Top Posts


Recent Articles

  • ‘1Password and the Crypto Wars’

    [Jeff Shiner CEO of AgileBits][1]: > It is impossible to absolutely prove that our answers to the easy questions above are truthful. But what I can do is provide a number of more verifiable claims, each of which makes it harder for us to lie about any of this. In combination, these should be enough…

    [Jeff Shiner CEO of AgileBits][1]:

    > It is impossible to absolutely prove that our answers to the easy questions above are truthful. But what I can do is provide a number of more verifiable claims, each of which makes it harder for us to lie about any of this. In combination, these should be enough to persuade you that there is no backdoor (deliberate weakness) in 1Password and that it would be very unlikely for one to be introduced.

    Great post, and about as much as anyone can hope for. (I was glad to see this because I looked at some of the other 1Password like offerings and they are, erm, not good.) While the post doesn’t give me 100% confidence it gives me enough to feel comfortable staying with AgileBits products for the time being.

    [1]: http://blog.agilebits.com/2013/09/06/1password-and-the-crypto-wars/

  • ‘Patent Troll Tries to Save Itself, Gets Pounded by Newegg’

    Joe Mullin: > “I hope they don’t wuss out on this case,” said Cheng. “I hope they have the balls to try it. I am not optimistic that they will, because it would be a big mistake on their part to let this case go to trial.” Excuse me while I go do some shopping…

    Joe Mullin:

    > “I hope they don’t wuss out on this case,” said Cheng. “I hope they have the balls to try it. I am not optimistic that they will, because it would be a big mistake on their part to let this case go to trial.”

    Excuse me while I go do some shopping at Newegg.

  • Epic Privacy Browser

    Interesting web browser built off of the Chromium engine (Google Chrome). It is not like the [PirateBrowser](http://piratebrowser.com) because it doesn’t look to use Tor, instead it basically blocks trackers in as many forms as it can find and routes certain things, like searches, through proxies. Ultimately, something like this comes down to who is building…

    Interesting web browser built off of the Chromium engine (Google Chrome). It is not like the [PirateBrowser](http://piratebrowser.com) because it doesn’t look to use Tor, instead it basically blocks trackers in as many forms as it can find and routes certain things, like searches, through proxies.

    Ultimately, something like this comes down to who is building it ((Because it would be damned clever for the NSA to build something like this.)) and I don’t know anything about the company other than they are US and India based. If you know more about it, [get in touch](https://brooksreview.net/contact/).

  • ‘I Am the Other’

    [Ken White][1]: > I am the other because I believe a free person needs no excuse whatsoever to keep communications secret from the government, whether those communications are weighty or frivolous. I am the other because I believe the mantra “what do you have to hide” is a contemptible and un-American sentiment that fundamentally misconstrues…

    [Ken White][1]:

    > I am the other because I believe a free person needs no excuse whatsoever to keep communications secret from the government, whether those communications are weighty or frivolous. I am the other because I believe the mantra “what do you have to hide” is a contemptible and un-American sentiment that fundamentally misconstrues the proper relationship between citizen and state.

    Fantastic read, and I could have quoted any section of it. One particular section (that I felt was too long to quote in a “moral” sense) deals with the government potential to pass confidential information to prosecutors to help with crimes. Put this at the top of your list if you are still wondering why NSA spying is a really big deal.

    [1]: http://www.popehat.com/2013/09/06/nsa-codebreaking-i-am-the-other/

  • ‘Trials and Upgrades Are Still Dead’

    [Justin Williams responding to this year’s complaints about upgrades and free trials in the App Store(s)][1]: > I don’t have a solution to the problem, but I know that trials won’t transition customers who have grown up in the age of free into people willing to part with money for software. A martini may be…

    [Justin Williams responding to this year’s complaints about upgrades and free trials in the App Store(s)][1]:

    > I don’t have a solution to the problem, but I know that trials won’t transition customers who have grown up in the age of free into people willing to part with money for software. A martini may be $10 whereas your app is a mere $2.99, but people are conditioned to always pay for their liquor as food and drink has always been a pay-for product.

