IndieWebCamp Oxford Day 1 – Polytechnic

This is a repost promoting content originally published elsewhere. See more things Dan's reposted.

IndieWebCamp Oxford Day 1 by Garrett Coakley (polytechnic.co.uk)

I’m here at the first IndieWebCamp Oxford. I can’t quite believe it all came together!
Listening to @garrettc kick us off at @indiewebcamp #oxford! #indieweb pic.twitter.com/4Pn1yetifA— Dan Q (@scatmandan) 22 September 2018
After some introductory rambling from me, the group got down to planni…

I’m here at the first IndieWebCamp Oxford. I can’t quite believe it all came together!

After some introductory rambling from me, the group got down to planning and coding.

And it’s been mostly planning and coding ever since, with brief breaks here and there to swear at or about PHP in my case.

Note #10542

@edent here’s where you ought to start with developing a webmention endpoint in PHP: https://indieweb.org/Webmention-developer

Dan Q found GC6K1BC Church Micro 9632…Oxford – Christadelphian

This checkin to GC6K1BC Church Micro 9632...Oxford - Christadelphian reflects a geocaching.com log entry. See more of Dan's cache logs.

After a few false starts with the arithmetic (hint: make sure you’re substituting the right value into the right place!) – thanks for the checker! – this was a quick and easy find. Log completely full and in need of replacement. TFTC!

Note #10536

Just discovered @openbenches (openbenches.org), which tags the locations of benches with memorial plaques. If I could #indieweb webmention my checkins to them, I’d totally promote a new GPS game based upon them. #indieweb #indiewebcamp

Note #10533

Listening to @garrettc kick us off at @indiewebcamp #oxford! #indieweb

IndieWebCamp Oxford

Dan Q posted a note for GC6K1BC Church Micro 9632…Oxford – Christadelphian

This checkin to GC6K1BC Church Micro 9632...Oxford - Christadelphian reflects a geocaching.com log entry. See more of Dan's cache logs.

Flew by to collect the requisite information while on the way to IndieWebCamp Oxford this morning. So long as the rain holds off and I can solve the coordinates, I may be back at lunchtime to find the cache! Love instruction C, by the way… I’ll consider it!

There is no longer any such thing as Computer Security

This is a repost promoting content originally published elsewhere. See more things Dan's reposted.

Remember “cybersecurity”? Mysterious hooded computer guys doing mysterious hooded computer guy .. things! Who knows what kind of naughty digital mischief they might be up to? Unfortunately, we now live in a world where this kind of digital mischief is literally rewriting the world’s history. For proof of that, you need look no further than…

A good summary of the worst of the commonplace (non-spear) phishing attacks we’re seeing these days and why 2FA is positively, absolutely what you need (in addition to a password manager) these days.

How do you catch a lynx?: when buying a zoo goes horribly wrong

This is a repost promoting content originally published elsewhere. See more things Dan's reposted.

When the Tweedys bought a zoo in Borth, west Wales, it was a dream come true. But it soon turned into a nightmare of escaped animals, deaths and family feuding.

You might just be thinking that I have a fascination with zoos that became a nightmare for their owners, and maybe that’s true, but this article grabbed my attention because in my Aberystwyth years I spent many a happy afternoon at Borth Animalarium and saw the lynx in question. I was aware that the mini-zoo had long been plagued by various hardships, but I never knew quite how bad it was until I read this article.

The Dirty Secret of the Global Plan to Avert Climate Disaster

This is a repost promoting content originally published elsewhere. See more things Dan's reposted.

In 2014 Henrik Karlsson, a Swedish entrepreneur whose startup was failing, was lying in bed with a bankruptcy notice when the BBC called. The reporter had a scoop: On the eve of releasing a major report, the United Nation’s climate change panel appeared to be touting an untried technology as key to keeping planetary temperatures at safe levels. The technology went by the inelegant acronym BECCS, and Karlsson was apparently the only BECCS expert the reporter could find.

Karlsson was amazed. The bankruptcy notice was for his BECCS startup, which he’d founded seven years earlier after an idea came to him while watching a late-night television show in Gothenburg, Sweden. The show explored the benefits of capturing carbon dioxide before it was emitted from power plants. It’s the technology behind the much-touted notion of “clean coal,” a way to reduce greenhouse gas emissions and slow down climate change.

