Feedbin

Yesterday I said I was going to try Feedbin, a potential replacement for Google Reader, when Reeder was updated to support it. This is where I admit that I’m not a patient man, when there is something new and shiny to try out I want to try it right now. Needless to say I decided to open a Feedbin account and give it a try even though Reeder doesn’t support it yet.

I’ll save you a lengthy writeup of my initial impressions and just give a bullet point summary of my thoughts.

The Good

  • It successfully imported my feeds from the file Google Takeout provided me.
  • The site always uses Hypertext Transfer Secure (HTTPS) (I’m still baffled by the number of sites that use unsecured connections).
  • The web interface, both on desktop and mobile systems, is very clean and straight forward.
  • Adding new feeds is very easy (I’m surprised by the number of Really Simply Syndication (RSS) clients and services that fail in this regard).
  • No advertisements.
  • You can easily export your list of subscriptions.
  • The developer is pretty upfront about planned features for the service.

The Bad

  • No way (at least that I’ve found) to rename feeds or tags.
  • No way (at least that I’ve found) to easily delete tags, you have to remove the tag from each feed individually.
  • The interface doesn’t allow you to sort feeds based on tags.
  • It’s currently unsupported by Reeder (this isn’t Feedbin’s fault, but it’s an important feature for me).

The Indifferent

  • It’s not free (which is why there are no advertisements).
  • There’s a complete lack of social media features (I’m not against social media features, I just don’t use them).

Overall I like the service so far. While part of me still isn’t used to paying for an online service the other part of me that enjoys a complete lack of advertisements and other attempts of monetizing user data is quite content. When you sign up on the site it notifies you that your card won’t be charged if you cancel within the first three days. Since I like what I’ve seen so far I’m going to pay the whopping $2.00 and try it for an entire month.

Nothing is Free

With the demise of Google Reader those of us who depend on Really Simple Syndication (RSS) for collecting and reading news articles have been scrambling to find a replacement. A couple of prospective replacements that have take on Google Reader refugees are Feedly and Feever. My primary concern in finding a replacement has been compatibility with Reeder, which I use as my RSS client on my iPhone, iPad, and Macs (Yeah, I’m a bit of an Apple whore, want to make something of it?). Via Reeder’s Twitter account I found out that the developer was planning to include support for Feedbin. When I looked into Feedbin the thing that immediately caught my attention was the subscription fee, in order to use Feedbin you need to either pay $2.00 a month or $20.00 a year. The part of me that has become accustomed to free online services was quickly taken aback. Would I be forced to pay a monthly or yearly fee just to use my preferred RSS client? Why should I pay money to use something that’s free?

Most of us use online services and most of us pay nothing for them. My reaction to seeing that Feedbin charges a monthly fee is mirrored by other Reeder users and that really woke me up to something I seldom think about: we denizens of the Internet have become so accustomed to free services that we become upset when somebody has the audacity to charge money for an online service. We often fail to remember that there are no free lunches. Providing an online service isn’t a costless endeavor. Servers, electricity, Internet connectivity, development and maintenance time, and providing enough infrastructure for users are all costs associated with providing an online service. This blog, if anything, is a loss for me. I don’t count the costs of the server and electricity when calculating the costs of running this blog because that server is providing other services I use (Virtual Private Network (VPN), e-mail, CalDAV, etc.). But it does costs me time in writing blog posts and maintaining the website. Since I enjoy writing and server maintenance (to a point) neither of these are a higher cost than the blog is worth. However, if I was offering a service with a decent number of subscribers, I would need to charge money in order to make providing the service at least break even.

When an service provider offer its “product” free of charge it is almost always recouping costs elsewhere. Google, Facebook, Twitter, and most of the other major online service providers recoup their costs by selling data. Specifically your data. When dealing with these service providers you must think of yourself as the product and the entities buying your data as the customers. If the collected data isn’t purchased by the customers it isn’t useful to the service provider and will likely be discarded. I’m sure Google dropped Reader because its customers weren’t interested in the data collected by the service. I understand that and don’t hold it against Google, they’re in business to make money and there’s no point for Google to maintain a service that isn’t making a profit.

For some time I’ve become less accepting of being a product for Google. Part of this stems from my innate desire to control my data. If my data is hosted on Google’s servers I have no control over it. There is no way for me to know if that data will be preserved or who will be given access to my data (we know the United States government periodically demands user data from Google). I do know that Google is selling my data to its customers. The only way a service provider has any motivation to keep its user data private is if its users are also its customers.

