Watching a new deepfake video I’ve embedded below was *very* sobering to watch this morning. It points out how incredibly far we’ve gone with deepfakes and, most importantly, how I found this one almost impossible to detect as a fake video.
The obvious tipoff this is fake is that both Cruise and Hilton look much younger than reality (because the fake actor & actress are actually much younger than the ‘real’ celebrities) but from a technology perspective I couldn’t detect this as a fake. Even the voices were spot-on.
The video is short and, because it was on TikTok and I was led to it by a Reddit post, decided to screen record on my iPad in order to capture it to embed here in this post (and I also wanted to keep this one as a major milestone deepfake).
I can’t even describe how deeply troubling this is as this deepfake capability will be weaponized politically and I shudder to think what will happen as the 2024 presidential election process begins. So instead of a critical-thinking baseball sized cap to wear, we’re all gonna need a ten-gallon cowboy hat going forward!
Ten days ago I decided to replace my aging 27″ iMac Pro with the 14″ model of the new MacBook Pros for 2021. Knowing that my needs have changed, and my preference was to have a laptop that I could take anywhere with me as I traveled around, I opted for one of the new machines and the 14″ model was the perfect size.
But how much memory would I really need? I’ve always purchased as much RAM as I could afford, but these new M1-based CPUs are so efficient, I knew I could probably get by with less. Plus, the two Apple Geniuses I spoke with when in the store — who quizzed me about my needs at length — said I could easily get by with 16GBs of RAM and the Mac Pro version of the M1 CPU.
But I was not convinced…that is until I watched this video which, while not GeekBench like analysis, pushed me over the edge and convinced me to go with the 14″ model and only 16GBs of RAM…so I bought it that day:
I also picked up the LG 34WK95U ultrawide display along with a new OWC Thunderbolt 3 Dock and a fast Sandisk 4TB Extreme Pro SSD disk. I’ve got the perfect set up for what I need today, as well as for the next several years.
One more thing…
On Apple’s website they call these machines and their new M1 Pro CPU “scary fast” and the M1 Pro Max “scary faster.” I can attest to the fact that, now running this MacBook Pro 14″ in my own office with my apps and files on it, HOLY CRAP IS THIS THING FAST!
Photoshop used to open in about a minute. Now Photoshop opens in 6.5 seconds. It’s that way with all of my apps. Damn…is this thing ever fun to use.
So if you’re in the market for a new machine, I highly recommend it.
I’d be remiss if I did not bring to your attention to an accelerating trend sweeping over the web right now, and one I view as timely since our attention is being pulled in dozens of directions at once and there is simply too much content to consume!
The trend is called “Web Stories” and the buzzword used to describe them is that they are “tappable” stories that are bite-sized and easy to swallow. Tappable is an obvious reference to smartphones and tablets being the primary device target for these “story containers”, but I’ve also seen some good full-browser ones being delivered too (that look good on desktops, laptops, and mobile devices). I’ve yet to see a TV-delivered container, but it makes perfect sense and am sure we’ll see some soon.
As I’ve gone through numerous Web Stories, I’ve thought that they’d be great for “How To” tutorials, general learning content, fun stories of any type, or even a replacement for the meme-driven videos we see all the time (I should note that I’m growing weary of text over video that, once you tap to listen to the video’s audio, the text remains).
ABOUT WEB STORIES
The trend is called “Web Stories” and these stories are small, self-contained, encapsulated stories about a single topic. Creating them is leveraging AMP (Accelerated Mobile Pages) and is a big push for Google. Why? Because the cost to them of dealing with big, bandwidth-intensive web pages is extremely high. So for some time we’ve been seeing Google trying to figure out ways to make the delivery of web content smaller and faster and so AMP was developed.
The problem historically with AMP is that it didn’t offer a whole lot to the world so people didn’t do much with it. It was also a pain in the ass to use in a website and also to build web stories. But in 2020 the world has rapidly moved toward smaller, discrete “containers” of content that would be great on mobile and the tools have evolved too.
The other driver for AMP/WebStories are data caps by mobile providers that can increase cost of bloated websites. Even with a so-called “unlimited” mobile account, almost always there is a gigabyte (GB) “ceiling” for how much bandwidth a mobile network user can consume in a single month. Usually 22 or 23GBs in a monthly billing cycle, once a user goes past that amount their mobile data connection is “throttled” and slowed down significantly. Outside 1st tier economies in the world, data speeds are typically slower and mobile connections not as ubiquitous, which makes rapid delivery of encapsulated content like Web Stories even more compelling.
Others have recognized that smaller, discrete pieces of functionality are important as well. For example, WordPress fundamentally changed how the software’s back-end content creation was done with their Gutenberg approach to creating and editing content. Even Apple has delivered this same sort of concept with App Clips in iOS 14 so we don’t have to launch an app, wade through menus, only to perform one, discrete and simple task.
There is some concern though…
In January of 1993, I was attending the MacWorld expo in San Francisco. At a furious pace I was hustling down a hallway to get in to a ballroom presentation when, out of the corner of my eye, I spotted a magazine that looked pretty dang cool. It was the WIRED Premiere publication (issue 1.1) and I stopped dead in my tracks and picked one up.
Quickly leafing through it I instantly knew I’d found exactly the right publication for everything I was doing and thinking as it pertained to the future of technology! Ripping out the subscription card I immediately filled it out to subscribe.
I wish I could convey to you what a big deal this magazine was when it appeared, and how profoundly it covered the big ideas and the overall zeitgeist of that era which birthed the commercial internet, companies like Google and Amazon, and tapped in to the explosion of tech and its changes on the world.
The constant (and sometimes jarring) design, colors and layout choices were often disconcerting, but always pushed-the-envelope in keeping with what they were covering: emerging, disruptive and futuristic tech.
Looking back on that first issue now is also a bit amusing — and I wish I could link to a live copy online but cannot find one — but there is one advertisement I found particularly delightful from Apple, proudly touting the ability to fax from the Powerbook 170 which I just so happened to own at that moment:
For at least 15 years, Wired magazine was my tech-bible. I devoured each issue and learned a lot along the way, and have used the Wired iPad app to download and read each issue. Unfortunately there is so much tech writing online now, the magazine has become less relevant (dare I say “boring”?) and I reluctantly just cancelled my subscription which will expire with the February 2020 issue.
SOME WIRED TIDBITS
Here are some items you may find of interest:
- The Internet Archive has TechNation “internet radio show” (the term ‘podcast’ was not yet invented) and you can listen to Dr. Moria Gunn interview the founders of Wired magazine, Jane Metcalfe and Louis Rosetto, and it is very enlightening (This part of the show starts at 32:18). They discuss how “Wired” is different from its predecessors, addressing the complete societal impact of technology and its latest breakthroughs. Other topics include the phenomenal success of “Wired”’s premier issue and why the BBC is “wired” while National Public Radio is “tired.”
- Wired 1.1: An Archaeology: Good blog post that breaks down what was contained within the premiere issue.
- Revisiting the Original 1992 WIRED Media Kit: This was sent to potential advertisers well before the publication of the premiere issue.
- Lastly, here is the Wired Magazine Promo Reel from the lead-up to the premiere issue that I found at the Internet Archive (which, by the way, I have always found to be THE best resource for anything digitally significant from history):
When my first-born daughter Liz was a toddler, I was hoping I’d be able to guide her towards becoming a techie. No pushing and no pressure was what I tried to achieve. Instead I tried to be a coach to her, gently showing her how stuff worked while striving to make it fun.
One of the ways I introduced her to technology was through games. There was a HyperCard ‘stack’ game — released at MacWorld in 1989, which I bought there, called Cosmic Osmo — and we played it often. She was always delighted to play it and asked to do so whenever I was on my Mac SE/30.
HyperCard was amazing and I learned how to build my own stacks. I built one with sounds I created in SoundEdit, and when any button on the stack was clicked, it would play that sound. I loaded as many funny sounds as I could find (along with the ones I recorded myself, including my daughter’s own voice) and she LOVED clicking on the buttons to trigger the sounds!
Fast forward to today and she definitely became very technically astute. She worked for the Apple Store for five years during college and just afterwards, at Best Buy (where she moved to corporate in to human resources), and every time I’m with her I learn some new tip or trick with my iPhone. The best part is that she grasps technology instantly and I hope I had some influence on her in this way.
Here is a video from 1989 where we are in my home office, she is sitting on my desk, and we talk about “Osmo” and I record her voice with SoundEdit:
Alex Begins His Technology Adventure
In 1994 our son Alex was born and he took technology like a duck to water. For him it was all about play, which fit perfectly in to my goal extending to him when it came to making the use of technology fun.
By this time Liz was well on her way toward her belief that technology was a seamless and integral part of our lives. She became a patient and encouraging tech-coach to her little brother. He wasn’t much interested in what Mom or Dad had to say about tech, but rather he watched, listened and allowed himself to be guided by his big sister. It was fun to watch!
In 1998 I was working at Apple in the business group after Steve Jobs came back, and had the chance to bring home the first iMac introduced and it had some built-in games, like the one they loved called Nanosaur.
Here’s a fun video of my kids using that first iMac at Thanksgiving, about three months after it was introduced:
We Have Come A LONG Way With Technology!
1) Holy buckets has technology advanced! When I watch these videos above (and the one below) and think about SoundEdit and a Mac SE/30, it’s just stunning how far we’ve come with computing technology, graphics, gameplay, sound, animation, and so much more.
Want to see what Liz and I experienced playing Cosmic Osmo on a Macintosh SE/30 with a 9″ screen? Here is a video of Cosmic Osmo’s click-to-trigger interface in HyperCard:
2) By the way, somehow I missed this Ars Technica article (30-plus years of HyperCard, the missing link to the Web) on May 25, 2019, but thought I’d add it to this post. In that article I learned about a way to goof around with HyperCard — this time by downloading Steam for your PC, Mac or Linux computer and actually introduced in 2010 — and, once you’ve installed it, you can load up an instance of HyperCard here.
Make Technology Fun
Whenever I’m asked about kids using technology too much, not enough, how to make it fun or educational, I always coach parents to limit screen time, always keep an eye on their kid’s use of tech, but most importantly make the use of it fun!
Having phones that are dozens of times more powerful than that previously mentioned Mac SE/30 and original iMac — along with Internet of Things devices that are inserting themselves in all parts of our lives — we all need to keep vigilant about how we use it. If you haven’t watched the Cosmic Osmo video above, view it now and see how laid-back, at-ease, and fun Cosmic Osmo is having with his out-of-this-world technology use. There’s a lesson there for all of us. 😉
I have to admit that I get irrationally angry when a major internet service provider like Cox does not allow true and complete management of one’s internet service online.
It’s easy to add a Cox service in my account, like I did when our son’s internet use threatened to push us over our 1 terabyte “cap” on our internet use (1 terabyte = 1,024 GBs). So I chose Cox’s “add-on” of 500GBs additional data. Doing so ensured I wouldn’t have to pay their $10 per 50GBs overage cost.
We were on a run-rate to be closer to 1,400 GBs and it was much cheaper to pay the add-on cost of $29.99 for 500 GBs, instead of the $75 it would have cost as an overage for the possible 376 GBs additional data we would likely have used.
But now that our son has moved to Santa Monica for a job, our data use has plummeted and is well under that 1 terabyte ceiling.
So this morning I went online to Cox and discovered — just like Comcast did in the State of Minnesota we left last June — the only way to cancel or remove an add-on or service is … you guessed it … to call a human in their respective billing departments.
Yes, I know this is so they have an opportunity to convince us to keep the service or add-on. To have a chance to upsell us on new services. BUT I AM SICK OF THE GAME and just want to do what I do with my Schwab brokerage accounts, Wells Fargo banking accounts, and the myriad of other services I use that “get it” when it comes to allowing FULL MANAGEMENT OF ONE’S ACCOUNT ONLINE.
So Cox, Comcast and others … quit the bullshit games and pretend like you understand the internet, the web, and how it works. All you do is piss off people like me who see right through your veiled attempts.
Around 1971 our neighbor across the street, Tom Thiers, pulled up in his bright blue Chevrolet Camaro. As a 16 year old kid close to getting my own car, I rushed across the street to talk to him and check-out the new car (new to him as it was a used 1st generation Camaro).
Tom was not much older than me so I blurted out, “How could you afford that car?” Sitting like a cool guy in the driver’s seat, he slid down his sunglasses and said, “Because I’m now working in the field of computers.”
You see, Tom had gone to work at Control Data Corporation (CDC), the mainframe and supercomputer firm, which Wikipedia states was “…one of the nine major United States computer companies through most of the 1960s; the others were IBM, Burroughs Corporation, DEC, NCR, General Electric, Honeywell, RCA, and UNIVAC.”
As a guy who grew up knowing so many people who worked at Remington Rand’s ERA, Control Data, Cray Research, at the University of Minnesota Supercomputer Center — and was endlessly fascinated by computing — it was obvious to me that I’d end up working my entire career in technology.
At the same time I feel a great sense of sadness on what did not happen in Minnesota when it comes to the evolution of computing toward minicomputers, workstations, then personal computers, and finally all the devices we use today with computing chips in them like smartphones, tablets, Internet of Things devices, and much more. My home state could easily have become the dominant place where the future was invented.
Here are a few short videos you might enjoy:
Do you use social login? How about for remote access to your home WiFi router when you’re not at home? Unless you have good password practices and multi-factor authentication, I recommend you do NOT enable remote access of any kind, and maybe consider never using social login ever again.
