technology

‘The sea has neither meaning nor pity.’ –Chekhov

34.jpg

…an agreement to feature Google’s search engine as the preselected choice on Apple’s iPhone and other devices. […] Apple had arranged the deal to require periodic renegotiations, according to a former senior executive, and each time, it extracted more money from Google. […]

Steve Jobs, Apple’s co-founder, once promised “thermonuclear war” on his Silicon Valley neighbor when he learned it was working on a rival to the iPhone. […] “I’m going to destroy Android,” Mr. Jobs told his biographer. […] A year later, Apple introduced Siri. Instead of Google underpinning the virtual assistant, it was Microsoft’s Bing. […] Around 2017, the deal was up for renewal. Google was facing a squeeze, with clicks on its mobile ads not growing fast enough. Apple was not satisfied with Bing’s performance for Siri. And Mr. Cook had just announced that Apple aimed to double its services revenue to $50 billion by 2020, an ambitious goal that would be possible only with Google’s payments. […] By the fall of 2017, Apple announced that Google was now helping Siri answer questions, and Google disclosed that its payments for search traffic had jumped. […]

Nearly half of Google’s search traffic now comes from Apple devices, according to the Justice Department, and the prospect of losing the Apple deal has been described as a “code red” scenario inside the company. When iPhone users search on Google, they see the search ads that drive Google’s business. They can also find their way to other Google products, like YouTube.

A former Google executive, who asked not to be identified because he was not permitted to talk about the deal, said the prospect of losing Apple’s traffic was “terrifying” to the company. […]

Apple now receives an estimated $8 billion to $12 billion in annual payments — up from $1 billion a year in 2014 — in exchange for building Google’s search engine into its products. It is probably the single biggest payment that Google makes to anyone and accounts for 14 to 21 percent of Apple’s annual profits. That’s not money Apple would be eager to walk away from.

{ NY Times | Continue reading }

‘The world wants to be deceived.’ –Petronius

62.jpg

Google has been getting worse. On too many queries, Google is more interested in making search lucrative than a better product for us. […] Today, 88 percent of all searches happen on Google. […] Believe it or not, Google also thinks we don’t mind the ads — and that they’re actually useful. […]

Google says people make more than 20 million contributions per day to its Maps reviews. I left one last year after my dentist’s office begged me to do so, in the hopes it would finally show up in Google search.

{ Washington Post | Continue reading }

And she lit up and fireland was ablaze

99.jpg

A range of methods have been applied for user authentication on smartphones and smart watches, such as password, PIN and fingerprint. […] In this paper, a new biometric trait, finger snapping, is applied for person authentication.

Finger snapping is an act of making an impulsive sound with one’s fingers and palm. It is often done by connecting the thumb with another (middle, index or ring) finger, and then moving the other finger immediately downward to hit the palm. Such act of finger snapping involves physiological characteristics which refer to inherited traits that are related to human body, as the sound of finger snapping is differentiated by the size of palm and skin texture. In addition, it also involves behavioral characteristics which refer to learned pattern of a person, as it is the movement of the finger creates the sound.

A survey is carried out on 74 people about whether they can snap their fingers and accept the finger snapping authentication. Results show that 86.5 % of the respondents can snap fingers, of which 89.2 % would like to authenticate themselves using a simple finger snap. Besides, through our finger snapping collecting phase, we come to find out that people who could not snap their fingers can learn to do it after understanding the method of finger snapping.

{ Biometric Recognition | Continue reading }

previously { Silicon Valley Legends Launch Beyond Identity in Quest to Eliminate Passwords }

photo { Guen Fiore }

Behavior is a mirror in which everyone displays his own image

collage.jpg

{ Images generated from captions by AI models | Technology Review | full story }

This truly makes me think of the good humanity can do… that and the fact that cellphones are now becoming more and more waterproof… pretty soon we’ll be able to push people into pools again.

