Category Archives: Security

Google succumbs

I think the Google Co-op concept is a novel idea. It allows individuals to rank information on the web “by creating ‘subscribed links’ for your services and labeling webpages around the topics you know best”. Wait, did I just read that correctly? Has something failed at Google? What happened to their pigeon algorithm revolution? Wasn’t the original concept of their search technology based upon figuring out a clever way to interpret page ranking through links? (Incidentally, I didn’t see a way to label webpages as safe/trusted, which would be the most interesting feature from a security perspective and also useful in the traditional sense of PGP.)

I must be missing something, because the announcement seems to suggest to me that so many attackers have been able to riddle the Google page-ranking system with holes, that the search giant has maxed-out their pigeon power and is essentially trying to ask everyone to help by sticking their own thumb into the cracks…

Don’t get me wrong, I agree that the power of the internet is in the people who have localized and specialized knowledge. But this is so completely counter to the origins of this “our algorithm is smarter than you are” company, one has to wonder if Google will next start trying to actually work within (or to help build) social fabric/structure rather than just pop out intellectually challenging tools. A better plow is great, since people can make better use of available land, but what’s your role when the plows turn into swords? Do you keep making swords and fan the discord among people fighting for resources or do you look for a way to establish localized rights and try to preserve the real value of plows?

More insight available courtesy of the Reg:

The problem is, Google has created a commons that is designed to be exploited beyond its capacity. Each user of a commons has an incentive to defect from the common good, to seek individual advantage. But in the Google commons, SEOs have an incentive to DESTROY the common good, to try to prevent anyone else from having any individual advantage. How the hell do you create a sustainable business model when everyone is intent on fucking up yours?

Many people have waxed lyrical about how Google was “God’s Brain” and contained some sort of magical Gestalt of all of mankind’s knowledge. But now it’s like an autistic brain that can’t say anything except advertising jingles.

— Charles Eicher

The Reg also had another take on the problem here:

creating junk web pages is so cheap and easy to do, Google is engaged in an arms race with search engine optimizers. Each innovation designed to bring clarity to the web, such as tagging, is rapidly exploited by spammers or site owners wishing to harvest some classified advertising revenue.

Recently, we featured a software tool that can create 100 Blogger weblogs in 24 minutes, called Blog Mass Installer. A subterranean industry of sites providing “private label articles,” or PLAs exists to flesh out “content” for these freshly minted sites. And as a result, legitimate sites are often caught in the cross fire.

Minimum wage and trojan-horses

I keep reading about the minimum wage debate in California, but I thought the OC Weekly staff clarified things nicely:

Fortunately, someone is looking out for California’s minimum wage workers: Thomas Hiltachk has filed a ballot initiative with the Attorney General that, if approved by voters, would raise the state’s minimum wage by a dollar an hour. Unfortunately, Hiltachk is a Republican who works as legal counsel to Governor Schwarzenegger, so therefore one must assume that such largesse comes with a nasty surprise attached. It does. In exchange for giving the worst paid workers an extra buck an hour, the charmingly named “Fair Pay Workplace Flexibility Act of 2006″ would abolish the 8 hour workday for all the state’s workers. Nice, huh? Especially considering that this week marks the 118th anniversary of the establishment of the 8 hour workday in California. Arnold Schwarzenegger’s Republican party: Building a Bridge to 1887.

So, if you consider the law to be code, and Mr. Hiltachk to be a programmer…oh, what a virus he could deliver. Is “trojan-horse law” an official phrase yet?

Cost of neighborhood risks

Apparently there are a lot of people cited for running stop-signs in certain areas of the US. This data point is just one factor of many used by insurance companies to determine the rates you must pay for coverage. Might be interesting to correlate the frequency of bad drivers around you, the damage caused, the number actually cited, and the cost others end up paying for their behavior.

You probably know you are charged a different rate depending on where you live. But have you looked into the differences relative to how people drive in your area, or number of citations?

Granick on bugspotting

News about the legal issues, courtesy of Wired.

The federal statute and copycat state laws prohibit accessing computers or a computer system without authorization, or in excess of authorization, and thereby obtaining information or causing damage.

What does it mean to access a networked computer? Any communication with that computer — even if it’s simply one system asking another “are you there?” — transmits data to the other machine. The cases say that e-mail, web surfing and port scanning all access computers. One court has even held that when I send an e-mail, not only am I accessing your e-mail server and your computer, but I’m also “accessing” every computer in between that helps transmit my message.