Apple’s 1984 ad introducing the Macintosh in January of 1984 with Donald Trump in
the role of overlord, about to be overturned by a disruptor with a sledgehammer
Yeah…he’s scary and I’m disappointed he won too. But it was a close election with Clinton winning the popular vote with 59,943,009 votes (47.7%) and Trump with 59,705,048 votes (47.5%). We all now know that Trump won the should-now-be-abolished electoral college with 279 votes vs. Clinton’s 228 and he’s our (shudder) president-elect.
Turns out that the 47.7% who did NOT support Trump are quite unhappy about getting a clown as president and there are protests in the streets, uncertainty everywhere, and the circus will soon arrive in our nation’s capital.
Fortunately the 47.5% who DID vote for Trump are incredibly excited because “it was God’s will” (which they influenced ’cause they prayed a lot), they now have a shot to delete the Affordable Care Act, overturn Roe v. Wade, revert to marriage as “one man, one woman“, get rid of Muslims, Mexicans, Somalis, and anyone who doesn’t look like them, invest in the military so we can crush all global militaries 10 times over instead of just 7 times over, and make sure that “political correctness” dies like Trump would speaking to a group of millennials.
But hey…we’ve got nearly two months left before we have to go nuts against a Trump administration and fight what will certainly be the attempted execution of an old man’s vision for the United States of America.
Until then it’s time for a chuckle. Here are a few videos that will hopefully help you overcome your stunned disbelief:
If I was 25 years old right now I’d probably be feeling pretty hopeless. Is it any wonder everyone, including young people, are furious and feeling hopeless? But this post will focus on our children and the world they have already inherited and how they still have optimism about the future.
Right after September 11, 2001 I remember peeking in to each of my kid’s bedrooms before going to bed myself. Our daughter was 13 years old and son was about to turn 7 years old. After that devastating day I stood there saddened when considering the world they were going to inherit and I felt a twinge of hopelessness.
That feeling turned in to irritation and then anger as the months unfolded. I saw the 9/11 tragedy turned in to a justification for war, one where the slimmest amount of intelligence possible was used as justification for invading Iraq and Afghanistan.
From 2002 through 2008 I grew increasingly concerned as the Bush administration seemed to be bending the rules of intelligence with CIA ‘enhanced interrogation‘ and rendition, along with initiatives like Total Information Awareness (TIA). TIA was killed off but as we now know thanks to Edward Snowden’s revelations, any paranoia and concern I had at the time paled in comparison to what was really going on as the goals and objectives of TIA lived on.
Next came the global economic meltdown, inadvertently created by the financial services industry whose greed overshadowed their fiduciary responsibilities and destroyed the economy. A greed, I might add, that was fueled by the laissez faire attitude toward oversight and regulation by the GOP and Bush administration. The same administration that squandered a surplus while cutting taxes and going to war. According to The Center on Budget and Policy Priorities:
“If not for the Bush tax cuts, the deficit-financed wars in Iraq and Afghanistan, and the effects of the worst recession since the Great Depression (including the cost of policymakers’ actions to combat it), we would not be facing these huge deficits in the near term. By themselves, in fact, the Bush tax cuts and the wars in Iraq and Afghanistan will account for almost half of the $20 trillion in debt that, under current policies, the nation will owe by 2019. The stimulus law and financial rescues will account for less than 10 percent of the debt at that time.”
Add to all of this the student debt crisis. The Economist reported in June 2014 that U.S. student loan debt exceeded $1.2 trillion, with over 7 million debtors in default. Today, there is approximately $1.3 trillion of outstanding student loan debt in the U.S. that affects 43 million borrowers who have an average outstanding loan balance of $30,000.
Lastly we have the Wells Fargo controversies which have shown that even one of the most profitable, respected banks in the world is no better than a plaid-sports-coat wearing salesman hawking non-running used cars on some inner city lot.
How can we not all be FURIOUS and filled with RAGE? If I was 25 years old I’d be marching in the street, campaigning for Bernie Sanders, and doing whatever I could to change the system and make a wholesale change in Congress.
Unless you’ve been traveling in space for the last few years, you obviously know all about the mass surveillance by the National Security Agency and Edward Snowden‘s revelations, as well as the continued acceleration in security hacks globally.
Besides using a virtual private network (VPN) when you are on public Wifi (here is why a VPN is extremely important), I’ve found the simplest method for my family, friends and even clients is to use a super-secure, open source app on our phones called Signal by Open Whispher Systems.
Even non-geeks know that email is laughingly insecure, which is why this app is so important and how I use it:
a) My bookkeeper sends me important, private information over the Signal app.
b) I have clients send me passwords and credentials for their services.
c) Several of my friends and family members I’m connected to use Signal to send me messages that need to be secure. We often share items like passwords, especially when I’m helping one of them with some website or online application requiring me to login.
c) But what really sold me on Signal was when my wife was on a recent business trip to Hong Kong. Her hotel’s Wifi was set up to disallow the use of VPNs so she was not able to set up a secure, encrypted channel. This is because of what is euphemistically called the great firewall of China which the country uses to restrict what their citizenry has access to outside of China.
