From Their Beloved to Their Bitter Enemy

Remember just a few weeks ago when the European Union passed the General Data Protection Regulation (GDPR) and became the beloved of Internet activists across the globe? In the wake of GDPR’s passage I saw a ton of European peasants claim that the passage of the law demonstrated that the European Union, unlike the United States government, actually represents and watches out for its people.

A rule I live by is if you see a government do something you like, stick around for a short while longer because it’ll soon do something you really don’t like. The European Union just proved this rule. Within a few short weeks it went from the beloved of Internet activists to their bitter enemy:

The EU has voted on copyright reform (again), with members of European Parliament this time voting in favor of the extremely controversial Articles 11 and 13. The 438 to 226 vote, described as “the worst possible outcome” by some quarters, could have significant repercussions on the way we use the internet.

The Copyright Directive, first proposed in 2016, is intended to bring the issue of copyright in line with the digital age. Articles 11 and 13 have caused particular controversy, with many heralding their adoption as the death of the internet. Article 11, also known as the “link tax”, would require online platforms such as Google and Facebook to pay media companies to link to their content, while Article 13, the “upload filter”, would force them to check all content uploaded to their sites and remove any copyrighted material. How this will affect regular internet users is still subject to debate, but it could seriously limit the variety of content available online — and it could pretty much spell the end of memes.

Excuse me for a minute while I laugh at all of the suckers who claimed that the European Union represents and watches out for its people.

The Internet started off as a strongly decentralized network. Eventually it turned into the highly centralized mess that we’re dealing with now. Soon it may return to its decentralized nature as international companies find themselves having to abandon regions because they cannot comply with all of the different legal frameworks. Google and Facebook make a lot of money off of Europe but do they make enough money to justify paying link taxes? Do small content hosting sites have the spare resources to scan every file that has been uploaded for copyrighted material?

Moreover, legislation like this will push more Internet traffic “underground.” As long ago as the Napster lawsuit it became obvious that people on the Internet weren’t going to comply with copyright laws. Instead when one system of bypassing copyright laws is destroyed by the State, another is created in its place. So sharing memes online, at least for European peasants, might require the Tor Browser in order to access hidden image sharing sites but they will continue to share memes.

Uncontrolled Release of Energy

Your smartphone has a rather sizable appetite for energy. To keep it running just for one day it needs a battery that is capable of storing a rather notable amount of energy. The same is true for your laptop, tablet, smartwatch, and any other sophisticated portable electronic device. For the most part we never think about the batteries that power our portable electronics until they degrade to such a point that we find ourselves recharging them more often than we’re comfortable with. But what happens when something besides the usual wear and tear goes wrong with our batteries? What happens if a battery decides to release its stored energy all at once? This is a problem plaguing companies that specialize in recycling electronics:

MADISON, Wis. — What happens to gadgets when you’re done with them? Too often, they explode.

As we enter new-gadget buying season, spare a moment to meet the people who end up handling your old stuff. Isauro Flores-Hernandez, who takes apart used smartphones and tablets for a living, keeps thick gloves, metal tongs and a red fireproof bin by his desk here at Cascade Asset Management, an electronics scrap processor. He uses them to whisk away devices with batteries that burst into flames when he opens them for recycling.

One corner of his desk is charred from an Apple iPhone that began smoking and then exploded after he opened it in 2016. Last year, his co-worker had to slide away an exploding iPad battery and evacuate the area while it burned out.

Due to their popularity, lithium-ion batteries are receiving a lot of attention at the moment but the problem of uncontrolled energy release isn’t unique to them. Anything capable of storing energy so that it can be released in a controlled manner can suffer a failure that causes the energy to be released in an uncontrolled manner. Consider the gas tank in your vehicle. Under normal operating conditions the energy stored in your gas tank is released in a controlled manner by your engine. But a crash can cause the energy to be released in an uncontrolled manner, which results in a fire or explosion.

Anything that can store a large quantity of energy should be treated with respect. If you’re repairing your smartphone or laptop, be careful around the battery. If you smell something odd coming from one of your battery-powered devices, put some distance between it and yourself (and anything that can catch fire and burn).

Marijuana You Say? Case Dismissed!

