Categories
Current Events Tampa Bay Uncategorized

Xamarin Dev Days in Tampa Bay happens tomorrow – Saturday, November 19th!

xamarin

Xamarin, the development tool that lets you use C# to write code for Android, iOS, Mac OS, Windows, and the cloud, is hosting a number of Xamarin Dev Days events all over the world, and the Tampa Bay event takes place tomorrow, Saturday November 19th at 9:00 a.m..

The Tampa Bay event is hosted by the Tampa Bay Mobile App Developers meetup at the Tampa Microsoft office in the Westshore area. Xamarin Dev Days events are hands-on sessions, with the mornings dedicated to learning about Xamarin and the afternoon set for diving into coding.

Are you in the Tampa Bay area and want to join in? Register at the Tampa Bay Xamarin Dev Days site!

Agenda

Here’s what will take place, and when:

 Time  What’s happening
9:00 a.m. – 9:30 a.m. Registration and breakfast, which SMARTRAC and SMART COSMOS (the company and platform I represent) are providing!
9:30 a.m. – 10:10 a.m. “Intro to Xamarin” presentation
10:20 a.m. – 11:00 a.m. “Cross-platform Xamarin” presentation
11:10 a.m. – 11:50 a.m. “Cloud Xamarin” presentation
12:00 p.m. – 1:00 p.m. Lunch (they’ll provide it; it will most likely be pizza)
1:00 p.m. – 4:00 p.m. Hands-on lab

Your hosts will be:

What you should bring

mac-and-windows-laptops

You’ll need a computer running either Mac OS or Windows on which to do Xamarin development. You should set up Xamarin prior to showing up, because setup takes time and bandwidth, which will likely be in short supply at the event. Follow these steps:

Breakfast is on SMART COSMOS!

smart-cosmos-horizontal

If you’re going to show up to spent 8 hours of your Saturday in an office — especially in the Tampa Bay Area, where November means sunny skies and 80°F/27°C temperatures — the least we can do is feed you. SMART COSMOS will help by providing breakfast!

SMART COSMOS is the IoT platform made by SMARTRAC, the company where I hold the title of developer evangelist. It orchestrates data for the internet of things, and combined with SMARTRAC’s RFID technology, it’s being used to help clothing manufacturers and retailers manage their wares, improve the way healthcare providers track patients from the moment they check into the hospital to well after they check out, and on mechanical devices to ensure that the right parts are plugged into the right places.

New to C#, or has it been a while? Download this free book.

c-sharp-programming-yellow-book

If you’re new to the C# programming language (I’ve quipped that it’s “like Java, but good”) or if it’s been a while (as is the case for me), I recommend getting your paws on Rob Miles’ C# Programming Yellow Book, a free ebook that he’s been publishing and updating for years. It’s based on the first year programming course at the University of Hull, and it’s been the free ebook I’ve been sending C# students to for years.

Categories
Uncategorized

Microsoft’s Visual Studio for Mac will debut at their “Connect(); // 2016” conference this week

old-microsoft-logo-and-mac-visual-studio

Microsoft meant to announce the upcoming release of the Visual Studio for Mac at the Connect(); 2016 developer event on Wednesday, but someone accidentally clicked “publish” on the blog entry a little too early (here’s the cached article). With this great news, we’re one step closer to their “pointy logo era”, that time in the 1970s and early- to mid-80s when they made development tools for many, many platforms.

bill-gates-time-cover

Bill Gates on the cover of TIME magazine, 1984.

For those of you who were too young to remember those days, here’s a quick photographic tour of just a few of the many, many versions of good ol’ Microsoft BASIC, the programming language that gave the company its start in a time when seeing a computer in a home or office was a very unusual thing:

The TRS-80 Model 100 by Radio Shack (yes, Radio Shack once made computers!) was one of the first notebook computers.

The TRS-80 Color Computer, also by Radio Shack, was their only machine not based on an Zilog Z80 processor, but a Motorola 6809 instead.

The Atari 400 and 800 series of computers had a passable built-in BASIC, but if you wanted the real thing, you’d load Atari Microsoft BASIC via cartridge or floppy disk.

The Apple II had its own BASIC — Integer BASIC — but it got superseded by Applesoft BASIC, a dialect of Microsoft BASIC whose name is an amalgam of “Apple” and “Microsoft”.

