Comcast: Because You Suck and We Hate You

Today’s lack of blogging is brought to you by Comcast. For the third goddamn time this year Comcast has decided to jack up my bill. Why? This time, just as the last two times, they are claiming I was receiving a discount that has now expired. What record do I have of receiving this discount? None. It was never listed on my bill, I was never told about it, and I never received a mailer alerting me to it. Apparently Comcast is in the business of giving discounts without telling you. Or, you know, they’re lying sacks of shit. Either way, I was wasting time on the phone with them and will end up wasting more time on the phone either getting my bill back to the way it was or disconnecting the service and finding another Internet provider (or which I have, maybe, two other options).

To further prove Comcast hates you the company also announced that it will be issuing data caps:

Cellphone users watched with dismay in recent years as unlimited data plans became nearly extinct, thanks to the growing demand for video. Now, many Twin Cities residents will see data caps coming to their internet service, too.

Comcast, in an e-mail to customers Thursday night, said it will place a limit on internet data use for its residential customers in Minnesota, starting Nov. 1.

As a business class customer I don’t believe this will effect me. But I’m sure it’s only a matter of time until this shit applies to business customers as well.

And while the 1TB cap sounds very generous everybody needs to keep in mind that 4K video is becoming more popular and it sucks up bandwidth. 1TB won’t be much in the near future, which Comcast is banking on:

For serious online gamers or 4K video streamers, unlimited data is still available — for $50 more a month.

Otherwise, what happens if you go over 1 terabyte in a month? Comcast will charge you $10 for every 50 gigabytes over the limit, up to a maximum of $200.

What a bunch of gouging fuckers. Let’s all take a moment to thank the State for providing protections to Comcast so it can do this kind of shit without much worry of losing customers to competitors.

This is Why We Can’t Have Nice Things

The status of Internet provision in the United States is pitiful. Speeds here are dwarfed by countries such as South Korea. Most people, because they’re a bunch of statists, blame this state of affairs on the Internet Service Providers (ISP). But the real culprit is the entity they use to maintain their near monopolies: the State.

Whenever an ISP’s near monopoly status is about to be threatened by a new competitor they run to the State for protection:

Charter Communications has sued the local government in Louisville and Jefferson County, Kentucky, in order to stop a new ordinance that gives Google Fiber easier access to utility poles.

Charter’s complaint in US District Court in Louisville on Friday (full text) is similar to one filed earlier by AT&T. Like AT&T before it, Charter wants to stop Louisville Metro’s One Touch Make Ready ordinance that lets new entrants like Google Fiber make all of the necessary wire adjustments on utility poles instead of having to wait for incumbent providers to send work crews to move their own wires. Charter alleges that the ordinance violates its Fifth Amendment property rights and could cause service outages for its customers if Google Fiber’s installers make mistakes.

[…]

Charter’s challenge to the One Touch Make Ready ordinance alleges a violation of Fifth Amendment property rights and state utility laws. The Louisville ordinance gives Google Fiber “a government-sanctioned license physically to invade, take possession of, move, and interfere with [Charter’s] property,” the complaint said. While Charter owns its wires, the poles are owned by AT&T and the Louisville Gas & Electric Company, and wires are placed in public rights-of-way.

These lawsuits are always amusing. It’s always entertaining to see what kind of excuse established ISPs can come up with to keep new ISPs out of their territory. In this case Charter is arguing on the grounds of property rights. What makes this argument laughable is that Charter doesn’t own the poles in question. If anybody has grounds to complain about how the poles can by use it’s AT&T and the Louisville Gas and Electric Company. And even they wouldn’t get mush sympathy from me because they fall under the live by the State, die by the State clause.

The live by the State, die by the State clause is what I use to describe companies that have thrived due to government protections suddenly finding themselves the target of government regulations. AT&T, for example, enjoyed a long period of having a literal monopoly on telecommunications granted to it by the State. It begrudgingly surrendered that monopoly as part of a deal with Congress to allow it to enter the computer market. Today AT&T likes to complain whenever a regulation doesn’t go its way.

