The algorithm is a bad guide

Algorithms are flawed. And yet they seem to be the best technology companies have to offer. How many products claim to “learn from your behavior”? But what happens when I am the weaker part in this information exchange? There is no way I can know what gems are hidden in the database. So once again the products recommended to me are repetitive or shallow.

So it was great to stumble upon Susanna Leijonhufvud’s Liquid Streaming, a thesis on Spotify and the ways in which streaming music, selected by algorithm not only learns from our experiences, but more interestingly, acts to train us into being musical cyborgs (a la Haraway)

Starting from the human, the human subject can indeed start to act on the service by asking for some particular music. But then, as this music, this particular track, may be a part of a compilation such as an album or a playlist, the smart algorithms of the service, e.g. the machine, will start to generate suggestions of music back to the human subject. Naturally, the human subject can be in charge of the music that is presented to her by, for instance, skipping a tune, while listening on a pre-set playlist or a radio function. Still, the option in the first place is presented through a filtering that the machine has made, a filtering that is originally generated from previously streamed music or analysis of big data, e.g. other networked subject’s streamed music. Added to this description; if an input derives from the subject’s autonomous system, then the analogy of an actor-network is present on yet other layers. The actor-network of the musical cyborg work both within the subject itself, as the subject is not consistent with an identity as an entity, as well as between the subject and the smart musical cicerones.

Leijonhufvud (2018) Liquid Streaming p. 274

We often forget this feedback loop. Since we are trained by the algorithms the level of serendipity and growth is relatively low and we tend to be stuck in a seemingly narrow spiral – especially considering we are supposed to have access to an almost infinite amount of music.

As a newish Spotify user who is musically ignorant, I often find the algorithm to be laughably unhelpful since it does little to expand my horizons and as such is less of a cicerone (knowledgable guide) and more of a frustrated and frustrating gatekeeper.

It would be nice not to have the things I already know recommended to me ad infinitum, but rather show me things I have not seen or heard. Sure I may hate them but at least I may have the chance of expanding my repertoire.

Susanna Leijonhufvud (2018) Liquid Streaming: The Spotify Way To Music, Doctoral Thesis, Luleå University of Technology, (Fulltext here http://www.diva-portal.org/smash/record.jsf?pid=diva2%3A1171660&dswid=-2263

Who owns your stuff?

Its a discussion that has been going on since the start of the Free Software movement in the 80s (and maybe even earlier), and its taking a more sinister and urgent turn. There are two parts of the problem both addressed in Joshua Fairfield’s book “Owned: Property, Privacy and the New Digital Serfdom” and this article he wrote for Quartz: A Roomba of One’s Own. The first part is the question

If we are surrounded by devices we bought but do not control, do we really own them?

This is the challenge to the very idea of property that we are facing today. The books you buy for your Kindle are less yours than the books you have on your shelf (they are more leased than owned). The devices that you cannot repair are a clear example of the ways in which your stuff is really more of a rental situation.

The second part is all about the data our devices collect about us. We have always been under surveillance but the difference is that now we are the ones buying the surveillance devices AND providing all the data for surveillance. Recently there was a fascinating display of this when Netflix posted this tweet:

Some people thought it was amusing while others saw it as creepy. But it is a simple example of how everything we do is being mined for data. This was a simple piece of humor, but it is also an excellent visualization of the power of data collection. Its not even a complex example.

Free & Open Source Software: Notes from a lecture

For a large period of time in computing history software was not seen as the primary component. It was all about the hardware, the machine. The code that made the machine work and useable was simply seen as part and parcel of the machine.

One reason for this may be the way in which we tended to understand software. Another reason may have been that hardware of that size and complexity was not sold, it was leased. The “buyer” therefore was paying for a solution rather than a system. This was a very lucrative way of doing business.

The early punch card system that became the solution for the US Census was the Hollerith Tabulating Machine, these were leased to the Census Bureau. Hollerith’s company would later merge with others to become IBM whose punch card tabulators were leased to governments and organizations around the world. One advantage of the leasing system is that the company could control which cards were used in the system and also charge for maintenance and training.

With digitalisation many companies made source code available and engineers could make changes to the software. Improvements could be included into the code and sold on to the next company.

