Created with Sketch.
78 minutes | Jan 21, 2022
Episode 96: Absolute Privacy Through Cryptography
Doc Searls and Katherine Druckman talk to Dave Huseby about privacy, cryptography, and authentic data. Reality 2.0 around the web: Site/Blog/Newsletter FaceBook Twitter YouTube MastodonSpecial Guest: Dave Huseby.Support Reality 2.0Links:Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems | The White House — This memorandum sets forth requirements for National Security Systems (NSS) that are equivalent to or exceed the cybersecurity requirements for Federal Information Systems set forth within Executive Order 14028 of May 12, 2021 (Improving the Nation’s Cybersecurity), and establishes methods to secure exceptions for circumstances necessitated by unique mission needs. Guess which government doesn't want you to use end-to-end encryption — From a privacy point of view, there is much to love about end-to-end encryption, as employed by the likes of WhatsApp. But while users may delight in the knowledge that their communication is free from surveillance, there are some groups that have a different opinion.I Got Access to My Secret Consumer Score. Now You Can Get Yours, Too. - The New York Times — Little-known companies are amassing your data — like food orders and Airbnb messages — and selling the analysis to clients. Here’s how to get a copy of what they have on you.Black Teen Kicked Out Of Roller Rink Over Face Recognition | News | BET — A face recognition-equipped Detroit roller rink reportedly kicked out a Black teen on June 10 after misidentifying her as a person who’d allegedly gotten into a fight there in March.The principles of user sovereignty | by 𝖉𝖜𝖍 | UX Collective — The first time I heard the phrase “user sovereignty” was while working at Mozilla on the Firefox web browser. Firefox ostensibly follows user sovereign design principles and respects its users. Mozilla has even baked it into their list of design principles on page 5 of the Firefox Design Values Booklet. But what does “user sovereignty” actually mean and what are the principles that define user-sovereign design?A Unified Theory of Decentralization | by 𝖉𝖜𝖍 | The Startup | Medium — All networks begin as only one thing; one neuron, one cell, one chip, one computer, or one user. One entity alone is not a network, but it is the starting point for understanding the unified theory of decentralization. One entity is fully sovereign, it has no connections to anything else that might influence or control it. One entity in isolation is empowered to act however it wants to strive for whatever results it seeks.The Web was Never Decentralized. Redecentralize the web is a fantasy | Design Warp — There are so many people today focused on “re-decentralizing the web.” They have a popular belief that when the web was invented it was a wonderfully optimistic vision of decentralization, governed by democratic principles and full of free information available through open access that all of humanity benefited from. They assume that originally all users of the web were well behaved and companies only wanted to help make the world better. Also, they think that somewhere along the line the web fell under the control of irresponsible corporations and governments and was contorted into the “broken and centralized” system that it is today.The Authentic Data Economy. Universal Digital Trust at Global Scale | by 𝖉𝖜𝖍 | Medium — All of us intuitively have a sense of what trust is and how to earn and maintain it as well as how to lose it. Trust never comes for free. The cost of earning trust is consistent trustworthy behavior over time. It forms our reputation in our social circles. But what happens when you have to do business outside of our personal social circles, such as with a new bank, or with a government agency far removed? How is trust established then? How is it transmitted to the distant institution to conduct business and how is it transmitted back? Over human history the solution has been to generate and keep official records about people and their activities. Some examples of official records are: Jane was born on this date, John earned his diploma from this university in this year, Judy received a license to practice medicine.Achieving Absolute Privacy. Cryptography Always Works, With or… | by 𝖉𝖜𝖍 | Medium — Absolute privacy on the internet is impossible, today. Why? Because nobody with the power to create it, wants it. The primary revenue model for the internet is based on surveillance making most investors aligned against privacy. Zero Architecture is the Way Forward | by 𝖉𝖜𝖍 | Medium — Inmy two most recent articles I discussed something called “Zero Architecture”. It is a new approach to designing decentralized systems using zero-trust security combined with business logic that operates entirely on zero-knowledge proofs — based on authentic data — and contains zero personally identifiable information. The primary motivation for this new way of thinking is building fully user-sovereign systems that automate regulatory compliance, drive out fraud, as well as eliminate surveillance capitalism and its attendant societal problems. 𝕿𝖍𝖊 𝕿𝖍𝖊𝖔𝖗𝖞 𝖔𝖋 𝕯𝖎𝖌𝖎𝖙𝖆𝖑 𝕲𝖆𝖙𝖊𝖘 | by 𝖉𝖜𝖍 | Medium — In computer systems it is common to construct digital gates around a service. The most common example is a username and password login gate that does a combination of authentication (i.e. verifying who is accessing the service) and authorization (i.e. what functions of the service can be executed). This approach for gating digital access is being blindly applied — without deeper contemplation — to vaccine passports and digital gates in the physical world with the explicit goal of denying people access to resources that were considered a human right as recently as this past spring. It is time to present a theoretical model describing the oppressive characteristics of naïve pervasive digital gating of real-world access and show why identity cannot be an input available to digital gates.
28 minutes | Jan 14, 2022
Episode 95: What Was Web 2.0?
