/ / A Place So Foreign and Eight More, Down and Out In the Magic Kingdom, Eastern Standard Tribe, Little Brother, News, Overclocked, Podcast, Someone Comes to Town, Someone Leaves Town

Will Staehle's cover for 'Spill': a white star on an aqua background; a black stylized fist rises out of the star with a red X over its center.

This week on my podcast, I read part five of “Spill“, a new Little Brother story commissioned by Clay F Carlson and published on Reactor, the online publication of Tor Books. Also available in DRM-free ebook form as a Tor Original.

I didn’t plan to go to Oklahoma, but I went to Oklahoma.

My day job is providing phone tech support to people in offices who use my boss’s customer-relationship management software. In theory, I can do that job from anywhere I can sit quietly on a good Internet connection for a few hours a day while I’m on shift. It’s a good job for an organizer, because it means I can go out in the field and still pay my rent, so long as I can park a rental car outside of a Starbucks, camp on their WiFi, and put on a noise-canceling headset. It’s also good organizer training because most of the people who call me are angry and confused and need to have something difficult and technical explained to them.

My comrades started leaving for Oklahoma the day the Water Protector camp got set up. A lot of them—especially my Indigenous friends—were veterans of the Line 3 Pipeline, the Dakota Access Pipeline, and other pipeline fights, and they were plugged right into that network.

The worse things got, the more people I knew in OK. My weekly affinity group meeting normally had twenty people at it. One week there were only ten of us. The next week, three. The next week, we did it on Zoom (ugh) and most of the people on the line were in OK, up on “Facebook Hill,” the one place in the camp with reliable cellular data signals.


MP3

/ / Little Brother, News, Podcast

Will Staehle's cover for 'Spill': a white star on an aqua background; a black stylized fist rises out of the star with a red X over its center.

This week on my podcast, I read part one of “Spill“, a new Little Brother story commissioned by Clay F Carlson and published on Reactor, the online publication of Tor Books. Also available in DRM-free ebook form as a Tor Original.

Doctors smoke. Driving instructors text and drive. Dentists eat sugary snacks before bed. And hackers? Well, we’re no better at taking our own advice than anyone else.

Take “There is no security in obscurity”—if a security system only works when your enemies don’t understand it, then your security system doesn’t work.

A couple of years ago, I decided I wanted to move off the cloud. “There’s no such thing as the cloud, there’s only other peoples’ computers.” If you trust Google (or Apple, or, God help you, Amazon to host your stuff, well, let’s just say I don’t think you’ve thought this one through, pal).

I Am Good at Nerd, and managing a server for my own email and file transfers and streaming media didn’t seem that hard. I’d been building PCs since I was fifteen. I even went through a phase where I built my own laptops, so why couldn’t I just build myself a monster-ass PC with stupid amounts of hard drives and RAM and find a data center somewhere that would host it?


MP3

/ / Articles, Little Brother, News, Podcast

Will Staehle's cover for 'Vigilant': a stylized, shattered mobile phone on a mustard-colored background.

This week on my podcast, I read “Vigilant“, a new Little Brother story commissioned by Nelda Buckman and published on Reactor, the online publication of Tor Books. Also available in DRM-free ebook form as a Tor Original.

Kids hate email.


Dee got my number from his older brother, who got it from Tina, my sister-in-law, who he knew from art school. He texted me just as I was starting to make progress with a gnarly bug in some logging software I was trying to get running for my cloud servers.


My phone went bloop and vibrated a little on the kitchen table, making ripples in my coffee. My mind went instantly blank. I unlocked my phone.


> Is this marcus


I almost blocked the number, but dammit, this was supposed to be a private number. I’d just changed it. I wanted to know how it was getting out and whether I needed to change it again.


> Who’s this?


Yeah, I punctuate my texts. I’m old.