In 1969, IBM began to charge separately for (mainframe) software and services, and ceased to supply source code. By withholding the source code, only the company could make changes (and presumably charge their buyers for these changes).

The ability to “own” software, or at least control it through copyright was beginning to become a discussion among programmers. For example in 1976 Dr Li-Chen Wang released Tiny Basic under a Copyleft license which included the catch phrase “All Wrongs Reserved” Copyleft_All_Wrongs_ReservedIt is fair to say that the history of free software (and copyleft) truly begins with Richard Stallman‘s attempts to create a “technical means to a social end.” The story behind the creation of free software starts with his attempts to make a printer work and the company’s (who owned the printer) refusal to give access to the necessary code. He launched the GNU Project in 1983.

Free software is all about ensuring that we have access to, and control over, the basic infrastructures of our lives. It is not about having software at no cost – it’s about ensuring that our technology works in ways that suit our lives. In order to enact this the software that is produced by teams and individuals around the world is licensed under the GPL (General Public License) summing up the license is a bit tricky but it is common to refer to the Four Freedoms, to be considered to be Free Software it must:

 

The freedom to run the program as you wish, for any purpose (freedom 0).

The freedom to study how the program works, and change it so it does your computing as you wish (freedom 1).

Access to the source code is a precondition for this. The freedom to redistribute copies so you can help your neighbor (freedom 2).

The freedom to distribute copies of your modified versions to others (freedom 3).

A precondition for these freedoms is that the code must be accessible to those who would want to read it. The importance of Free Software is much like the arguments for free speech or freedom of information. It is not that everyone wants, or has the competency, to use these rights but without them all of us are a little less informed about what is happening around us.

Once again it is important to stress Free Software is not about price. Nor is it about doing whatever you like with the code. From the Free Software Manifesto (1985)

GNU is not in the public domain. Everyone will be permitted to modify and redistribute GNU, but no distributor will be allowed to restrict its further redistribution. That is to say, proprietary modifications will not be allowed. I want to make sure that all versions of GNU remain free.

It is a gift with a very clear condition.

Free Software is sometimes confused with Open Source software. They are both similar but they have different conditions:

The term “open source” software is used by some people to mean more or less the same category as free software. It is not exactly the same class of software: they accept some licences that we consider too restrictive…

A common difference that can easily be seen in many open source licenses is the lack of the clear condition that nothing can be made into proprietary software.

Here are the slides I used.

Becoming Bland: Popularity isn’t Innovation

Something has been happening at Twitter. There are rumblings of changes and re-designs. First there was the new changes that made it more “photo-centric”, then there was the talk of removing the @ reply and today the buzz is the new design making it all look more like Facebook. The photo changes have been made to challenge instagram and the re-design is to become more networky and challenge Facebook?

At the same time Facebook has been attempting to challenge Twitter and online chat with its recent exorbitant purchase of Whatsapp. Facebook’s launch of paper has been an attempt to take the market from news aggregation sites like digg.com and, more importantly, apps like Currents, Flipboard and Zite. Annoyingly, the innovative Zite has been bought by the excellent Flipboard which will decrease the diversity. Combining two nice things does not necessarily make it better.

In similar news but this is done to shut the app down.

Yahoo has announced that it wants to challenge YouTube with its own service. Yahoo also owns Flickr which has been slowly evolving. Flickr’s changes to it’s layout have made it progressively more difficult to download images and find information about the licensing which made the tool such a treasure for the open content community. Cory Doctorow wrote an interesting protest about this yesterday (Restoring CC attribution to Flickr, because Yahoo broke it).

So this isn’t really anything new. But it does point to a level of stagnation in the online world. When was the last time something really new, innovative and exciting happened? When the tech world is using more lawyers than developers you know that something is up. Instead of making really good products that many people like there is a race to the bottom in order to create as many similarly bland products that few people have the energy to hate.

In politics this is usually seen when previously well defined parties race towards the middle ground in order to gain the most votes. While this may be a successful policy to win elections it does tend to create bland politics and eventually leading to a great sense of disenchantedment (this might not really be a word but you know what I mean). Once all parties have lost their identities and voters have become unhappy the field is opened up for the growth of distasteful radical politicians spouting extremist views.

