Letters of Marque

In days of yore, enterprising folks could obtain permission from the crown to hunt down and clobber pirates on the high seas. (I think the crown got a percentage of the take, and no one was too fussy about the techniques that they employed).

Hollywood’s latest antics here are similar; the fat cats want the ability to snake their way into your computer and start blowing stuff away, if they have reason to believe you’re violating the copyright of content they own the rights to. All they have to do is tell the DOJ about the techniques they’re using. Your legal recourses appear to be few and ineffective.

This is unbelievably good stuff. It makes the record companies one of the most powerful forces in the land. Was your firewall breached last night? Oh, that attack was perfectly legal; the record company informed the DOJ of its cracking technique last week.

Is this a recipe for legal hacking? Publish some cheezy album, give the tracks some popular and enticing names, let the tracks spread through the P2P networks for a few months, and then tell the DOJ “Oh, we’re going after these guys.”

Anyone could do this. Expect the FBI to release a “greatest hits” album soon.

More DRM Doom

It’s going to be difficult to find a non-biased report on what happened at the Commerce Department’s digital rights management round-table last week. Here’s a report that’s fairly balanced.

I’ll tell you why I don’t think much of Stallman another time. (The MPAA and its ilk are no better).

Here’s a good touchstone for the true agenda of a DRM system: How does it obey the law? Current copyright lasts 70 years past the death of the author, after which you can presumably FTP, photocopy, tape or broadcast to your heart’s delight (here is more exact info on that). How does an automated DRM system know when to unseal the content that it is guarding?

It’s a rhetorical question: Current DRM systems can’t. The entire DRM infrastructure is geared towards sealing up information and never letting it go.

’nuff said, I think. The prosecution rests.

Power Coding

After the incantations, the wizard simply winds up. He aims, throws.

Systems all across the midwest suffer crashes. Ball lightning plays fast, blue tag on power lines all the way to Minnesota. Hundreds of thousands of people are left in the dark as operators in power plants stare wide-eyed in shock at their pegged needles.

Well, no. That’s not how the new dark ages began.

After the all-nighter, the wizard forgets a semi-colon. After weeks of testing, the product ships. A year later, the embedded system that controls the power relays walks across a data structure that was trashed three weeks earlier by some code written by a twenty-year veteran who should have known better. This time, the off-by-one error indirects through a wild pointer and stabs an I/O address that causes the relay to latch open and stay that way. The relay welds shut, the transistors blow to protect their fuses, and the cascade begins.

The world ends, not with a bang, not with a whimper, but with a typo…

The NASDAQ, caught in its zillionth week of contracting stock offerings, gutters and flames out for the last time. Somewhere in Kansas a farmer kicks the side of his unresponsive combine, spits in the dust and walks away, leaving a mortgaged mountain of high-tech junk behind him. The million-year-old fossil water that fed his fields can’t be pumped anyway, because QuotaNet’s been down for weeks and the valves won’t open without permission from a bureaucrat who hasn’t been able to get to the office; no methanol for fuel, so it’s illegal to drive.

Don’t worry about arranging for the last someone turn the lights out. Just make sure they properly douse last night’s camp fire. At last count there were eight refinery fires going in the US alone, and no sign that anyone was going to brave the crossfire from the various dug-in fringe groups and put out the flames.

A pregnant horse is worth … you name it. Just about anything.

In fifty years, most books are crackling fragments (though a lot of acid-free titles were printed, and those are worth livestock). CDROMs are, of course, completely unreadable, and few people have time for friviolity like that anyway. A lot of communities are built on old landfills, mining for goodies like aluminum and plastic. You can build good houses and irrigation equipment out of that stuff. Computers? You’re kidding, right? Didn’t those toys cause the Fall? Stay away from those and get into honest work, son, not like a thief. Remember that old guy they found hiding out all these years on old Tober’s ranch?

More later…

Cold, dead fingers (got a match?)

From CNN:

Richard Clarke, the president’s computer security adviser, said Wednesday that an upcoming national plan to protect cyberspace will include expectations for home users, as well as large companies and the government.

“It’s designed to not just say (they) have a responsibility, but to empower them by giving them the tools,” Clarke said.

The day I run government-mandated “security” tools on my hardware is the day that I turn off my computers and burn them.

More random drawings

Wants to protest. Too afraid (or undecided) to commit to something. Still, it takes guts to get out there with a blank sign.

Tired, going to bed… I had a bunch written, but none of it is worthwhile reading yet. Later.


Ben & Jerry’s will never have pork-flavored ice cream. (You could probably make a case for Bacon).

It was pointed out to me that Ben and Jerry’s religion would probably prevent them from doing bacon-flavor, too.

Embedded System Lament

You’re running good
But your stack got trashed
You’re running good
But your code just crashed
You’re running good
But you’re dumping core
You’re running good
But not no more

— after Brian McNaughton

Purists will note that most embedded systems do not “dump core” because there’s usually nothing to dump memory to. However, most purists have never written an embedded system, and I stand by my verse.

MtS (memo to self)

Don’t drink Dr. Pepper at midnight if you need to get up early the next morning.

You’ll always find a 24-hour pharmacy, say at some Walgreens, very near by a hospital.


Things to do when the time machine arrives:

  1. (1976) Convince Gary Kildall to use LF for a newline separator, not CRLF, and “-” for command line switches, not “/”.
  2. (mid 70s) Give Bjarne Stroustrup (age 15) a Xerox Alto to play with, running SmallTalk 76
  3. (1978) Intel needed 24 bits of address space on the 8086, simply by making their paragraph sizes 8 bits instead of 4 bits
  4. (1971 or so) Have K&R provide C with a native string type

Continue reading “Todo”

Go go go

From Kuroshin, a nice piece on the game of Go:

“There are nine mental levels into which players are distinguished. The first is called ‘being in the spirit’, the second ‘seated in enlightenment’, the third ‘concreteness’, the fourth ‘understanding changes’, the fifth ‘applying wisdom’, the sixth ‘ability’, the seventh ‘strength’, the eighth ‘being quite inept’, and the ninth and last ‘being truly stupid’.”

(from The Classic of Weiqi in Thirteen Chapters, c.1054 AD)

This is how I feel about programming. Initially you don’t know what you’re doing. Then you reach a level of competence and you’re a worthy opponent. Then you get back to not knowing everything, and you’re doing useful work.