The IBM PC not only brought personal computing to offices, schools, and homes in the 1980s and 1990s, but many forms of Microsoft BASIC, starting with IBM BASIC.

It’s been a long time since Microsoft has made a full-fledged development environment for the Mac, but the signs of its arrival have been around for a while. Consider Xamarin Studio, whose creators were recently acquired by Microsoft…

xamarin-studio
…and Visual Studio Code, which is an excellent programmer’s text editor:

visual-studio-code

Here’s what Visual Studio for Mac will look like:

visual-studio-mac-workspace

VS for Mac is based on Xamarin Studio — the Mac version is so much better than the Windows version; Windows folks were much better off using Visual Studio with the Xamarin extension — and gives Mac-based developers the ability to use C# and .NET to build applications for…

  • Android
  • iOS
  • Mac OS

It also supports the ASP.NET Core web development platform for building web service back ends that can live on your on-premises servers or in the cloud on Azure.

VS for Mac is supposed to be the Mac OS counterpart of VS for Windows, and features many of the things that made Visual Studio popular, including IntelliSense:

intellisense

While it doesn’t support all the project types that the Windows version supports, its solutions use the same MSBuild-based solution and project format, meaning that Mac- and Windows-based developers can share projects for Android, iOS, Mac OS, and ASP.NET development seamlessly.

connect-2016

Microsoft will announce the full details about Visual Studio for Mac at their Connect(); // 2016 conference, which will feature live streams of its keynotes and various session from Wednesday, November 16th through Friday, November 18th. This promises to be an interesting one — make sure you catch it!

Categories
Uncategorized

When tech is so cool that it makes William Gibson accidentally slip into his native “street” talk

foe-real

They be fo’ real, Gib-dogg!

Categories
Uncategorized

Interviewed on John Biggs’ Technotopia podcast!

joey-devilla-technotopia

This morning, I got a message on Facebook Messenger from John Biggs:

chat-with-john-biggs

I said “Yes” immediately, because as I said on Twitter:

technotopia

Technotopia is Biggs’ weekly podcast about a bright future. Here are his own words about it:

Over the past few months I’ve been on a mission: I want to prove that the future is not going to suck. While this project was originally going to end up in a book – and it still will – I’ve started recording a weekly podcast called Technotopia in which I speak to amazing thinkers about the future. We’ve covered the environment, bitcoin, and why the future will be cafes and croissants.

Very soon after his message, we recorded the podcast in a single take, where I talked about my new job at SMARTRAC, the possibilities that RFID technology enables, growing up in the ’80s thinking you were born 20 years too soon while your friends thought they were born 20 years too late, accordion playing, and the sorts of things that you talk about when you love technology and want to use it to make a better future.

The podcast got posted today shortly after noon! Give it a listen using the player below, or subscribe to via the feed!

Categories
Uncategorized

With Surface Dial and the Touch Bar, the battle for your non-dominant hand is heating up again

surface-dial-and-touch-bar

This week, we’ve had demos of interesting new user interface hardware, most notably Microsoft’s Surface Dial

…and Apple’s Touch Bar:

In many of the demos for both devices:

  • The user’s dominant hand — the one with the better fine motor control — is being used to operate a pointing device, whether it’s a mouse, stylus, or touchscreen for some kind of fine motor control action — typically pointing at, creating, or editing onscreen objects, and
  • The user’s non-dominant hand is used to operate a option-picking device that affects the outcome of what s/he is doing with his/her dominant hand.

The UI tech for our dominant hands caught on quickly, making the transition from obscure device found only in super-advanced computing labs to a tool common enough to be part of a now-legendary gag in a popular movie in less than two decades…

…but our non-dominant hands have stayed empty for the most part, as no clear winners have emerged. Tools like the Surface Dial and Touch Bar may represent a new movement to bring our non-dominant hands back into the computing game.

It’s kind of odd to think that our non-dominant hands have little to do at our computers, when the demo that introduced to the mouse to an unsuspecting world actually featured an equally unusual device for our non-dominant hands.

mother-of-all-demos-chorded-keyboard-keyboard-mouse

Doug Englebart’s console from “The Mother of All Demos”, which was given on December 9, 1968. From left to right, the input devices are: chorded keyboard, standard keyboard, and the then-newfangled mouse.