Do you remember the Dallas law enforcers that went to Botham Jean’s apartment to plant, err, find evidence to assassinate his character? This is probably going to come as a shock but they found something:

One of the warrants became a public record Thursday afternoon when it was returned to the judge who signed it. It was shortly after Jean’s funeral had ended. It listed several items found in Jean’s apartment, including a small amount of marijuana.

I can see the courtroom now. The officer’s defense attorney mentions that the search warrant resulted in the discovery of marijuana. The judge says, “Marijuana you say?” He then taps his gavel and says, “Case dismissed!”

Truth be told, the discovery of marijuana is irrelevant to the case at hand. Even if Officer Guyger was aware that Jean was in possession of cannabis, she had no warrant to enter the premise. Without a warrant or an invitation, which she never claimed to be given, she was in his dwelling unlawfully. But I’m sure the discovery of cannabis will give all of the boot lickers their much needed reason to defend Officer Guyger’s actions and that’s what the warrant was all about, assassinating Jean’s character.

Creating Justification After the Fact

Most of you have probably heard about Officer Amber Guyger, the Dallas law enforcer who entered Botham Jean’s apartment and summarily executed him. When I first heard about the story, Guyger was enjoying a paid vacation. That vacation ended when she was arrested after the story had spread across the Internet. However, she was still granted the professional courtesy of receiving a few days to craft her story. Even with a few days her story was pretty feeble though. She claimed that she mistook the man’s apartment for her own (apparently black men have a magical power where they can quickly remove all of your furnishings from an apartment and replace them with new furnishings) and only shot Jean after he failed to respond to verbal commands.

Now it appears as thought the department is extending a bit more professional courtesy by helping Guyger’s defense team find some kind of evidence with which to smear Jean’s character:

Now KXAS reports that the day after the shooting, a Dallas Police Department investigator obtained a warrant to search Jean’s apartment. The warrant, signed by 292nd District Court Judge Brandon Birmingham, says the police intended to look for “any contraband, such as narcotics,” that could “constitute[e] evidence of a criminal offense.”

If I entered another person’s apartment and gunned them down, I highly doubt that the local police department would extend me the courtesies of giving me a few days to craft my story and searching my victim’s apartment for evidence that could help my defense lawyer smear them. Those levels of courtesy are only granted to members of the brotherhood.

A Potential Agorist Business Opportunity

I initially hesitated to post this article because I didn’t want to face a bunch of agorists crowding into my brilliant underground business plan but after considering how many vape shops existed before the Fascist Drug Administration (FDA) initiated its first crackdown (seriously, it’s almost as if there were two on every street corner), I realized that there was plenty of room in the market for literally everybody. So if any agorists are looking for a hustle, the (FDA) may have an opportunity lined up for you:

The agency has hardly ignored the issue. It is reviewing more than a half million public comments as it mulls whether to restrict or even ban flavors in the liquid and is investigating youth marketing by Juul, which attracts young vapers with its nicotine-packed products, easily hidden USB size and alluring social media presence.

Vape juice is dead simple to make and the handful of ingredients necessary are dirt cheap. The process is so easy and the ingredients are so cheap that I never understood how vape shops remained in business. If the FDA outright banned flavored vape juice, it would create an underground market where anybody could play. Best of all, judging by the number of vape shops that used to exist, there is obviously a massive market.

I’m sure any “concerned individual” who reads this will think that I’m the devil incarnate because I’m openly advocating for the sale of a product that they view is the embodiment of all that is wrong with this world. But I don’t care what a bunch of teetotalers think. Inhaling flavored vape juice isn’t my thing but if somebody wants to do so, they should be free to do so. It’s your body so you can put whatever you want into it.

Potentially Most Worthless Form of Protest Ever

When a bunch of triggered snowflake conservatives started burning their Nike products to protest the company’s decision to make Colin Kaepernick its mascot, I foolishly asked if there a more useless way to protest a company than destroying your own property? The question was meant to be rhetorical but a trigger snowflake liberal stepped up to the plate to prove that there are more useless forms of protest through his act of protesting by shooting himself in the arm:

Mark J. Bird, 69, was charged last month with discharging a gun within a prohibited structure, carrying a concealed weapon without a permit and possessing a dangerous weapon on school property, court records show. He was found bleeding from a self-inflicted gunshot wound to his arm about 8:15 a.m. on Aug. 28 outside a bathroom in the Charleston campus K building.

