daringfireball   13015

« earlier    

Today Mac OS X is as old as the Classic Mac OS - Six Colors
from Daring Fireball

Jason Snell, writing at Six Colors:

Here’s a bit of numerology for you. Today marks 17 years, one month, and 29 days since Mac OS X 10.0 was released on March 24, 2001. That’s a strangely odd number — 6269 days — but it also happens to be the exactly length of time between January 24, 1984 (the launch of the original Macintosh) and March 24, 2001.

As Jason notes, it’s a bit mushy, given that Mac OS X had been out for a while in beta form prior to 10.0 being released, and perhaps more importantly, a majority of Mac users were relying on Mac OS 9 for several years after Mac OS X was released — including yours truly. But, still, a notable milestone. Classic Mac OS being anything other than a very fond memory feels like a long time ago.

 ★ 
ifttt  daringfireball 
1 hour ago by josephschmitt
TANK — Prolost
from Daring Fireball

If you’ve got a soft spot for vintage ’80s vector-graphic video games like Star Wars and Battlezone, you’re going to love this new short film by Stu Maschwitz. So great. Also, a fantastic 20-minute video on how it was made.

 ★ 
ifttt  daringfireball 
7 hours ago by josephschmitt
FBI repeatedly overstated encryption threat figures to Congress, public - The Washington Post
from Daring Fireball

Devlin Barrett, reporting for The Washington Post:

The FBI has repeatedly provided grossly inflated statistics to Congress and the public about the extent of problems posed by encrypted cellphones, claiming investigators were locked out of nearly 7,800 devices connected to crimes last year when the correct number was much smaller, probably between 1,000 and 2,000, The Washington Post has learned.

Over a period of seven months, FBI Director Christopher A. Wray cited the inflated figure as the most compelling evidence for the need to address what the FBI calls “Going Dark” — the spread of encrypted software that can block investigators’ access to digital data even with a court order.

The FBI first became aware of the miscount about a month ago and still does not have an accurate count of how many encrypted phones they received as part of criminal investigations last year, officials said. Last week, one internal estimate put the correct number of locked phones at 1,200, though officials expect that number to change as they launch a new audit, which could take weeks to complete, according to people familiar with the work.

Even if the accurate number really was 7,800, it wouldn’t change the fact that adding backdoors to phones would be a disaster for security and privacy. The number really doesn’t matter. But the fact that they overstated it by a factor of 6 makes the FBI look really bad. I’m not saying they lied, but I think it’s unlikely they would have undercounted the number of phones by a factor of 6.

 ★ 
ifttt  daringfireball 
9 hours ago by josephschmitt
The Eudora™ Email Client Source Code – Core+ – Medium
from Daring Fireball

Len Shustek, writing for The Computer History Museum:

Eventually many email clients were written for personal computers, but few became as successful as Eudora. Available both for the IBM PC and the Apple Macintosh, in its heyday Eudora had tens of millions of happy users. Eudora was elegant, fast, feature-rich, and could cope with mail repositories containing hundreds of thousands of messages. In my opinion it was the finest email client ever written, and it has yet to be surpassed.

I still use it today, but, alas, the last version of Eudora was released in 2006. It may not be long for this world. With thanks to Qualcomm, we are pleased to release the Eudora source code for its historical interest, and with the faint hope that it might be resuscitated. I will muse more about that later.

I still miss classic Eudora in a lot of ways.

Here’s are some telling statistics:

The Windows version of Eudora is written in C++. The source tree consists of 8,651 files in 565 folders, taking up 458 MB. There are both production (“Eudora71”) and test (“Sandbox”) versions of the code.

The Macintosh version of Eudora is an entirely different code base and is written in C. The source tree consists of 1,433 files in 47 folders, taking up 69.9 MB.

 ★ 
ifttt  daringfireball 
yesterday by josephschmitt
Amazon Teams Up With Law Enforcement to Deploy Dangerous New Face Recognition Technology | ACLU of Northern CA
from Daring Fireball

Matt Cagle, writing for the ACLU:

The company has developed a powerful and dangerous new facial recognition system and is actively helping governments deploy it. Amazon calls the service “Rekognition.”