On December 9, 1968, computer engineer Doug Englebart gave a presentation of a combined hardware/software system called oN-Line System, or NLS for short at the ACM/IEEE Fall Joint Computer Conference in San Francisco. In this now-legendary presentation — since dubbed “The Mother of All Demos” — he demonstrated so many computing innovations that we take for granted today, including windowed GUIs, hypertext, networking, and most famously, the mouse:

There was one innovation in the Mother of All Demos that didn’t catch on, and it was under Englebart’s left hand:

chorded-keyboard

It was the keyset, a chorded keyboard. Pressing a single key would generate a character or command, and pressing combinations of keys — like playing chords on a piano — would generate different characters or commands. With 5 keys and 2 states per key, the keyset allowed for the input of 31 different characters or commands (5 keys and 2 states actually allows for 32 combinations, but one of them is where no keys are pressed):

The keyset didn’t catch on, probably because it required you to memorize what each chording combination did. The Surface Dial and Touch Bar get around this by providing a context-sensitive visual guide — Surface Dial does this by providing you with a pie menu (a.k.a. radial menu), and the Touch Bar is a tiny touchscreen that gives you the context-appropriate virtual buttons and sliders.

Right now, the closest thing we have to non-dominant hand interface that’s used by a significant number of people is the W-A-S-D set of keys for games with a first-person-type perspective:

wasd-keyboard

Clean your keyboards every now and then. Please.

I expect (and hope) that our non-dominant hands are in for an interesting time over the next little while.

Watch the Mother of All Demos

If you’ve never seen Doug Englebart give the Mother of All Demos — or if you haven’t seen it in a while — watch it, keeping in mind that at the time, a lot of people were still interacting with computers by feeding punch cards into them!

Categories
Uncategorized

No escape: The new MacBook Pro in the leaked photos apparently doesn’t have an “esc” key

alleged-2016-macbook-pro
If you’re a regular reader of this blog, chances are that you’ve heard about and even seen the leaked photos that purport to show the new MacBook Pro that is expected to be announced on their Thursday, October 27th event. MacRumors has posted these photos, which show the inclusion of a touch-sensitive, fingerprint-reading OLED display where the function keys would normally go.

Here’s the same photo, zoomed in at the upper left-hand corner of the keyboard. Note that the esc key is missing:

alleged-2016-macbook-pro-keyboard

For the purposes of comparison, here’s a photo of the upper left-hand part of the keyboard on my work-issued machine, a mid-2015 MacBook Pro. Along with function keys, it has the esc key:

2015-macbook-pro-keyboard

The esc key generates the “escape character” — ASCII 27 in decimal, Unicode U+001B, equivalent to ctrl[ — and was meant to be a “cancel” or “stop operations” signal, or to mark the beginning of an escape sequence to specify that incoming characters should be interpreted as instructions rather than data. A number of Mac applications use the esc key as a “cancel” or “stop operations” signal, but according to Mac OS’ UX guidelines, the official key sequence for stopping operations is command. (command-period).

Most users will likely not miss the esc key, but there is one set of users for whom its removal could be a big problem…

vim-user

…vi/vim users. In vi and vim, the esc key gets you into command mode. Yes, there’s still ctrl[, but it’s not the same as having a single, dedicated key located at the uppermost, leftmost part of the keyboard.

Expect to hear some angry developers this week.

Categories
Uncategorized

Last Friday’s IoT botnet attack and internet outages, explained for non-techies

dns-attack-map

A map of the parts of the internet affected by Friday’s attack. The redder an area is, the more heavily it was affected.

If you’ve been reading about the cyberattack that took place last Friday and are confused by the jargon and technobabble, this primer was written for you! By the end of this article, you’ll have a better understanding of what happened, what caused it, and what can be done to prevent similar problems in the future.

coffee-cup

While I’ve gone to great lengths to make this article easily understood by non-techies, it’s still a little long because of all the material that has to be covered. Feel free to grab your favorite beverage before settling in to read it!

Before I explain the attack, let’s cover some terminology. It’ll make it easier to understand what happened…

What’s DNS?

phone-book

DNS is short for Domain Name Service. It translates domain names — names like google.com, slideshare.net, wikipedia.org, and so on — into their corresponding IP (internet protocol) addresses, each of which is a set of numbers that specifies a computer connected to the internet. Every computer and device connected to the internet has a unique IP address assigned to it; without an IP address, there’s no way it can send or receive information to and from the internet.