    Williams has some really smart points in his post and I think he is spot on about upgrade pricing.

    I don’t think free trials are needed at all. If you think people aren’t buying your software because they can’t try it, then you simply are not doing a very good job explaining your software (with screenshots, descriptions, website, screencasts, etc.). There’s a lot of software I won’t buy until someone I know has it because the information about the product is scarce — and what is available isn’t very informative.

    [1]: http://carpeaqua.com/2013/09/05/trials-and-upgrades-are-still-dead/

  • Why Break Encryption, When You Can Build a Backdoor?

    New Snowden documents are out. [James Ball, Julian Borger and Glenn Greenwald report][1]: > It cautions analysts that two facts must remain top secret: that NSA makes modifications to commercial encryption software and devices “to make them exploitable”, and that NSA “obtains cryptographic details of commercial cryptographic information security systems through industry relationships”. And: >…

    New Snowden documents are out. [James Ball, Julian Borger and Glenn Greenwald report][1]:

    > It cautions analysts that two facts must remain top secret: that NSA makes modifications to commercial encryption software and devices “to make them exploitable”, and that NSA “obtains cryptographic details of commercial cryptographic information security systems through industry relationships”.

    And:

    > A quarterly update from 2012 notes the project’s team “continue to work on understanding” the big four communication providers, named in the document as Hotmail, Google, Yahoo and Facebook, adding “work has predominantly been focused this quarter on Google due to new access opportunities being developed”.

    Lastly:

    > This GCHQ team was, according to an internal document, “responsible for identifying, recruiting and running covert agents in the global telecommunications industry.”

    Ok, so this report is coming out from The Guardian, The New York Times, and ProPublica as a joint report of sorts — and of course the government asked they not publish this article (kudos to them for publishing it anyway).

    From what I can tell, with the information being provided, GCHQ and the NSA are working with large software companies to build-in backdoors to encrypted software. This can/could/is/maybe running the gamut from VPN, HTTPS, SSL/TLS, and so on. Basically if the encryption tool is made by a large US or UK corporation there is a chance it has a backdoor built in for the spy agencies.

    Not. Good.

    On top of that, as quoted above, it appears that Google was/is the top target (not surprising given the popularity and the amount of data Google holds on users). More importantly it *sounds* like GCHQ (maybe the NSA?) is putting spies into telecomm companies to compromise those networks from within…

    [Bruce Schneier, writing about how to stay secure in light of this new information][2] (he has the original documents and has read through them), states:

    > What I took away from reading the Snowden documents was that if the NSA wants in to your computer, it’s in. Period.

    That’s Windows, Mac, Linux, iOS, or whatever. That’s incredibly unsettling.

    Essentially, if the government wants in to your communications, your data, your computer, it’s likely going to get in. What’s unsettling about backdoors is that once they are found by others, they can, and will, be used by others. That’s incredibly dangerous for all.

    Being in the U.S. this is not comfortable, but I can’t imagine being in a foreign country and seeing that most of the software you are using is U.S. made software and knowing that the NSA is specifically targeting foreign communications coming through the US.

    [1]: http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
    [2]: http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance

  • ‘Why should I host in a data center?’

    What it takes to get at your device inside a data center, good to know if you are hosting your own stuff. That’s for a normal person, while a governmental agency would obviously have a different route to take.

    What it takes to get at your device inside a data center, good to know if you are hosting your own stuff. That’s for a normal person, while a governmental agency would obviously have a different route to take.

  • ‘A Mockery of Whom?’

    [Daniel Jalkut on the new Yahoo! logo][1]: > This is not how any company, big or small, cherished or unknown should design a company identity. The more I read about Yahoo!’s process for this redesign, the less respect and confidence I have in them The only good thing I can say about the logo is:…

    [Daniel Jalkut on the new Yahoo! logo][1]:

    > This is not how any company, big or small, cherished or unknown should design a company identity. The more I read about Yahoo!’s process for this redesign, the less respect and confidence I have in them

    The only good thing I can say about the logo is: at least it isn’t blue. Then again, I have seen blue iOS app icons that I much prefer to this, for example: any blue Apple iOS icon would be better.