Marketing materials and documents obtained by ACLU affiliates in three states reveal a product that can be readily used to violate civil liberties and civil rights. Powered by artificial intelligence, Rekognition can identify, track, and analyze people in real time and recognize up to 100 people in a single image. It can quickly scan information it collects against databases featuring tens of millions of faces, according to Amazon.

Amazon is marketing Rekognition for government surveillance.

This strikes me as a bad idea in general, but an especially bad idea for a company that sells consumer devices with built-in cameras.

 ★ 
ifttt  daringfireball 
yesterday by josephschmitt
Two Americans were detained by a Border Patrol agent after he heard them speaking Spanish
from Daring Fireball

Amy B. Wang, reporting for The Washington Post:

“We were just talking, and then I was going to pay,” Suda told The Washington Post. “I looked up [and saw the agent], and then after that, he just requested my ID. I looked at him like, ‘Are you serious?’ He’s like, ‘Yeah, very serious.’ ”

Suda said she felt uncomfortable and began recording the encounter with her cellphone after they had moved into the parking lot. In the video Suda recorded, she asks the agent why he is detaining them, and he says it is specifically because he heard them speaking Spanish.

“Ma’am, the reason I asked you for your ID is because I came in here, and I saw that you guys are speaking Spanish, which is very unheard of up here,” the agent can be heard saying in the video.

They were detained for nearly an hour for speaking Spanish. This guy should lose his job over this; I worry he’ll get a promotion.

 ★ 
ifttt  daringfireball 
yesterday by josephschmitt
Bitcoin estimated to use half a percent of the world's electric energy by end of 2018 | EurekAlert! Science News
from Daring Fireball

EurekAlert:

In the first rigorously peer-reviewed article quantifying Bitcoin’s energy requirements, a Commentary appearing May 16 in the journal Joule, financial economist and blockchain specialist Alex de Vries uses a new methodology to pinpoint where Bitcoin’s electric energy consumption is headed and how soon it might get there. […]

His estimates, based in economics, put the minimum current usage of the Bitcoin network at 2.55 gigawatts, which means it uses almost as much electricity as Ireland. A single transaction uses as much electricity as an average household in the Netherlands uses in a month. By the end of this year, he predicts the network could be using as much as 7.7 gigawatts — as much as Austria and half of a percent of the world’s total consumption.

This is not going to end well.

 ★ 
ifttt  daringfireball 
yesterday by josephschmitt
The Latest: EPA bars AP, CNN from summit on contaminants
from Daring Fireball

The Associated Press:

The Environmental Protection Agency is barring The Associated Press, CNN and the environmental-focused news organization E&E from a national summit on harmful water contaminants. The EPA blocked the news organizations from attending Tuesday’s Washington meeting, convened by EPA chief Scott Pruitt. […]

Guards barred an AP reporter from passing through a security checkpoint inside the building. When the reporter asked to speak to an EPA public-affairs person, the security guards grabbed the reporter by the shoulders and shoved her forcibly out of the EPA building.

Early stage autocracy.

 ★ 
ifttt  daringfireball 
yesterday by josephschmitt
Is Facebook Just a Platform? A Lawyer to the Stars Says No - The New York Times
from Daring Fireball

From a profile of Irish attorney Paul Tweed for The New York Times, by David Kirkpatrick:

In a February debate over revenge porn televised on the Irish national broadcaster, Mr. Tweed squared off against Niamh Sweeney, Facebook’s policy chief for Ireland. Ms. Sweeney said that one way Facebook was trying to address the issue was by inviting individuals to preemptively submit naked or other embarrassing pictures of themselves so the company’s software could block efforts to post the images. (A pilot program is underway in Australia.)

What could possibly go wrong with this scheme?