So my wife and I connected on Signal and, because the system has both private messaging and voice calling, we knew we would be secure and assured that some Chinese government flunky wasn’t eavesdropping on our messages or listening-in on our calls.
As I’d mentioned, Signal boasts highly secure private messaging using end-to-end encryption. In fact, the Signal protocol (the underlying technology) is being used by WhatsApp (though there are other insecurity issues with the app so I do NOT recommend using it). As of this writing, all other messaging apps (yes, even Apple’s Messages) have good security layers, but some are still accessible by the NSA’s warrantless surveillance activities, law enforcement, or possibly a system administrator at the app company.
End-to-end encryption (especially the way Signal implements it) means NO ONE can eavesdrop on your messages. Same thing with phone calls made via Signal due to its quality. When my wife and I were talking over Signal between Minnesota and Hong Kong I was pleasantly surprised with the quality of those calls while using the app on our iPhones (Signal is available for both iPhones and Android phones). It was better than if we had been talking over mobile connections (she was on good Wifi in her hotel, but often other voice-over-internet-protocol (VoIP) phones like the insecure Skype don’t sound very good).
SIGNAL FOR THE DESKTOP
Once you start using Signal you will probably come to the realization (like most Signal users do, I suspect) that it would sure be great to be able to use Signal on the desktop. Well now you can!
Signal is now an app for Google Chrome, the browser I use every day (Note: it does require that you have already set up Signal on your smartphone). Besides the computer version of Chrome, I also have two colleagues that use Chromebooks and now can use Signal on them.
You can connect the Chrome app with your smartphone’s Signal app by opening the app and instantly scanning a QR code. Once done you are connected and can even have your smartphone’s Signal app contacts imported in to your desktop version.
This is so easy to use and so secure that there really is no reason why you shouldn’t be using Signal right now.
Just after the horrific tragedy of 9/11, I began to see quite disturbing things unfolding in the U.S. in the name of “security” that was (in my, and many other’s, minds) clearly trampling on the Constitution. Most of my friends teased me for several years about wearing a “tinfoil hat” to shield my brain, but then Edward Snowden came on the scene, ensuring that the unconstitutional domestic surveillance underway by the National Security Agency (NSA) was exposed.
While I was (and am) less disturbed by some of the global spying activities the NSA is performing—other than egregious hacking of world leaders’ mobile phones and such—there is no question that making U.S. citizens aware of the extent of the domestic spying was the first wake-up call for those ignoring the signs of the obvious, disturbing and unconstitutional activities going on.
After essentially reading every single news article and snippet about what Snowden (and others, I might add) have released to date, yes I believe Snowden did the world a great service and is a patriot. No, I don’t think he will get a pardon (yet) since it’s still too early on and Congress has not yet bothered to rein in the NSA in any meaningful way with regard to domestic spying.
The U.K. news organization The Guardian has an entire section called the NSA files which is likely the most comprehensive compendium of items sparked by Snowden’s whistleblowing document release. It’s a bit daunting to wade through, so I was intrigued this morning to see that Business Insider just compiled this bullet-point list of items Snowden had provided to select journalists that were released between 2013 and 2014. It’s pretty amazing to see them listed and realizing just how profound were these leaks and, in my view, extremely important.
Here are just a handful of those links just to get you started:
- The NSA accessed and collected data through backdoors into U.S. internet companies, such as Google and Facebook, with a program called Prism. — June 6, 2013
- The NSA has a program codenamed EvilOlive that collects and stores large quantities of Americans’ internet metadata, which contains only certain information about online content. Email metadata, for example, reveals sender and recipient address and time but not content or subject. — June 27, 2013
- Internal NSA document reveals an agency “loophole” that allows a secret backdoor for the agency to search its databases for U.S. citizens’ email and phone calls without a warrant. —Aug. 9, 2013
- The NSA broke privacy rules thousands of times per year, according to an internal audit. —Aug. 15, 2013
- Expanding upon data gleaned from the “black budget,” the NSA is found to be paying hundreds of millions of dollars each year to U.S. companies for access to their networks. — Aug. 29, 2013
That’s right….weak. Virtually every single cryptography expert on the planet knows that a force-mandated “backdoor” in software or devices will not work and will make the systems vulnerable to attack by black-hat hackers or state-run military cyberattacks.
Today’s Wall Street Journal had this front-page article, “Paris Attacks Fuel Debate Over Spying – Growing belief that terrorists behind assaults used encrypted communications prompts re-examination of U.S. policy on surveillance.” A few things from the article leapt out at me:
“A growing belief among intelligence officials that the terrorists behind Friday’s Paris attacks used encrypted communications is prompting a far-ranging re-examination of U.S. policy on data collection and surveillance.”
No kidding. Anyone on this planet with intermediate technical skills can encrypt their communications.