Doc Searls and Katherine Druckman talk to Petros Koutoupis about Air Tags and the generations of the web. Reality 2.0 around the web: Site/Blog/Newsletter FaceBook Twitter YouTube MastodonSpecial Guest: Petros Koutoupis.Support Reality 2.0Links:Byway FAQ – Customer Commons — The Intention Byway—or Byway for short—is a way to move messages of intent between customers and companies, buyers and sellers, demand and supply, anywhere in any value chain or among a collection of participants. Its goal is to maximize the quality and volume of economic signaling by everyone and to expand the range of economic activity that can take place in a networked marketplace. Moxie Marlinspike >> Blog >> My first impressions of web3 — Despite considering myself a cryptographer, I have not found myself particularly drawn to “crypto.” I don’t think I’ve ever actually said the words “get off my lawn,” but I’m much more likely to click on Pepperidge Farm Remembers flavored memes about how “crypto” used to mean “cryptography” than I am the latest NFT drop. Also – cards on the table here – I don’t share the same generational excitement for moving all aspects of life into an instrumented economy. Even strictly on the technological level, though, I haven’t yet managed to become a believer. So given all of the recent attention into what is now being called web3, I decided to explore some of what has been happening in that space more thoroughly to see what I may be missing.Matt Mullenweg on Twitter: "People seem to be redefining Web 2.0 as Facebook, etc, that own data, but Web 2.0 at the time was platforms like WordPress, Odeo, Six Apart, Flickr, Technorati, and https://t.co/vlhR5g6fkg that had open data and interoperated. https://t.co/PXuZBaLbP2 https://t.co/sJJT8kyaJG" / TwitterWhat Is Web 2.0 - O'Reilly Media — The concept of "Web 2.0" began with a conference brainstorming session between O'Reilly and MediaLive International. Dale Dougherty, web pioneer and O'Reilly VP, noted that far from having "crashed", the web was more important than ever, with exciting new applications and sites popping up with surprising regularity. What's more, the companies that had survived the collapse seemed to have some things in common. Could it be that the dot-com collapse marked some kind of turning point for the web, such that a call to action such as "Web 2.0" might make sense? We agreed that it did, and so the Web 2.0 Conference was born.Apple AirTags being used to track cars and stalk victims, police warn — The Apple AirTag is a device created to help people keep track of their misplaced items. But the seemingly harmless tool is being used by some to track people and commit car thefts. As authorities investigate these incidents, the devices are raising privacy and security concerns.
50 minutes | Dec 10, 2021
Episode 94: The Fun Holiday Episode
Katherine Druckman, Doc Searls, Shawn Powers, and Kyle Rankin talk about everything from microphones to roombas to pottery in our last episode of 2021. Reality 2.0 around the web: Site/Blog/Newsletter FaceBook Twitter YouTube MastodonSpecial Guests: Kyle Rankin and Shawn Powers.Support Reality 2.0Links:Amazon.com: Heil Sound PR 40 Dynamic Cardioid Studio Microphone Bundle with PRSM Shock Mount (Black), Two-Section Broadcast Arm and Microphone Cable : Musical Instruments — Doc's mic.Amazon.com: Electro-Voice RE20 Microphone Kit with Shockmount, Two-Section Broadcast Arm and Microphone Cable : Musical Instruments — Shawn's mic.Blue - Yeti — Katherine's mic.The Great (TV Series 2020– ) - IMDbThe Repair Shop (TV Series 2017– ) - IMDbThe Great Pottery Throw Down (TV Series 2015– ) - IMDbSpot Plushie — Shawn’s furry creation.
56 minutes | Dec 3, 2021
Episode 93: Quad9 and DNS
Katherine Druckman, Doc Searls and Kyle Rankin talk to John Todd from Quad9 about DNS, privacy, security and their open DNS recursive service. Reality 2.0 around the web: Site/Blog/Newsletter FaceBook Twitter YouTube MastodonSpecial Guests: John Todd and Kyle Rankin.Support Reality 2.0Links:Quad9 | A public and free DNS service for a better security and privacy — Quad9 is a free service that replaces your default ISP or enterprise Domain Name Server (DNS) configuration. When your computer performs any Internet transaction that uses the DNS (and most transactions do), Quad9 blocks lookups of malicious host names from an up-to-the-minute list of threats. This blocking action protects your computer, mobile device, or IoT systems against a wide range of threats such as malware, phishing, spyware, and botnets, and it can improve performance in addition to guaranteeing privacy. The Quad9 DNS service is operated by the Swiss-based Quad9 Foundation, whose mission is to provide a safer and more robust Internet for everyone.Pi-hole – Network-wide protection — Instead of browser plugins or other software on each computer, install Pi-hole in one place and your entire network is protected.
