the hypothesis stage.  I don't expect us to get beyond that for another 50 years (or unless a Snowden comes along with PowerPoint slides [written in Russian!]).  To be clear, I think our government is full of misguided nincompoops, but I don't really think any of them are evil enough to pull off a twin tower implosion - if that's what happened.  

I don't know.  In the meantime, my imagination runs wild.


2013-11-13

NSA Listening Posts - Crowdsourced

There has been lots of press recently about the NSA hacking into everything.

There are cameras in everything now; laptops; Chromebooks; netbooks; tablets; phones ...   I'm surprised the NEST learning thermostat doesn't have a camera (but it does have a motion detector).

Anyway ...  with consumers (that's you and me) buying this stuff and distributing it around our homes, the NSA's job is half done.  The other half is getting to information out.  For phones with GSM/LTE the phone itself will do the job.  For the rest of these devices, Wi-Fi is required.

Comcast is here to help!  All new routers from Comcast come with WiFi you can't turn off.  The idea, from Comcast's point of view, is that they are doing a sort of "crowd sourcing" of WiFi hotspots. Supposedly (I haven't tried it), you can connect to anyone's Comcast router with your Comcast account and use it as a free hotspot.

Comcast, as you probably know, has a back-channel IP address for every home router.  They use this for maintenance, and generally, the back channel addresses are IP6, which is cool.  But since we know the NSA co-opts consumer gear for their own purposes I think we can be pretty confident that the NSA can take control of one of these routers if they want.

... so ... to summarize ... as consumers, we've bought everything the NSA needs to bug our homes.  Talk about crowd sourcing ...

(Note:  It's possible to do small amounts of configuration to your Comcast WiFi connection - so I renamed mine from HOME_<some hex digits> to NSA_LISTENING_POST.  So if you're driving by and see that, you'll know where you stand.)

[Edit: My question for many years as been - how do you know you're connecting to a trustworthy Comcast hotspot and not some random router?]

 

2013-11-12

Nine nines

 (Reposted from 9/9/1999 to approx 9:10 on 11/12/13)

Wednesday, September 9, 1999 - Nine Nines

Today is the famous day 9/9/99 (or as using the international standard, 1999/9/9, but that's another story).

Personally, I wouldn't have used four nines to delimit a list of dates in my own code - that's too wimpy! I would have used NINE NINES!

9:99:99 on 9/9/99 (that's nine nines) could easily be stored as a time and date. Of course, if you 'normalized' it, it would really be 10:40:39 on 9/9/99, because you would have to subtract sixty from the seconds and the minutes to normalize it (carrying the extra 'tens' place). (Don't laugh: I bet you can enter 1:99 into your Microwave oven and it will do the right thing and warm your coffee for 2:39.)

Today is the first somewhat official day of Y2K-ness, so I thought it would be appropriate for programmers all over the world to observe a moment of silence at 10:40:39 a.m. Or, for that matter, since we're talking about lame ways of encoding dates, you can do it at 10:40:39 p.m.! Or, do the normalization wrong, and observe a moment of silence at 9:39:39 a.m. or 9:39:39 p.m.! Whatever!

(In some parts of the world it's already 9/10/99 - oh well! Close enough!)

So, whatever you're doing today, at sometime during the day that might be represented by 9:99:99 on 9/9/99, stop what you're doing and think a deep thought. Think about all the Cobol programmers who have gone before, boldly representing dates as strings that may or may not be parsable in the 21st Century.

Then think about what we are going to do when the Unix date function rolls over in 2039. Then forget about it, because, heck, it's still forty years away!

2013-11-10

Self-government in action

Is self-government possible? (Most people say no and think it would lead to chaos.) I would say a certain amount of chaos is good (but I digress).

Watch the following video about bicycling in Amsterdam (which I witnessed first hand a month ago).

 

Bicycle Anecdotes from Amsterdam from STREETFILMS on Vimeo.

Yes, some central planner laid out the streets, but the day-to-day movement of bicycles is both chaotic and somewhat beautiful ... I would argue such self-organization is suggestive of what self-government might be like: maybe a bit chaotic, but ultimately productive and energetic and efficient.