Life Without the Tech Giants

Life Without the Tech Giants

Maybe you’re in the camp of people who worry that these companies have too much access to our purchases, our movements, our social networks—and perhaps even our thoughts. Maybe you’re disturbed by the concentration of so much economic power in a handful of companies built on the West Coast’s fault lines. Or maybe you want them to have less insight into your life so they have less sway over our society. But how? How do you reduce their power? Is it even possible?
The common retort to these concerns is that you should “just stop using their services.” So I decided to try.

Life Without the Tech Giants Read More
Rachel Orr/The Washington Post

China’s scary lesson to the world: Censoring the Internet works

“After two decades of Internet development under the Communist Party’s firm leadership, [China’s Internet czar, Lu Wei] said, his country had struck the correct balance between ‘freedom and order’ and between ‘openness and autonomy.’” – BEHIND THE FIREWALL: How China tamed the Internet | This is part 1 of 6 of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.

China’s scary lesson to the world: Censoring the Internet works Read More
(Washington Post illustration; iStock)

Internet activists are finding ways around China’s Great Firewall

“I hope one day I’ll live in a country where I have the freedom to write any code I like without fearing.” – BEHIND THE FIREWALL: How China tamed the Internet | This is part 2 of 6 of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.

Internet activists are finding ways around China’s Great Firewall Read More
China Innovation gif

America wants to believe China can’t innovate. Tech tells a different story.

“The truth is that behind the Great Firewall — the system of censorship designed to block content that could challenge the Chinese Communist Party — China’s tech scene is flourishing in a parallel universe.” – BEHIND THE FIREWALL: How China tamed the Internet | This is part 4 of 6 of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.

America wants to believe China can’t innovate. Tech tells a different story. Read More
((Rachel Orr/The Washington Post; iStock))

China’s plan to organize its society relies on ‘big data’ to rate everyone

“This is what China calls “Internet Plus,” but critics call a 21st-century police state.” – BEHIND THE FIREWALL: How China tamed the Internet | This is part 5 of 6 of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.

China’s plan to organize its society relies on ‘big data’ to rate everyone Read More
Washington Post illustration; iStock

U.S. companies want to play China’s game. They just can’t win it.

“For some highflying U.S. Internet businesses, the China dream is fading; for others, it looks radically different from what they had hoped.” – BEHIND THE FIREWALL: How China tamed the Internet | This is part 6 of 6 of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.

U.S. companies want to play China’s game. They just can’t win it. Read More
MIT's Time-Sharing Computer

Passwords Evolved: Authentication Guidance for the Modern Era

Here’s the bigger picture of what all this guidance from governments and tech companies alike is recognising: security is increasingly about a composition of controls which when combined, improve the overall security posture of a service. What you’ll see across this post is a collection of recommendations which all help contribute to a more robust solution by virtue of complementing one another.

Passwords Evolved: Authentication Guidance for the Modern Era Read More
Ray Holt - Photograph: William Widmer

The Secret History of the First Microprocessor, the F-14, and Me

This is the story, then, of how another first microprocessor, a secret one, came to be—and of my own entwinement with it. The device was designed by a team at a company called Garrett AiResearch on a subcontract for Grumman, the aircraft manufacturer. It was larger, it was a combination of six chips, and it performed crucial functions for the F-14 Tomcat fighter jet, which celebrates the 50th anniversary of its first flight this week.

The Secret History of the First Microprocessor, the F-14, and Me Read More
blocky world map with people - Illustration: Hiroshi Watanabe

A New Tool Shows How Google Results Vary Around the World

Google’s claim to “organize the world’s information and make it universally accessible and useful” has earned it an aura of objectivity. Its dominance in search, and the disappearance of most competitors, make its lists of links appear still more canonical. An experimental new interface for Google Search aims to remove that mantle of neutrality.

A New Tool Shows How Google Results Vary Around the World Read More