DNS is often described as “the phone book of the internet”: just as old-school phone books like the one in the photo above were used to look up the phone number corresponding to a given name, DNS is used to look up the IP address numbers corresponding to a given domain name. As you might have deduced, DNS is a key part of internet infrastructure; without it, connecting to anything on the internet is much, much harder.

If you’d like a more in-depth (but still non-techie-friendly) explanation of DNS, I recommend reading George Flanagin’s DNS Explained So You Can Understand.

What’s a denial-of-service attack?

crowd-at-door

A denial-of-service attack — often called by its short form, a “DoS attack” — is an attempt to make a network resource, such as a web site or service, unavailable to its intended users. This is typically done by having computers bombard a site or service with superfluous or nonsense requests so that its ability to fulfill real requests is either reduced or eliminated. Wikipedia has a good analogy for DoS attacks: “It is analogous to a group of people crowding the entry door or gate to a shop or business, and not letting legitimate parties enter into the shop or business, disrupting normal operations.”

You may often seen the term “Dos” with an extra D: “DDos”. That’s short for distributed denial-of-service attack, which is a denial-of-service attack being performed by a large number of computers, often spread throughout the globe. These days, most denial-of-service attacks are distributed ones, and DoS and DDoS attacks are pretty much the same thing.

If you’d like to learn more about Dos/DDoS attacks, Digital Attack Map’s Undertsanding DDOS page is a layperson-friendly starting point.

What’s Dyn, and what do they do?

dyn-logo

Dyn is a company that provides sells all sorts of internet infrastructure services including DNS, which was the first service they provided.

The “Phone book of the internet” analogy is a very big simplification of how DNS actually works. The task of resolving domain names into IP addresses is actually carried out by a large number of internet-connected computers. When you connect to the internet at home or in a small office, chances are you’re using the DNS provided by your internet service provider for free as part of the service.

There are times when the DNS provided by an internet service provider won’t cut it, and that’s where third-party DNS services come in handy. Some home internet service providers run DNS servers that are slow or unreliable; I once had a home provider that gave me great bandwidth but terrible DNS. In such cases, you can switch to the free DNS provided by Google by changing your computer’s network settings. There’s also the case of popular sites and online services that get lots of traffic — the numbers of people trying to connect to them online are so large that they need to make use of commercial DNS, which is designed for high throughput and reliability. Dyn provides such a service to businesses that deal with large volumes of internet traffic, including Twitter, Zappos, and Etsy.

There are a number of reasons to use third-party DNS instead of the service provided by your internet service provider. Digital Citizen lists them in their article, 6 reasons why you should use third-party public DNS servers.

What’s the internet of things?

nest-iot-devices

The “internet of things” — often shortened to IoT — is a catch-all term that we use to describe everything that we don’t usually think of as a computer that is connected to the internet. A “smart thermostat” that lets you use an app to adjust the temperature in your house while you’re on your way home is an IoT device. So is a home security system that you can activate remotely and notifies you of break-ins even when you’re on the other side of the world. So are internet-enabled security cameras that let you keep an eye on your home and pets through a web site while you’re at the office.

The things in the internet of things are typically connected to the internet as one or both of the following:

  • As a sensor, providing some kind of measurement data, such as temperature, speed, signals from an RFID chip or tag, pressure, sounds picked up by a microphone, sights caught by a camera, and so on. These devices have sensors that can take real-world measurements and turn them into digital data that can then be transmitted on the internet.
  • As a computer, performing some number-crunching and causing some action to be taken, with some examples being: turning on the air conditioning or heating, rotating a camera in a certain direction, and unlocking or locking a door. These devices have small computers — some of which have power that rivals desktop computers from only a few years ago — embedded in them.

A number of internet of things devices connect to the internet as both sensor and computer. For example, a smart thermostat functions as a sensor when getting the temperature of the room, and as a computer when turning on cooling or heating to reach a desired temperature. A smart camera functions as a sensor when taking video, and as a computer when changing its focus or direction.

IBM’s video, How It Works: Internet of Things, is a good primer on the internet of things and some of its practical applications.

What’s a botnet?

droid-army

A botnet — the term is a combination of “robot” and “network” — is a collection of internet-connected computers networked together and using their spare processing power and network bandwidth to perform some kind of coordinated (and usually malicious) action. The computers on a botnet are usually commandeered without the approval or knowledge of their owners.