Charter, like most ISPs, is where it is today due to government protections. Namely state and municipal protections against competition. Through zoning and utility laws state and municipal governments have artificially restricted the number of ISPs that can operate in their territory. With few competitors Charter was able to rake in more cash without having to provide increasingly better service. Now those protections are being taken away and its crying foul. Meanwhile I can’t help but laugh. I’m not above admitting to enjoying when karma comes around and bites these politically connected companies in the ass.

All E-Mail Providers are Snitches But Some are Bigger Snitches Than Others

E-mail should be a dead standard this day and age. By default it offers no confidentiality or anonymity. Even when you use something like GPG to encrypt the contents of your e-mail the metadata, such as who you communicated with, remains unencrypted. But legacy products like to stick around past their welcome and almost all of us have to deal with e-mail on a daily basis.

This dependency on a legacy product has also been a boon for the State. The snoops working for the State such as the National Security Agency (NSA) and the Federal Bureau of Investigations (FBI) love e-mail because it’s easy to surveil. Not only are the messages unencrypted by default but many providers are more than happy to assist federal agencies in their quest to spy on the general population. It was recently revealed that Yahoo has been one of the e-mail providers in the State’s pocket:

Yahoo Inc last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter.

The company complied with a classified U.S. government demand, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI, said three former employees and a fourth person apprised of the events.

Some surveillance experts said this represents the first case to surface of a U.S. Internet company agreeing to an intelligence agency’s request by searching all arriving messages, as opposed to examining stored messages or scanning a small number of accounts in real time.

Stories like this make me happy that Yahoo has been suffering financially. Most technology companies have at least half heartedly pushed back when the State has demanded all-encompassing surveillance powers. But Yahoo was more than willing to roll up its sleeves and provide the State with everything it asked for. Fortunately, there was at least one decent person in Yahoo during this fiasco. Unfortunately, that person was powerless to stop Yahoo from going through with its dastardly deed:

According to two of the former employees, Yahoo Chief Executive Marissa Mayer’s decision to obey the directive roiled some senior executives and led to the June 2015 departure of Chief Information Security Officer Alex Stamos, who now holds the top security job at Facebook Inc.

I’d say he was well rewarded for standing up for what he believed in. Facebook is raking in cash so he’s almost certainly being paid far better. And while Facebook is a major player in the State’s surveillance apparatus the company has at least shown a willingness to provide customers with secure means of communications by allowing WhatsApp, one of its acquisitions, to implement the Signal protocol and even implemented optional end-to-end encryption in its Messenger app.

This is the point where I’d recommend Yahoo’s users to abandon its e-mail service for a more reputable one. But I doubt anybody reading this is actually using Yahoo’s e-mail service. But if you are a statistical anomaly and still using it you should stop. Yahoo has zero interest in protecting your privacy.

Confidentiality Versus Anonymity

The Intercept has started a bit of a shit storm by pointing out that iMessage doesn’t encrypt metadata:

APPLE PROMISES THAT your iMessage conversations are safe and out of reach from anyone other than you and your friends. But according to a document obtained by The Intercept, your blue-bubbled texts do leave behind a log of which phone numbers you are poised to contact and shares this (and other potentially sensitive metadata) with law enforcement when compelled by court order.

Every time you type a number into your iPhone for a text conversation, the Messages app contacts Apple servers to determine whether to route a given message over the ubiquitous SMS system, represented in the app by those déclassé green text bubbles, or over Apple’s proprietary and more secure messaging network, represented by pleasant blue bubbles, according to the document. Apple records each query in which your phone calls home to see who’s in the iMessage system and who’s not.

Is this an affront to privacy? Is Apple showing bad faith in its promise to deliver a more security communication system? No and no. The issue at hand here is that Apple has promised confidentiality but hasn’t promised anonymity, which are two different things.