55 minutes | Nov 19, 2021
Episode 92: The DIY Episode
Doc Searls, Katherine Druckman, Shawn Powers, and Kyle Rankin talk right to repair Apple devices, cocktails, and our nerdy hobbies. Reality 2.0 around the web: Site/Blog/Newsletter FaceBook Twitter YouTube MastodonSpecial Guests: Kyle Rankin and Shawn Powers.Support Reality 2.0Links:Everyone Is a Genius: Apple Will Offer Parts and Tools for DIY Repairs | iFixit News — Early next year, a previously impossible repair will be possible: you can buy an iPhone screen directly from Apple, use Apple’s repair guide (and tools, if you want) to install it, and have it fully work as intended, using Apple’s diagnostic software. And you won’t have to own an authorized repair shop to do it.Apple Self Service Repair Program | Right to Repair - Consumer Reports — In a major win for advocates, device owners and independent repair shops will soon have access to dozens of Apple parts, tools, and manuals—at the same price as authorized shopsApple (AAPL) Aims for Fully Autonomous Car - Bloomberg — Apple Inc. is pushing to accelerate development of its electric car and is refocusing the project around full self-driving capabilities, according to people familiar with the matter, aiming to solve a technical challenge that has bedeviled the auto industry. DIY Cocktails: A Simple Guide to Creating Your Own Signature Drinks: Marcia Simmons, Jonas Halpren: Amazon.com: Books — Black Rose, Blood Orange Tequila & Soda, Kentucky Apple Sour: the newest trend in cocktails is creating your own! Now, the editors of DrinkoftheWeek.com have concocted the only guide that teaches you to create your own infallible thirst-quenchers. Using a simple system of basic ratios, you will learn to: Mix new flavor combinations for the perfect new blend using the Flavor Profile Chart as a guide Master advanced mixology techniques from infusing liquors at home to creating custom-flavored syrups Serve the perfect drink every time, whether it kicks off a rowdy party or winds down a romantic evening! With only nine ratios to master, you'll shake, stir, roll, and build literally thousands of unique and exceptional cocktails. All you need is a good thirst, an active imagination--and this guide!Amazon.com: Mixology Dice® (tumbler) // Laser Engraved Wood Dice for Craft cocktail inspiration - Christmas gift, boyfriend gift, gift for him, gift for guys : Handmade Products — Whether you’re a newbie or a pro behind the bar, Mixology Dice will take your cocktail game to the next level. Along with providing seemingly endless inspiration (over 1.5 million combos!), this set of dice is actually a clever system for actually learning the art of mixology.Redwood Empire Whiskey - Our Whiskeys — The Northern California Coast is a unique place, one of the few in the world where giant redwood trees grow. A place of inspiration and renewal. This same cool climate makes it a perfect place to produce sublime whiskey. Aging barrels here allows for a slow and even extraction of flavor, producing a whiskey of exceptional balance and complexity. Taste what our Redwood Empire inspires.Gulden Draak, tremendous beer for titans | Gulden Draak — With its Gulden Draak, the Van Steenberge Brewery has brewed a beer that is as robust as the symbol of the dragon itself. It is a specialty beer with a fiery colour and unparalleled flavour and aroma. Gulden Draak has devoted fans throughout the world.xkcd: Sandwich
52 minutes | Nov 5, 2021
Episode 91: The Metaverse
Katherine Druckman and Doc Searls talk to Kyle Rankin about the metaverse of Facebook and beyond, how it may intersect with Web 3 and blockchain, as well as Second Life and the verses that came before. Reality 2.0 around the web: Site/Blog/Newsletter FaceBook Twitter YouTube MastodonSpecial Guest: Kyle Rankin.Support Reality 2.0Links:Snow Crash: Stephenson, Neal: 2015553380958: Amazon.com: BooksBuilding a Multibillion-Dollar Company in 18 Months (with Hopin’s Johnny Boufarhat) — Hopin is one of the fastest-growing startups in history. Founder and CEO Johnny Boufarhat joins Azeem Azhar to talk about how he grew the virtual events company from six employees in February 2020, at the start of the Covid-19 pandemic, to more than eight hundred, and a valuation of almost $8 billion, a year and a half later. Johnny explains how he seized the opportunity presented by the pandemic, what it was like learning to lead at one of the fastest-growing startups in history, and why he dreams of a future in which a founder’s location is no impediment to success.Nilay Patel on Facebook’s Reckoning With Reality—And the Metaverse-Size Problems Yet to Come | Vanity Fair — After a decade covering the Zucks, Googles, and Ubers of the scene, the Verge editor in chief reflects on tech’s troublesome relationship with the rest of the world.Facebook’s fatal flaws. Facebook is doomed. | by Doc Searls | Medium — Nobody can fix this. Facebook is doomed. True, all companies are mortal. (Geoffrey West has been telling us how and why for years.) But Facebook is actually designed to fail in a world that stops tolerating the way Facebook works, and can’t quit working.The Metaverse Was Lame Even Before Facebook - The Atlantic — It was terrible then, and it’s terrible now.