  • On desktop and laptop computers (as well as some less-secure mobile devices), this is typically done by tricking the user into installing malware without his or her knowledge, which lets the botnet controller use any spare processing power and network bandwidth that the computer’s owner isn’t using.
  • On IoT devices, it’s often done by taking over their embedded computers. Many of these devices have a built-in account with easy-to-guess or easy-to-find usernames and passwords that grants full control over them. There’s malware called Mirai and Bashlight that scans the internet for these easily-compromised devices and uses these accounts to take them over.

Once you have a botnet, you can harness its power to do all sorts of unsavory things. Two of the most popular uses for botnets are sending spam and launching denial-of-service attacks.

For more on botnets, see How-To Geek’s article, What is a botnet?

Okay, you just defined five technical things. Now can you tell me what happened to the internet on Friday, October 21, 2016?

Hackread’s animation of what happened last Friday. Click the image to see the source.

Here’s what happened, using all the terminology we just covered:

On Friday, October 21, 2016 at around 6:00 a.m. EDT, a botnet made up of what could be up to tens of millions of machines — a large number of which were IoT devices — mounted a denial-of-service attack on Dyn, disrupting DNS over a large part of the internet in the U.S.. This in turn led to a large internet outage on the U.S. east coast, slowing down the internet for many users and rendered a number of big sites inaccessible, including Amazon, Netflix, Reddit, Spotify, Tumblr, and Twitter.

Flashpoint, a firm that detects and mitigates online threats, was the first to announce that the attack was carried out by a botnet of compromised IoT devices controlled by Mirai malware. Dyn later corroborated Flashpoint’s claim, stating that their servers were under attack from devices located at millions of IP addresses.

The animation above is a visualization of the attack based on the devices’ IP addresses and IP geolocation (a means of approximating the geographic location of an IP address; for more, see this explanation on Stack Overflow). Note that the majority of the devices were at IP addresses (and therefore, geographic locations) outside the United States.

What’s “Mirai” all about?

anna-senpai

The anime character “Anna-Senpai”, a.k.a. Anna Nishikinomiya. Yes, this is where it gets a little weird.

As I mentioned earlier, Mirai is the name of the malware that was used to seize control of poorly-secured IoT devices and coordinate them into Friday’s attack. It propagates itself by continuously searching the internet for IoT systems that can be taken over by logging into them with the built-in default or hard-wired usernames and passwords.

Friday’s attack isn’t the first Mirai attack to make the news. In September, internet security journalist Brian Krebs’ Krebs on Security site was targeted by a Mirai botnet in an attack powerful enough to affect the Akamai content distribution network (that’s no mean feat — take a look at their customers to get an idea of the amount of data they can distribute through the internet). The attack on Krebs’ site was likely in retaliation for his series of articles on the takedown of vDOS, a DoS-for-hire business (yes, there’s a business model for denial-of-service attacks). The publication of these articles coincided with the arrest of two men that Krebs named as vDOS’s founders.

On Friday, September 30th, someone going by the name of and using the image of “Anna-Senpai” (a character from the Japanese comic book and animated series Shimoneta: A Boring World Where the Concept of Dirty Jokes Don’t Exist — I told you it would get a little weird, didn’t I?) posted the source code of Mirai to Hackforums, an online discussion board where people who like to break into and disrupt other people’s computers hang out. Anna-Senpai released the source code as part of an announcement that s/he was getting out of the DoS-for-hire business, as s/he was under growing scrutiny from people in the internet security business (and likely law enforcement as well). Here’s what s/he wrote:

“When I first go in DDoS industry, I wasn’t planning on staying in it long. I made my money, there’s lots of eyes looking at IOT now, so it’s time to GTFO.” [Here’s the Urban Dictionary definition of GTFO, in case you need it. Be advised that the “F” in GTFO is a swear word.]

In continuation with the anime-fan theme, “Mirai” is a less-common Japanese girl’s name. It means “future”.

Krebs has a good guess as to why Anna-Senpai released the code into the wild:

It’s an open question why anna-senpai released the source code for Mirai, but it’s unlikely to have been an altruistic gesture: Miscreants who develop malicious software often dump their source code publicly when law enforcement investigators and security firms start sniffing around a little too close to home. Publishing the code online for all to see and download ensures that the code’s original authors aren’t the only ones found possessing it if and when the authorities come knocking with search warrants.

