gila monster kiss he crept right under our legs i am going to stand
Poems for summer Five, seven, and then five more Halcyon haiku
step. breathe. one, two, four run 'till the feeling's no more this is not my game
For several years people have been telling me how good the movie Fireproof is. I finally watched it on my flight tonight and agree with everything I’ve ever heard about it. It’s a wonderful story. If you haven’t seen it, I recommend it whole-heartedly. It’s a simple story about two people who get off track and have no idea how get back, no idea what they themselves even want, and no idea what the journey they embark on is going to be like.
Since I had someone offer to me once before to pay for the movie if money was keeping me from it, I’ll extend the same offer to you – it’s worth it.
Trying to explain computer or cyber security can be like trying to explain how a nuclear reactor works – it’s complicated. Nonetheless, I want to take a moment with this post and share a letter that my company, Automattic, Inc., published today with respect to security and government requests as it relates to the recent case with Apple.
The greatest difference between the privacy one has in something like a diary and the privacy one has in the cyber world is a matter of speed and reach.
It’s simply not feasible to find the time and craft to sneak into everyone’s home in a city and look for their diaries, read them, then catalogue that information. On the other hand, if someone has a specific target and they spend the time preparing, they have a very high chance of sneaking in and getting what they want.
In the cyber world, however, things that would normally take weeks of planning and execution take place in milliseconds. Things happen so fast that we can’t feasibly spend the time planning to figure out what we want to find. Instead, it’s cheaper to just get in and take everything and then try to sort out the important findings later. In other words, even though the probability is low that we will get something valuable for any given break-in, we can repeat the experiment billions of times and hope for the best.
This is the difference between someone who takes a week to mold a key that fits your front door and then opens it easily and someone who has a ring with millions of keys on them and can try all of them out in seconds. Physically, we couldn’t try out that many keys that quickly, but electronically this happens all day every day around the Internet.
In related news, somebody recently discovered a security bug in a common piece of software that lots of other software in the industry relies on. The security relies on using very large prime numbers, but the one that had been used was discovered to be non-prime. Here is the number for reference.
When someone originally chose this number, they determined that there was a very low chance that it would turn out to be non-prime. In fact, that was a one-in-one-with-twenty-four-zeros-after-it chance that it would turn out to be non-prime, so there is very little blame to be given for the person who chose it. The fact that it’s not prime, however, means that the security behind the algorithm that was using it is severely crippled and it becomes trivial to break just by incorporating some simple math tricks.
The point of this is that computer and cyber security is a very fragile system and a small perturbation is more than enough to allow unintended parties to gain access to systems and data that were intended to be safe and private.Within a year of the release of DVDs to the mass markets and before there were even 10,000 DVDs sold globally, a 16-year-old hacker played a big role in cracking the security meant to prevent people from copying the films from the discs.
Today, the FBI and the Department of Justice is asking Apple to not only help them recover information from the iPhone of a terrorist, but they are asking Apple to build documented security flaws into the iPhone operating system. This is a fascinating and monumental case whose discussion is far broader than this post is able to cover. In short, the things the FBI wants would effectively eliminate any security mechanism built into Apple’s products and it would be no more than a short matter of time before other governments or malicious hackers got access to the same methods of access. Cyber security is a fragile thing and one weakness on one device is a major weakness to all related devices.
Apple has been doing all it legally can to refuse the request and protect its customers. We support their work and believe that the consequences of compliance will bring severe and broad risks to the protection of personal privacy, whether it protects those at risk of political retribution, embarrassing personal revelations, damaging financial misconduct, or even of the release of immodest pictures meant for specific audiences.
Following is the amicus brief published today by Automattic, Inc., alongside many other major technology companies who work hard to protect their customers.
After too long of not recording where I’ve been working, here is the first in (hopefully) a series of exposés on Tucson coffee shops and coworking facilities.
Presta Coffee is the place to be in Tucson if you like snobby coffee. I had been waiting for some time to go there but had heard nothing but great recommendations for it. When I arrived they were doing a cupping and people stood around a table tasting and learning about different varieties of coffee.
Unfortunately this iasn’t a great place to work. The WiFi access was good, but there were only marginal places to sit down with a laptop and very poor power access. Presta only recently opened up as a cafe; before then it was purely a roastery. The owner and staff were both friendly and knowledgeable, but I’m not sure that remote workers are in their target market.
- Internet access was brisk and required a password that they provided on request.
- There are only a few choices to buy here: iced coffee, Chemex, V60, Aeropress…
View original post 147 more words
My best friend has two wonderful little boys. Micah, the older brother, has experienced difficulties with his speech and there are a few areas where he seems to be developmentally behind other children. At the same time, Micah is one of the happiest little guys I know and has an absolutely charming personality.
It has been a challenge for Andrew and Sarah to figure out how they ought to respond and act to help Micah grow, and for some time they have had a looming suspicion that Micah might suffer under the ailment of a rare genetic syndrome. They finally have a confirmation for a very rare condition called Kabuki Syndrome.
The linked blog post is an incredibly worthwhile read. Andrew tells his story from the very beginning to now and shares his emotions, joys, and struggles along the journey. I am very proud of my best friend and his wife and have learned so much from him as he has shared his experiences and challenged me in the ways that I perceive parents and their children.
The start of the journey
Early in the morning on September 17th, 2012 Sarah’s water broke. She was five days overdue and extremely ready to meet our first little baby. After a few hours of trying to get comfortable at home we headed to the hospital to meet our little guy.
The labor went quickly, without any real hitches at all, and our first son Micah entered the world at 12:31 in the afternoon. It is a birth story that Sarah’s midwife said needed to be told frequently to encourage other pregnant women. Birth stories aren’t all bad or horrific or traumatizing. We were fortunate to have a good one to tell.
It was a Monday. I’ll never forget the feeling of lying in that roll away hospital bed that first night with Micah watching Peyton Manning throw four interceptions on Monday Night Football.
I had a son. And life as…
View original post 3,311 more words