[…]

One college employee told police that he held Bird’s hand to calm him down as others tried to stop the bleeding. While waiting for authorities to arrive, Bird said he had shot himself in protest of President Donald Trump, police noted in their report. The report did not elaborate.

I’m sure Trump is all broken up over the fact that some college professor, whom he would probably tear apart on Twitter if he was even vaguely aware of his existence, from Las Vegas decided to shoot himself in the arm with a .22 pistol. I expect Trump to announce his resignation this week due to the power of this professor’s protest.

The real icing on the cake though was this:

Inside the bathroom, campus police found a $100 bill taped to a mirror along with a note that said, “For the janitor,” according to Bird’s arrest report. On the floor of the restroom was a black-and-white, .22-caliber pistol and one spent shell casing.

$100 to clean up blood? Obviously this professor has no idea how expensive it is to cleanup a scene contaminated with blood. You don’t just run a mop across it and call it a day. The scene has to be sterilized because human blood can carry some really nasty shit.

I will probably regret this but I’ll ask anyways, is there a more useless way to protest than shooting one’s self in the arm with a small caliber handgun?

Don’t Trust Snoops

Software that allows family members to spy on one another is big business. But how far can you trust a company that specializes in enabling abusers to keep a constant eye on their victims? Not surprisingly, such companies can’t be trusted very much:

mSpy, the makers of a software-as-a-service product that claims to help more than a million paying customers spy on the mobile devices of their kids and partners, has leaked millions of sensitive records online, including passwords, call logs, text messages, contacts, notes and location data secretly collected from phones running the stealthy spyware.

Less than a week ago, security researcher Nitish Shah directed KrebsOnSecurity to an open database on the Web that allowed anyone to query up-to-the-minute mSpy records for both customer transactions at mSpy’s site and for mobile phone data collected by mSpy’s software. The database required no authentication.

Oops.

I can’t say that I’m terribly surprised by this. Companies that make software aimed at allowing family members to spy on one another already have, at least in my opinion, a pretty flexible moral framework. I wouldn’t be surprised if all of the data collected by mSpy was stored in plaintext in order to make it easily accessible to other buyers.

You Are Responsible for Your Own Security

One of the advertised advantages of Apple’s iOS platform is that all software loaded onto iOS devices has to be verified by Apple. This so-called walled garden is meant to keep the bad guys out. However, anybody who studies military history quickly learns that sitting behind a wall is usually a death sentence. Eventually the enemy breaches the wall. Enemies have breached Apple’s walls before and they continue to do so:

In a blog post entitled “Location Monetization in iOS Apps,” the Guardian team detailed 24 applications from the Apple iOS App Store that pushed data to 12 different “location-data monetization firms”—companies that collect precise location data from application users for profit. The 24 identified applications were found in a random sampling of the App Store’s top free applications, so there are likely many more apps for iOS surreptitiously selling user location data. Additionally, the Guardian team confirmed that one data-mining service was connected with apps from over 100 local broadcasters owned by companies such as Sinclair, Tribune Broadcasting, Fox, and Nexstar Media.

iOS has a good permission system and users can prevent apps from accessing location information but far too many people are willing to grant access to their location information to any application that asks. If a walled garden were perfectly secure, users wouldn’t have to worry about granting unnecessary permissions because the wall guards wouldn’t allow anything malicious inside. Unfortunately, the wall guards aren’t perfect and malicious stuff does get through, which brings me to my second point.

What happens when a malicious app manages to breach Apple’s walled garden? Ideally it should be immediately removed but the universe isn’t ideal:

Adware Doctor is a top app in Apple’s Mac App Store, sitting at number five in the list of top paid apps and leading the list of top utilities apps, as of writing. It says it’s meant to prevent “malware and malicious files from infecting your Mac” and claims to be one of the best apps to do so, but unbeknownst to its users, it’s also stealing their browser history and downloading it to servers in China.

In fairness to Apple, the company did eventually remove Adware Doctor from its app store. Eventually is the keyword though. How many other malicious apps have breached Apple’s walled garden? How long do they manage to hide inside of the garden until they are discovered and how quickly do the guards remove them once they are discovered? Apparently Apple’s guards can be a bit slow to react.

Even in a walled garden you are responsible for your own security. You need to know how to defend yourself in case a bad guy manages to get inside of the defensive walls.