    [1]: http://bitsplitting.org/2013/09/05/a-mockery-of-whom/

  • Quote of the Day: Trevor Timm

    “In other words, even the author of Section 215 thinks the government has twisted and distorted its language to justify something that the law was never supposed to allow.” — Trevor Timm

    “In other words, even the author of Section 215 thinks the government has twisted and distorted its language to justify something that the law was never supposed to allow.”
  • ‘We’re unable to offer upgrade pricing for Mac App Store purchases’

    I hate that Apple plays this game, but my take is [the same as Stephen Hackett’s](http://512pixels.net/2013/09/omni-app-store/).

    I hate that Apple plays this game, but my take is [the same as Stephen Hackett’s](http://512pixels.net/2013/09/omni-app-store/).

  • ‘7 Billion Reasons to Say No’

    I certainly don’t like the Microsoft acquisition of Nokia, but this post from [Patrick Rhone strikes me as rather short-sighted][1]: > The smartphone war is over. It has been for a while. And, like a lot of wars, the two winners both claim victory and are likely both, through the view of each own’s prism,…

    I certainly don’t like the Microsoft acquisition of Nokia, but this post from [Patrick Rhone strikes me as rather short-sighted][1]:

    > The smartphone war is over. It has been for a while. And, like a lot of wars, the two winners both claim victory and are likely both, through the view of each own’s prism, right. Anyone else getting into this fight now (or trying to start the same fight) will be ignored.

    Really? [Kind sounds like this][2]:

    > “\[Apple and the iPhone is] kind of one more entrant into an already very busy space with lots of choice for consumers … But in terms of a sort of a sea-change for BlackBerry, I would think that’s overstating it.”– Jim Balsillie, 2007 \[then Co-CEO of RIM]

    The one thing to know about the cell phone industry is that it can change almost over night. Build something substantially better and the geeks will flock to it, which means eventually all users will too. The odds are heavily against Microsoft, but that doesn’t mean that the “smartphone war is over” — not by a long shot.

    [1]: http://minimalmac.com/post/60240331259/7-billion-reasons-to-say-no
    [2]: http://www.theguardian.com/technology/2012/jun/29/rim-chiefs-best-quotes

  • The HP LaserJet Pro 200 Color M251NW

    [Marco Arment was talking about printers][1] and mentioned the cheap color laser printer he has at home, the HP CP1525NW, and noted: > Since printer models change almost as often as GPUs, it looks like it’s been replaced in the lineup now by the [HP LaserJet Pro 200 color M251nw][2], which just rolls off the…

    [Marco Arment was talking about printers][1] and mentioned the cheap color laser printer he has at home, the HP CP1525NW, and noted:

    > Since printer models change almost as often as GPUs, it looks like it’s been replaced in the lineup now by the [HP LaserJet Pro 200 color M251nw][2], which just rolls off the tongue. 

    I bring this up because I actually have the HP LaserJet Pro 200 color M251nw Doid Akon LL Sweet K, or some name like that. We bought it to replace a shitty Konica Minolta color laser that we had in my *office*. We use the M251nw everyday, for printing every document we send out. There’s four people in the office and my accountant uses it. ((I note my accountant because three of us don’t print much, but my accountant seems to print non-stop.))

    We’ve had this printer in service for about three months and the only issue that I have run into is that large graphics in documents print slowly. ((Slower than I would expect, that is.)) Beyond that the color is good, the quality is sharp, and it hasn’t broken. The toner still costs an arm and a leg, but it always does.

    It’s a solid printer, and I recommend it.

    [Buy here, with my affiliate link][3], or you can use Marco’s in his quote above. (It’s currently $206.95 with Prime shipping, what a steal. I’m thinking about buying another.)