Karlsson, then a 27-year-old studying to be an operatic tenor, was no climate scientist or engineer. Still, the TV show got him thinking: During photosynthesis plants naturally suck carbon dioxide from the air, storing it in their leaves, branches, seeds, roots, and trunks. So what if you grew crops and then burned those crops for electricity, being sure to capture all of the carbon dioxide emitted? You’d then store all that dangerous CO2 underground. Such a power plant wouldn’t just be emitting less greenhouse gas into the atmosphere, it would effectively be sucking CO2 from the air. Karlsson was enraptured with the idea. He was going to help avert a global disaster.

Wonderful but horrifying longread about the truth of the theoretical effectiveness of the Paris Agreement. The short: if we’re going to keep global temperature rises under a “bad” 2°C rather than closer to a “catastrophic” 4°C, we need to take action, but the vast majority of the plans that have been authored on how to do that rely on investment in technologies and infrastructure that nobody is investing in and that might not work even if we did. We’re fucked, in short. See also this great video about greening the Sahara in an effort to lock carbon into plants (another great idea that, surprise surprise, nobody’s investing in).

Building Geese Games

This is a repost promoting content originally published elsewhere. See more things Dan's reposted.

I got into a general life slump recently, and so to try and cheer myself up more, I’ve taken up building fun projects. I joined this industry because I wanted to build things, but I found that I got so carried away with organising coding events for others, I’d not made time for myself. I started ‘Geese Games’ last year, but I only really got as far as designing a colour scheme and general layout. I got a bit intimidated by the quiz functionality, so sheepishly put it to one side. This meant that the design was already in place though, and that I couldn’t get caught up in fussing over design too much. So I figured this would be a good starting point!.

Why geese? I really like geese, and I wanted something super silly, so that I’d not end up taking it too seriously. So I intentionally made a slightly ridiculous design and picked out some pretty odd types of geese, and got stuck in. It got a bit intense; at one point I got such tech tunnel vision that I accidentally put one goose type in as ‘Great White Frontend Goose’, went around telling people that there really was such a thing as a ‘great white frontend goose and then later realised I’d actually just made a typo. Little bit awkward… But it has been good intense, and I’ve had so much fun with this project! Building it has made me pretty happy.

My friend Beverley highlights an important fact about learning to develop your skills as a software engineer: that it’s only fun if you make it fun. Side-projects, whether useful or silly, are an opportunity to expand your horizons from the comfort of your own home.

Quantum Computing and Cryptography

This is a repost promoting content originally published elsewhere. See more things Dan's reposted.

Quantum computing is a new way of computing — one that could allow humankind to perform computations that are simply impossible using today’s computing technologies. It allows for very fast searching, something that would break some of the encryption algorithms we use today. And it allows us to easily factor large numbers, something that would…

A moderately-simple explanation of why symmetric cryptography is probably (or can probably be made, where it’s not) safe from our future quantum computer overlords, but asymmetric (split-key) cryptography probably isn’t. On the journey of developing the theory of computation, are we passing through within our lifetimes the short-but-inevitable bubble during which split-key cryptography is computationally viable? If so, what will our post-split-key cryptographic future look like? Interesting to think about.

Importing Geocaching Logs into WordPress

Background

As an ocassional geocacher and geohasher, I’m encouraged to post logs describing my adventures, and each major provider wants me to post my logs into their silo (see e.g. my logs on geocaching.com, on opencache.uk, and on the geohashing wiki). But as a believer in the ideals behind the IndieWeb (since long before anybody said “IndieWeb”), I’m opposed to keeping the only copy of content that I produce in an environment controlled by somebody else (why?).

How do I reconcile this?

Wrist-mounted GPS in the snow.
Just another hundred metres to the cache, then it’s time to freeze my ass back to base.