 ★ 
ifttt  daringfireball 
yesterday by josephschmitt
The Apple Watch has found a surprisingly useful home with everyone that works on their feet — Quartz
from Daring Fireball

Mike Murphy, writing for Quartz:

Quartz spoke with airline attendants, bartenders, waiters, baristas, shop owners, and (very politely) TSA employees who all said the same thing: The Apple Watch keeps them in touch when they can’t be on their phones at work. Apple has increasingly been pushing the watch as a health device, and seems to have moved away from marketing it as one that offers more basic utility, as Apple continues do with the iPhone. But given that roughly 23% of the US labor force works in wholesale or retail operations, perhaps it’s a market Apple should reconsider.

Interesting, but I don’t think it should be considered surprising. Apple has focused more on fitness features in its advertising this year, but this sort of convenient unobtrusive use of Apple Watch for communicating and receiving notifications was one of the core features right from the start.

 ★ 
ifttt  daringfireball 
yesterday by josephschmitt
The Last Days of Time Inc. - The New York Times
from Daring Fireball

Sridhar Pappu and Jay Stowe, writing for The New York Times:

An oral history of how the pre-eminent media organization of the 20th century ended up on the scrap heap.

It was once an empire. Now it is being sold for parts.

Walter Isaacson on the heyday:

There were gentlemen writers and editors and women researchers who stayed up late and often had affairs. People just stayed in the office and would make drinks, or people would go out to long dinners. You felt like you were in some movie version of an elegant magazine.

It’s really hard to believe how far Time Inc. and its flagship magazines have fallen. Up until just 10-15 years ago it’s hard to overstate how influential Time and Sports Illustrated were, or how staggeringly profitable People was. What an ignominious end to a once-great company.

 ★ 
ifttt  daringfireball 
yesterday by josephschmitt
‘Too inconvenient’: Trump goes rogue on phone security - POLITICO
from Daring Fireball

Eliana Johnson, Emily Stephenson, and Daniel Lippman, reporting for Politico:

The president uses at least two iPhones, according to one of the officials. The phones — one capable only of making calls, the other equipped only with the Twitter app and preloaded with a handful of news sites — are issued by White House Information Technology and the White House Communications Agency, an office staffed by military personnel that oversees White House telecommunications.

While aides have urged the president to swap out the Twitter phone on a monthly basis, Trump has resisted their entreaties, telling them it was “too inconvenient,” the same administration official said.

I don’t get it — surely it wouldn’t be inconvenient at all for Trump. It’s not like he’d be the one setting up the new phones.

Anyway, I’m sure everyone who was outraged by Hillary Clinton’s email practices will be just as outraged by this.

 ★ 
ifttt  daringfireball 
yesterday by josephschmitt
Teen phone monitoring app leaked thousands of user passwords | ZDNet
from Daring Fireball

Zack Whittaker, reporting for ZDNet:

The mobile app, TeenSafe, bills itself as a “secure” monitoring app for iOS and Android, which lets parents view their child’s text messages and location, monitor who they’re calling and when, access their web browsing history, and find out which apps they have installed. […]

The database stores the parent’s email address associated with TeenSafe, as well as their corresponding child’s Apple ID email address. It also includes the child’s device name — which is often just their name — and their device’s unique identifier. The data contains the plaintext passwords for the child’s Apple ID. Because the app requires that two-factor authentication is turned off, a malicious actor viewing this data only needs to use the credentials to break into the child’s account to access their personal content data.

What a fiasco. Looks like TeenSafe pulls data from iCloud backups — that’s at least one of the reasons they require you to give them iCloud passwords.

 ★ 
ifttt  daringfireball 
2 days ago by josephschmitt
quip | affiliate
from Daring Fireball

Created by dentists and designers, quip guides good habits that help improve oral health. To help you brush longer, quip packs a nifty 2-minute timer. To help you brush better, quip provides practical oral care advice in your inbox and mailbox. And to help you freshen old, worn out bristles, quip delivers new brush heads every 3 months (like dentists recommend). Not only does this make quip incredibly simple, it’s also effective with a Seal of Acceptance from the American Dental Association. Refresh your routine with the quip electric toothbrush, starting at $25.