    [1]: http://www.marco.org/2013/09/04/drang-epson
    [2]: http://www.amazon.com/dp/B008ABLJHE/?tag=marcoorg-20
    [3]: http://www.amazon.com/exec/obidos/ASIN/B008ABLJHE/ref=nosim&tag=brooksreview-20

  • PayPal Freezes Mailpile Campaign Funds

    [Brennan on the Mailpile blog][1]: > Af[t]er 4 phone calls, the last of which I spoke to a supervisor, the understanding I have come to is, unless Mailpile provides PayPal with a detailed budgetary breakdown of how we plan to use the donations from our crowd funding campaign they will not release the block on…

    [Brennan on the Mailpile blog][1]:

    > Af[t]er 4 phone calls, the last of which I spoke to a supervisor, the understanding I have come to is, unless Mailpile provides PayPal with a detailed budgetary breakdown of how we plan to use the donations from our crowd funding campaign they will not release the block on my account for 1 year until we have shipped a 1.0 version of our product.

    That’s some bullshit from PayPal. PayPal is one of the worst online banking solutions, but it is also the largest and most popular. They are holding about $45,000 of the Mailpile funds, but Mailpile is confirming they will still make the product happen — which is great.

    Now, to shame PayPal into admitting the truth here. (I tend to think it may be governmental pressure on PayPal since Mailpile is a secure email service.)

    Update: [PayPal has released the funds](http://arstechnica.com/business/2013/09/paypal-freezes-45000-of-mailpiles-crowdfunded-dollars/).

    [1]: http://www.mailpile.is/blog/2013-09-05_PayPal_Freezes_Campaign_Funds.html

  • Meet Perch on Vimeo

    > Perch is an always-on video communication app designed to bring you closer to the people you talk to everyday regardless of where you are. It connects two separate spaces together in a way that facilitates natural and spontaneous video conversation. My buddy Pat Dryburgh showed me this video a while ago, and I was…

    > Perch is an always-on video communication app designed to bring you closer to the people you talk to everyday regardless of where you are. It connects two separate spaces together in a way that facilitates natural and spontaneous video conversation.

    My buddy Pat Dryburgh showed me this video a while ago, and I was impressed (not just with the video). The original idea of Perch was never one that I understood, but this incarnation is very cool. You should watch the video.

    Now, if only I had remote workers to Perch with. (I am thinking about setting up a Perch to my house so my daughter can talk to me whenever she needs me.)

  • A Well Constructed Opinion

    [Michael Lopp writing about his never-ending obsession with the long gone][1] Instagram `Gotham` filter: > In a world where we mindlessly repeat the loudest and most compelling tweets as fact, a well-constructed opinion is rare. It’s rare because a well-constructed opinion can defend itself. Through a combination of experience, facts, and, occasionally, passion, a well-constructed…

    [Michael Lopp writing about his never-ending obsession with the long gone][1] Instagram `Gotham` filter:

    > In a world where we mindlessly repeat the loudest and most compelling tweets as fact, a well-constructed opinion is rare. It’s rare because a well-constructed opinion can defend itself. Through a combination of experience, facts, and, occasionally, passion, a well-constructed opinion is a refreshing signal among a sea of unstructured, unattributed noise.

    That bit is such a perfect encapsulation of what I try to do every time I review a product. It also perfectly explains what is frustrating to me about 95% of product reviews on “other” blogs.

    I often say: give your opinion. I know you guys know I am not short on opinions, but I am a very long way away from having truly well-constructed opinions. So when I say “have an opinion Verge”, what I mean is: develop a well-constructed opinion that is also reflected in your 0-10 rating scale.

    [1]: http://www.randsinrepose.com/archives/2013/09/04/rip_gotham.html

  • ‘Tor Is Less Anonymous Than You Think’

    [Meghan Neal][1]: > So, how bad is the security risk? The study found that even if an attacker had no control routers, 80 percent of Tor users could be de-anonymized within six months. With control of one AS, nearly 100 percent of users were likely to be uncovered, within three months. With two, it could take just…

    [Meghan Neal][1]:

    > So, how bad is the security risk? The study found that even if an attacker had no control routers, 80 percent of Tor users could be de-anonymized within six months. With control of one AS, nearly 100 percent of users were likely to be uncovered, within three months. With two, it could take just one day.