Confidentiality means that a communication isn’t accessible to unauthorized parties. In other words what was communicated is secret. Anonymity means that the parties communicating are secret. A confidential message isn’t necessarily anonymous and an anonymous message isn’t necessarily confidential.

iMessage and other secure communication applications such as WhatsApp and Signal use an identifier that are tied to your real-life persona, your phone number. Using phone numbers as identifiers allows these apps to easily scan your contacts list to see who does and doesn’t have the application. While they do keep what is being communicated secret they make no attempt to keep who is communicating secret.

Tor, on the other hand, attempts to provide anonymity but doesn’t necessarily provide confidentiality. With the exception of hidden services, every website you access through Tor goes through an exit node. Unless the site you’re accessing utilizes Transport Layer Security (TLS) the contents of the site are accessible to the exit node operator. On Tor the content being communicated isn’t necessarily confidential but the parties communicating are.

Applications such as Ricochet attempt (I use this qualifier because Ricochet is still experimental) to provide both confidentiality and anonymity. Not only are the communications themselves kept secret but the parties who are communicating is also kept secret. But since Ricochet users are anonymous be default the application can’t go through your contacts list and automatically inform you who does and doesn’t have the application.

There’s nothing sinister afoot here. Apple, WhatsApp, and Signal never claimed to deliver anonymity. Even if they didn’t use phone numbers as identifiers they still wouldn’t deliver anonymity since they make no attempt to conceal your IP address. Everybody that is freaking out about this is freaking out about the fact that Apple isn’t providing something it never claimed to provide.

There are no magic bullets. Before choosing the right tool for the job you need to develop a threat model. Unless you know what you are guarding against you can’t effectively guard against it. Confidentiality works well to protect against certain types of snoops. Law enforcers wanting to dig through the contents of messages to find evidence of illegal activities and advertisers wanting the same but to acquire information to better sell your products are threats where confidentiality is important but anonymity may not be required. Law enforcers wanting to create a social graph so it can target friends of specific individuals and censors wanting to learn who is putting out unapproved material are threats where anonymity is important but confidentiality may not be required. On the other hand, depending on your threat model, all of the above may be threats where confidentiality and anonymity are required.

Know your threats and know your tools. Make sure your tools address your threats. But don’t get upset because a tool doesn’t address your threat when it never claimed to do so.

Have an Offsite Backup of Your Data

It’s a good idea to have a bug out bag in case there’s an emergency such as a house fire where you have to evacuate immediately. For the same reason it’s a good idea to have an offsite backup of your important data. You don’t want to be the guy who has to run into a burning building to save the only copy of his novel:

A fire inside a blighted house in Broadmoor quickly spread to a nearby multiplex Thursday, sending residents rushing to safety and one — a novelist worried about losing his life’s work — back inside to save his laptop.

[…]

Gideon Hodge, 35, describes himself as a playwright, novelist and actor. When his fiancée told him that their apartment was on fire, he left work in Mid-City and rushed to the scene. That’s when he realized that his only copies of two completed novels were on a laptop inside.

Clad in a T-shirt that said #photobomb next to an illustration of the Joker photobombing Batman and Robin, Hodge dashed into the building. He ran past the smoke and the firefighters yelling at him to stop and managed to grab the precious laptop.

I backup my important data to Amazon Glacier with Arq. What I like about Amazon Glacier is the price: $0.007 per gigabyte in the Ireland region. What I like about Arq is that it encrypts the data before uploading it Amazon Glacier.

Amazon Glacier starts costing you real money when you want to retrieve your backups. But that’s a price I’m willing to pay because the chances of me needing those offsite backups is slim so I don’t want to pay a sizable storage fee. In addition to having cheap storage, Amazon Glacier also allows me to select the region I backup to. You probably noticed that I mentioned the Ireland region. Your offsite backups should be geographically separated from you. An earthquake that takes out your home could also take out nearby data centers. If your offsite is stored in a nearby data center you might lose both your local and offsite backups. Few things short of full scale nuclear war are likely to wipe out both my local and offsite backups and if something that bad happens I don’t think my data will be terribly important to me.

