Now that the temperatures are out of the deep freeze Mazie and I took Lucky on a walk. Walking on this snowmobile packed snow was like walking on sand.
Tyler’s LEGO Loop Coaster is really tall! The structure alone is very impressive. I can’t wait to see it go!!!
Through bag 9 of the Super Mario 64™ Question Mark Block LEGO. The inside contraption I believe will pop out when done. A lot of fussy small pieces. A very fun build.
Tyler is making great progress on the LEGO Loop Coaster, already done through bag 7!
Just finished bag 3 on the Super Mario 64™ Question Mark Block LEGO. This is a very fun build full of surprises already.
Polarizing Technology: Encryption and Crypto
The fury and vitriol towards crypto is strong. People use words like “hate” and you can feel the emotion in their voice. I’ve had friends suggest that I must hate the environment if I support crypto. Or even that they thought I was “too smart” for crypto. Many suggest that blockchains are “just a database”, but I’ve never seen people yelling at each other, dismissing opinions, and ultimately even losing friends because they liked a database!
This made me wonder, is this unique to crypto? What else in technology might be so polarizing and carry so much emotional energy with it?
Then I realized that crypto isn’t alone. Encryption has a similar polarizing affect. And as I explored that hypothesis, I clearly also saw that the entities that find these technologies threatening use very similar tactics to attack them.
Encryption
Ways to encrypt data have been around for as long as we’ve written things down. Famous hardware devices like the Enigma machine were key tools to successful war operations. Modern technology has made encryption more sophisticated and even more difficult to defeat.
In 1991 Phil Zimmerman wrote Pretty Good Privacy or PGP. PGP was the first widely available implementation of the incredibly secure public-key cryptography. After Zimmerman created PGP he shared the source code online, triggering the US Government to open an investigation into Zimmerman and PGP for potential violations of the Arms Export Control Act. For obvious reasons, the US Government doesn’t want encryption technology that it cannot defeat to be in the hands of other entities. Five years later the US Government dropped its investigation into Zimmerman with no indictment.
The early history of the Electronic Frontier Foundation also involved encryption. In 1995 they represented the defendant in Bernstein v. United States. Similar to Zimmerman, Bernstein wanted to publish the source code of his encryption software. After four years we had a landmark ruling that determined that software source code was speech, and is thus protected by the First Amendment.
It is worth noting that the Bernstein v. United States ruling was one of the cases referenced by Apple when it refused to hack the San Bernardino shooter’s iPhone.
Encryption is now used widely, and necessary to provide hundreds of secure services. Every modern phone has dozens of encryption routines in it, many that just operate in the background so that if someone stole your device, your private information would be protected.
But should private citizens be able to use encryption that is so secure that nobody else access it? Even law enforcement? Even the US Government? Even after 30 years public opinion on this is still not settled. It absolutely makes law enforcement harder when all communication between parties is encrypted, but it has immense benefit to the privacy of those individuals.
I firmly believe that we have a right to encrypt data in a way that no other entity can ever access it. The same way that I cannot be compelled to share a secret I have memorized, I have the right to have digital information that is completely secure and private to me.
However, there are many people who disagree completely. Many feel strongly that law enforcement particularly should have a backdoor to get into encrypted data. Many believe that Apple should have hacked those terrorist phones and retrieved information for the FBI. The government itself continues to fight for this with. In 1993 we had the Clipper Chip, but the battle continues.
Encryption itself challenges power. It allows normal people to do something that beforehand only governments or corporations could. The power to access secret information is a big one. Those that previously held that capability exclusively are not going to let it go easily. And that is why the FBI steps in to sue Apple when the time is right.
There are two wedges that are used to argue why encryption should not be allowed for regular individuals: terrorism and protecting children. Horrible topics to be sure, but they are the most effective at swaying public opinion against encryption. The next time an established entity with power makes a legal claim that encryption must have a backdoor, look for those two topics.
If we had a Digital Bill of Rights, I would include encryption as one of the first.
Crypto
Crypto, blockchain, cryptocurrencies — this technology has many similarities to encryption. First, let me clarify that while encryption and cryptography play a key role in crypto, it is a completely different solution and set of use cases. There could be no crypto without cryptography, but the application of crypto is not about protecting secrets.
Very similar to encryption though, crypto takes an activity that was previously the exclusive domain of powerful entities and makes it accessible to many. You could not have created a currency that could be trusted by millions without crypto. I can assert ownership of many digital assets without the benefit of any company or government entity, thanks to crypto.
Crypto allows individuals to store and exchange things of value completely on their own, common digital ownership.
The Bitcoin Whitepaper written in 2008, and then launched in 2009 was in many ways like Zimmerman’s publishing of PGP in 1991. The technology was furthered significantly when Ethereum launched in 2015, allowing completely new use cases to be created. Similar to encryption, in the crypto world we now have dozens of technology solutions and thousands of applications built on top of that. But the fundamental ethos is about storing and transferring value between people, directly without a company or government in the middle.
The efficiency benefits of blockchain are incredibly enticing, and like encryption it is possible for existing entities that control power to use these technologies internally to get benefit. The crypto version of a government backdoor is a US Digital Currency, run on a private and controlled blockchain.
Imagine if the FBI published an encryption tool. Would you use it?
Depending on when you start the clock with crypto we are between 7 and 14 years into the same kind of debate that we have been having with encryption. Should groups of people on their own be able to store and transfer value without any tools from the Government? Many smart, educated, and well-meaning people will have different views on this. It is important that a government can control their own currency. It is also important that a government have legal domain over certain forms of ownership. But personally I don’t believe those are blanket needs, and I see a great opportunity for technology to enable new capabilities here.
To fight off crypto there are two narratives that have developed. The first is that crypto supports fraud & crime. The second is environmental destruction. It is true that almost all Ransomware takes payment in Bitcoin, and the energy footprint of a proof-of-work blockchain is enormous. However, Bitcoin has also enabled people with no access to banking systems to store and transmit value. And while the energy footprint for Bitcoin is high, the gold industry certainly has a large energy footprint too. What amount of energy is acceptable for a digital reserve currency of the world to use?
***
This thought exercise was helpful for me to add some context and perspective to these two debates. I hadn’t previously connected the encryption debate that I’ve observed and supported for years with what I was seeing in crypto. Connecting them in this way draws a couple of conclusions:
- Encryption has been an open debate for 30 years and is still unsettled. I suspect that crypto will have a similar path. I don’t think we will gain a consensus as a society soon.
- Existing entities with power that is threatened by encryption and crypto will not give it up easily. Progress will be slow and begrudgingly.
- Unfortunately these technologies do get used for nefarious activities. Terrorists do use encryption to protect terrible things, and bad actors do use Bitcoin to get payments.
What, Why, and How to Improve Your Security and Privacy
I thought I would share a few of the things that I personally do to improve my security and privacy online. I do all five of things I’ve included here and services I reference are ones I use, in many cases for several years. I’m not recommending anything that I don’t personally do.
What: Keep secrets safe.
Why: We all manage a lot of secrets. We have hundreds of passwords to various websites. You’re not using the same password all over the place right? We have a ton of other secrets too. Those random questions that some websites ask about where you were born or the name of your first pet? There are also more traditional secrets like banking information, or the combination to your safe. This stuff all needs to be kept accessible but very secure.
How: I use 1Password for all of my secret management. Specifically, I use 1Password for Families because it allows all four of us to have our own accounts, keep our own vaults, and share vaults between different family members as well. 1Password is a password manager, but it also manages any number of different secrets, including any random notes that you may want to keep in it’s encrypted database.
What: Use a unique email address per service.
Why: Whenever you create an account on a new service, you should create a brand new email address for that account. You know how people have been saying for years to never share passwords between websites? Well, you also shouldn’t share an email address. You see, if you sign up for dozens of websites using the same email address, those websites may share tracking information using your email address as a shared identifier! Gross right? Yeah. The way to defeat this is to make sure that the email address is unique for each service you use.
How: There are a number of ways to do this, and I’ve tried all of them.
Many services allow for “plus addressing”, so if your email address is foobar@proton.me
, you can make it unique by putting a + in it with some characters. So, foobar+lyft@proton.me
could be the address you give Lyft.
There are also email relayers just forward email to you through a random address. These can be hard to use because they are outside your usual email flow.
I’ve used Fastmail for years and they recently rolled out a Masked Email feature that is awesome. It is easy to create any number of addresses, I have hundreds of them. You can delete any of them at anytime to destroy an address, and fairly unique to Fastmail if you reply it will use your masked email address at the from address. They even supports custom domain names so all of my addresses are in the form of polar.bison4837@thingelstad.com
. The nice thing about this is that I could still get these masked emails on another provider if I setup a Catch All address.
