The Dwindling PC Market

It’s not secret that the personal computer (PC) market isn’t doing so well:

According to research firm IDC, things are not looking great for the PC industry. The firm says that PC sales saw “the steepest decline ever in a single quarter” this year (excluding tablets and notebooks with a removable screen or keyboard), down 13.9 percent to 76.3 million from the same quarter last year. If you’ll recall, thats more than double the loss the industry experienced in the fourth quarter of 2012, which saw a 6.4 percent decline. Back in January, IDC noted that sales declined year-to-year during the holiday season the first time in more than five years. Today’s newly reported results from IDC mark the fourth consecutive quarter that PC shipments have fallen.

Everybody in the industry is scrambling to find the culprit. Some analysts are blaming Windows 8 while others are blaming the popularity of mobile phones and tablets. What few analysts appear to be looking at is the bloody obvious. Most people I know have a computer that is several years old. Hell, I purchased my last desktop in August of 2006. While I did recently upgraded to a new MacBook Pro the only reason I did so was because my old laptop’s memory controller was failing and replacing that (which means replacing the motherboard) was expensive enough to make a new laptop seem like a smarter way to go. In fact I don’t know a single person who has recently upgraded their computer. Why? Because the current system they’re running is good enough.

Herein lies the secret to the declining PC market, most people who want a computer already have one and have little reason to upgrade until their system dies. Modern computers are powerful enough to serve the needs of most users. Who needs an Intel i7 processor, 16GB of RAM, and a blazing fast graphics card for reading e-mail and looking at Facebook? Nobody, that’s who. The PC market is saturated. People aren’t upgrading as frequently because they don’t need to. The people who are upgrading are usually replacing machines that are so old that they’ve finally broken or are too slow to perform some task or another.

Computers are tools and so long as a tool gets the job done in a satisfactory manner most people aren’t motivated to replace it with something newer. It’s as simple as that.

The Great Bitcoin Crash

Yesterday my prediction based on the utmost scientific research came true. Bitcoin, which has seen a remarkable increase in value compared to dollars, began to crash. Supposedly the cause of this crash was a Distributed Denial of Service (DDoS) attack:

We’ve reached out to one of the biggest exchanges, Mt. Gox, to see what happened. But another San Francisco-based exchange called TradeHill is saying that the crypto-currency is falling because of apparent distributed denial of service attacks on Mt. Gox and Bitstamp. A denial of service attack happens when an attacker overwhelms a target with external requests, so that it can’t honor regular requests from legitimate users.

All commodities are vulnerable to some amount of manipulation and Bitcoin is no different. The sudden drop in value demonstrates a potential exploit that can be used to make a great deal of money off of Bitcoin. Let’s hypothesize that the DDoS attack was planned some months back. Planning to execute a DDoS attack against several prominent Bitcoin trading sites individuals decided to first buy a large number of Bitcoin as the then current price and then move to manipulate the price by bringing the currency to the media’s attention. After generating a good deal of interest those same individuals begin to trade some Bitcoin for larger amounts of dollars, which raises the high point trade value. Seeing an increase in the high point trade value people uninvolved with the plan begin trading at higher prices. Eventually the system becomes a sort of Ouroboros, a self-feeding cycle that causes the price of Bitcoin to continuously rise. Once the value of Bitcoin has been manipulated high enough the manipulators sell off all of their Bitcoin and begin their DDoS attack. With the most prominent Bitcoin trading sites down the perceived value of Bitcoin tumbles along with it. After that the cycle can begin again. Buy low, manipulate the price higher, instigate a DDoS attack to drop the price, buy low, and so on.

The scenario I just explained is hypothetical, I’m not implying that it is fact. But the scenario is a possibility.

It will be interesting to see what the price of Bitcoin does over the next several days. Will is drop in price? Will it return to the pre-DDoS high? Will it climb even higher?

Feedbin

Yesterday I said I was going to try Feedbin, a potential replacement for Google Reader, when Reeder was updated to support it. This is where I admit that I’m not a patient man, when there is something new and shiny to try out I want to try it right now. Needless to say I decided to open a Feedbin account and give it a try even though Reeder doesn’t support it yet.

I’ll save you a lengthy writeup of my initial impressions and just give a bullet point summary of my thoughts.

The Good

  • It successfully imported my feeds from the file Google Takeout provided me.
  • The site always uses Hypertext Transfer Secure (HTTPS) (I’m still baffled by the number of sites that use unsecured connections).
  • The web interface, both on desktop and mobile systems, is very clean and straight forward.
  • Adding new feeds is very easy (I’m surprised by the number of Really Simply Syndication (RSS) clients and services that fail in this regard).
  • No advertisements.
  • You can easily export your list of subscriptions.
  • The developer is pretty upfront about planned features for the service.

The Bad

  • No way (at least that I’ve found) to rename feeds or tags.
  • No way (at least that I’ve found) to easily delete tags, you have to remove the tag from each feed individually.
  • The interface doesn’t allow you to sort feeds based on tags.
  • It’s currently unsupported by Reeder (this isn’t Feedbin’s fault, but it’s an important feature for me).

The Indifferent

  • It’s not free (which is why there are no advertisements).
  • There’s a complete lack of social media features (I’m not against social media features, I just don’t use them).

Overall I like the service so far. While part of me still isn’t used to paying for an online service the other part of me that enjoys a complete lack of advertisements and other attempts of monetizing user data is quite content. When you sign up on the site it notifies you that your card won’t be charged if you cancel within the first three days. Since I like what I’ve seen so far I’m going to pay the whopping $2.00 and try it for an entire month.

MakerBot Industries Unveils Prototype 3D Scanner

3D printers are a marvel of modern engineering. A device that is able to build almost any solid object from the ground up stands to reshape modern manufacturing. One of the gaps in the technology has been the lack of a tool that allows you to scan an object so you can replicate it. Last week at South by Southwest MakerBot industries unveiled a prototype desktop 3D scanner:

The maker community has helped on that front, as well, with MakerBot’s Thingiverse serving as an unparalleled resource for 3D images, meaning that, once your printer’s all set up and calibrated, you can download and print to your hearts delight — but what if, say, you want to print up something that some kindly soul hasn’t designed for you? You could learn a CAD program — or you could invest in an industrial 3D scanner. The latter option has lead to something of a land rush of companies and individuals looking to break things wide open with an affordable, consumer-facing offering. And while MakerBot still seems a ways away from the final product, the company used SXSW as a platform to unveil a prototype of its MakerBot Digitizer Desktop 3D Scanner.

Imagine being able to toss a part onto a scanner and having copies print out in a few minutes. That’s what 3D scanners combined with 3D printers stands to do. It will be interesting to see where this technology goes in the next decade.

Tor Relay Update

Last week I mentioned that I purchased a Raspberry Pi specifically to use as a Tor relay. Two days ago I received the following e-mail:

Hello and welcome to Tor!

We’ve noticed that your Tor node christopherburg (id: 3F17 3F07 DDBB D8F6 34C7 9588 6F99 E808 1AE6 AB42) has been running long enough to be flagged as “stable”. First, we would like to thank you for your contribution to the Tor network! As Tor grows, we require ever more nodes to improve browsing speed and reliability for our users. Your node is helping to serve the millions of Tor clients out there.

As a node operator, you may be interested in the Tor Weather service, which sends important email notifications when a node is down or your version is out of date. We here at Tor consider this service to be vitally important and greatly useful to all node operators. If you’re interested in Tor Weather, please visit the following link to register:

https://weather.torproject.org/

You might also be interested in the tor-announce mailing list, which is a low volume list for announcements of new releases and critical security updates. To join, visit the following address:

https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-announce

Thank you again for your contribution to the Tor network! We won’t send you any further emails unless you subscribe.

Disclaimer: If you have no idea why you’re receiving this email, we sincerely apologize! You shouldn’t hear from us again.