41.jpg

The Justice Department plans to bring an antitrust case against Google as soon as this month […] A coalition of 50 states and territories support antitrust action against Google […]

Alphabet was an obvious antitrust target. Through YouTube, Google search, Google Maps and a suite of online advertising products, consumers interact with the company nearly every time they search for information, watch a video, hail a ride, order delivery in an app or see an ad online. Alphabet then improves its products based on the information it gleans from every user interaction, making its technology even more dominant.

Google controls about 90 percent of web searches globally, and rivals have complained that the company extended its dominance by making its search and browsing tools defaults on phones with its Android operating system. Google also captures about one-third of every dollar spent on online advertising, and its ad tools are used to supply and auction ads that appear across the internet. […]

Makan Delrahim, the head of the Justice Department’s antitrust division, had pushed the department to investigate Google but was recused from the case because he represented the company in a 2007 acquisition that helped it to dominate the online advertising market.

In an unusual move, Mr. Barr placed the investigation under Jeffrey A. Rosen, the deputy attorney general, whose office would not typically oversee an antitrust case. Mr. Barr and Mr. Delrahim also disagreed on how to approach the investigation, and Mr. Barr had told aides that the antitrust division had been asleep at the switch for decades, particularly in scrutinizing the technology industry.

Mr. Rosen does have a tech background: He was the lead counsel for Netscape Communications when it filed an antitrust complaint against Microsoft in 2002.

In October, Mr. Rosen hired Ryan Shores, a veteran antitrust lawyer, to lead the review and vowed to “vigorously seek to remedy any violations of law, if any are found.”

Mr. Barr also had a counselor from his own office, Lauren Willard, join the team as his liaison. She met with staff members and requested information about the investigation. She also issued directives and made proposals about next steps.

{ NY Times | Continue reading }

platinum print { Robert Mapplethorpe, Coral Sea, 1983 }

‘And the state of (gestures at everything) *this* is not helping lol.’ –britney gil

45.jpg

Some luxury brands have started adding surveillance to their arsenal, turning to blockchains to undermine the emergence of secondary markets in a way that pays lip service to sustainability and labor ethics concerns. LVMH launched Aura in 2019, a blockchain-enabled platform for authenticating products from the Louis Vuitton, Christian Dior, Marc Jacobs, and Fenty brands, among others. Meanwhile, fashion label Stella McCartney began a transparency and data-monitoring partnership with Google for tracking garment provenance, discouraging fakes and promising to ensure the ethical integrity of supply chains. Elsewhere, a host of fashion blockchain startups, including Loomia, Vechain, and Faizod, have emerged, offering tracking technologies to assuage customer concerns over poor labor conditions and manufacturing-related pollution by providing transparency on precisely where products are made and by which subcontractors. […]

Companies such as Arianee, Dentsu and Evrythng also aim to track clothes on consumers’ bodies and in their closets. At the forefront of this trend is Eon, which with backing from Microsoft and buy-in from mainstream fashion brands such as H&M and Target, has begun rolling out the embedding of small, unobtrusive RFID tags — currently used for everything from tracking inventory to runners on a marathon course — in garments designed to transmit data without human intervention. […]

According to the future depicted by Eon and its partners, garments would become datafied brand assets administering access to surveillance-enabled services, benefits, and experiences. The people who put on these clothes would become “users” rather than wearers. In some respects, this would simply extend some of the functionality of niche wearables to garments in general. Think: swimsuits able to detect UV light and prevent overexposure to the sun, yoga pants that prompt the wearer to hold the right pose, socks that monitor for disease risks, and fitness trackers embedded into sports shirts. […]

According to one potential scenario outlined by Eon partners, a running shoe could send a stream of usage data to the manufacturer so that it could notify the consumer when the shoe “nears the end of its life.” In another, sensors would determine when a garment needs repairing and trigger an online auction among competing menders. Finally, according to another, sensors syncing with smart mirrors would offer style advice and personalized advertising.

{ Real Life | Continue reading }

related { Much of the fashion industry has buckled under the weight of the coronavirus — it appears to have sped up the inevitable }

galaxy brain

51.jpg

according to its own IPO filings, Uber can only be profitable if it invents fully autonomous vehicles and replaces every public transit ride in the world with them.