How does this work in tech?

The race to similarity and the priority of lawsuits over development creates a fall into blandness. Trying to make everybody happy will make nobody happy. This may open up the chance for new devices, apps and services to come forth. Well that would be the theory but in practice the market will be blocked by patents, fenced in with copyrights and guarded by monoliths that purchase and destroy all that is new and exciting.

Or maybe I’m just grumpy today?

New York Times' prophetic 1983 warning about the NSA

The scary part about the whole NSA Prism story is the predictability, if not inevitability of the whole affair. The shock of the disclosure lies mainly in the hope that government will not do what they have the power to do.

Via BoingBoing comes this 1983 article from The New York Times written by David Burnham: THE SILENT POWER OF THE N.S.A.

No laws define the limits of the N.S.A.’s power. No Congressional committee subjects the agency’s budget to a systematic, informed and skeptical review. With unknown billions of Federal dollars, the agency purchases the most sophisticated communications and computer equipment in the world. But truly to comprehend the growing reach of this formidable organization, it is necessary to recall once again how the computers that power the N.S.A. are also gradually changing lives of Americans – the way they bank, obtain benefits from the Government and communicate with family and friends. Every day, in almost every area of culture and commerce, systems and procedures are being adopted by private companies and organizations as well as by the nation’s security leaders that make it easier for the N.S.A. to dominate American society should it ever decide such action is necessary.

Making attribution work

One of the problems with using as many Creative Commons licensed images as I do is creating and maintaining a system so that I am able to attribute the right picture to the right creator in the right way.

This is why I’m excited about the project Commons Machinery that promises to make my life much easier.

Commons Machinery is building infrastructure in support of the Commons. Our aim is to make the use of digital works as easy as possible by developing new technology built on open standards for licensing, attribution and provenance.

So support Commons Machinery and make attribution (and life) easier.

How to share wifi from wifi (without Ethernet)

If hotel rooms are supposed to become my home away from home then there is one thing that I absolutely hate: the unfriendly wifi.

  1. I dislike paying extra for wifi
  2. I dislike having to log on with superlong codes each time I need to use wifi
  3. I dislike having to buy wifi for each of my devices separately!

The first two are unfortunately not going to go away until hotels come to their senses but the third can be resolved by without relying on the hotels.

This is a guide to creating your own wifi in a room where the only Internet connection is wifi (i.e. no Ethernet). You will need laptop, wireless router, Ethernet cable. I have done this with my Apple equipment. I am sure you can do this in other connections but I have not tried it. I have not done this all too often and remembering these settings are the reason I wrote this guide.

Begin by Logging into the wifi with your laptop.

Go to sharing (Settings->sharing->Internet Sharing) Select from wifi share via Ethernet and turn it on. When troubleshooting turning sharing on/off again has sometimes resolved the problem.

Connect your Wireless router to the computer. I use the new small Airport Express its lightweight for travel. Connect you Ethernet cable from the laptop to the Ethernet WAN port.

Then its time to set up the Wifi

Go to the Airport Utility (Applications -> Utilities -> Airport Utility)

Base Station: pick a name and password for the base station. This is not the wifi net or password but the way to log into the base station to make changes if need be.

Network: You are creating a wireless network. Pick name for that wifi and password. Chose Bridge mode.

Note some situations may not like you doing all this so picking a wifi name that screams out whom you are may be unwise. Obviously be wise about passwords as well.

Internet Connection: This is the hotel wifi that you logged into in the beginning of this guide.

The update and you are away. You should now log all your devices onto the wifi you have created and they are all sharing the internet connection that you are paying for.

Soon time for FSCONS 2011

It’s soon time for my favorite annual Free Culture event. This time, it’s the 5th FSCONS conference will be between 11th and 13th of November. As usual it is held in Gothenburg, Sweden.

FSCONS is the Nordic countries’ largest gathering for free culture, free software and a free society. The conference is organised yearly with 250-300 participants primarily from northern Europe. The main organiser is the Society for Free Culture and Software.

This years keynote speakers will be Richard Stallman & Christina Haralanova.