The other method for a service provider to monetize its services is to charge money for its services or provide another product that ties into its services. Apple chooses the latter. iCloud isn’t provided free of charge out of the goodness of Apple’s heart, it’s provided free of charge (at least for the first 5GB of storage) because it’s a feature that allows Apple to sell iPhones, iPads, and Macs. Feedbin has chosen the former. Instead of offering a free service and monetizing user data the people behind Feedbin are asking users to pay a monthly or yearly free. There are two advantages for users under this model: as a user you are also a customer and Feedbin has motivation to keep your information private and Feedbin is more apt to keep the RSS service running since its business model relies on it.

While my initial response to Feedbin was one of distaste I’m beginning to realize it may be a better model for me. I want three things: an RSS service that works with Reeder, motivation for my RSS service provider to keep my information to itself, and an RSS service that won’t suddenly disappear overnight. Being a customer instead of a product will takes care of desires two and three.

Since the costs of providing an online service are generally hidden from users it’s often difficult for a service provider to charge money. This is why most service providers monetize user data. Trying to charge users money for a service is usually met with outrage. Unfortunately there are no free lunches. If you don’t pay money directly you’re going to pay by being a product. Since I’m concerned with control over my data I would prefer to be a customer. Due to this services that directly charge me money instead of monetizing my data are appealing. For most people, those who think little about their data, services that monetize their data are likely more appealing. Either way it would do well if denizens of the Internet stopped responding in outrage when a service provider asks for money from its users. Scarcity is the ultimate law of economics and ensures nothing is every entirely free.

Violent Criminals are Trying to Recruit Potential Computer Experts

One of the most violent gangs in the United States has begun actively recruiting individuals who show a high aptitude in computer skill. I would advise parents to talk with their children and warn them against joining the ranks of psychopaths such as the National Security Agency (NSA) and Department of Fatherland Motherland Homeland Security (DHS):

The secretary of that agency, Janet Napolitano, knows she has a problem that will only worsen. Foreign hackers have been attacking her agency’s computer systems. They have also been busy trying to siphon the nation’s wealth and steal valuable trade secrets. And they have begun probing the nation’s infrastructure — the power grid, and water and transportation systems.

So she needs her own hackers — 600, the agency estimates. But potential recruits with the right skills have too often been heading for business, and those who do choose government work often go to the National Security Agency, where they work on offensive digital strategies. At Homeland Security, the emphasis is on keeping hackers out, or playing defense.

“We have to show them how cool and exciting this is,” said Ed Skoudis, one of the nation’s top computer security trainers. “And we have to show them that applying these skills to the public sector is important.”

One answer? Start young, and make it a game, even a contest.

This month, Mr. Jaska and his classmate Collin Berman took top spots at the Virginia Governor’s Cup Cyber Challenge, a veritable smackdown of hacking for high school students that was the brainchild of Alan Paller, a security expert, and others in the field.

With military exercises like NetWars, the competition, the first in a series, had more the feel of a video game. Mr. Paller helped create Cyber Aces, the nonprofit group that was host of the competition, to help Homeland Security, and likens the agency’s need for hackers to the shortage of fighter pilots during World War II.

The job calls for a certain maverick attitude. “I like to break things,” Mr. Berman, 18, said. “I always want to know, ‘How can I change this so it does something else?’ ”

Between drones and these types of competitions it appears that the United States government is continuing its track record of exploiting young children by making war feel like a video game. What the government recruiters don’t talk about are the harsh realities of war. In the case of computer security working for the government means working for the entity that is actively trying to suppress free speech on the Internet. This entity has continued to push legislation such as the Stop Online Piracy Act, Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act, and Cyber Intelligence Sharing and Protection Act. In addition to pushing destructive legislation this entity has also actively worked against free speech by seizing domain names of websites it finds undesirable (without any due process, of course). This entity has even go so far as to relentlessly pursue an individual for being a proponent of free speech and free information. By every definition of the word the United States government is a terrorist organization.

If you or somebody you know is an upcoming computer expert I urge you to urge them to work on projects that help protect Internet users from the psychopaths in the United States government. The Tor Project and I2P are always looking for more developers. Those of us that want to preserve free speech, free information, and privacy online need more advocates of cryptographic tools such as OpenPGP, Off-the-Record Messaging, and encrypted voice communications. Young computer savvy individuals should work on becoming experts in such technology, encourage their friends to use such technology, and work on the next generation of such technology.

Fortunately, for those of us that work against the United States government’s continuous attempts to censor the Internet, most people described by the state as computer hackers are not fond of authority and are therefore more likely to pursue non-state employment instead of working for the monster that labels them criminals.