67 minutes | Oct 29, 2021
Episode 90: Can Facebook Be the Good Guy?
Katherine Druckman and Doc Searls talk to Shawn Powers and Petros Koutoupis about Facebook’s metaverse focus and whistleblower problems. Reality 2.0 around the web: Site/Blog/Newsletter FaceBook Twitter YouTube MastodonSpecial Guests: Petros Koutoupis and Shawn Powers.Support Reality 2.0Links:Exclusive: Facebook whistleblower Frances Haugen warns company's encryption will aid espionage by hostile nations — A Facebook spokesman said: “The reason we believe in end-to-end encryption is precisely so that we can keep people safe, including from foreign interference and surveillance as well as hackers and criminals.Scripting News: Facebook is us — The bullshit about Facebook keeps coming. It's not a fucking autocracy, it's a carrier. You could say everything you say about FB about a city like NY.(15) Post | LinkedIn — I've got a big Twitter thread with tons of screenshots from the unredacted docs between Facebook and GoogleBefore the “Whistleblowers” there were “Goodbye” posts: leaving #Facebook Engineering in 2016 because of #China, User Content, and #EndToEndEncryption – dropsafe — Before the “Whistleblowers” there were “Goodbye” posts: leaving #Facebook Engineering in 2016 because of #China, User Content, and #EndToEndEncryption In 2016 I quit the best job I ever had: the most impactful, the most challenging, and (yes) the best paid. I did so in part because of explicable burnout from shipping a radical product, but also and primarily because of a shift in Facebook’s company goals towards degrading user-experience for profit, and for experimentally building message-censorship infrastructure to offer-up as a gift and to show willing, for entry into the Chinese market.Eva on Twitter: "It is still a bad idea to idolize whistleblowers instead of focusing on the revelations the whistleblowers bring forward, but Frances Haugen says that her opinions on end-to-end encrypted messaging were misinterpreted and mischaracterized and e2e messaging is good, ok?" / Twitter — It is still a bad idea to idolize whistleblowers instead of focusing on the revelations the whistleblowers bring forward, but Frances Haugen says that her opinions on end-to-end encrypted messaging were misinterpreted and mischaracterized and e2e messaging is good, ok?My interview with Steven Levy of Wired re: Frances Haugen leaking my Facebook Engineering “Goodbye Post” – dropsafe — My interview with Steven Levy of Wired re: Frances Haugen leaking my Facebook Engineering “Goodbye Post”Facebook CIA Project: The Onion News Network ONN - YouTubeSo...what now? - by Charlie Warzel - Galaxy Brain — There’s so much reporting out there from the consortium of news outlets on ‘The Facebook Papers’ that I don’t really know what to do or where to start. Over at Protocol they’ve collected a running list of stories published and I count 50 pieces (as of Monday evening), many of them thousands of words long. Apparently, (according to Casey Newton and Kara Swisher) there are like six week’s worth of stories like this coming.FTC Study Confirms ISPs Collect a Scary Amount of Your Personal Data - ExtremeTech — Frustration with Big Tech is reaching a crescendo, and we could be headed for legislative efforts to reduce the influence of companies like Google, Amazon, and Facebook, but another technology heavyweight has managed to fly under the radar: your Internet Service Provider (ISP). A new Federal Trade Commission (FTC) report examines what ISPs are doing with your data, and it’s not good news. Even when they promise not to sell your information, it often ends up in the hands of advertisers and other third parties. The Facebook Papers Are a Big Fat Nothingburger - Reason.com — More than a dozen mainstream media organizations published reports today on the so-called Facebook Papers, a trove of internal company documents obtained and released by former Facebook employee Frances Haugen. The headlines promised dramatic revelations and damning indictments.
47 minutes | Oct 22, 2021
Episode 89: Digital Identity
Katherine Druckman and Doc Searls talk to Phil Windley about digital identity, picos, oauth, and big tech ecosystems. Reality 2.0 around the web: Site/Blog/Newsletter FaceBook Twitter YouTube MastodonSpecial Guest: Phil Windley.Support Reality 2.0Links:Phil Windley's Technometria7 Laws of Identity – Kim Cameron's Identity Weblog — Here's the most beautiful take yet on the Seven Laws of Identity – put together by Karon and Katrika, who even saw how the Laws connect with the Perception of Ailatan. In the past people have asked why I didn't do a Laws of Identity poster – this must be it. Click to view full size.Rainbows End - Wikipedia — Rainbows End is a 2006 science fiction novel by Vernor Vinge. It was awarded the 2007 Hugo Award for Best Novel. The book is set in San Diego, California, in 2025, in a variation of the fictional world Vinge explored in his 2002 Hugo-winning novella "Fast Times at Fairmont High" and 2004's "Synthetic Serendipity". Vinge has tentative plans for a sequel, picking up some of the loose threads left at the end of the novel. The many technological advances depicted in the novel suggest that the world is undergoing ever-increasing change, following the technological singularity, a recurring subject in Vinge's fiction and nonfiction writing.Ten Reasons to Use Picos for Your Next Decentralized Programming Project — Picos are a programming model for building decentralized applications that provide significant benefits in the form of abstractions that reduce programmer effort. Here are ten eleven reasons you should use picos for your next decentralized application.Moore's law - Wikipedia — Moore's law is the observation that the number of transistors in a dense integrated circuit (IC) doubles about every two years. Moore's law is an observation and projection of a historical trend. Rather than a law of physics, it is an empirical relationship linked to gains from experience in production.Doc Searls Weblog · Car design trends — On Quora, here’s my answer to What are the worst design trends in modern cars?—updated by our family’s experience with a new Toyota that features even more indicators than the bunch above::::
66 minutes | Oct 8, 2021
Episode 88: Can We Fix Facebook?
Tune in to our new episode! Katherine Druckman and Doc Searls talk to Jerry Michalski and Petros Koutoupis about Facebook, its weaknesses, relationship to its users, and impact on all of us, and what happens when it disappears for six hours. Reality 2.0 around the web: Site/Blog/Newsletter FaceBook Twitter YouTube MastodonSpecial Guest: Petros Koutoupis.Support Reality 2.0Links:John Taylor Gatto - The Six Lesson Schoolteacher — “Look...at the...lessons of school teaching - confusion, class position, indifference, emotional and intellectual dependency, conditional self-esteem, surveillance - all of these lessons are prime training for permanent underclasses, people deprived forever of finding the center of their own special genius....Can you imagine a school where children challenged prevailing assumptions? Or worked alone without guidance? Or defined their own problems? It would be a radical contradiction of everything we've been conditioned to expect schools to do. If you want your son or daughter to learn what Harvard said was necessary, you'll have to arrange it outside of school time, maybe in between the dentist and the dancing lessons. And if you are poor, you better forget it altogether.” - John Taylor GattoThe Seven Lesson School Teacher — Teaching means different things in different places, but seven lessons are universally taught from Harlem to Hollywood Hills. They constitute a national curriculum you pay for in more ways than you can imagine, so you might as well know what it is. You are at liberty, of course, to regard these lessons any way you like, but believe me when I say I intend no irony in this presentation. These are the things I teach, these are the things you pay me to teach. Make of them what you will.The Hidden Curriculum of SchoolFrances HaugenFacebook outage, by the numbers: Largest outage ever tracked could cost millions - MarketWatch — Outage cost company about $164,000 a minute in revenue, while stock’s decline wiped away more than $40 billion in market cap and cost Mark Zuckerberg roughly $6 billion personally
81 minutes | Oct 1, 2021
Episode 87: Understanding NFTs
Tune in to our new episode! Katherine Druckman and Doc Searls talk to Gregory Bledsoe about NFTs and the future of transactions and authentication. Reality 2.0 around the web: Site/Blog/Newsletter FaceBook Twitter YouTube MastodonSpecial Guest: Gregory Bledsoe.Support Reality 2.0Links:double-entry bookkeeping – ProjectVRM — What makes double-entry bookkeeping important is that maybe it can save our asses from what computing did to our hands-on knowledge of how business works—or ought to work—in a hearty economy. Hence the hope behind the headline above.Pico LabsTriple entry accounting system: A revolution with blockchain | by Kapil RANA | DataSeries | MediumNFTY Jigs — NFTY Jigs is a platform to create & manage digital goods for the open metaverse
68 minutes | Sep 17, 2021
Episode 86: Pedal-Assisted Privacy
Katherine Druckman and Doc Searls talk to Shawn Powers about their various health-related gadgets, including trackers, ebikes, VR workouts, etc., and the ways we incorporate them into our lives. Reality 2.0 around the web: Site/Blog/Newsletter FaceBook Twitter YouTube MastodonSpecial Guest: Shawn Powers.Support Reality 2.0
60 minutes | Sep 10, 2021
Episode 85: Bufferbloat
Katherine Druckman and Doc Searls talk to Dave Taht about bufferbloat, latency, and the issues plaguing our networks. Reality 2.0 around the web: Site/Blog/Newsletter FaceBook Twitter YouTube MastodonSpecial Guest: Dave Taht.Support Reality 2.0Links:dtaht (Dave Täht) · GitHubPostcards from the Bleeding Edge — David Täht writes about politics, space, copyright, the internet, audio software, operating systems and surfing.Does my modem have Active Queue Management (AQM) for low latency? | Xfinity Community Forum — Does my modem have Active Queue Management (AQM) for low latency?RFC 8290 - The Flow Queue CoDel Packet Scheduler and Active Queue Management AlgorithmBufferbloat.net - Bufferbloat.net — Bufferbloat is the undesirable latency that comes from a router or other network equipment buffering too much data. Cerowrt Wiki - Bufferbloat.net — The CeroWrt Project is complete. The last build (3.10.50-1) was released in July 2014. The principles learned from that research project have been transferred to the Linux kernel and OpenWrt.The congestion-notification conflict [LWN.net] — Most of the time, the dreary work of writing protocol standards at organizations like the IETF and beyond happens in the background, with most of us being blissfully unaware of what is happening. Recently, though, a disagreement over protocols for congestion notification and latency reduction has come to a head in a somewhat messy conflict. The outcome of this discussion may well affect how well the Internet of the future works — and whether Linux systems can remain first-class citizens of that net.Objections to L4S WGLC — This document is a companion to a pair of slides presented at the IETF-111 TSVWG session. Due to time and space constraints, the slides could only contain a bare listing of the most pertinent, purely technical issues. This document illustrates and links to concrete data supporting the relevance of those issues, and amplifies them with further relevant issues. The bullet points from the slides are quoted, followed by supporting material.Edward Bernays - WikipediaOperational Guidance for Deployment of L4S in the Internet — This document is intended to provide guidance in order to ensure successful deployment of Low Latency Low Loss Scalable throughput (L4S) in the Internet. Other L4S documents provide guidance for running an L4S experiment, but this document is focused solely on potential interactions between L4S flows and flows using the original ('Classic') ECN over a Classic ECN bottleneck link. The document discusses the potential outcomes of these interactions, describes mechanisms to detect the presence of Classic ECN bottlenecks, and identifies opportunities to prevent and/or detect and resolve fairness problems in such networks. This guidance is aimed at operators of end-systems, operators of networks, and researchers.draft-ietf-tsvwg-aqm-dualq-coupled-16 - DualQ Coupled AQMs for Low Latency, Low Loss and Scalable Throughput (L4S)[OpenWrt Wiki] SQM Details — If you want to set up SQM to minimize bufferbloat, you should start at the SQM Howto page. SpaceX nicknames Starlink Internet user terminal 'Dishy McFlatface' — SpaceX started to offer Starlink satellite broadband internet this week. The company sent out e-mails to potential customers who would want to beta test the Starlink network in its early phase. SpaceX currently operates approximately 888 Starlink satellites in low Earth orbit out of thousands it plans to deploy to provide broadband coverage globally. Starlink is initially providing service to the northern United States and southern Canada. SpaceX states that by 2021 the company will provide service to 'the populated world'.
46 minutes | Sep 3, 2021
Episode 84: Respect on the Web
Katherine Druckman and Doc Searls talk about respect on the web, including respecting your users, and algorithmic bias. Reality 2.0 around the web: Site/Blog/Newsletter FaceBook Twitter YouTube MastodonSupport Reality 2.0
56 minutes | Aug 27, 2021
Episode 83: Intent Broadcasting and the Real Estate Market
Tune in to our new episode! Katherine Druckman and Doc Searls talk to Bill Wendel and Joyce Searls about where tech meets real estate, and how intentcasting could improve the market. Reality 2.0 around the web: Site/Blog/Newsletter FaceBook Twitter YouTube MastodonSupport Reality 2.0Links:Real Estate Cafe | Serving a Money-saving Menu of Services since 1995Real Estate Cafe / reVRM Minifesto — Idea starters to kick-start conversation about VRM's potential role in the residential real estate industry Ralph Nader on Twitter: "Absentee giant corporate control over local America expands relentlessly. Latest are huge firms like Blackrock buying hundreds of thousands of houses for speculation purposes. Fight absentee corporatist domination. Support the Institute for Local Self-Reliance. @ilsr -R" / TwitterPacaso Is Turning Houses Into Corporations : Planet Money : NPR — On a sleepy cul-de-sac amid the bucolic vineyards and grassy hills of California's Sonoma Valley, a $4 million house has become the epicenter of a summer-long spat between angry neighbors and a new venture capital-backed startup buying up homes around the nation. The company is called Pacaso. It says it's the fastest company in American history to achieve the "unicorn" status of a billion-dollar valuation — but its quarrels in wine country, one of the first regions where it's begun operations, foreshadow business troubles ahead.Bill Wendel on Twitter: "Stats below reveal need to replace Active MLS listings with new metric - owners who #Intend2Sell or #IntentionInventory DEC = good month for price reductions, expired listings & to interact #P2P w/ owners planning #LifeTransition in 2022 DM re #ProactHH https://t.co/Tgvjs9S6nM https://t.co/1KkusoNPpz" / Twitter — #BidWarBacklash: 20 yrs ago, Feds report "Housing Starting to Weaken“ cautioned: "Housing values dropped 8% on average during last recession in 1991. Not only could it happen again, ..it could 'happen rather abruptly.'" Instead of bidding #100KoverAsk, willing to #TimeREMarket?In Case You Were Unclear What the US Government Thinks of NAR... - NotoriousROB — In light of yet another intervention in a private lawsuit by the Department of Justice, this time in the REX v. Zillow case, a few things should be clearer. One, the Department of Justice really doesn’t like it when NAR uses the 2008 Consent Decree as any kind of a shield for any kind of a rule. NAR has done this in Moehrl, in Sitzer, and now in REX and in all three instances, the DOJ went out of its way to file a Statement of Interest telling the judge that the DOJ in no way shape or form approved any NAR rule or policy. Instant Buyer - Wikipedia — Instant Buyer (or iBuyer) is a real estate transaction model wherein companies purchase residential properties directly from private sellers, to eventually re-sell them.
55 minutes | Aug 13, 2021
Episode 82: Apple’s Child Safety and the Screeching Voices of the Minority
Katherine Druckman and Doc Searls talk to Kyle Rankin about Apple’s new plans to monitor personal devices, and what it means for privacy, ownership, and setting precedence. Reality 2.0 around the web: Site/Blog/Newsletter FaceBook Twitter YouTube MastodonSpecial Guest: Kyle Rankin.Support Reality 2.0Links:Apple's Plan to "Think Different" About Encryption Opens a Backdoor to Your Private Life | Electronic Frontier Foundation — Apple has announced impending changes to its operating systems that include new “protections for children” features in iCloud and iMessage. If you’ve spent any time following the Crypto Wars, you know what this means: Apple is planning to build a backdoor into its data storage system and its messaging system.Daring Fireball: Apple’s New ‘Child Safety’ Initiatives, and the Slippery Slope — My first advice is to read Apple’s own high-level description of the features, which ends with links to detailed technical documentation regarding the encryption and techniques Apple is employing in the implementations, and “technical assessments” from three leading researchers in cryptography and computer vision.Eva on Twitter: "Apple distributed this internal memo this morning, dismissing their critics as "the screeching voices of the minority." I will never stop screeching about the importance of privacy, security, or civil liberties. And neither should you. https://t.co/lLDfxEUIXL" / Twitter — Apple distributed this internal memo this morning, dismissing their critics as "the screeching voices of the minority." I will never stop screeching about the importance of privacy, security, or civil liberties. And neither should you.GitHub - nadimkobeissi/appleprivacyletter: An open letter against Apple's new privacy-invasive client-side content scanning. — An open letter against Apple's new privacy-invasive client-side content scanning technology. Transactional analysis - Wikipedia — Transactional analysis (TA) is a psychoanalytic theory and method of therapy wherein social transactions are analyzed to determine the ego state of the communicator (whether parent-like, childlike, or adult-like) as a basis for understanding behavior. In transactional analysis, the communicator is taught to alter the ego state as a way to solve emotional problems. The method deviates from Freudian psychoanalysis which focuses on increasing awareness of the contents of subconsciously held ideas. Eric Berne developed the concept and paradigm of transactional analysis in the late 1950s.Reality 2.0 Episode 80: NSO Group's Pegasus, Stingrays, and Grindr — Katherine Druckman and Doc Searls talk to Kyle Rankin about NSO group and Pegasus, Stingrays and cars, and surveilling priests.The Encryption Debate in Australia: 2021 Update - Carnegie Endowment for International Peace — In 2018, the heads of Australia’s law enforcement and intelligence agencies were given broad powers by the Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018,1 or TOLA Act, to gain access to encrypted communicatInternet of Snitches – Purism — Imagine an Internet of Snitches, each scanning whatever data they have access to for evidence of crime. Beyond the OS itself, individual phone apps could start looking for contraband. Personal computers would follow their lead. Home network file servers could pore through photos, videos and file backups for CSAM and maybe even evidence of copyright infringement. Home routers could scan any unencrypted network traffic. Your voice assistant could use machine learning to decide when yelling in a household crosses the line into abuse. Your printer could analyze the documents and photos you send it.Reality 2.0 Episode 49: Parler, Ownership, and Open Source — Doc Searls, Katherine Druckman, Petros Koutoupis, and Kyle Rankin talk Parler and platform lock-in, the concept of data, software, and hardware ownership, and the open source social contract.Reality 2.0 - Blog - Reality 2.0 Newsletter - November 25, 2020: Owned. — This week’s conversation was rooted in the concept of ownership, including hardware, software, and in the case of platform lock-in, even ownership of ideas. Over the course of nearly an hour, we questioned our ownership of our social media profiles, our photo storage accounts, our MacBooks, and our code.Apple Adds a Backdoor to iMessage and iCloud Storage - Schneier on Security — Apple’s announcement that it’s going to start scanning photos for child abuse material is a big deal. (Here are five news stories.) I have been following the details, and discussing it in several different email lists. I don’t have time right now to delve into the details, but wanted to post something.Apple Privacy Letter: An Open Letter Against Apple's Privacy-Invasive Content Scanning Technology — An Open Letter Against Apple's Privacy-Invasive Content Scanning Technology Security & Privacy Experts, Cryptographers, Researchers, Professors, Legal Experts and Apple Consumers Decry Apple's Planned Move to Undermine User Privacy and End-to-End Encryption
52 minutes | Aug 6, 2021
Episode 81: Geeks at Home: The Gear That Makes Us Happy
Katherine Druckman and Doc Searls talk to Shawn Powers and Petros Koutoupis about how we make our personal spaces better for work and play. Reality 2.0 around the web: Site/Blog/Newsletter FaceBook Twitter YouTube MastodonSpecial Guests: Petros Koutoupis and Shawn Powers.Support Reality 2.0Links:My Big Round World – Everyone's a square…Pet Sematary (1989) - IMDb — After tragedy strikes, a grieving father discovers an ancient burial ground behind his home with the power to raise the dead.Sony Alpha 7R Review: Digital Photography Review — If there's one thing you can say about Sony's digital camera business, it's that they've experimented with many different concepts. From SLRs with dual autofocus systems and Translucent Mirror Technology to its NEX mirrorless line-up, Sony has gone down virtually every avenue in digital imaging. Its latest products - the Alpha 7 and Alpha 7R - may be the most exciting products to come out of the Sony labs in some time. The company has managed to create full-frame cameras which are about the same size as the Olympus OM-D E-M1. In other words, the Alpha 7s are much smaller than their full-frame interchangeable lens peers (such as Nikon's D610 and the Canon EOS 6D), an achievement made possible primarily because they're not SLRs.Sony a6400 review: Digital Photography Review — Sony's a6400 is a compact 24MP mirrorless interchangeable lens camera with an APS-C sensor that will serve plenty of photographers from family documentarians to pro shooters looking for a lightweight second body. The big news is that it has a new processor based on that used in Sony's sports-shooting flagship a9 which enables 'Real-Time Tracking' autofocus, which is one of the most effective autofocus implementations we've yet seen. It's also among the easiest to use, once you've gotten it set up.Amazon.com: Electro-Voice RE20 Broadcast Announcer Microphone with Variable-D: Musical InstrumentsX2U - Microphone to USB AdapterCam Link 4K | elgato.comKey Light Air | elgato.comWatch Free Movies Online Now | Stream Free TV with Plex4K UHD Hisense Roku TV with HDR (2020) (55R6G) - Hisense USAAeron - Office Chairs - Herman MillerSwopper Active Stool Archives | Ergify18 Best Ergonomic Office Chairs 2021 | The Strategist — Whether you’re working from home at a DIY desk setup or commuting to an office, you may have begun to feel the strain that sitting for seven or more hours a day can put on a body. If said strain has led you to wonder whether it’s worth investing in a better, more ergonomic office chair, the answer is almost certainly yes, according to experts we spoke to. “Makeshift setups can cause a laundry list of problems, including back, shoulder, and wrist pain,” explains Dr. David Perna of Back and Body Medical. Dr. Marc Agulnick, an orthopedic surgeon based on Long Island who’s affiliated with NYU Winthrop Hospital, agrees: “If you’re sitting for a long period of time in one position that’s not natural, or a bad position from a postural standpoint, over time that’s going to break down your spine.”Arcade1Up | Officially Licensed Arcade Cabinets
44 minutes | Jul 30, 2021
Episode 80: NSO Group's Pegasus, Stingrays, and Grindr
Katherine Druckman and Doc Searls talk to Kyle Rankin about NSO group and Pegasus, Stingrays and cars, and surveilling priests. Reality 2.0 around the web: Site/Blog/Newsletter FaceBook Twitter YouTube MastodonSpecial Guest: Kyle Rankin.Support Reality 2.0Links:Defending Against Spyware Like Pegasus – Purism — What’s particularly scary about spyware in general, and is true for Pegasus as well, is that victims have no indication they’ve been compromised. Due to how locked down the iPhone is from the end user, detecting Pegasus in particular requires expert forensics techniques. This has left many at-risk iPhone users wondering whether they too are compromised and if so, what do they do?Here’s how to check your phone for Pegasus spyware using Amnesty’s tool - The Verge — Amnesty International — part of the group that helped break the news of journalists and heads of state being targeted by NSO’s government-grade spyware, Pegasus — has released a tool to check if your phone has been affected. Alongside the tool is a great set of instructions, which should help you through the somewhat technical checking process. Using the tool involves backing up your phone to a separate computer and running a check on that backup. Read on if you’ve been side-eyeing your phone since the news broke and are looking for guidance on using Amnesty’s tool.Mobile Verification Toolkit — Mobile Verification Toolkit (MVT) is a tool to facilitate the consensual forensic analysis of Android and iOS devices, for the purpose of identifying traces of compromise.The FBI Is Locating Cars By Spying On Their WiFi — The FBI is using a controversial technology traditionally used to locate smartphones as a car tracking surveillance tool that spies on vehicles’ on-board WiFi.Catholic priest quits after “anonymized” data revealed alleged use of Grindr | Ars Technica — In what appears to be a first, a public figure has been ousted after de-anonymized mobile phone location data was publicly reported, revealing sensitive and previously private details about his life.Secure, Fast & Private Web Browser with Adblocker | Brave Browser — Brave stops online surveillance, loads content faster, and uses 35% less battery.1
48 minutes | Jul 23, 2021
Episode 79: Your Identity - Twitter Verification, Facial Recognition, and More
Tune in to our new episode! Katherine Druckman, Doc Searls and Shawn Powers chat about Twitter verification, facial recognition, YouTube moderation, and algorithmic bias. Subscribe to our newsletter. Reality 2.0 around the web: Site/Blog/Newsletter FaceBook Twitter YouTube MastodonSpecial Guest: Shawn Powers.Support Reality 2.0Links:I’m Not a Reporter. But I’m Verified as One on Twitter | WIRED — I NEVER CALLED myself a journalist until Twitter made me. I’m an attorney, activist, and faculty member, but it was only by using the “journalist” label that I was able to get one of the most coveted assets in social media, the blue “verified” checkmark. My months-long effort to get verified revealed a system that is stacked against grassroots activists, particularly BIPOC communities.Twitter verification requirements - how to get the blue check — The blue Verified badge on Twitter lets people know that an account of public interest is authentic. To receive the blue badge, your account must be authentic, notable, and active.Goodbye, Fleets — We built Fleets as a lower-pressure, ephemeral way for people to share their fleeting thoughts. We hoped Fleets would help more people feel comfortable joining the conversation on Twitter. But, in the time since we introduced Fleets to everyone, we haven’t seen an increase in the number of new people joining the conversation with Fleets like we hoped. Because of this, on August 3, Fleets will no longer be available on Twitter. Black teen barred from skating rink by inaccurate facial recognition - The Verge — A facial recognition algorithm used by a local roller skating rink in Detroit wouldn’t let teen Lamya Robinson onto the premises, and accused her of previously getting into a fight at the establishment.Algorithmic bias - Wikipedia — Algorithmic bias describes systematic and repeatable errors in a computer system that create unfair outcomes, such as privileging one arbitrary group of users over others. Bias can emerge due to many factors, including but not limited to the design of the algorithm or the unintended or unanticipated use or decisions relating to the way data is coded, collected, selected or used to train the algorithm. Algorithmic bias is found across platforms, including but not limited to search engine results and social media platforms, and can have impacts ranging from inadvertent privacy violations to reinforcing social biases of race, gender, sexuality, and ethnicity. The study of algorithmic bias is most concerned with algorithms that reflect "systematic and unfair" discrimination. This bias has only recently been addressed in legal frameworks, such as the 2018 European Union's General Data Protection Regulation. More comprehensive regulation is needed as emerging technologies become increasingly advanced and opaque.Face-Detection Cameras: Glitches Spur Charges of Racism - TIME — When Joz Wang and her brother bought their mom a Nikon Coolpix S630 digital camera for Mother's Day last year, they discovered what seemed to be a malfunction. Every time they took a portrait of each other smiling, a message flashed across the screen asking, "Did someone blink?" No one had. "I thought the camera was broken!" Wang, 33, recalls. But when her brother posed with his eyes open so wide that he looked "bug-eyed," the messages stopped.Meet the Censored: Matt Orfalea - by Matt Taibbi - TK News by Matt Taibbi — Yes, the government is helping crack down on text messages and Facebook posts, but not to worry. At least your private thoughts are safe, right? Not so fast, found filmmaker Matt OrfaleaTexas’ social media censorship bill pushes unconstitutional limits on free speech — Amid ongoing allegations that social media platforms are censoring conservatives, regulating Big Tech has become one of the hottest issues across the country. In Texas, Gov. Greg Abbott has called a special legislative session in part to debate and pass content moderation legislation.I Got Access to My Secret Consumer Score. Now You Can Get Yours, Too. - The New York Times — Little-known companies are amassing your data — like food orders and Airbnb messages — and selling the analysis to clients. Here’s how to get a copy of what they have on you.
51 minutes | Jul 16, 2021
Episode 78: Human ID for Single Sign-On
Katherine Druckman and Doc Searls talk to Bastian Purrer and Namik Muduroglu about Human ID, their open source anonymous single sign-on solution. Subscribe to our newsletter. Reality 2.0 around the web: Site/Blog/Newsletter FaceBook Twitter YouTube MastodonSpecial Guests: Bastian Purrer and Namik Muduroglu.Support Reality 2.0Links:humanID | One-Click Anonymous Login — humanID is an anonymous, bot-resistant authentication for safer online communities. Non-profit and open source, the project was started in 2018 by the Foundation for New humanID. With the help of Mozilla and Harvard, we’re on a mission to #FixTheInternet.
69 minutes | Jul 9, 2021
Episode 77: Musings on Privacy, Remote Work, Health, and More
Katherine Druckman and Doc Searls talk to Shawn Powers about everything from healthcare to bad weather. Join us for a chat about everything. Subscribe to our newsletter. Reality 2.0 around the web: Site/Blog/Newsletter FaceBook Twitter YouTube MastodonSpecial Guest: Shawn Powers.Support Reality 2.0Links:Apple shouldn't use privacy & security to stave off competition, EU antitrust head warns | AppleInsider — Responding to comments made by Apple CEO Tim Cook in June, European Union competition chief Margrethe Vestager said that Apple shouldn't use privacy and security concerns to stifle competition on the App Store.Why Google Can't Bring Itself to Make the Internet Respect Your Privacy | Inc.com — The search giant has delayed the rollout of FLoC, its controversial replacement for third-party cookies, until 2023. Real Time Lightning Map :: LightningMaps.org
Terms of Service
Do Not Sell My Personal Information
© Stitcher 2022