Sen. Richard Burr (R., N.C.), chairman of the Senate Intelligence Committee, said Tuesday his panel will launch a review of encryption use. “It is likely that end-to-end encryption was used to communicate in Belgium and France and Syria,” Mr. Burr said. He said encryption was likely because no direct communication among the terrorists was detected.”
Really Senator? Maybe they met in person?
It was happenstance today that led me to the Google Cultural Institute, an online place to “Discover exhibits and collections from museums and archives all around the world. Explore cultural treasures in extraordinary detail, from hidden gems to masterpieces. Create your own galleries and share favorite finds with friends.”
While I ate lunch I viewed ‘exhibits’ and took virtual tours of:
- Anne Frank: Her Life, Her Diary & Her Legacy
- History of Ford’s Theatre (site of Abraham Lincoln’s assassination)
- The Fall of the (Berlin) Wall
- Computer History Museum
- Life Magazine Photo Collection
- and many more.
Though I’m quite astute with the web and user interface design, I struggled a bit with how the site’s collections were displayed. Most troubling was my inability to find that opening page again for the Anne Frank exhibit. I had to go back to my browser’s history to find the first page! It’s not as intuitive as it should be.
But that lacking ease-of-use is outweighed by the value inherent in these collections. All I could think of as I went through many of them was “Wow!”. Give it a try yourself.
The only way you can guarantee your privacy while using a computer or mobile device, is to just disconnect them from the network. Or become a security expert. But if you must be online and want (or need) to be as secure as possible, you won’t want to use Google’s Chrome or Mozilla’s Firefox browsers until you make some changes since your IP address can be easily discovered.
You may know about (and already use, as I do) AdBlockPlus or Ghostery. These browser add-ons are used to block advertisements and also let you control who can track you by blocking services and advertisers from doing so.
So imagine how stunned I was to learn that the very cool and new WebRTC technology (for using video, audio and screensharing right inside your web browser) can leak your internet (IP) address.
Advertisers, and tracking services, love to set tracking cookies that map to your IP address. Then they can follow you around as you use that browser to surf the internet. Intelligence agencies love to discover the IP address of someone since they then can go right to the spot from where they’re connecting.
This flaw in WebRTC is especially troublesome since it would compromise someone whistleblowing, in a country with an oppressive regime in power, businesses communicating online with WebRTC, or anyone legitimately wanting their online activities to be private…especially when they believe they are safe while using a VPN.
That IP address leakage is bad enough, but what is worse is that your IP address leaking is NOT able to be detected by any current plugins (e.g., Ghostery) or even the developer tools in Google’s Chrome or the Mozilla Firefox browsers (the primary ones that support WebRTC currently).
ThreatPost has this excellent article on this leak problem:
A recently publicized hole in WebRTC, a protocol for web communication, is revealing the local IP addresses of users, even those who go to extra lengths to hide theirs by using a virtual private network.
Daniel Roesler, a San Francisco-based researcher who’s dabbled in encryption, posted a demonstration on GitHub last week to illustrate how the vulnerability works.
Of course, you shouldn’t be doing anything online—even if using a VPN—that’s illegal like pirating movies or music, or buying stuff from a drug ecommerce site like Silk Road. But be especially careful if you are in a country, or situation, that means your life might be in danger if you are caught communicating using something like WebRTC.
How to Disable WebRTC
- To disable WebRTC, go to
- Or install this Firefox add-on
- Bad news? You CAN’T turn off WebRTC on desktop version of Google Chrome.
- Good news? Install this Chrome Extension: WebRTC Leak Prevent
Love how he can wrap very serious content with enough funny stuff to keep us paying attention…and understanding what’s coming is exactly what we all need to do (and yes, that includes you):
If you care about American education, our kids and our future, you should take a few minutes to read one of the best defenses of a liberal education I’ve read in a long while.
The article by Fareed Zakaria in his Washington Post column, Why America’s obsession with STEM education is dangerous, argues that a liberal arts education
Mr. Zakaria starts of with an understanding that most of us agree that the current state of education in the United States is flawed. That education is a critical precursor driving our ability to compete in the world, and that America’s seeming defocus on science, technology, engineering and math (STEM) is at the root of our nation’s perceived competitive decline in the world.
What does this have to do with Steve Jobs?
Reading the German publication Der Spiegel’s article called Prying Eyes: Inside the NSA’s War on Internet Security this weekend, like them I was struck by something that has been on my mind for over ten years. Why does the U.S. intelligence services, and specifically the National Security Agency (NSA), do more to protect the nation?
What came out in the Edward Snowden revelations was that the NSA is, without question or doubt, working feverishly to crack all encryption and are also working hard to build a quantum computer that will crack the little unbreakable encryption we still enjoy today.
Any of us in information technology, web or mobile app creation, and any sort of data security at all, know that if something has been cracked—regardless if it’s some kid in Norway or a state-based intelligence service—it is only a matter of time before the blackhat hackers discover it and exploit the crack.