> I need help with some school stuff some spying stuff at school i heard your good at that


MP3

/ / Articles, News, Podcast

A psychedelic, brightly colored castle wall with turrets. It floats on in an existential background of a glowing, neon green grid that meets a code waterfall as seen in the credit sequences of the Wachowskis' 'Matrix' films. The words GAME OVER are centered above the wall in the sky, in blocky, glowing, 8-bit type. The wall is shattered and peering out of it is a shadowy hacker in a hoodie. Next to the shattered wall is a red 'insert coin' slot from a vintage arcade game.

This week on my podcast, I read my latest Pluralistic.net column, “Anti-cheat, gamers, and the Crowdstrike disaster” about the way that gamers were sucked into the coalition to defend trusted computing, and how the Crowdstrike disaster has seen them ejected from the coalition by Microsoft:


As a class, gamers *hate* digital rights management (DRM), the anti-copying, anti-sharing code that stops gamers from playing older games, selling or giving away games, or just *playing* games:

https://www.reddit.com/r/truegaming/comments/1x7qhs/why_do_you_hate_drm/

Trusted computing promised to supercharge DRM and make it orders of magnitude harder to break – a promise it delivered on. That made gamers a weird partner for the pro-trusted computing coalition.

But coalitions are weird, and coalitions that bring together diverging (and opposing) constituencies are *very* powerful (if fractious), because one member can speak to lawmakers, companies, nonprofits and groups that would normally have nothing to do with another member.

Gamers may hate DRM, but they hate *cheating* even more. As a class, gamers have an all-consuming hatred of cheats that overrides all other considerations (which is weird, because the cheats are *used* by gamers!). One thing trusted computing is pretty good at is detecting cheating. Gamers – or, more often, game *servers* – can use remote attestation to force each player’s computer to cough up a true account of its configuration, including whether there are any cheats running on the computer that would give the player an edge. By design, owners of computers can’t override trusted computing modules, which means that even if you *want* to cheat, your computer will still rat you out.


MP3

(Image: Bernt Rostad, Elliott Brown, CC BY 2.0)

/ / Articles, News, Podcast

A serene, cross-legged, gilded Buddha statue; he is wearing a top-hat and posed on a field of white, fluffy marshmallows.

This week on my podcast, I read my latest Locus Magazine column, “Marshmallow Longtermism” a reflection on how conservatives self-mythologize as the standards-bearers for deferred gratification and making hard trade-offs, but are utterly lacking in these traits when it comes to climate change and inequality.


I’m no fan of Charles Koch, but I agree that his performance at the helm of Koch Industries demonstrated impressive discipline and self-control, and that his enormous economic and political power stems in large part from his ability to resist temptation and reinvest patient money in patient technologies.

But Koch’s foresight is extremely selective. Much of Koch’s fossil-fuel for­tune has been spent on funding climate denial and inaction. Koch claims that he sincerely believes that the climate emergency isn’t real or urgent, which is awfully convenient, given the centrality of fossil fuels to Koch’s power and wealth.

The rigor Koch applies to evaluating the technical propositions of new, efficient coal extraction and refining processes disappears when it comes to climate science. If Koch held coal-tech to the same evidentiary standard that he applies to the climate, he never would have bought a single piece of gear.


MP3

(Image: Mark S, CC BY 2.0, modified)

/ / Articles, News, Podcast

A medieval tapestry depicting an overseer gesturing imperiously with his stick at three bent peasants who are grubbing in a field. The image has been altered. Contrasts and colors have been pushed into psychedelic pinks, greens and blues. Part of the tapestry fades into a 'code waterfall' effect as seen in the credit sequences of the Wachowskis' 'Matrix' movies. The overseer's head has been replaced with the hostile red eye of HAL 9000 from Kubrick's '2001: A Space Odyssey.'

This week on my podcast, I read a recent post from my Pluralistic.net blog/newsletter: “AI’s productivity theater,” about the severe mismatch between the bosses who buy AI to increase their workers’ efficiency, and the utter bafflement of the workers who are expected to use the AI…somehow.