If you’re prepared enough to assemble a bug out bag you should also setup an offsite backup plane as part of your disaster preparedness.

My Biggest Concern with Smart Guns

The subject of smart guns, that is introducing electronics into firearms to boost their capabilities, is a touchy one. A lot of capabilities could be added to firearms but one side sees the introduction of electronics as a way to forward the goals of gun control while the other side has legitimate concerns about reliability. Me? My biggest concern is a smart gun manufacturer pulling a stunt like HP:

On September 13, owners of HP OfficeJet, OfficeJet Pro and OfficeJet Pro X began contacting third-party ink vendors by the thousand, reporting that their HP printers no longer accepted third-party ink.

The last HP printer firmware update was pushed in March 2016, and it appears that with that update (or possibly an earlier one), HP had set a time-bomb ticking in its customers’ printers counting down to the date when they’d begin refusing to follow their owners’ orders.

With a simple software update HP locked third-party ink providers out of its platform. This isn’t new. HP has had a long history of trying to stop consumers from using their ink of choice in HP printers. Hell, HP isn’t even alone in this pursuit. Lexmark was nailed to the wall for attempting the same shit in 2003.

It’s not too much of a stretch to imagine firearms manufacturers pulling a similar stunt. Can you imagine, for example, a Remington smart gun that disabled the use of third-party ammunition with a simple firmware update? With software copyright laws as they are and the Digital Millennium Copyright Act what it is, this is the kind of thing that really worries me about introducing more electronics into firearm.

First World Police Problems

How much wealth has the New York City Police Department (NYPD) stolen through civil forfeiture? Nobody knows but it’s enough that if calculated it would apparently crash NYPD’s computers:

The New York City Police Department takes in millions of dollars in cash each year as evidence, often keeping the money through a procedure called civil forfeiture. But as New York City lawmakers pressed for greater transparency into how much was being seized and from whom, a department official claimed providing that information would be nearly impossible—because querying the 4-year old computer system that tracks evidence and property for the data would “lead to system crashes.”

I’m not sure if that means NYPD has a really shitty computer system, has stolen a mind boggling amount of stuff, or is lying to us. The worst part? All three possibilities are equally likely.

And can you imagine the public relations meeting where this excuse was considered acceptable enough to release? Who in their right mind thought admitting that their computer system cannot calculate the amount of stuff that has been stolen was a good idea? That just illustrates the sheer scope of the problem to the public, it doesn’t make NYPD look justified.

TANSTAAFL

One of the most important things for anybody to know is that there ain’t no such thing as a free lunch. Everything comes at a cost, even “free” things. Consider public Wi-Fi networks. Companies seemingly provide free Wi-Fi to customers as a courtesy. But those free Wi-Fi networks are revenue generator:

According to an article, which mall officials say they co-wrote, “while being an attractive guest feature, the (Wi-Fi) service simultaneously provides the mall with enough data to fill digital warehouses with information about what people do both online and in the real world while on the property.”

“This type of tracking can happen at any business, any location, any place that there’s any Wi-Fi networks,” Schulte said.

He explained that when your phone connects to Wi-Fi, it’s actually exchanging information with the network.

“You’re telling the Mall of America when you go to the mall, what door you go in, what stores you visit, what level you’re on, as well as what you’re doing on your phone.”

Asked if that means that mall officials could potentially know about it if someone logs onto Facebook while using the mall’s Wi-Fi network, Shulte answered, “Absolutely they know that you’re going to Facebook.”

This is the same paradigm used by websites that rely on ad networks for revenue. Instead of charging the user directly the provider simply snoops on the user and sells the information it collects to advertisers. In this way the advertiser becomes the customer and the user becomes the product.

