Celebrating Mr Tom

Photograph by Tillers1

The only sport I’ve ever really loved is golf, so there was a special poignancy for me in the outcome of the 149th British Open today. I badly wanted Tom Watson to win, not just because of the wonderful way he played over the four days, or because he’s nearly as old as I am, but because he was a hero of my golf-obsessed youth. He came sooooo close to pulling it off, and the way his second shot to the 18th ran off the back of the green and lodged in the half-cut grass was nothing short of tragic. The play-off was cruel because he was understandably disheartened by the fact that he had — literally — thrown away the chance to equal Harry Vardon’s record of six Open wins, and also because he was clearly exhausted — hardly surprising after 72 holes of nerve-wracking competitive golf.

One thing I loved about this year’s event was the way the Turnberry links tamed the world’s finest players. Links — i.e. seaside — courses are wonderful because they are never static: a slight change in the wind can transform a straightforward hole into a nightmare of distance, hollows and cavernous bunkers with precipitious sides. And the rough at Turnberry defied description. I’ve never seen so many first-class players having to hunt for lost balls — a rare reminder for them of what life is like for ordinary mortals.

One good joke emerged from the commentary.

Q: What’s the difference between praying in church and praying on a golf course?
A: On a golf course you really mean it.

Churlishly, I was rather pleased that Tiger Woods failed to make the cut. He’s obviously a great golfer, but somewhat deficient in common humanity. At any rate, his interactions with the public have a clinical air, and he often displays a kind of sulky petulance when his expectations — either of himself or of a particular course — aren’t met. One suspects that the softest part of him is the enamel on his perfect teeth. Tom Watson is, like Jack Nicklaus, a real, accessible, gentlemanly human being. He was very dejected after the play-off, but at the award ceremony his good-humoured courtesy was much in evidence.

And like most Irishmen I’ve loved him ever since he said that his favourite golf course in all the world was Ballybunion in Co. Kerry, which is a course I knew well in my childhood because my father was a member there and I often caddied for him — and later played the course myself.

Orwell, Amazon and the downsides of tethered devices

With my Open University colleagues Martin Weller, Simon Rae and Doug Clow I’ve just finished an experimental online reading group aimed at exploring ways of encouraging ‘deep reading’. It’s aimed at people who are interested in ideas but find it difficult to find time to do anything other than skim-read serious books. The project is based on the idea that “if a book is worth reading then it’s worth reading well”. The first book we chose for the exercise was Jonathan Zittrain’s The Future of the Internet: And How to Stop it, a central theme of which is the dangers to ‘generativity’ (i.e. technology-enabled creativity) posed by tethered devices like the iPhone.

As far as I remember (I can’t locate my copy of the book just now), Zittrain doesn’t mention the Amazon Kindle, but — as we’ve seen in the last week — it provides a rather dramatic case study. I’ve already blogged about this, but the FT’s Richard Waters has posted a striking comment which makes the point well.

Amazon’s woeful decision to delete unauthorised copies of 1984 and Animal Farm from its customers’ Kindles hammers home an uncomfortable lesson.

The idea that you can “own” digital data, in the same sense that you can own a book, was always suspect. But at least some forms of digital media have conveyed many of the attributes of ownership. With local storage, the bits have been delivered onto a device that you can unplug and put in your pocket. The information, at that point, is “yours”.

Unless the device in question is a Kindle. Once connected to Sprint’s Whispernet (now that’s a name George Orwell would have appreciated) Amazon can (and did) reach in and delete it.

New internet media platforms like this raise a dilemna. Their owners have the power to control information on the client. So if they have a legal responsibility to remove data from their systems – say, after receiving a take-down notice under the DMCA – failing to expunge it may expose them to liability.

That seems to be the conclusion Amazon came to. The outcry this has caused has now led it to promise to be less intrusive in future, though it has failed to say how it will act the next time around.

