Your Gmail account could be hacked

At The Atlantic, James Fallows has written an excellent and harrowing account of how your email program in the cloud be hacked and what you can do about it. The story is centers on a real-life experience of Fallows' wife, who noticed one day that she couldn't get into her Gmail account; by the time she got control of her account again, she noticed that all of her email was missing. After much additional effort she regained access to most of her email, but it wasn't easy and this result is not guaranteed. She made the mistake of simply assuming that her data was safe with Google and that no one would hack her account. Many people are out there trying to take over your email account, and they are successful too often. They have broken into email accounts in all of the cloud email companies (gmail, yahoo, hotmail . . . you name it). The problem is usually password hygiene. Fallows offers some suggestions at the end of his detailed article (I highly recommend that you read the entire article, because his suggestions go well beyond the excerpts below):

[I]f you use Gmail, please use Google’s new “two-step verification” system. In practice this means that to log into your account from any place other than your own computer, you have to enter an additional code, from Google, shown on your mobile phone. On your own computer, you enter a code only once every 30 days. This is not an airtight solution, but it can thwart nearly all of the remote attacks that affect Gmail thousands of times a day. Even though the hacker in Lagos has your password, if he doesn’t have your cell phone, he can’t get in. In case you’ve missed the point: if you use Gmail, use this system. Also, make sure the recovery information for your account—a backup e-mail address or cell phone where you can receive password-reset information—is current. Google uses these to verify that you are the real owner. Next we have password selection, that seemingly impossible task. The science, psychology, and sociology of creating strong passwords is a surprisingly well-chronicled and fascinating field. OnThe Atlantic’s Web site, we will describe some of the main strategies and the reasoning behind them. Even security professionals recognize the contradiction: the stronger the password, the less likely you are to remember it. Thus the Post-it notes with passwords, on monitor screens or in desk drawers. But there is a middle ground, of passwords strong enough to create problems for hackers and still simple enough to be manageable.

Continue ReadingYour Gmail account could be hacked

Come to the United States for slow and expensive Internet

As reported by Common Dreams:

The New York Times reported on Wednesday that the U.S. has sunk to 25th in a global ranking of Internet speeds, just behind Romania. Why? Because our nation's regulators abandoned an earlier commitment to foster competition in the marketplace for Internet access providers.
Here's the problem:  Most households in the United States have little-to-no choice when it comes to land line broadband:

The lack of competition has turned America into a broadband backwater. In the aftermath of the FCC’s decisions, powerful phone and cable companies legislated and lobbied their way to controlling 97 percent of the fixed-line residential broadband market — leaving the vast majority of consumers with two or fewer choices of land-based providers in any given market.

This article links to a Free Press publication, "Dismantling Digital Deregulation: Toward a national Broadband Strategy," which tells us what deregulation has brought us:
Almost right out of the gate, the Bush administration’s FCC declared war on competitive ISPs. It quickly decided that even though the cable platform had transformed into a two-way communications medium, cable companies didn’t need to abide by any of the pro-competitive requirements of the 1996 Act. The FCC also decided that incumbent monopoly phone companies would no longer be required to provide competitive broadband ISPs wholesale access at reasonable rates and conditions. This abandonment of “open access” policy flew in the face of congressional intent and doomed the competitive ISPs to irrelevancy and bankruptcy. Meanwhile, overseas, other countries maintained this commitment to competition and reaped the benefits. The OECD countries with open access policies have broadband penetration levels nearly twice that of countries without these policies. Citizens in the countries with open access policies also get more broadband bang for their buck. For example, consumers in countries with “line sharing” open access policies pay about $14 per Mbps; consumers in countries without these policies pay more than double this amount. The FCC, in its blind pursuit of deregulation, abandoned line sharing and other open access policies in the hopes that this “regulatory relief” would inspire incumbents to make massive investments in broadband infrastructure. But this hope, based in part on the promises made by the incumbents to get favorable FCC treatment, turned out to be completely false. An examination of the data reveals that the pace of broadband deployment was no different in the years before major FCC broadband deregulation than it was in the years after. States like Virginia and Maine saw no improvement in deployment, while in some states like Nebraska, things actually got worse. The FCC also justified its abandonment of competition policy by arguing that the incumbent phone and cable companies would offer third-party ISPs wholesale access on favorable terms, even though they weren't obligated to do so. In retrospect, letting the fox guard the henhouse was a colossal mistake. An examination of the offerings of the few remaining third-party broadband ISPs illustrates the obvious: that incumbents have absolutely no reason to offer their competitors favorable wholesale rates. For example, Earthlink still resells Time Warner Cable broadband service, but the monthly rate is so high that no consumer in his or her right mind would pay it. Earthlink’s 7 Mbps tier costs consumers nearly $30 more than if they bought it from Time Warner Cable directly, while the lowest-price tier is nearly 20 percent cheaper if purchased from Time Warner Cable. In many cases, once they were granted relief from providing reasonable wholesale access, incumbents refused to offer wholesale altogether or jacked up the rates so high that third-party ISPs would lose money.