    Given all of the tidbits passed along in this post, it seems to make logical sense to assume that the NSA could de-anonymize any Tor user within a day or so. This is both impressive, and immensely concerning.

    [1]: http://motherboard.vice.com/blog/tor-is-less-anonymous-than-you-think

  • Quote of the Day: Bruce Schneier

    “The more we expect technology to protect us from people in the same way it protects us from nature, the more we will sacrifice the very values of our society in futile attempts to achieve this security.” — Bruce Schneier

    “The more we expect technology to protect us from people in the same way it protects us from nature, the more we will sacrifice the very values of our society in futile attempts to achieve this security.”
  • How Shawn Blanc Sells His Old iPhones

    Among his other tips, this one probably works really well: > […] take some cool and professional-looking pictures that have super-shallow depth of field […] The crux of Shawn’s strategy is that he is selling a legally unlocked iPhone — good pictures or not — and there’s a market for unlocked iPhones (it seems to…

    Among his other tips, this one probably works really well:

    > […] take some cool and professional-looking pictures that have super-shallow depth of field […]

    The crux of Shawn’s strategy is that he is selling a legally unlocked iPhone — good pictures or not — and there’s a market for unlocked iPhones (it seems to be a strong market too).

    But, I would guess that market will be a bit *less* strong this year. I say this because the Verizon iPhone 5s were *all* sold sim-card unlocked. That’s huge and that makes the supply of unlocked-year-old-iPhone-5s that much bigger. So my guess is that there will be slightly depressed pricing in the used market, but then again it’s a `5` and not an `s` model so that may help keep the price up.

    Needless to say, Shawn’s strategy is *not* one that I would bank on. I’d use it as more of a “I hope I can get this, but can still pay rent if I don’t” type of strategy.

  • Meet: The Hemisphere Project

    [A DEA and AT&T program to search call records of Americans (records that date back to 1987)][1]. Scott Shane and Colin Moynihan for the New York Times: > The government pays AT&T to place its employees in drug-fighting units around the country. Those employees sit alongside [Drug Enforcement Administration][2] agents and local detectives and supply…

    [A DEA and AT&T program to search call records of Americans (records that date back to 1987)][1]. Scott Shane and Colin Moynihan for the New York Times:

    > The government pays AT&T to place its employees in drug-fighting units around the country. Those employees sit alongside [Drug Enforcement Administration][2] agents and local detectives and supply them with the phone data from as far back as 1987.

    What’s happening is that administrative subpoenas (i.e. not from a court) are issued to AT&T directly and implanted AT&T employees search a 20+ year database of all calls passing through AT&T switches. This data is use to catch Americans and non-Americans alike who are suspected of committing crimes.

    Now the important difference to the NSA here is that AT&T is storing the data, not the government. *Another* important difference is that the data goes back to 1987 and grows by 4 billion records a day — whereas the NSA only keeps data for 5 years.

    Yet another government program to watch out for. I do wonder how communications like Skype/Facebook/Google Hangouts/FaceTime affect this type of tracking. ((Yeah, Skype is compromised, but by the NSA not DEA.)) That is, these services are essentially internet traffic so I have to wonder if the smarter criminal strategy is to move from burner phones to encrypted IP based communications…

    [1]: http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?pagewanted=all
    [2]: http://topics.nytimes.com/top/reference/timestopics/organizations/d/drug_enforcement_administration/index.html?inline=nyt-org

  • Microsoft’s Illusion

    *Editor’s Note: Don’t forget, I own Microsoft stock.* It was [announced today] that Microsoft would acquire Nokia. ((Finally.)) There’s only one point that I want to touch on in this “acquisition” and that is: Microsoft isn’t buying the brand or patents — instead Microsoft just gets to *use* the brand “Nokia” and the patents in…

    *Editor’s Note: Don’t forget, I own Microsoft stock.*

    It was [announced today] that Microsoft would acquire Nokia. ((Finally.)) There’s only one point that I want to touch on in this “acquisition” and that is: Microsoft isn’t buying the brand or patents — instead Microsoft just gets to *use* the brand “Nokia” and the patents in the form of a license.