 ★ 
ifttt  daringfireball 
2 days ago by josephschmitt
How did Google get so big?—60 Minutes - CBS News
from Daring Fireball

Steve Kroft, reporting for 60 Minutes:

This past week the Federal Trade Commission was asked to investigate the data collected by Google on its Android operating system, which powers most of the world’s smartphones. It was a tiny blip in the news cycle but another sign of Washington’s and Europe’s growing concerns about the enormous, largely unchecked power accumulated by tech giants like Facebook, Amazon and Google over the last two decades. Of the three, Google, which is part of a holding company called Alphabet, is the most powerful, intriguing, and omnipresent in our lives. This is how it came to be.

Succinct, compelling case that Google is abusing its search monopoly to promote its own products. Yelp founder Jeremy Stopplelman:

Jeremy Stoppelman: If I were starting out today, I would have no shot of building Yelp. That opportunity has been closed off by Google and their approach.

Steve Kroft: In what way?

Jeremy Stoppelman: Because if you provide great content in one of these categories that is lucrative to Google, and seen as potentially threatening, they will snuff you out.

Steve Kroft: What do you mean snuff you out?

Jeremy Stoppelman: They will make you disappear. They will bury you.

 ★ 
ifttt  daringfireball 
2 days ago by josephschmitt
Does Google’s Duplex violate two-party consent laws? – TechCrunch
from Daring Fireball

Devin Coldewey, writing for TechCrunch:

“It may be possible with careful design to extract the features you need without keeping the original, in a way where it’s mathematically impossible to recreate the recording,” Kortz said.

If that process is verifiable and there’s no possibility of eavesdropping — no chance any Google employee, law enforcement officer, or hacker could get into the system and intercept or collect that data — then potentially Duplex could be deemed benign, transitory recording in the eye of the law.

That assumes a lot, though. Frustratingly, Google could clear this up with a sentence or two. It’s suspicious that the company didn’t address this obvious question with even a single phrase, like Sundar Pichai adding during the presentation that “yes, we are compliant with recording consent laws.” Instead of people wondering if, they’d be wondering how.

This is one scenario I’m imagining for Google’s [complete refusal to answer any questions][a] related to the Duplex phone calls it has released — that they were actual Duplex calls to actual businesses (the one to Hong’s Gourmet almost certainly was, in my opinion), recorded without consent. Someone who works at the one restaurant we know Duplex called told Mashable they weren’t aware in advance.

This wouldn’t send anyone to prison, but it would be a bit of an embarrassment, and would reinforce the notion that Google has a cavalier stance on privacy (and adhering to privacy laws).

 ★ 
ifttt  daringfireball 
5 days ago by josephschmitt
Trump administration preparing to hold immigrant children on military bases - The Washington Post
from Daring Fireball

Nick Miroff and Paul Sonne, reporting for The Washington Post this week:

The Trump administration is making preparations to hold immigrant children on military bases, according to Defense Department communications, the latest sign the government is moving forward with plans to split up families who cross the border illegally.

According to an email notification sent to Pentagon staffers, the Department of Health and Human Services (HHS) will make site visits at four military installations in Texas and Arkansas during the next two weeks to evaluate their suitability to shelter children.

The bases would be used for minors under 18 who arrive at the border without an adult relative or after the government has separated them from their parents. HHS is the government agency responsible for providing minors with foster care until another adult relative can assume custody.

Let’s not mince words. What they’re describing here are called concentration camps. For children, forcibly separated from their parents.

 ★ 
ifttt  daringfireball 
5 days ago by josephschmitt
Rebecca Solnit: The Coup Has Already Happened | Literary Hub
from Daring Fireball

Rebecca Solnit, in a compelling essay for Literary Hub:

The current situation of the United States is obscene, insane, and incredible. If someone had pitched it for a thriller novel or film a few years ago, they would’ve been laughed out of whatever office their proposal made it to because fiction ought to be plausible. It isn’t plausible that a solipsistic buffoon and his retinue of petty crooks made it to the White House, but they did and there they are, wreaking more havoc than anyone would have imagined possible, from environmental laws to Iran nuclear deals. It is not plausible that the party in control of the federal government is for the most part a kleptomaniac criminal syndicate.