Operating systems designed for the Web, like Chrome OS, take this further. With no local storage, nothing can ever be owned, only rented…

Yep. And that’s why anyone who thinks that the future belongs to eReaders is what Lenin had in mind when he coined the phrase “useful idiot”.

LATER: One of the participants in our online reading group sent us a link to this Bookseller article which draws attention to an interesting point made by the New York Times which reported that

Amazon’s actions were at odds with its published terms of service agreement for the Kindle that does not appear to give the company the right to delete purchases after they have been made. It says Amazon grants customers the right to keep a “permanent copy of the applicable digital content”. Retailers of physical goods cannot, of course, force their way into a customer’s home to take back a purchase, no matter how bootlegged it turns out to be. Yet Amazon appears to maintain a unique tether to the digital content it sells for the Kindle, the NYT noted.

The Bookseller reports that Amazon would now be altering its policy so that it could block illegal copies, but not take back copies innocently downloaded by customers. “We are changing our systems so that in the future we will not remove books from customers’ devices in these circumstances,” a spokesman said.

Anatomy of the Twitter Attack

TechCrunch has a riveting account of how Twitter’s security was compromised. It’s a salutary tale of how an ecosystem of Web 2.0 services contains holes that an astute and tireless attacker can exploit. The Summary reads:

1. HC [Hacker Croll, the culprit] accessed Gmail for a Twitter employee by using the password recovery feature that sends a reset link to a secondary email. In this case the secondary email was an expired Hotmail account, he simply registered it, clicked the link and reset the password. Gmail was then owned.

2. HC then read emails to guess what the original Gmail password was successfully and reset the password so the Twitter employee would not notice the account had changed.

3. HC then used the same password to access the employee’s Twitter email on Google Apps for your domain, getting access to a gold mine of sensitive company information from emails and, particularly, email attachments.

4. HC then used this information along with additional password guesses and resets to take control of other Twitter employee personal and work emails.

5. HC then used the same username/password combinations and password reset features to access AT&T, MobileMe, Amazon and iTunes, among other services. A security hole in iTunes gave HC access to full credit card information in clear text.

6. Even at this point, Twitter had absolutely no idea they had been compromised.

What could have happened next is that Hacker Croll could have used or sold this information for profit. He didn’t do that, and says he never intended to. All he wanted to do, he says, was to highlight the weaknesses in Twitter’s data security policies and get them and other startups to consider more robust security measures.

It’s made me think hard about the approach I take to granting access to Web 2.0 services.

Twitter puzzles

This tweet by Rory Cellan-Jones sent me to Twittercounter, which produced this chart:

Suggests that something strange is going on. Compare, for example, with the chart for my account, which accurately reflects data coming from email notifications from Twitter.

Hmmm… Is a spambot signing up ‘followers’ of Rory?

LATER: Now he’s back to his original track.

Which suggests that there’s something wrong with Twittercounter?

Moral: put not your faith in these statscounting services.

A Tale of Two Stores

This morning’s Observer column.

The prospect of Microsoft and Apple stores side by side is rich in comic possibilities. For one thing, what will the Microsoft store sell? It's a software company: its hardware range consists of the Xbox games console, some keyboards and mice, and the Zune music player – which, compared with the iPod, looks like something produced by the Soviet Union in its heyday. But a retail store needs exciting hardware to attract people in off the street and create a buzz.

Stand by, then, for a new range of viral ads from Apple. A Tale of Two Stores, perhaps. One establishment is crowded with teenagers browsing Facebook and trying to get off with one another, watched by benevolently smiling, T-shirted geeks. The other is a deserted cavern, rather like one of those Sony outlets, in which dispirited chaps in ties try to interest passing tramps in the new features of Office 2009. YouTube here we come!

Is Crowdfunding the Future of Journalism?

Useful survey of different ways of searching for a sustainable business model.