I am very pleased with our Amplifi Mesh Wi-Fi System installation but have one security-related issue: For remotely logging in to the router from my smartphone, the remote-access, social login credentials are only ones from two providers: Google and Facebook.
While implementing social login is far easier for developers than building a custom login solution — and social login is often assumed by them to be the path of least resistance since these big companies can protect user credentials better than a smaller company — that “big company is more secure” assumption has been proven false and highly risky:
- KREBS: Facebook Stored Hundreds of Millions of User Passwords in Plain Text for Years
- WIRED: The Security Risks Of Logging In With Facebook
- MEDIUM: It’s time for brands to reconsider social login
- TOM’S GUIDE: 100 Million Quora Accounts Hacked: What to Do
Use of social login also assumes that the user has excellent password practices and/or uses multi-factor authentication, which is usually not the case. So if the user doesn’t implement those best-practices when it comes to protecting their Google or Facebook logins, then Amplifi’s parent company, Ubiquiti, may feel they are off-the-hook in the event of a breach?
I would argue that a blackhat hacker obtaining a social login email and password is trivial (e.g., I can name twenty-five friends and family that have had social accounts hacked in to).
Unless the user has implemented multi-factor authentication, then those social login credentials could be used to gain access to a home WiFi router that use social logins for remote access.
I’ve added this suggestion on the Amplifi community forum to ask the company to have a Ubiquiti-driven login with multi-factor authentication, and in it asked these questions:
- What is your position on security and privacy where it comes to enabling Google and Facebook to potentially monitor outbound traffic from an IP address?
- As such, do you have a security/privacy white paper that outlines how you use the Google and Facebook social APIs, and specifically what you allow Google and Facebook to monitor? (like router IP address).
While I appreciate that our Amplifi Mesh Wi-Fi System is focused on simplicity first and granular level detail on security and privacy second, I’d like to see a public/private key, encrypted, Ubiquiti-delivered remote access login (where I hold both keys) along with multi-factor authentication … at a minimum.
After I switched from Google Chrome back to Firefox, I’ve never second-guessed my decision. Especially because I use Firefox Quantum: Developer Edition every day as well, but primarily it’s when something as cool and useful as Firefox Send debuts.
Mozilla, the non-profit behind the Firefox browser, just released Firefox Send and, even though I’d used the beta version some weeks ago, I tried the final released version just now.(Please note that the servers are slammed this morning so be patient as the Send app loads).
With Firefox Send you can share files up to 2.5 GBs in size through your web browser and they will be end-to-end encrypted to its destination.
To get started:
1. Go to https://send.firefox.com
2. In the upper right click “Sign in/up”
3. Create a Firefox account and activate it via the email sent to you
4. Go back to https://send.firefox.com and try uploading one or more files (up to 2.5 GBs, of course). You can choose to have the file(s) download expire after 1 – 100 downloads and/or by placing a time limit the download will be available of 5 minutes | 1 hour | 1 day | 7 days. Most importantly you can also protect the file(s) download with a password .
5. Once your up-to-2.5 GBs of file(s) are uploaded, you can copy the link to share with one or more people:
As I’ve been dubbed “Mr. Security” by my friends, family and clients (I pay significant attention to, and use, cybersecurity, privacy and software measures) but my pleadings with them to be secure often are ignored…until they get hacked. Then they plead with me to help them out and get their digital life on track. Usually it’s too little, too late, and the work to recover is enormous.
You should care deeply about your digital life and its security, especially since the risk of getting hacked is exploding! The World Economic Forum in its 2018 report (PDF) said blackhat hackers are gaining the upper-hand in cyber warfare…and they are coming after you…and even the experts can’t keep up:
“Offensive cyber capabilities are developing more rapidly than our ability to deal with hostile incidents.”
Here’s the good news: if you haven’t yet been hacked it’s likely you will at some point, so lets get you cyber secure NOW!
I was delighted this morning to discover this Security Checklist, “An open source checklist of resources designed to improve your online privacy and security. Check things off to keep track as you go.”
The Security Checklist is very comprehensive, easy to follow, and one you should look at and implement as quickly as possible. It gives you the “why” and specific resources to use for each category, making this pretty brain-dead-simple to follow and implement:
- Password Manager
- Create a strong device passcode
- Use two-factor authentication
- Set up a mobile carrier PIN
- Encrypt your devices
- Freeze Your Credit
- Use 126.96.36.199 for DNS resolution
- Use a VPN
- Cover your webcam
- Use a privacy-first web browser
- Use a privacy-first search engine
- Review app permissions on your devices
- Review your social media privacy settings
- Educate yourself about phishing attacks