Life Without the Tech Giants

Life Without the Tech Giants

Maybe you’re in the camp of people who worry that these companies have too much access to our purchases, our movements, our social networks—and perhaps even our thoughts. Maybe you’re disturbed by the concentration of so much economic power in a handful of companies built on the West Coast’s fault lines. Or maybe you want them to have less insight into your life so they have less sway over our society. But how? How do you reduce their power? Is it even possible?
The common retort to these concerns is that you should “just stop using their services.” So I decided to try.

Read More
Rachel Orr/The Washington Post

China’s scary lesson to the world: Censoring the Internet works

“After two decades of Internet development under the Communist Party’s firm leadership, [China’s Internet czar, Lu Wei] said, his country had struck the correct balance between ‘freedom and order’ and between ‘openness and autonomy.’” – BEHIND THE FIREWALL: How China tamed the Internet | This is part 1 of 6 of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.

Read More
China Innovation gif

America wants to believe China can’t innovate. Tech tells a different story.

“The truth is that behind the Great Firewall — the system of censorship designed to block content that could challenge the Chinese Communist Party — China’s tech scene is flourishing in a parallel universe.” – BEHIND THE FIREWALL: How China tamed the Internet | This is part 4 of 6 of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.

Read More
A live visualization of the online phishing and fraudulent phone calls across China. (Ng Han Guan/Associated Press)

China’s vast Internet prison

In law and in practice, China is creating the world’s largest online thought prison. It turns the idea of the Internet as a force for freedom on its head, and as China goes, so go other tyrants. From Vietnam to Saudi Arabia, from Russia to Turkey, the age of Internet repression has blossomed.

Read More
MIT's Time-Sharing Computer

Passwords Evolved: Authentication Guidance for the Modern Era

Here’s the bigger picture of what all this guidance from governments and tech companies alike is recognising: security is increasingly about a composition of controls which when combined, improve the overall security posture of a service. What you’ll see across this post is a collection of recommendations which all help contribute to a more robust solution by virtue of complementing one another.

Read More
Ray Holt - Photograph: William Widmer

The Secret History of the First Microprocessor, the F-14, and Me

This is the story, then, of how another first microprocessor, a secret one, came to be—and of my own entwinement with it. The device was designed by a team at a company called Garrett AiResearch on a subcontract for Grumman, the aircraft manufacturer. It was larger, it was a combination of six chips, and it performed crucial functions for the F-14 Tomcat fighter jet, which celebrates the 50th anniversary of its first flight this week.

Read More