As of this writing my relay has been running for 8 days, has sent 38.65 GB of data, and has received 38.10 GB of data. I’m happy that this thing has proven to be an effective relay. My next step is to pursue the development of a relay image that can be written to an SD card, plugged into a Raspberry Pi, and operate as a relay without requiring any additional (or, at least, significant) configuration.

How Tor and HTTPS Work

The Electronic Frontier Foundation (EFF) has posted a nice diagram that explains how Tor and Hypertext Transfer Protocol Secure (HTTPS) work in regards to security and anonymity. If you click the HTTPS button the diagram explains how HTTPS protects your data, if you click the Tor button the diagram explains how Tor protects your anonymity, if you have both buttons clicked the diagram explains how Tor and HTTPS work together to protect your data and anonymity.

Neither Tor or HTTPS are perfect, especially when you’re accessing data outside of the Tor network (in other words, not accessing a hidden service). The anonymity that Tor provides cannot protect you if you chose to reveal personal information and HTTPS is only a secure as the trust chain created by issued certificates. The trust chain created by HTTPS has been compromised before when hackers were able to acquire the root signing certificates used by DigiNotar and it’s possible that many trusted certificate authorities are willing to issue fraudulent certificate to government entities. However both tools are relatively effective at what they do and when used in unison can do a great deal to protect your identify online.

Demonstrating the Importance of Tor

I’ve discussed the importance of Tor in fighting erroneous legislation but haven’t had any excellent demonstrations of Tor’s effectiveness in fighting the state’s continuous Internet power grabs. Russia has given me a perfect demonstration of the importance Tor holds:

A Russian law passed in November 2012 aimed at blacklisting sites promoting drug use has apparently just blocked the popular drug education website Erowid.org for certain users in the country according to a post on Reddit. A Russian government site listing prohibited sites shows that Erowid was added to the register earlier this month and was blocked on February 23. Russian user GreatfulListener says it is only “a matter of time” before the block affects more Russian internet service providers.

Erowid remains available in Russia via the Tor network. In fact, the Russian Tor community has undergone significant growth over the last year. RAMP, the Russian Anonymous MarketPlace, is now providing a leading Russian alternative to the English-speaking Silk Road.

Russia has begun blocking websites related to drug use. If history teaches us anything it’s that Russia will likely increase its censorship powers in the coming years. Fortunately the blocked site, Erowid, can still be accessed by Russians through Tor. Although I primarily discuss hidden services Tor is also very important in bypassing censorship of websites outside of the Tor network. Many countries block access to websites deemed undesirable but Tor works by sending traffic through exit nodes that are located in different countries, countries where the site being access may not be blocked.

The remainder of the article discusses the Russian Anonymous Marketplace (RAMP), a hidden service where Russians can perform anonymous transactions with Bitcoins. It’s akin to Silk Road, which I’ve discussed before. RAMP, like Silk Road, demonstrate that markets cannot be suppressed and that people will always find ways around state prohibitions. Today Tor and Bitcoins are integral tools for individuals wanting to avoid state prohibitions and censorship, which is why I believe it’s important to ensure these technologies become more widespread.

Who Will Build the Broadband

Without the state who will build the broadband? Apparently the people who want to use it:

Look outside of your window: if you see miles of farmland, chances are you have terrible internet service. That’s because major telecommunications companies don’t think it’s worth the investment to bring high-speed broadband to sparsely populated areas. But like most businesses, farms increasingly depend on the internet to pay bills, monitor the market and communicate with partners. In the face of a sluggish connection, what’s a group of farmers to do?

Grow their own, naturally.

That’s what the people of Lancashire, England, are doing. Last year, a coalition of local farmers and others from the northwestern British county began asking local landowners if they could use their land to begin laying a brand-new community-owned high-speed network, sparing them the expense of tearing up roads. Then, armed with shovels and backhoes, the group, called Broadband for the Rural North, or B4RN (it’s pronounced “barn”), began digging the first of what will be approximately 180,000 meters of trenches and filling them with fiber-optic cable, all on its own.