    Read into that what you will, but that is certainly a less than ideal situation for Microsoft and its shareholders. Microsoft will now be saddled with tens of thousands of additional employees with only a (roughly) ten year license to the Nokia name (the patents look to have been granted in a license that will renew in perpetuity). ((I assume this is why it was a “substantially acquire” wording that is clumsy and confusing.))

    There are red flags all over this deal, but I want to focus on what I will call ‘Microsoft’s Illusion’. Before I dive into what that means, first let’s take a quick peek at what *made* Microsoft so dominant for so very long.

    ##### The Microsoft Dominance

    I believe (contrary to others) that there exist but two important factors to the Microsoft dominance of yore:

    1. The `.doc(x)`, `.xls(x)`, and `.ppt(x)` file formats.
    2. The near universal support of application developers (called ‘programs’ back then).

    Many people argue that Microsoft’s true lock-in was the Office suite, but I believe that’s a slight misdirection. The true lock-in is the file formats *created* by Office. At one time there is no doubt that Office itself was the lock-in, but it’s the above mentioned file formats that there is no escaping.

    You can use whatever office suites you want now, but if you don’t save to those formats, then no one will know what to do with your files. I’d even argue that `.doc` is more well known in offices than `.txt`.

    Secondary to all of this is that it used to be a near universal statement that *all* software was made for Windows. Mac user? Wait three years, only to then have the developer tell you it’s not coming after all. That’s not some bitter exaggeration, it *was* the truth. Everything was made first and foremost for Windows and then maybe, *just maybe*, for Mac OS.

    Today, I think both of the above factors are changing. Yes, the Office file formats are still demanded and pervasive in the business world, but the developer focus certainly feels more split. Sometimes even feeling like Mac apps are made first, and then Windows.

    Think about it like this: most crappy electronics you buy, like bluetooth headsets, come with software for both Mac and Windows. That *never* used to be the case.

    So where you used to have lock-in with Office and with developers only creating for your platform. You now middy have lock-in with Office and are *losing* the developer support — which is important to note that I mean not just “Windows first”, but that I mean “Windows only”.

    ##### So, Microsoft’s Illusion Then

    What you will notice about the (admittedly biased) two reasons for dominance above, is that neither focus on design, or software development prowess. There is no doubt that Microsoft has done some really great software work, and continues to do so, but it’s no longer overly compelling work (as evident by the user revolt to Windows 8, the lack of Windows Phone adoption, and the general ‘meh’ reviews from geeks). Microsoft’s business was largely shored up by Office lock-in which is now waning and by developers *only* developing for Windows — which is certainly circling the drain.

    So, naturally, Microsoft goes and buys a hardware company to try and be more… Apple-y?

    The thing is, to buy Nokia and assume it will help you leap forward as a company, is to also assume that you have a strength in software. Software strength just doesn’t exist at Microsoft right now. It *could* exist there, but Microsoft would have to let go of the idea that they might irritate entrenched users by removing things like the Start menu.

    The illusion that Microsoft holds for themselves is that they are a ‘fantastic software company’ that has been beaten down by shitty hardware providers. That’s an illusion that couldn’t be further from the truth.

    Microsoft, I would argue, is a mediocre software company with fleetingly good software ideas, saddled with corporate ineptitude. To change that they will be adding tens of thousands of *hardware* employees to compete in a market saturated with high-quality hardware and high-quality software — where they already offer their software on high-quality hardware (e.g. Nokia, HP, etc).

    Microsoft is trying to fix their internal illusion, that they make some of the best software on the market, by selling hardware themselves. The better idea would have been to just double down on making the tough software decision to move their software forward. Instead they now have to try and make hardware *and* software at a high quality level.

    Good luck.