What I’d prefer would be to be able to write my logs here, on my own blog, and for my content to by syndicated via some process into the logging systems of the various silo sites I prefer. This approach is called POSSE – Publish on Own Site, Syndicate Elsewhere. In addition to the widely-described benefits of this syndication strategy, such a system would also make it possible for me to:

  • write single posts amalgamating multiple locations (e.g. a geohashing expedition that included geocache finds) or,
  • write single posts that represent the same location published on multiple silos (e.g. a visit to a geocache published on two different listing sites [e.g. 1, 2])

Applying such an tool would require some work as different silos have different acceptable content rules (geocaching.com, for example, effectively forbids mention of the existence of other geocache listing sites), but that’d theoretically be workable.

POSSE would involve posts being made first to my blog and then converted via some process into logs in each relevant silo
The ideal solution would be POSSE-based.

Unfortunately, content rules aren’t the only factor making PESOS – writing content into each silo and then copying it to my blog – preferable to POSSE. There’s also:

  • Not all of the silos offer suitable (published) APIs, and where they do, the APIs are all distinctly different.
  • Geocaching.com specifically forbids the use of unapproved automated robots to access the site (and almost certainly wouldn’t approve the kind of tool that would be ideal).
  • The siloed services are well-supported by official and third-party apps with medium-specific logic which make them the best existing way to produce logs.
PESOS would mean that posts were made "the usual way" to the silos and then a process duplicates them onto my blog
A PESOS-based solution is far easier to implement, in this case.

Needless to say: as much as I’d have loved to POSSE my geo* logs, PESOS will do.

Implementation

My implementation is a WordPress plugin which does two things. The first is that it provides a Javascript bookmarklet and an accompanying dynamically-generated Javascript file (the former loads the latter) served from my blog’s domain. That Javascript file contains reference to every log already published to my blog, so that the Javascript code can deliberately omit these logs from any import. When executed on a log listing page like those linked above, it copies all of the details of that log into a form which submits them back to my blog, where it’s received by the second part of the plugin.

Geocache logs to WordPress importer seen running on geocaching.com
The import controls appear in a new, right-most column (GCVote is also visible running in my browser).

The second part of the plugin takes this data and creates a new draft post. My plugin is pretty opinionated on this part because it’s geared strongly towards my use-case, so if you want to use it yourself you’ll probably want to tweak the code a little (e.g. it applies specific tags and names metadata fields a particular way).

Import plugin running on OpenCache.uk
When run on OpenCache.uk effectively the same interface is presented, even though the underlying mechanisms and data locations are different.

It’s not fully-automated and it’s not POSSE,but it’s “good enough” and it’s enabled me to synchronise all of my cache logs to my blog. I’ve plans to extend it to support other GPS game services to streamline my de-siloisation even further.

And of course, I’ve open-sourced the whole thing. If it’s any use to you (probably in an adapted form), it’s all yours.

× × ×

Five-Eyes Intelligence Services Choose Surveillance Over Security

This is a repost promoting content originally published elsewhere. See more things Dan's reposted.

The Five Eyes — the intelligence consortium of the rich English-speaking countries (the US, Canada, the UK, Australia, and New Zealand) — have issued a “Statement of Principles on Access to Evidence and Encryption” where they claim their needs for surveillance outweigh everyone’s needs for security and privacy. …the increasing use and sophistication of certain…

How many times must security professionals point out that there’s no such thing as a secure backdoor before governments actually listen? If you make a weakness in cryptography to make it easier for the “good guys” – your spies and law enforcement – then either (a) a foreign or enemy power will find the backdoor too, making everybody less-secure than before, or (b) people will use different cryptographic systems: ones which seem less-likely to have been backdoored.

Solving the information black hole is a challenging and important problem of our time. But backdoors surely aren’t the best solution, right?

Nazi spies awarded fake medals after war by their MI5 controller

This is a repost promoting content originally published elsewhere. See more things Dan's reposted.

Two fascist spies were awarded fake Nazi medals after the end of the second world war by an MI5 officer who penetrated their secret network, a newly published book on wartime espionage has revealed.

Copies of German bronze honours for non-combat gallantry were commissioned from the Royal Mint and presented at a covert ceremony in January 1946 to both British citizens by Eric Roberts, a former bank clerk who spent years impersonating a Gestapo officer.

I love this. It’s the obvious end to the Double Cross system: giving the unwitting double agents you’ve turned fake medals “from” their own country so that they’re still in the dark about the fact that their handler isn’t on their side!