A new research report from the Upwork Research Institute offers a look into the bizarre situation unfolding in workplaces where bosses have been conned into buying AI and now face the challenge of getting it to work as advertised:

https://www.upwork.com/research/ai-enhanced-work-models

The headline findings tell the whole story:

* 96% of bosses expect that AI will make their workers more productive;

* 85% of companies are either requiring or strongly encouraging workers to use AI;

* 49% of workers have no idea how AI is supposed to increase their productivity;

* 77% of workers say using AI decreases their productivity.


MP3

(Image: Cryteria, CC BY 3.0, modified)

/ / Articles, News, Podcast

An editorial cartoon depicting the Standard Oil company as a word-girdling kraken, choking the statehouse, legislature and White House in its tentacles. It has been modified. The kraken's head is now surmounted by the hostile red eye of HAL 9000 from Kubrick's '2001: A Space Odyssey.' The sky behind the world has been replaced with a 'code waterfall' effect as seen in the credit sequences of the Wachowskis' 'Matrix' movies.

This week on my podcast, I read my latest Locus Magazine column, Unpersoned>; about the enormous power that we’ve given to tech giants to determine who can participate in modern life, and why the answer to the giants’ failure to wield that power wisely is to take it away, rather than attempting to perfect their use of it.


AT THE END OF MARCH 2024, the romance writer K. Renee discovered that she had been locked out of her Google Docs account, for posting “inappropriate” content in her private files. Renee never got back into her account and never found out what triggered the lockout. She wasn’t alone: as Madeline Ashby recounts in her excellent Wired story on the affair, many romance writers were permanently barred from their own files without explanation or appeal. At the time of the lockout, Renee was in the midst of ten works in progress, totaling over 200,000 words (Renee used Docs to share her work with her early readers for critical feedback).

This is an absolute nightmare scenario for any writer, but it could have been so much worse. In 2021, “Mark,” a stay-at-home dad, sought telemedicine advice for his young son’s urinary tract infection (this was during the acute phase of the covid pandemic, all but the most urgent medical issues were being handled remotely). His son’s pediatrician instructed Mark to take a picture of his son’s penis and upload it using the secure telemedicine app.

Mark did so, but his iPhone was running Google Photos, with auto-synch turned on, so the image was also uploaded to his private Google Photos directory. When it arrived there, Google’s AI scanned the photo and flagged it for child sexual abuse material. Google turned the issue over to the San Francisco Police Department, and furnished the detective assigned to the case with all of Mark’s data — his location history, his email, his photos, his browsing history, and more.

At the same time, Google terminated Mark’s account and deleted all of their own copies of his data. His phone stopped working (he had been using Google Fi for mobile service). His email stopped working (he was a Gmail user). All of his personal records disappeared from his Google Drive. His Google Authenticator, used for two-factor authentication, stopped working. Every photo was deleted from his Google Photos account, including every photo he’d taken of his son since birth.


MP3

/ / Articles, News, Podcast

A Depression-era photo of a used car lot with three cars for sale. It has been hand-tinted. The sky has been replaced with a 'code waterfall' effect as seen in the credit sequences of the Wachowskis' 'Matrix' movies. All of the car headlights have been replaced with the hostile red eye of 'HAL 9000' in Kubrick's '2001: A Space Odyssey.'

This week on my podcast, I read The reason you can’t buy a car is the same reason that your health insurer let hackers dox you, a column from one of last week’s editions of my Pluralistic newsletter; it describes a monopoly pattern whereby companies execute a series of mergers to dominate a sector, leaving their IT systems brittle and tangled – and vital to the nation.


Just like with Equifax, the 737 Max disasters tipped Boeing into a string of increasingly grim catastrophes. Each fresh disaster landed with the grim inevitability of your general contractor texting you that he’s just opened up your ceiling and discovered that all your joists had rotted out – and that he won’t be able to deal with that until he deals with the termites he found last week, and that they’ll have to wait until he gets to the cracks in the foundation slab from the week before, and that those will have to wait until he gets to the asbestos he just discovered in the walls.

Drip, drip, drip, as you realize that the most expensive thing you own – which is also the thing you had hoped to shelter for the rest of your life – isn’t even a teardown, it’s just a pure liability. Even if you razed the structure, you couldn’t start over, because the soil is full of PCBs. It’s not a toxic asset, because it’s not an asset. It’s just toxic.

Equifax isn’t just a company: it’s infrastructure. It started out as an engine for racial, political and sexual discrimination, paying snoops to collect gossip from nosy neighbors, which was assembled into vast warehouses full of binders that told bank officers which loan applicants should be denied for being queer, or leftists, or, you know, Black


MP3

/ / Articles, News, Podcast

A photo of me from the summer of 2020, taken by Paula Mariel Salischiker for Rolling Stone Argentina. I'm sitting in a red leather armchair, talking with one hand held out. I'm wearing a Pirate Bay tee. The background has been replaced with the destop wallpaper that shipped with Windows XP. Over my left shoulder is a Microsoft Clippy with a yellow speech-bubble. In the bubble is EFF's DRM logo, a monstrous padlock and the letters 'DRM.'

This week on my podcast, I read my Microsoft DRM talk, first delivered 20 years and one day ago in Redmond, Washington. It was a viral hit in the nascent blogosphere and became a defining document in the fight against DRM.

Greetings fellow pirates! Arrrrr!

I’m here today to talk to you about copyright, technology and DRM, I work for the Electronic Frontier Foundation on copyright stuff (mostly), and I live in London. I’m not a lawyer — I’m a kind of mouthpiece/activist type, though occasionally they shave me and stuff me into my Bar Mitzvah suit and send me to a standards body or the UN to stir up trouble. I spend about three weeks a month on the road doing completely weird stuff like going to Microsoft to talk about DRM.

I lead a double life: I’m also a science fiction writer. That means I’ve got a dog in this fight, because I’ve been dreaming of making my living from writing since I was 12 years old. Admittedly, my IP-based biz isn’t as big as yours, but I guarantee you that it’s every bit as important to me as yours is to you.

Here’s what I’m here to convince you of:

1. That DRM systems don’t work

2. That DRM systems are bad for society

3. That DRM systems are bad for business

4. That DRM systems are bad for artists

5. That DRM is a bad business-move for MSFT


MP3

/ / Articles, News, Podcast

Three antique leather volumes on a shelf. They are three volumes of Codex Theodos Cum, labeled TOME 1, TOME 2, TOME 3-4. Taken at the Royal College of Physicians Library, Regent's Park, London, UK.

This week on my podcast, I read Against Lore, a recent piece from my Pluralistic blog/newsletter, about writing and the benefits of nebulously defined backstories.

Warning: the last few minutes of this essay contain spoilers for Furiosa. In the recording, I give lots of warning so you can switch off when they come up.


One of my favorite nuggets of writing advice comes from James D Macdonald. Jim, a Navy vet with an encylopedic knowledge of gun lore, explained to a group of non-gun people how to write guns without getting derided by other gun people: “just add the word ‘modified.'”

As in, “Her modified AR-15 kicked against her shoulder as she squeezed the trigger, but she held it steady on the car door, watching it disintegrate in a spatter of bullet-holes.”

Jim’s big idea was that gun people couldn’t help but chew away at the verisimilitude of your fictional guns, their brains would automatically latch onto them and try to find the errors. But the word “modified” hijacked that impulse and turned it to the writer’s advantage: a gun person’s imagination gnaws at that word “modified,” spinning up the cleverest possible explanation for how the gun in question could behave as depicted.

In other words, the gun person’s impulse to one-up the writer by demonstrating their superior knowledge becomes an impulse to impart that superior knowledge to the writer. “Modified” puts the expert and the bullshitter on the same team, and conscripts the expert into fleshing out the bullshitter’s lies.


MP3