Saturday, October 26, 2013

Hackathon Team Builds ‘Open Radioactivity Warning System' For Crowdsourced Data


Hackathons can sometimes turn into a sea of laptops and monitors, so perhaps it's no surprise that, as I wandered the Disrupt Europe Hackathon today, I found myself drawn to a table covered with wiring and gadgets, including a Geiger counter. The idea was pretty unusual, too - as the four-person team explained it to me, they're trying to build a system for collecting and displaying crowdsourced radiation data. Philipp Wagner (the team member actually working with the Geiger counter) explained that in situations like the Fukushima nuclear disaster, you might not trust the company involved to give you accurate warnings about the radiation danger. So a participant in the Open Radioactivity Warning System would receive their own Geiger counter that collects and shares live data online. The team's hardware attracted other passersby, and one of them suggested that a similar project already exists. I think they were talking about Safecast, a project that was originally funded through Kickstarter in the wake of Fukushima - right now, it looks like Safecast is focused on Japan. The team comes from the Austrian cities of Linz and Vienna, and it's their first time at Disrupt. Philipp attributed the idea to his teammate Alex Entinger, who seems to have brought the the group together - he went to university with one of his teammates (Matthias Schörghuber), another is his girlfriend (Adriana Ghira), and he said he recruited Philipp because they work on the same floor. It seems like the system is still very much a work in progress, but Alex said he's determined to have something finished for the hackathon presentations tomorrow. In the meantime, you can see an initial version on the website of Entinger's startup, LXRobotics.

Gillmor Gang: Free As A Bird


The Gillmor Gang - Robert Scoble, Dan Farber, Keith Teare, Kevin Marks, and Steve Gillmor - recorded a Tuesday evening session in the wake of Apple's iPad refresh announcements. Tim Cook cemented control of the company by open-pricing apps and OS for the price of the hardware. In so doing, Apple did what Google has been doing for years: free upgrades to enhance the network effects of the platform. The hardware continues to attract not only the core faithful but a growing number of tire kickers for enhanced collaborative services. The freed-up iWork apps may seem like an attack on Office, but the easier target is Google Apps. Google is forced to counter by playing ball with iPhone users to retain cross platform share for Google Now, and the big prize of push notification keeps opening up a lead in aggregate with Microsoft fading fast.

H2O-Pal Helps You Get Your Two Gallons Of Water A Day


The United States National Laboratory Of Water Drinking And Health (not a real laboratory) recommends that all humans drink lots of water all the time. That's why H2O-Pal exists – it's a water bottle that tells you how much you've drunk and, more important, when you've reached the daily goal of two to five gallons (warning: you could probably drink less) needed to stay alive. The system uses a scale and accelerometer to see how much water you drink during the day. You fill the bottle, snap on the electronics, and hit the town. You can pull the puck-like device off of the bottle for washing. It then connects to your iPhone via Bluetooth to report your drinking habits.
They are asking for $95,000 on Kickstarter with devices starting at $59. They will sell for $69 when H2O-Pal launches in February. The Ljubljana-based company showed me prototypes of the system last summer and I was duly impressed. Anything that can ensure that we liquid-based lifeforms maintain our juiciness is A-OK in my book.