Continue ReadingCome to the United States for slow and expensive Internet

Telecommunications industry working overtime to misrepresent net neutrality

I don’t believe that money is speech, but I’ve repeatedly seen that money motivates dishonest speech, much of it uttered by paid “experts.” This money-motivated dishonesty is a recurring problem regarding many issues, including the topic of this article, net neutrality. On August 8, 2011, I was pleased to see that the St. Louis Post-Dispatch published my letter to the editor on the topic of net neutrality.  Here’s the full text of my letter:

Maintain neutrality We pay Internet service providers to move data from point to point. We don't pay them to steer us to selected sites (by speeding up access times) or to discourage us from using other sites (by slowing down or blocking access). Nor do we pay them to decide what applications we can use over the Internet. I should be free to use Skype even if it competes with the phone company's own telephone service. Giving Internet users this unimpeded choice of content and applications is the essence of "net neutrality," and it has inspired unceasing innovation over the Internet. The Senate soon may vote on a "resolution of disapproval" that would strip the Federal Communications Commission of its authority to protect Americans from potential abuses. If it passes, net neutrality would be at serious risk. Congress is under big pressure (and receiving big money) from companies like AT&T, Comcast and Verizon, who want to become the gatekeepers of the Internet. They would like to carve up the Internet so that it would become like cable TV, with tiered plans and limited menus of content that they would dictate. Phone companies should not be allowed to dictate how we use the Internet. I urge Sens. Claire McCaskill and Roy Blunt to support net neutrality by voting against the resolution of disapproval. Erich Vieth • St. Louis
I wrote this letter as a concerned citizen.  I have long been concerned about net neutrality.  I have seen ample evidence that increasingly monopolistic telecommunications companies have no qualms about forcibly assuming the role of Internet gate-keeper.  As for-profit entities, their instinct is to limit our Internet choices if it would make them ever greater piles of money. Call me a pragmatist based on America’s television experience; telecommunications companies want to control how we use the Internet much like cable TV companies shove users into programming packages in order to maximize profit. On August 18, 2011, I noticed that the Post-Dispatch published an anti-net-neutrality letter. Here is the text of that letter: [More . . . ]

Continue ReadingTelecommunications industry working overtime to misrepresent net neutrality

A Subtle Change to the Way the Web Works

A recent article on ZDNet, 10 things you should know about HTML5, brought to mind the good old days. I wrote my first web site in early 1995, back before there was a World Wide Web Consortium, before there were hundreds of thousands of web sites, before Internet Explorer was even a gleam in Bill Gates' eye, and HTML 1.0 had recently been ratified. I had to manually install a TCP/IP stack in DOS (underlying Windows 3.11), and bought a book on the proposed HTML 2.0 standard to use with my purchased 3½" disc of the new Netscape 2.0. Yes, I wrote my first several sites using Notepad, before moving up to the superior Notepad++. Netscape had some good debugging tools built in that IE never felt the need to mimic. The first deficiency that I noticed in the HTML standard was that there was no graphical mode. They had no way to draw a box, a line, a circle, or any graphical image except for the img tag to import Microsoft BMP and CompuServe GIF files. The open JPG standard was just coming out. I couldn't believe it. The HPGL vector language seemed pretty standard to me back then, and has since become the universal vector drawing protocol in plotters and such. But somehow the designers of the new, image-based World Wide Web addition to the Internet had no apparent plan to explicitly support graphics. Sure, one could buy Flash and embed it as an object on a page. But it was expensive, clumsy, and not widely deployed back in the 300/1200/2400 baud world. But now, only sixteen years later the W3C is finally putting together the new HTML 5.0 standard, including both vector and video graphics as part of the basic language! Because of the now-entrenched nature of Flash, that isn't going away quickly. After all, many web sites still use the CompuServe GIF 1989a (formerly proprietary) image format. But Flash or DivX or QuickTime will no longer be necessary to build fully graphical web pages.

Continue ReadingA Subtle Change to the Way the Web Works

Apparently We Need More Accidental Criminals

I was reading my usual science blogs, and came across Weekend Diversion: And now, they're coming for me. Yeah, me. Because I write for you. at Starts With a Bang. Apparently Congress is creating new classes of felons that would have no idea they were doing anything even technically wrong. In brief,  U.S. Senate Bill 978 (that just cleared committee) makes it a Federal Offense (felony) if you happen to embed someone's video on your post that someday someone may claim infringed on a copyright. If I, for example, embed a video of some stranger's birthday party on this blog, that pans briefly across a television set that happened to be playing a commercial for shoes, that has background music by the Beatles, and in five years Michael Jackson's heirs decide that this infringed on their copyright on the music of McCartney and yank the video, I could technically be sentenced to up to 5 years in prison. Even if the creator of the video, the owners of the network, and the shoe company and its marketing agent all had approved my use. Ethan Siegel has more details about this silliness and suggestions on his post.

Continue ReadingApparently We Need More Accidental Criminals