Exploiting Aaron Swartz’s Memory to Expand State Tyranny

After Aaron Swartz committed suicide several politicians claimed they would make an effort to reduce the penalties of the Computer Fraud and Abuse Act, which was the law being used to nail Swartz to the wall. I’m not surprised to find out that the politicians are planning on doing the exact opposite of what they promised:

So, you know all that talk about things like Aaron’s Law and how Congress needs to fix the CFAA? Apparently, the House Judiciary Committee has decided to raise a giant middle finger to folks who are concerned about abuses of the CFAA. Over the weekend, they began circulating a “draft” of a “cyber-security” bill that is so bad that it almost feels like the Judiciary Committee is doing it on purpose as a dig at online activists who have fought back against things like SOPA, CISPA and the CFAA. Rather than fix the CFAA, it expands it. Rather than rein in the worst parts of the bill, it makes them worse. And, from what we’ve heard, the goal is to try to push this through quickly, with a big effort underway for a “cyberweek” in the middle of April that will force through a bunch of related bills. You can see the draft of the bill here (or embedded below. Let’s go through some of the pieces.

Exploiting the dead to push an agenda is nothing unusual for statists, in fact it’s their standard mode of operation. It’s unfortunate that this is the outcome of Swartz’s death, but we need not worry for there are solutions to state’s encroachment on the Internet.

Potential Winner of the Worst Father of the Year Award

I think I may have found a contender for the Worst Father of the Year Award. Not surprisingly the father is a state thug:

A policeman has shopped his 13-year-old son for fraud after he ran up a £3,700 bill playing iPad games.

PC Doug Crossan, 48, was horrified when his credit card company informed him that son Cameron had blown a small fortune in the App Store.

He claims the teenager, who now faces the possibility of being arrested and questioned by his father’s colleagues, was unaware he was being charged for the in-game purchases and wants Apple to scrap the charge.

But the technology company has refused and his only way of recouping the money is to report the purchases as being fraudulent.

What kind of father would have his kid charged with fraud to recoup a measly £3,700? By having his kid charged the father has put the son at risk of being kidnapped and caged, not to mention the effect such charges could have on the kid’s future. A father willing to sell his son out in the hopes some nebulous entity will refund his money is no father I’d want to suffer. If I were the father I would make the kid pay back the money he spent. Scratch that, if I was the father I wouldn’t have given the kid a password to my iTunes account. Since app and in-app purchases require a password be entered before a purchase has been confirmed the kid wouldn’t have been able to purchase anything.

The lesson here is that you should understand technology before handing to a teenager. Master your technology less it master you.

State Surveillance is the Problem, Crypto-Anarchism is the Solution

It’s a new day, which means the state must be planning to expand its surveillance system:

The U.S. government is expanding a cybersecurity program that scans Internet traffic headed into and out of defense contractors to include far more of the country’s private, civilian-run infrastructure.

As a result, more private sector employees than ever before, including those at big banks, utilities and key transportation companies, will have their emails and Web surfing scanned as a precaution against cyber attacks.

The state can’t help but expand its automated surveillance capabilities as automated surveillance systems allow the state to keep more of its stolen wealth for itself. Needless to say we’re not going to see a reduction in the amount of spying the state does on us but we can avoid Big Brother’s gaze. It really is time to start participating in crypto-anarchism. Encrypting e-mail, using anonymizers, accessing information through location hidden services, and performing transactions with crypto-currencies should be standard practice. In fact parents should be teaching their children how to use these technologies at an early age (because we know the state’s indoctrination centers won’t). If you don’t know how to use these technologies you should learn.

The Surveillance State

Via Bruce Schneier’s blog I came across an excellent, and short, essay regarding the surveillance state. Ian Welsh, the essay’s author, sufficiently sums up the tense relationship between the rulers and the enforcers:

This is one of the biggest problems the current elites face: they want the smallest enforcer class possible, so as to spend surplus on other things. The enforcer class is also insular, primarily concerned with itself (see Dorner) and is paid in large part by practical immunity to many laws and a license to abuse ordinary people. Not being driven primarily by justice or a desire to serve the public and with a code of honor which appears to largely center around self-protection and fraternity within the enforcer class, the enforcers’ reliability is in question: they are blunt tools and their fear for themselves makes them remarkably inefficient.

It’s easy to see the state’s motivation for implementing comprehensive automated surveillance. Paying enforcers to perform surveillance manually is expensive. Why would the rulers want to spend large amounts of money on manual surveillance when they can automate a great deal of the work and pocket the saved wealth? This is also the reason why the state tries to involve everybody, whether they’re an enforcer or not, into its surveillance system. How many times have we seen the phrase, “If you see something, say something?” Hell the phrase has its own Department of Motherland Fatherland Homeland Security (DHS) webpage. Every tattling neighbor increases the state’s watchful eye without incurring additional costs. Fortunately surveillance has a weakness:

The reliance on surveillance is however a weakness, one of many. One of the simplest ways to reduce the power and reach of the oligarchy is to destroy surveillance equipment, much of which is very easy to reach. I have frequently said that we will know that people are becoming more serious when they start destroying surveillance equipment, when it becomes an ethical imperative to do so; ideally when people believe that blanket surveillance is an ethical wrong.

I, am, thus interested to see that the Barefoot Bandit Brigade destroying surveillance cameras. In the US, those who oppose current elites directly seem strongest around Oakland and in the Pacific Northwest.

I touched on the strategy of destroying the state’s surveillance system when Minnesota politicians proposed reinstall red light cameras. Welsh puts forth an interesting idea: one can judge how serious people are about avoiding the state’s watchful eye when they begin openly advocating and participating in the destruction of surveillance equipment. It will be interesting to see if organizations like Camover and the Barefoot Bandit Brigade become more prevalent in the United States as the state becomes even more intrusive.

I’m Giving a Presentation on Tor in Apple Valley, Minnesota

Tomorrow (March 20th, 2013) at 18:00 (although the talk probably won’t start until 18:30 or 19:00) I will be giving an introduction to Tor in Apple Valley, Minnesota. The event will be held at Rascal’s Bar and Grill located at 7721 147th Street West. My plan is for the event to be an introduction to Tor, specifically what it is, why it’s important, and how to use it. If anybody reading this blog is interested in attending feel free to join us.

3D Printed Firearm Technology Will Begin Advancing Quickly

I think we’re going to see a rapid advancement of 3D printed firearm technology now that Cody Wilson, the crypto-anarchist who is working to develop printable firearms while bypassing potential copyright laws, has a Type 7 Federal Firearms License (FFL):

On Saturday, Defense DistributedAmerica’s best-known group of 3D gunsmiths—announced on Facebook that its founder, Cody Wilson, now has a federal license to be a gun manufacturer and dealer. The group published a picture of the Type 7 federal firearms license (FFL) to prove it.

“The big thing it allows me to do is that it makes me manufacture under the law—everything that manufacturers are allowed to do,” he told Ars. “I can sell some of the pieces that we’ve been making. I can do firearms transactions and transport.”

Cody isn’t planning to stop with a simple manufacturing license though:

Currently, Wilson said he will not actually begin manufacturing and selling guns until he receives an “add-on” to his FFL, known as a Class 2 Special Occupational Taxpayer (SOT), as licensed under federal law (PDF). This would allow him to manufacture and deal a broader range of firearms under the National Firearms Act. The Class 2 SOT would grants Wilson the ability to manufacture, for example, a fully-automatic rifle. Wilson applied for the SOT on Saturday and expects to receive approval within a few weeks.

The primary advantage a manufacturing license has in regards to creating printable firearms is that it allows Cody to work on the project openly while legally seeking investors. In other words it keeps the state off of his back for a while. If Cody can build and test printable machine guns the technology of printable firearms in general is likely to advance leaps and bounds very quickly.

Nationalism on the Internet

Bruce Schneier has an interesting piece discussing the dangers of Internet nationalism:

For technology that was supposed to ignore borders, bring the world closer together, and sidestep the influence of national governments the Internet is fostering an awful lot of nationalism right now. We’ve started to see increased concern about the country of origin of IT products and services; U.S. companies are worried about hardware from China; European companies are worried about cloud services in the U.S; no one is sure whether to trust hardware and software from Israel; Russia and China might each be building their own operating systems out of concern about using foreign ones.

I see this as an effect of all the cyberwar saber-rattling that’s going on right now. The major nations of the world are in the early years of a cyberwar arms race, and we’re all being hurt by the collateral damage.

[…]

Nationalism is rife on the Internet, and it’s getting worse. We need to damp down the rhetoric and—more importantly—stop believing the propaganda from those who profit from this Internet nationalism. Those who are beating the drums of cyberwar don’t have the best interests of society, or the Internet, at heart.

Rampant nationalism online is an issue that has concerned me for some time now and it is one of the things that motivates me to push for Tor hidden services. I worry about a time when various states, in my case the United States government, being pursuing individuals who post things online that goes against the state’s desired message. If that day comes it will be important to be difficult, if not impossible, to track down. The future of the unconcealed web looks bleak but there is hope in anonymized networks such as Tor and I2P.