 ★ 
ifttt  daringfireball 
5 days ago by josephschmitt
Samsung Compares Galaxy S9 to Very Slow iPhone 6 in Frivolous Ad - Mac Rumors
from Daring Fireball

Two thoughts on this Samsung ad trying to get iPhone 6 users to upgrade to a Galaxy S9:

I’m glad they’re making fun of the notch rather than copying it, like every other Android maker. Samsung should go all-in on anti-notch-ism. It’ll make them stand out not just compared to the iPhone, but to their Android competitors. I don’t think this weird haircut is the way to do it, though.

I’m curious about the legality of using the Apple logo on the shirts worn by the employees inside the fake Apple Store. I’m not sure I’ve seen that before. There’s a long history of second bananas mocking their market-leading competitor, by name, in ads. Pepsi mocking Coke, [Burger King mocking McDonald’s][k]. But can you imagine a Burger King commercial where someone goes into a McDonald’s, including employees wearing McDonald’s-logo’d uniforms, and gets a bad hamburger? Wendy’s iconic “Where’s the Beef?” spot took place in a generic competitor, not a McDonald’s (although the narrator mentions Big Mac and Whopper at the end).

Rather than show and mention an actual iPhone 6 and Apple Store, if I were Samsung (and were going to demean myself by doing an ad like this) I would have created a thinly veiled caricature — say, from a brand called Pineapple or Banana — and then exaggerated every aspect of the experience for comic effect. Go for actual humor, “Where’s the Beef”-style.

 ★ 
ifttt  daringfireball 
5 days ago by josephschmitt
Daring Fireball: The Restaurant Where Google Claims to Have Booked an Actual Meal Via Duplex
from Daring Fireball

At the bottom of Google’s AI Blog announcement of Duplex (“An AI System for Accomplishing Real World Tasks Over the Phone”), they included a photo of two Duplex engineers eat a meal, with the following caption:

Yaniv Leviathan, Google Duplex lead, and Matan Kalman, engineering manager on the project, enjoying a meal booked through a call from Duplex.

As suspicions around this announcement deepen, I got to wondering if we could identify this restaurant. If we could identify the restaurant, we could ask them if they had been told in advance they would be speaking to Google Duplex, among other interesting questions.

The image is cropped somewhat tightly, but they’re clearly eating Chinese food, the bench style and wall color are distinctive, and there’s a large picture hanging over their heads. So, I did the laziest thing I could possibly do: I asked my Twitter followers if any of them recognized it.

22 minutes later, we had the answer from DF reader Jay P: Hong’s Gourmet, in Sarasota, CA. This image on Yelp shows the same bench, same wall, and same picture on the wall. Next door to Hong’s Gourmet is Masu Sushi, whose sign is legibly reflected in the glass of the picture behind the Google engineers.1

My thanks to Jay P and everyone else who contributed to the thread on Twitter. Jay deserves the credit for cracking this, by going backwards from the Masu Sushi sign in the reflection.2 All I did was ask. The fact that I had an answer to my question in just 22 minutes shows that having a large follower count on Twitter is a bit of a super power. I honestly can’t think of another way to have answered this question without Google PR’s help. I suppose, without Twitter, I could have just posted the question on Daring Fireball, and I might have gotten the same answer. But the threaded, public, instant nature of Twitter allowed for multiple people to contribute — we went from “this might be the place” to “this is definitely place” in just a handful of minutes. Remarkable, really.

One weird detail is that the image from Google of the engineers has been flipped horizontally, so the reflection of the neighboring restaurant’s sign isn’t mirrored. My only guess as to why Google flipped this image is that they wanted Leviathan, the project lead, to have his name listed first in the caption. ↩︎

Solving this not from the decor of the restaurant but instead from the tiny reflection of the neighboring restaurant’s sign brings to mind one word: “Enhance.” ↩︎︎
ifttt  daringfireball 
5 days ago by josephschmitt

« earlier    

related tags

ai  apple  coreml  deeplearning  dust  entries  favoritetweet  feedbin  hardware  ifttt  johngruber  learning  macbook  macbookpro  machinelearning  ml  quality  tensorflow  webapps  website 

Copy this bookmark:



description:


tags: