The Command Line

The Command Line

Description

Exploring digital citizenry as a creator and a consumer.

Link: thecommandline.net

Episodes

How systems change explains why some actors in the public policy space are more effective

Jan 8, 2018

Description:

This article from Stanford has helped me understand why some of my colleagues when I worked directly on public policy were consistently more effective. My own insights about coalition building and using connections well really snapped into much clearer focus Read More ...

Schumer wants to use CRA to undo net neutrality repeal

Dec 18, 2017

Description:

Jon Brodkin at Ars Technica as ever explains clearly how using the CRA to undo the FCC vote could work as well as the political likelihood of such an action succeeding. Part of me likes open internet supporters in Congress Read More ...

One Reason I am Increasingly Struggling to Speak about Tech Policy

Dec 18, 2017

Description:

Technology policy is hard to follow for the interested and invested. It is harder for a blogger and podcaster like me who wants in some way to make the legitimately complex issues in some way more understandable, to hopefully increase Read More ...

Glowing Recommendation of O’Reilly’s New Book

Dec 4, 2017

Description:

I had the great pleasure to see Tim O’Reilly speak in person at an open government event I attended years ago. Everything Cory relates in his expansive and glowing review of O’Reilly’s new book both rings true and makes for Read More ...

Firefox adopts technique from Tor to blunt browser fingerprinting

Oct 31, 2017

Description:

The change, to curtail access to the Canvas API, is incremental and likely to be limited in how it is visible to regular users. However it signals some progress in a collaboration with the Tor project to incorporate code and Read More ...

Google’s reCaptcha cracked again

Oct 31, 2017

Description:

A couple of important points here. What was theoretically broken was the audio alternative option in reCaptcha. Bad but not as bad as it could be. What is probably worse, though, is that an exploit has been previously published of Read More ...

Deputy AG shows law enforcers still don’t get encryption

Oct 31, 2017

Description:

According to The Register, the US Deputy Attorney General is now saying that technology companies don’t need to install back doors in their encryption–provided they can reveal plain text of all secure communications on demand. Entirely misses the point. Sure, Read More ...

Flaw in Google bug tracker exposed reports about unpatched vulnerabilities

Oct 31, 2017

Description:

I am surprised we haven’t seen this kind of thing previously. No doubt it has happened before given the value to attackers of this kind of information. The issue was found by a bug hunter as part of Google’s bounty Read More ...

FCC chair’s battles extend beyond net neutrality

Oct 30, 2017

Description:

Wherever you may fall on the budget concerns of an uncapped program like Lifeline, Jon Brodkin’s piece contains enough to worry about in terms of Pai’s continuing dismantling of his predecessors service to the public interest. Re-raising the bar on Read More ...

Lessons for technologists from historical resistance

Oct 30, 2017

Description:

This piece Cory shares works on a couple of levels. 1st is the simple history of how tech workers interfered with the Nazis, a theme that reminds me in all the best ways of the history and historical fiction I Read More ...

FBI still arguing for “responsible encryption”

Oct 30, 2017

Description:

Why is this still a thing? There is no such thing as encryption only law enforcers can bypass. The math and computer science on this is pretty well settled, not to mention the terrifying unintended consequences that would be unleashed Read More ...

2017-10-22 The Command Line Podcast

Oct 22, 2017

Description:

In a new episode of The Command Line, I ponder the challenges of code review. Read More ...

2017-10-01 The Command Line Podcast

Oct 1, 2017

Description:

In a new episode of The Command Line, I reflect on being mentored and being a mentor. Read More ...

2017-09-10 The Command Line Podcast

Sep 10, 2017

Description:

In a new episode of The Command Line, motivation and energy. Read More ...

2017-08-20 The Command Line Podcast

Aug 20, 2017

Description:

In a new episode of The Command Line, the appeal of complex learning curves. Read More ...

2017-08-06 The Command Line Podcast

Aug 6, 2017

Description:

In a new episode of The Command Line, the evolution leading to Docker. Read More ...

Congress invites key players to net neutrality hearing

Jul 25, 2017

Description:

Far too early to guess how this may play out. Should it lead to new legislation, for good or for ill, the back and forth at the FCC will effectively be ended. That means the stakes are pretty high. No Read More ...

Incredibly detailed history of notional crypto users, Alice and Bob

Jul 24, 2017

Description:

Not surprising that they originate from an RSA paper on public key cryptography. This site has way more than the early history, though, explaining how the set of notional actors has been expanded and adopted in other example narratives. h/t Read More ...

MIT working to make custom chips for AI more attractive for mobile

Jul 24, 2017

Description:

This reminds me of other research I’ve read about over the years to add other kinds of custom processors into the many core mix that is now prevalent even on mobile devices. This story isn’t even about creating a custom Read More ...

2017-07-23 The Command Line Podcast

Jul 23, 2017

Description:

In a new episode of The Command Line, writing tools for other developers. Read More ...

Unix predecessor resurrected in a simulator

Jul 10, 2017

Description:

Literally living history. Multics was was a critical antecedent to Unix and an early touchstone of hacker history. Seminal time-sharing OS needs emulator for ancient Honeywell DPS8M CPU Source: Multics resurrected: Proto-Unix now runs on Raspberry Pi or x86 • Read More ...

Thorough primer on threat modeling

Jul 10, 2017

Description:

Sean Gallagher at Ars does an admirable job of breaking down a security topic, threat modeling, that doesn’t get much attention outside of research and professional circles. This piece is a long read but well worth it, both to understand Read More ...

2017-07-09 The Command Line Podcast

Jul 9, 2017

Description:

In a new episode of The Command Line, single programming language versus learning many. Read More ...

W3C pushes forward DRM standard despite all objections

Jul 7, 2017

Description:

The cementing of DRM as a core web standard is terrible. Worse is how shamefully the W3C acted, ignoring and overruling all objections to produce this outcome. The W3C has overruled members’ objections and will publish its DRM for videos Read More ...

Let’s Encrypt to offer wildcard certificates for free

Jul 6, 2017

Description:

After only a year with a paid authority, I gladly switched to the free and open certificate authority that EFF helped stand up. I haven’t minded having to enter multiple alternative names on my certificate every time I renew (which Read More ...

Copyright Office recommends permanently legalizing right to repair

Jun 26, 2017

Description:

Jason Koebler’s write up at Motherboard explains that the Copyright Office is essentially tired of granting the same exemption to the DMCA’s anti-circumvention clause for the right to repair locked down devices. If adopted, this would be a substantial win Read More ...

2017-06-25 The Command Line Podcast

Jun 25, 2017

Description:

In a new episode of The Command Line, Internet exceptionalism and radical acceptance. Read More ...

Building quantum registers from imperfect crystals

Jun 20, 2017

Description:

Chris Lee at Ars explains some new research that could fill in a critical piece needed for a practical quantum computer, a way of storing multiple qubits similar to a register in a classical computer so more sophisticated computation and Read More ...

SCOTUS turns down dancing baby DMCA case

Jun 20, 2017

Description:

An unfortunate update explained well by Joe Mullin at Ars. Some useful background, too, as well as the question of whether EFF will proceed with a jury trial. The law against bogus DMCA takedowns will remain tough to enforce. Source: Read More ...

Solid advice on writing an effective comment to the FCC on net neutrality

Jun 19, 2017

Description:

Jon Brodkin at Ars leavens his coverage of the fight for network neutrality with this advice on writing a good comment to the FCC. He features suggestions from Gigi Sohn, long time and respected fixture of the DC technology policy Read More ...