The War On Hackers


Corey Thuen was a developer at the Idaho National Laboratory who helped to develop a network-visualization tool called Sophia. Then Battelle Energy, the company that manages the INL, rejected the notion of open-sourcing Sophia, and instead licensed it for commercial use to a company called NexDefense. So Thuen created a separate-but-similar open-source tool called Visdom, written in entirely different languages. (He stresses: “Visdom is not a translation of Sophia from C to the languages in which Visdom is written. We did not have the Sophia code when we created Visdom.“) And what happened? That's right: Battelle sued him. No, wait, it gets even worse. Because Thuen identified himself as a “hacker” - he's a security researcher who's worked for the FBI, among others - the judge had his computer seized without notice on the grounds that: there are national security implications associated with an open-source release … In addition, the defendants have identified themselves as hackers, as discussed above. A well-known characteristic of hackers is that they cover their tracks … The tipping point for the Court comes from evidence that the defendants – in their own words – are hackers. By labeling themselves this way, they have essentially announced that they have the necessary computer skills and intent to simultaneously release the code publicly and conceal their role in that act. There is so much so wrong here that I scarcely know where to begin. Should we be more outraged by Battelle's decision to license, rather than open-source, code developed with taxpayer money? By their breathtakingly broad patent application? By the idea that their belatedly-registered copyright should apply to similar code written independently in different languages? By the amazing contention that an open-source version of a network visualization tool would have “national security implications”? Or by the notion that those who call themselves “hackers” are advertising to the world their intent to break the law? …This seems like a good time to link you to the Visdom Legal Defense fund, because Mr. Thuen has a very expensive road ahead of him. But let's also step back and take a look at the larger picture here. It's not like this is the first hacker panic in recent memory, or the first time that the American legal system has decided to aim bizarrely huge howitzers at alleged hackers and/or computer-related crimes. Think of Aaron Swartz, threatened with 35 years in prison; Chelsea Manning, charged with the capital crime of “aiding the enemy”; Andrew Auernheimer, jailed for years for the crime of incrementing a URL; and Barrett Brown, indicted for copying-and-pasting a link. It doesn't help that the mainstream understanding of “hacker” does indeed mean “criminal,” whereas the tech-world definition is very different. But there's a lot more going on here than just a semantic misunderstanding. I think hackers - and all computer experts - are increasingly perceived as more dangerous than other potential criminals … because, perhaps rightly, they're seen as more powerful. Hacker technology is increasingly seen to be encroaching on domains that were, until recently, the exclusive purview of nation-states. Who needs a central bank or fiat state currency when you've got Bitcoin? What happens when the state monopoly on violence is subverted by 3D-printed guns? (Hence the recent hilarious hysteria.) Or when Edward Snowden and his ilk decide that it's their individual duty to watch - and report on - the NSA watchmen? Or when intellectual property rights are honored more in the breach than the observance? What happens is that the empire strikes back, of course. Two years ago Cory Doctorow gave a talk to the Chaos Computer Congress in Berlin entitled “The Coming War On General-Purpose Computing.” (And the great Vernor Vinge was way ahead in his novel Rainbows End.) As Doctorow put it: …all of our sociopolitical problems in the future will have a computer inside them, too-and a would-be regulator saying stuff like this: “Make it so that self-driving cars can't be programmed to drag race” “Make it so that bioscale 3D printers can't make harmful organisms or restricted compounds” Which is to say: “Make me a general-purpose computer that runs all programs except for one program that freaks me out.” I submit that: The ongoing saga of judges and elected officials coming down particularly hard on computer crimes and hackers is happening in part because, on some level, whether it's conscious awareness or unconscious cultural context, hackers are seen not as mere miscreants, but as dangerous enemies of the fundamental established order of society. This “war on hackers” is actually just the first salvo in the war on general-purpose computing. So throw Corey Thuen some money, would you? And then buckle your seat belt. Because if I'm right, then this next decade is going to be an awfully bumpy ride.

Meet The Coders Of The Disrupt Europe Hackathon


The Disrupt Europe Hackathon is underway, but just because you can't make it out to Berlin for the festivities, it doesn't mean you can't enjoy the experience. That said, we're bringing you as close as possible to the sights, sounds, and (unfortunate) smells of the 24-hour coding competition with this video. We're seeing starts from near and far, experienced and brand new to the scene compete. More than $5,000 is on the line, as hackers will present their products on stage tomorrow at noon to a panel of amazing, expert judges. Plus, our incredible API sponsors like Weather Underground and Yammer are giving away some amazing prizes for the best use of their API.

Social Scheduling Tool Buffer Gets Hacked, Floods Twitter And Facebook With Weight Loss Spam


If you're a user of social media scheduling app Buffer, there's a good chance that your Saturday morning has been less than relaxing. There have been numerous reports circulating today purporting that the service has been hacked, and just a few moments ago the company officially confirmed those reports in a tweet. “Hi all. So sorry, it looks like we've been compromised,” the terse statement reads. “Temporarily pausing all posts as we investigate. We'll update ASAP.” At this point the company has said little else about the cause of the issue, but its effects are clear: users who have linked their social accounts to the service have been posting sketchy weight loss links like the ones seen below. The extent of the hack is also unclear at this point, but Buffer Chief Happiness Officer (yes, really) Carolyn Kopprasch has said that it doesn't seem like every user has been affected by the exploit. Speaking of affected Buffer users, you're probably in the clear if your Facebook or Twitter accounts haven't already started spewing spam - following a tweet from CEO Joel Gascoigne, all sharing from the service has been temporarily halted as the team tries to figure out what's wrong. A quick attempt to sign in from the Buffer homepage confirms the team's response - it's impossible to sign in using a Twitter account, and the corresponding Facebook app seems to have been pulled into sandbox mode so the Buffer API is inaccessible to outside users. Even so, it wouldn't be a bad idea to revoke Buffer's access to your accounts just in case - you can disable Buffer from connecting to your Twitter account here, while doing the same on Facebook will require a trip to your application settings page. While the slew of spammy links only seems to have begun within the last hour or so, it appears as though the root cause of problem may have begun a little earlier than that. Judging by the company's timeline of tweets, the issues began late last night when some users reported not being able to access the service, while others claimed that their scheduled social posts had disappeared from the Buffer backend. I've reached out to the company for some additional insight and I'll update this post as I learn more.

Make Yourself "Interruptible" for Better Meetings


Email clutter can mount up at work, so Behance’s William Allen recommends having a face-to-face talk. And no matter how tricky the conversation is, there is one prerequisite to all such meetings: “be interruptible.” If you are too busy to listen to your team, don’t expect them to make the time to listen to each other. Yes, you might occasionally lose the deep focus you had when you are interrupted. But an in-person conversation alleviates one of the greatest drains on company resources—a lack of clarity—so it generally is a worthy tradeoff. Of course, this isn’t going to work every time. On some occasions, you just need the other party to listen, so it might be advisable to clearly state at the start of the meeting if you can be interrupted or not. Chances are, saying that you can be interrupted will encourage others to pipe in when they feel the need to.