Crowdfunding, or getting many people to donate small amounts of cash to fund a project, startup, or service, is nothing new. Think public radio or television pledge drives. Think political campaigns. Think tip jar. Now, as the media landscape changes and traditional revenue sources are beginning to disappear, some forward-thinking journalists and entrepreneurs are starting to apply the crowdfunding concept to the news. A new crop of sites are combining crowdfunding with volunteer and professional contributions in order to source news that people want to read.

There are two issues with crowdfunded sites that also have volunteer journalists, however: who’s going to pay for it and who’s going to write it. These sites are experimenting with ways of answering these questions….

And that’s the way it is…

… as Walter Cronkite used to say when signing off the nightly news.

Iconic anchorman Walter Cronkite, a pioneer in television broadcasting once dubbed The Most Trusted Man in America, died Friday, his family said. He was 92.

As anchorman of ‘CBS Evening News’ from 1962 to 1981, Mr. Cronkite elevated the role of television news presenter from a script reader to that arbiter of truth called an anchorman.

Noted broadcaster Walter Cronkite died Friday at the age of 92. Known as “Uncle Walter” and sometimes as the conscience of America, Cronkite covered World War II, Nuremberg, the moon landing, Vietnam and scores of other major historical events during his long and storied career.

The term originally signified his role as tether to a far-flung news crew, but Mr. Cronkite imbued it with new gravitas. His Middle-American warmth — he once likened himself to “a comfortable old shoe” — led to an equally popular nickname, Uncle Walter. He became famous for his nightly sign-off, “And that’s the way it is.”

[Source.]

Needless to say, his Wikipedia entry has already been updated.

The Future of Reading (A Play in Six Acts)

Remarkable, thought-provoking post by Mark Pilgrim on the Orwellian overtones of the Amazon Kindle.

LATER: Right on cue comes this story from the New York Times:

In George Orwell’s “1984,” government censors erase all traces of news articles embarrassing to Big Brother by sending them down an incineration chute called the “memory hole.”

On Friday, it was “1984” and another Orwell book, “Animal Farm,” that were dropped down the memory hole — by Amazon.com.

In a move that angered customers and generated waves of online pique, Amazon remotely deleted some digital editions of the books from the Kindle devices of readers who had bought them.

An Amazon spokesman, Drew Herdener, said in an e-mail message that the books were added to the Kindle store by a company that did not have rights to them, using a self-service function. “When we were notified of this by the rights holder, we removed the illegal copies from our systems and from customers’ devices, and refunded customers,” he said.

This day…

… in 1946 was a Thursday. How do I know this? Why, I asked WolframAlpha. It’s the kind of thing it knows.

It was also the day in 1936 when the Spanish Civil War began as General Franco led an uprising of army troops based in North Africa.

A wilderness of mirrors

From today’s NYTimes..

It is an axiom that “on the Internet nobody knows that you are a dog.”

By the same token, it is all but impossible to know whether you are from North Korea or South Korea.

That puzzle is plaguing law enforcement investigators in several nations who are now hunting for the authors of a small but highly publicized Internet denial-of-service attack that briefly knocked offline the Web sites of some United States and South Korean government agencies and companies.

The attack, which began over the Fourth of July weekend and continued into the next week, led to South Korean accusations that the attack had been conducted by North Korean military or intelligence agents, possibly in retaliation for new United Nations sanctions. American officials quickly cautioned that despite sensational news media coverage, the attacks were no different from similar challenges government agencies face on a daily basis.

Cyberwarfare specialists cautioned this week that the Internet was effectively a “wilderness of mirrors,” and that attributing the source of cyberattacks and other kinds of exploitation is difficult at best and sometimes impossible. Despite the initial assertions and rumors that North Korea was behind the attacks and slight evidence that the programmer had some familiarity with South Korean software, the consensus of most computer security specialists is that the attackers could be located anywhere in the world.

“It would be incredibly difficult to prove that North Korea was involved in this,” said Amrit Williams, chief technology officer for Bigfix, a computer security management firm. “There are no geographic borders for the Internet. I can reach out and touch people everywhere.”

This is the back-story to the post by Mark Anderson that I blogged earlier in the week.