[…]

Elon Musk - a man whose “green electric car company” is only profitable thanks to the carbon credits it sells to manufacturers of the dirtiest SUVs in America, without which those planet-killing SUVs would not exist - makes the same mistake. Musk wants to abolish public transit and replace it with EVs […]

Now, both Uber and Musk are both wrong as a matter of simple geometry. Multiply the space occupied by all those AVs by the journeys people in cities need to make by the additional distances of those journeys if we need road for all those cars, and you run out of space.

{ Cory Doctorow | Continue reading }

related { In this work of speculative fiction author Cory Doctorow takes us into a near future where the roads are solely populated by self-driving cars. }

related { Why Uber Still Can’t Make a Profit }

aluminum, acrylic paint, and LCD screen, sound { Tony Oursler [ s~iO. ], 2017 }

‘A desk is a dangerous place from which to watch the world.’ –John le Carré

{ Malmö-based startup Bitcraze has come up with a way to pre-program their tiny 27 gram drones to work autonomously, enabling them to fly in science fiction-like coordinated swarms of up to 49 units at a time. | The Local | full story }

related { Autonomous killer drones }

I’ve already gone through like 3 bottles of Skin Aqua this season lol

holographic-optics_hero.jpg holographic-optics_3.gif

{ sunglasses-like VR hardware }

Today a man knocked on my door and asked for a small donation towards the local swimming pool, so I gave him a glass of water

{ as part of his 5 day long experiment into ‘modern survival’, the artist recorded every single search and order placed using his smartphone }

(O my shining stars and body!)

A powerful antibiotic that kills some of the most dangerous drug-resistant bacteria in the world has been discovered using artificial intelligence.

{ The Guardian | Continue reading }

Everywhere erriff you went and every bung you arver dropped into, in cit or suburb or in addled areas, the Rose and Bottle or Phoenix Tavern or Power’s Inn or Jude’s Hotel or wherever you scoured the countryside from Nannywater to Vartryville or from Porta Lateen to the lootin quarter

22.jpg

On Monday, the Justice Department announced that it was charging four members of China’s People’s Liberation Army with the 2017 Equifax breach that resulted in the theft of personal data of about 145 million Americans.

Using the personal data of millions of Americans against their will is certainly alarming. But what’s the difference between the Chinese government stealing all that information and a data broker amassing it legally without user consent and selling it on the open market? Both are predatory practices to invade privacy for insights and strategic leverage. […]

Equifax is eager to play the hapless victim in all this. […] “The attack on Equifax was an attack on U.S. consumers as well as the United States,” [Equifax’s chief executive] said. […]

According to a 2019 class-action lawsuit, the company’s cybersecurity practices were a nightmare. The suit alleged that “sensitive personal information relating to hundreds of millions of Americans was not encrypted, but instead was stored in plain text” and “was accessible through a public-facing, widely used website.” Another example of the company’s weak safeguards, according to the suit, shows the company struggling to use a competent password system. “Equifax employed the username ‘admin’ and the password ‘admin’ to protect a portal used to manage credit disputes,” it read.

Though the attack was quite sophisticated — the hackers sneaked out information in small, hard to detect chunks and routed internet traffic through 34 servers in over a dozen countries to cover their tracks — Equifax’s apparent carelessness made it a perfect target.

According to a 2019 class-action lawsuit, the company’s cybersecurity practices were a nightmare. The suit alleged that “sensitive personal information relating to hundreds of millions of Americans was not encrypted, but instead was stored in plain text” and “was accessible through a public-facing, widely used website.” Another example of the company’s weak safeguards, according to the suit, shows the company struggling to use a competent password system. “Equifax employed the username ‘admin’ and the password ‘admin’ to protect a portal used to manage credit disputes,” it read.

The takeaway: While almost anything digital is at some risk of being hacked, the Equifax attack was largely preventable.

{ NY TImes | Continue reading }

related { The End of Privacy as We Know It? }

related { The FBI downloaded CIA’s hacking tools using Starbuck’s WiFi }