The phablet controversy

iPad_Mini

Wading through the throng in an Apple store the other day, I had a look at the new iPhones. The iPhone 6 didn’t seem much of an advance on my 5s, but the even-bigger one, the 6 plus, seems odd. It’s far too big to be a credible phone, but too small to be a useable tablet. So why, one wonders, will people buy it?

One answer, I suppose, is that people buy preposterously large Samsung phones, even if they do wind up holding something the size of a dinner plate to their ears. (Or making calls surreptitiously, using headphones.)

Ages ago, I bought an iPad Mini with a SIM card for writing on the move, and kept my phone for texts and the occasional voice call. The Mini has turned out to be one of the most useful gadgets I’ve ever owned. Just big enough to be useful; just small enough to slip into a jacket pocket. The new iPhone isn’t a persuasive argument for abandoning that system. It ain’t broken, so I won’t be fixing it.

Hong Kong: two countries, one system

From Larry Lessig, commenting on the way the demonstrations in Hong Kong are being ‘policed’:

But this time, please, without the self-defeating trope that somehow this is a Right/Left issue. It is not. This is a Right/Wrong issue. It is wrong to allow a democracy to be captured by a tiny fraction of cronies. It is wrong here. It is wrong in Hong Kong. It is the democracy that Boss Tweed birthed (“I don’t care who does the electing, so long as I get to do the nominating.”) Which is to say, is the latest stage of a fundamentally corrupted democracy.

We should all stand with the students who launched the Hong Kong protests. And we should pray that it doesn’t become hijacked by violence — since this is China (Tiananmen) and because it is only ever nonviolent social movements that achieve the critical mass of support needed to win (that’s the brilliant conclusion of Erica Chenoweth’s work).

And the system is rotten to the core.

So is it good to talk… again?

This morning’s Observer column.

To the technology trade, I am what is known as an “early adopter” (translation: gadget freak, mug, sucker). I had a mobile phone in the mid-1980s, for example, when they were still regarded as weird. It was the size of a brick, cost the best part of a grand and exposed me to ridicule whenever I took it out in public. But I didn’t care because the last Soviet president, Mikhail Gorbachev, used the same phone and he was cool in those days. Besides, it had always seemed absurd to me that phones should be tethered to the wall, like goats. I still have that Nokia handset, by the way: it sits at the bottom of a drawer and I sometimes take it out to show my grandchildren what phones used to be like.

Over the decades since, I have always had latest-model phones – just like all the other early adopters. And of course I used them to make phone calls because basically that’s all you could do with those devices. (Well, almost all: one of mine had an FM radio built in.) And then in 2007 Steve Jobs launched the iPhone and the game changed. Why? Because the Apple device was really just a powerful computer that you could hold in your hand. And it was a real computer; its operating system was a derivative of BSD, the derivative of Unix developed by Bill Joy when he was a graduate student at Berkeley. (Note for non-techies: Unix is to Windows as a JCB is to a garden trowel.)

The fact that the iPhone could also make voice calls seemed, suddenly, a trivial afterthought. What mattered was that it provided mobile access to the internet. And that it could run programs, though it called them apps…

Read on

Privacy, remember, is only for criminals

So it begins. The next steps by the National Security state to ensure that nobody has the right to private communications or data.

FBI Director James Comey on Thursday said he’s bothered by moves by Apple Inc. and Google Inc. to market privacy innovations on smartphones that put some data out of the reach of police, saying agency officials have been in touch with both companies.

“What concerns me about this is companies marketing something expressly to allow people to place themselves beyond the law,” Mr. Comey said in a briefing with reporters, reports WSJ’s Brent Kendall.

Mr. Comey said he still wants to get a better handle on the implications of the technology, saying FBI officials have engaged in discussions with the companies “to understand what they’re thinking and why they think it makes sense.”

As WSJ earlier reported, officials in Washington have been expecting a confrontation with Silicon Valley in the wake of Apple’s announcement that its new operating system for phones would prevent law enforcement from retrieving data stored on a locked phone, such as photos, videos and contacts. Google has also said its next version of its Android mobile-operating system this fall would come with similar privacy protections.

This is where the mantra “if you’ve nothing to hide then you’ve nothing to fear” gets us.

And then there’s this from Down Under:

This week, Australian Prime Minister Tony Abbott used recent terrorist threats as the backdrop of a dire warning to Australians that “for some time to come, the delicate balance between freedom and security may have to shift. There may be more restrictions on some, so that there can be more protection for others.”

This pronouncement came as two of a series of three bills effecting that erosion of freedoms made their way through Australia’s Federal Parliament. These were the second reading of a National Security Amendment Bill which grants new surveillance powers to Australia’s spy agency, ASIO, and the first reading of a Counter-Terrorism Legislation Amendment (Foreign Fighters) Bill that outlaws speech seen as “advocating terrorism”. A third bill on mandatory data retention is expected to be be introduced by the end of the year.

Whilst all three bills in this suite raise separate concerns, the most immediate concern—because the bill in question could be passed this week—is the National Security Amendment Bill. Introduced into Parliament on 16 July, it endured robust criticism during public hearings last month that led into an advisory report released last week. Nevertheless the bill was introduced into the Senate this Tuesday with the provisions of most concern still intact.

In simple terms, the bill allows law enforcement agencies to obtain a warrant to access data from a computer—so far, so good. But it redefines “a computer” to mean not only “one or more computers” but also “one or more computer networks”. Since the Internet itself is nothing but a large network of computer networks, it seems difficult to avoid the conclusion that the bill may stealthily allow the spy agency to surveil the entire Internet with a single warrant.

Apart from allowing the surveillance of entire computer networks, the bill also allows “the addition, deletion or alteration of data” stored on a computer, provided only that this would not “materially interfere with, interrupt or obstruct a communication in transit or the lawful use by other persons of a computer unless … necessary to do one or more of the things specified in the warrant”. Given the broad definition of “computer”, this provision is broad enough to authorize website blocking or manipulation, and even the insertion of malware into networks targeted by the warrant.

Capping all this off, the bill also imposes a sentence of up to ten years imprisonment upon a person who “discloses information … [that] relates to a special intelligence operation”. Although obviously intended to throw the hammer at whistleblowers, the provision would apply equally to journalists. Such a provision could make it impossible for Australians to learn about the activities of their own government that infringe international human rights laws.