Posted on May 10th, 2016
Once again, people are confused about “Millenials". Apparently, surveys show that people born in that era tend to support “socialism", and also support a “free market" economy. Pundits say, “obviously they are confused!"
In “Who’s Confused about Capitalism?", Kevin Carson disagrees, and I do, too. Free markets do not look like corporate state capitalism. And free markets are consistent with (and I would argue, the best way of supporting) nonviolent socialism.
"So maybe when Millennials say...
Posted on May 10th, 2016
Revelation gets abused…a lot. Brian Zahnd gives us another picture to help avoid those traps.
If Jesus conquers evil by killing his enemies, he’s just another Caesar. But the whole point of John’s Revelation is that Jesus is nothing like Caesar! The war of the Lamb looks nothing like the war of the Beast. Jesus is not like Caesar; Jesus does not wage war like Caesar. To miss this point is to misunderstand everything the Apocalypse is trying to reveal!
If you want an accessible primer on Reve...
Posted on April 22nd, 2016
On Earth Day, you are probably going to be overwhelmed with advice on how to save the planet. You’ll hear things like:
Plant a tree
Recycle your plastic, cardboard, and aluminum
Use reusable grocery bags
Take shorter showers
These are fine suggestions. They help to limit our negative impact, and perhaps more importantly, they help us train ourselves to be mindful of our choices.
Now, some more adventurous sources will have suggestions like:
Posted on April 18th, 2016
The New Inquiry ponders the “viral virus" and whether society benefits "from a world in which everyone is anxious about having anxiety".
Your first SMBC of this post:
In TV and movies, it is a common trope to track someone to an exact location using only their IP address, often even to a specific spot in a specific room! Naturally, you are skeptical of that, as you should be. This excellent story shows some of the really interesting things that happen with IP-to-physical-address mapping at...
Posted on April 13th, 2016
“I can’t believe the next movie isn’t ready, yet. They need to get off their asses and get it done." “Is she ever going to finish the next book? What is she doing working on other stuff instead of publishing the next book?" “Uhhh, I helped fund this game, why isn’t it ready, yet? I demand a refund!"
I am pretty sure you have heard a lot of statements like this. They come from a good place: we are excited about something that is being made! But they can also turn shortsighted, selfish, and ot...
Posted on April 11th, 2016
I have been listening to a lot of audiobooks recently, but I still get in some tunes. Here’s what has had the most attention over the last year. Countries represented this time include: Sweden, USA, Netherlands, Australia, Norway, Italy.
Posted on April 8th, 2016
I’ve talked about malvertising, before. Here’s a recap: In malvertising, the adtech ecosystem is used to distribute security intrusions and malware to users. This is not the intent of the adtechnologists or advertisers, but the very design of the adtech ecosystem is useful to and aligns with the malvertiser’s goal: get this content spread as far and wide as possible, achieve great penetration in the target market, and be as underhanded as necessary in order to make users see it and interact...
Posted on April 7th, 2016
In 2016, I want to see if I can use the Internet as if it is not powered by ads. For other posts in the series, click here.
Medium is making two changes to earn revenue. One of them is great:
"We are launching with a limited number of publications on Medium who will offer members-only content and other perks to readers, in exchange for a monthly membership fee paid directly to the publication."
Excellent! This is an honest model for earning money and for serving customers.
However, they h...
Posted on April 1st, 2016
No Funnies Edition
Another winner from The Baffler. It hits so many sweet spots for me, such as quoting Jacques Ellul and criticizing advertising, propaganda, and this terrible upcoming US presidential election.
The ethical thing to do when you have a security vulnerability is to help the people responsible for the vulnerability to fix it. Often, it is instead hidden and weaponized, commoditized, and used against specific targets. However, during that period, non-targets with the same softwa...
Posted on March 31st, 2016
The IBJ has another article that discusses the Anthem breach. Like many articles from many sources before, it does a poor job of being clear about the uses and types of two-factor authentication.
If you are not aware, two-factor authentication requires that you use two ways to prove who you are. This is often implemented by using something you know (account name and password) and something you have (a special token or certificate).
It is becoming common to use two-factor authentication for ...