This year’s track are Building Together — Manufacturing Solidarity, Development for Embedded Systems, Development in Free Software Communities, Free Desktop Environments, Free Software in Politics, Human Rights and Digital Freedoms, Social Events, The Future of Money, Universal Design — Aiming for Accessibility.

Since I am not a coder I am especially looking forward to attending Book scanning, proofreading, and advanced reuse & Bitcoin: decentralised currency & Policy issues around Free Software & Privacy or welfare – pick one: Cryptocurrencies, taxation, and the legibility of culture & WikiLeaks, Whistleblowing and the Mainstream Audience & Internet and Civil Rights In LATAM & many more. Not to mention the great discussions and beer drinking nights.

Oh, and I will be giving the presentation Off the grid: Is anonymity possible?

Registration here.

Is user education a red herring?

The BBC podcast of The Media Show with Steve Hewlett is always interesting to listen to. The latest show I listened to (episode 28 September 2011) contained a segment on the recent changes to Facebook and what these may mean for privacy. Hewlett interviewed Facebook’s Christian Hernandez and attempted to get him to see the privacy effects of the new changes.

Basically the new changes will mean that your friends will see what you are doing online – unless you opt out of showing those specific pages. In other words Facebook will happily announce to your “friends” that you have been looking at pages on weight loss (or whatever) and naturally let them draw their own conclusions from what they see of what I saw.

Hernandez was quick to stress the elements of user control over his/her information. If you chose you may opt-out of showing friends the specific pages you are viewing right now. Additionally if you forget you can remove the pages after the fact.

My problem with the former is that I need to be aware that my Facebook friends will always be looking over my shoulder. I am easily going to forget this. As for the latter – well once my friends know what I have looked at, removing the links/pages/information is not effective… I have already outed myself.

When pressed for a reasoning to why the privacy encroaching changes were made Hernandez talked about Zuckerbergs vision of a social net. When pressed further he returned back to the concept of user control. Eventually he did accept that these changes will require user education.

In other words we, the users, need to learn new proactive, protective forms of behavior. The platform owner has washed their hands – its our problem that they have given us the gift of freedom and control. Wonderful terms like freedom and control become red herrings in the world of data harvesting.

But if we are in danger from social media shouldn’t we be able to expect that the state will somehow regulate to protect us from our own behavior. They did so in areas such as smoking, seat-belts and motorcycle helmets… Sure there is a lot of interest in attempting to update privacy regulation from the pre-social media age – but its tricky. Also not everyone is in favor of regulation.

An example of this is Jeff Jarvis’ recent book Private Parts – Gordon Crovitz reviewed it in the Wall Street Journal

“Congress is considering several privacy bills. But Mr. Jarvis calls it a ‘dire mistake to regulate and limit this new technology before we even know what it can do.’

“Privacy is notoriously difficult to define legally. Mr. Jarvis says we should think about privacy as a matter of ethics instead. We should respect what others intend to keep private, but publicness reflects the choices ‘made by the creator of one’s own information.’ The balance between privacy and publicness will differ from person to person in ways that laws applying to all can’t capture.”

Jarvis is right that it is complex to regulate what we do not fully understand but this means that in the meantime we are losing our integrity rights every time the platform owners make changes – nominally to increase our freedom and control – but in reality to increase their control and profits. Lets never forget what MetaFilter user blue_beetle wrote “if you’re not paying for something, you’re not the customer; you’re the product being sold”.

Profiteers may act to protect access to raw material – not the rights of raw material.

 

Increased surveillance it obviously cheaper than social change

“Everyone watching these horrific actions will be struck by how they were organized via social media. Free flow of information can be used for good. But it can also be used for ill. And when people are using social media for violence we need to stop them. So we are working with the police, the intelligence services and industry to look at whether it would be right to stop people communicating via these Web sites and services when we know they are plotting violence, disorder and criminality.”

Prime Minister David Cameron of Britain addressing Parliament during a special debate on the UK riots.

(via BoingBoing)

Increased surveillance it obviously cheaper than social change. Riots are bad but they are a incredibly potent symbol that something is wrong in society. So far the focus has been on “bad kids”, “bad parents” and “bad social media”. It’s all about blaming the individuals and preventing the possibility of rioting – Nothing about the need to create a society were people don’t want to riot.