I recommend against using public Wi-Fi networks. If you have to use one I recommend doing so through a Virtual Private Network (VPN). A VPN encrypts your traffic from your device to the VPN provider’s server. That means your data isn’t visible to the local Wi-Fi network and therefore cannot be snooped on by local network surveillance. Tor can work to a lesser extent in that you can conceal traffic that can be run through the Tor network but it’s not as effective in this case since most systems, with the exception of specially designed operating systems such as Tails, don’t route all traffic through Tor.

Whenever anybody offers you something for free you should try to figure out what the catch is because there is one.

Obedience Won’t Save You

People pay taxes because the alternative is ultimately death. Yes, the State will go so far as to murder you if you don’t fork over the “protection” money it demands. The threat of death convinces most people to pay their taxes. Furthermore, as if hoping to curry favor with the State, many people perform a great deal of virtue signaling by proclaiming how much they enjoy paying taxes. But obeying the State’s expropriation tax laws and virtue signaling won’t save you. Even if you obey and pay the State will try to steal more of your wealth if it thinks it can get away with it:

Over the years, we received guidance from Irish tax authorities on how to comply correctly with Irish tax law — the same kind of guidance available to any company doing business there. In Ireland and in every country where we operate, Apple follows the law and we pay all the taxes we owe.

The European Commission has launched an effort to rewrite Apple’s history in Europe, ignore Ireland’s tax laws and upend the international tax system in the process. The opinion issued on August 30th alleges that Ireland gave Apple a special deal on our taxes. This claim has no basis in fact or in law. We never asked for, nor did we receive, any special deals. We now find ourselves in the unusual position of being ordered to retroactively pay additional taxes to a government that says we don’t owe them any more than we’ve already paid.

Apple has a massive team of lawyers whose job is to ensure it complies with the laws of the regions it operates in so it can avoid the State’s wrath. The European Union decided that this dedication to obedience wasn’t enough and chose to demand billions of dollars more from the largest tax victim in its territory. In the eyes of the European Union Apple and every other organization and individual are little more than giant Automated Teller Machines. When it decides it wants more cash it claims the wealthy didn’t pay enough taxes and demands they either pay more or else.

This should be a lesson to all the people hoping to avoid the State’s wrath by publicly proclaiming how much they enjoy paying taxes. Apple has a long history of touting its efforts to be a “responsible citizen”, which includes publicly stating its desire to pay its “fair share”. But the European Union still went after Apple for more. Don’t fool yourself into believing the State will let you live your life so long as you kowtow to it.

Technology Empowers Individuals

In all regions of the planet having sex is legal. But in many regions being paid to have sex is illegal. Some of those areas to have a caveat where you can legally be paid for sex but you have to be filmed doing it. Either way, governmental restrictions on sex work have made the trade more dangerous. Many sex workers have been relegated to operating under the authority of abusive pimps. However, technology is changing that:

Soon after Kate ran into trouble at the nightclub—like many other fresh-faced high school girls in Hong Kong today—she discovered online forums to run her own business as a sex worker. On HK Big Man and HK Mensa, where ads are proliferating everyday, so-called “compensated daters” offer their services without the help of a middleman.

Bowie Lam Po-yee, who runs an organization called Teen’s Key that provides outreach for these girls, says that it’s common for one girl to find an ad she likes, and then copy it—with just minor adjustments. Then, girls leave their contact information and negotiate where they’ll meet and how much they’ll charge. It’s easier to evade the cops that way: they’re less likely to be caught for solicitation if they’ve checked a client out to see if he’s legitimate. Police can be obvious as to their identity when it comes to brokering a deal over a chat app.

The job of a pimp has been to market out sex workers and they often use their position abusively. Ubiquitous communication technology allows sex workers to market themselves. Forums, smartphones, and chat applications allow sex workers to cut out the middle man, which allows them to keep all of the profits as well as not be reliant on an abusive individuals.

This isn’t just true for sex workers. Online communication technology has also made the drug trade safer. Technology often acts as a balance to the State. When the State makes a market more dangerous by declaring it illegal technology helps make it safe again.