The next step, after raising half a million pounds from shareholders, is to convince Lancastrians to pony up about fifty dollars a month for internet service. (Those who invest £1500 or more can get a year’s free service, a tax credit of 30%, and the option to sell the entire investment back in 2016 at full value.) This isn’t AOL dial-up: customers will have access to a blazing fast 1 gigabit connection, something that many city-dwellers, myself included, would covet.

Regardless of what statists tell us people can accomplish great things without the assistance of fear mongering war hawks.

Using a Raspberry Pi as a Tor Relay

I’ve been discussing Tor more frequently because I foresee a day when laws such as the Cyber Intelligence Sharing and Protection Act (CISPA) force everybody wanting to communicate online anonymously to seek shelter in fully encrypted and anonymized networks. In addition the that Internet related laws are slowing making it so only people who receive a stamp of approval from state regulators will be allowed to legally post material online. In fact the United States government has already used its influence to take down websites it found undesirable and there is no reason to believe such actions won’t continue.

Many people are turned off by Tor because it is relatively slow. The Tor network’s bandwidth relies on relay nodes, which all traffic is transmitted through. What is needed to speed up the Tor network are more fast relay nodes. To this end I’ve begun investigating the use of Raspberry Pis as Tor relay nodes. For those who are unfamiliar with the Raspberry Pi it is a credit card sized ARM-based Linux computer. Two models are available, a $25.00 model and a $35.00 model. As you can see the device is dirt cheap, based on a processor that Tor has been ported to, and, in the case of the $35.00 model, has a built-in Ethernet port. All of these features make for an ideal platform on which to run a Tor relay.

I ordered a $35.00 model Raspberry Pi (although I paid slightly more since they are in very short supply at the moment) Friday and received it Monday. After installing Rasbian, the Debian-based Linux distribution optimized for the Raspberry Pi, onto an SD card I had lying around I plugged my little device into my television and booted it up. Installing Tor on the device was easy, I just had to enter the command sudo apt-get install tor and wait for a minute or so (since the device uses an SD card for storage write operations can be kind of slow). After the short wait I had Tor up and running and merely had to edit the torrc file to enable it as a relay node, open port 9001 on my firewall, and restart the Tor service. My little relay now appears on the Tor Metrics Portal and has traffic routing through it. For now I’ve throttled the relay to use 1Mbps normally and allow 1.5Mbps burst speeds. I plan to increase the bandwidth bit by bit until the relay begins to interfere with my overall network speeds (I use my network for other services including serving this website and I don’t want the relay to interfere with those).

If this project pans out I believe it will offer an effective way to increase the overall bandwidth of the Tor network. I know several people who would like to run a Tor relay but lack the technical expertise to set one up. Having a cheap Tor relay appliance, which is possible by utilizing embedded platforms likes the Raspberry Pi, would give those people an option to help increase the network’s bandwidth and, by so doing, make the network more appealing. Someday, if the Tor network becomes fast enough, a bulk of Internet traffic could seek refuge from today’s tyrannical states in the encrypted and anonymized heaven it offers. Should that happen there is little states could do to censor people online.

I’ll close by saying that the future we live into today is amazing. You can now pick up a fully capable computer for $35.00. That is something I never expected to say just a few short years ago.

A Pet Peeve I Share in this App-Oriented Age

I love smartphones. Ever since I started carrying around a Palm Treo 700p I realized having access to the collected knowledge of humanity from a pocketable device was glorious. Back then the limited hardare of portable devices required the use of mobil optimized websites. Fortunately we’ve evolve from that point in time and now our smartphones are able to display full websites. Unfortunately we have another problem, every website on the planet seems to believe requiring users to download a special application is far better than allowing directe access to their website from a mobile device. They’re wrong. Applications have their places. Games, personal information management, and e-mail clients are useful to have installed on your phone but requiring the installation and use of an application to gain access to news articles is not a smart design decision.