Creating unique email addresses is key to limiting tracking.
What: You need a content blocker in your browser.
Why: Imagine if you didn’t have a spam filter on your email for a second. Imagine every single email you ever got just landed in your inbox. That is what is happening if you surf the web without a content blocker. Actually though, it is worse. Because you aren’t just letting every email in, you are letting infinite numbers of little programs run on your computer from any number of different companies. Those programs are tracking you and collecting up all sorts of information about you. Dozens (or more!) of them on every website you visit. Yes, it is terrible. Running a content blocker is the key. Some will get caught in the ethics of running an ad blocker, but good content blockers can selectively block by category. So, if you feel ads should stay that is fine. You can still block the trackers.
How: I’ve used 1Blocker for this and think it is absolutely the best. It has a robust set of categories and definitions are updated regularly. I love that I can create my own custom rules as well. I have a set of rules that stop all activity to any Facebook property. My Internet doesn’t even have Facebook services on it. It is fabulous.
What: Your searches should not profile you.
Why: Google knows what you’re thinking. Searching is a particularly effective way to build a profile of a person. No company should get to hear all the questions that you have in your brain.
What: I love the idea of just paying for search, and have been using Neeva for a long time. I pay a small fee, and in turn they don’t profile and harvest my inner thoughts. That seems fair to me. If you absolutely can’t see to it to pay for something, at least switch your search engine to DuckDuckGo and stop using Google. DuckDuckGo is way better for privacy.
What: Get a feed reader!
Why: New content is published everywhere, and the best way to preserve your privacy is to have a service to get it for you. Instead of subscribing to a YouTube Channel in YouTube, you can have your Feed Reader watch it and show you. YouTube then doesn’t get that data. Or, want to follow a Twitter account but avoid being logged into Twitter, good feed readers can do that too. Your Feed Reader gets to be your armored agent, going into various services and pulling new content for you. No algorithms here either, as the content is just shown in time order. Brilliant!
What: Feedbin is my favorite service here and I’ve been a subscriber for years. I use it for RSS feeds, email newsletters, Twitter accounts, YouTube channels, Medium, Substack, and the list goes on and on. I don’t have to go to all those things, I just go to Feedbin. No social amplification, no algorithms, no ads. Just the stuff I subscribed to in exchange for a small fee.
I’ve been validating the Gnosis Chain for about three months now. I’m running 32 validators. Gnosis made the transition to using proof-of-stake. The validators generate about 0.4 mGNO a day, or about $1.09, a 14% annual yield. On average my 32 validators propose 4 to 5 blocks a day, with a maximum of 10. There are currently 109,386 validators.
I really dig this CC0 is Punk sticker from Matt Downey. CC0 is totally punk!
The snow, subzero temps, and frozen lid on the Big Green Egg are too much to overcome. Need to find different way to cook tenderloin steaks. No grilling this Christmas Eve. 🥶
Negative temperatures with even more negative windchills make the crackle of wood in the fireplace even better as night falls. 🔥❄️
Source of Attention
“Take the thought itself as an object.
Take the feeling of being the thinker also as an object.
What is that feeling?
It too must be an appearance in consciousness.
It feels like something, to be the source of attention.
Is there really a source of attention in the middle of experience?
Or is there just experience?”
— Sam Harris, Waking Up, Daily Meditation for Dec 21, 2022
We got together with friends and had a great time escaping Cuckoo’s Clock at Missing Pieces. We escaped with 13m 36s left on the clock having used 5 clues.
I’m glad I grabbed a screen shot of the “Promotion of alternative social platforms policy” because now that same URL returns a 404 and appears to be deleted from the search index.
I feel like Twitter is disrespecting micro.blog by not including it in the banned list of platforms you can link to. Show some respect! Post is on there and it’s been around for 5 minutes.
Follow me @jthingelstad on micro.blog!
This new “Promotion of alternative social platforms policy” on Twitter deserves memorializing for the pure idiocy of it.
The goalkeeping from Martinez was epic for Argentina! 🇦🇷 ⚽️
That was absolutely beautiful and epic. Tears or joy for Argentina. Messi the heart of it all. Mbappé gets golden boot. Love this game. Argentina 🇦🇷 3 v France 🇫🇷 3. 4-3 on kicks. ⚽️🎉
Suddenly penalty kick and another in the back of the net goes Argentina 2 France 2!!! ⚽️ 1m 33s between goals.
GOAL!!! Argentina 2 France 0.