The publication of Mirai’s source code will likely have the following short- and long-term effects:

  • In the short term, it will enable a number of reasonably tech-savvy, socially-maladjusted people to launch their own attacks, including the one we saw on Friday. This will also hinder attempts by law enforcement to find the parties responsible for creating Mirai and using it.
  • In the long term, it will help prevent future attacks based on Mirai’s approach. Internet security professionals are already studying the code in an attempt to find ways to counter it.

What are these poorly-secured IoT devices?

xiongmai-camera

Brian Krebs has been working overtime recently, and covered this topic well in an article titled Who Make the IoT Things Under Attack? This is where the publication of Mirai’s source code turned out to be a good thing; it contains the usernames and passcodes it used to access poorly-secured IoT devices. By matching these to the known factory default settings of IoT devices, it was possible to determine which makes and models of IoT devices were compromised.

Krebs published a list of compromised IoT devices, including the usernames and passwords used by Mirai to gain unauthorized access to them. Many of these passwords are so laughably bad that your email service or online banking wouldn’t allow you to use them, and in one case — the Vivtoek IP camera — there’s no password at all.

A number of these username/password combinations are for maintenance purposes and hard-wired into the devices; they cannot be changed by their users. Imagine manufacturing hundreds of thousands, or even millions, of cars or door locks that can all be opened with the same, easily-copied key. That’s pretty much what these manufacturers have done.

Chinese technology manufacturer Hangzhou Xiongmai Technology (who often refer to themselves as “XM”) have admitted that some of their products, which include webcams, digital video recorders, and white-label components used by other device vendors were partially responsible for Friday’s attack. At the time of writing, their response has been to recall a pitifully small number (10,000) of their webcams, and to threaten legal action against anyone who they say tarnishes their brand.

What can you do?

If you’re reading this, it’s quite likely that you’re based in North America. Given that most of the attacks came from outside North America and originated on devices that aren’t common in North America, it’s unlikely that any of your devices were part of Friday’s botnet attack. However, it doesn’t mean that they could be used in future attacks.

As individuals, the best thing we can do is secure our home routers. They act as the gateway that our devices at home use to reach the internet, and they’re the first, best place to take security measures. You’ll need to access your router’s settings (these are different for various makes and models, so you’ll have to consult the manual) and perform these steps:

  1. Change the administrative password for your router. By “administrative password”, I mean the password used to access the settings for the router, not the password to get on the wifi network. Mirai works by logging into devices using default usernames and passwords, so make sure you’re not using the default password!
  2. Disable remote management, especially remote management through telnet. Telnet is a protocol that lets one computer remotely control another, and for most non-techie users, it isn’t useful. Disabling remote management and telnet cuts off one of Mirai’s avenues to the devices on your home network.
  3. Disable Universal Plug-and-Play (also known as UPnP). It’s a protocol designed for devices on home networks to find and communicate with each other, and most routers have it enabled by default. It is a big security hole that malware like Mirai can exploit, and disabling it is unlikely to make any difference in the way you use your devices at home.

If your router is more than a few years old, get a new one. This is even more important if you’ve been using your current one without a password or the default one. You may find that in addition to being more secure, it’s also faster.

If you’re using the default password on any device, change it now! Once again, part of Mirai’s effectiveness is based on our laziness — it counts on people not changing the default passwords on their devices to gain access to them without permission.

What else can be done, part 1: We all have to stop being so damned cheap

cheapskate

Buying things based primarily on price only starts a race to the bottom, and this is doubly true for the internet of things. Adding sensors, computers, and networking capability to things naturally makes those things more expensive. Vendors and manufacturers who compete primarily on price love to cut corners, and quality — which includes security — often gets cut with them.

As customers, we need to stop buying based just on price, and as vendors and manufacturers, we have to stop using price and start using quality as our main differentiator (and this means taking security very seriously, and not treating it as an afterthought). This is a chicken-and-egg problem, but it’s one we must solve in order to prevent the internet of things’ downward slide.

What else can be done, part 2: It may require law enforcement and governments to step in

law

In the rather libertarian world of technology, suggesting the increased involvement of law and government in our sphere may be anathema, but it might be the best alternative. Techies’ preferred approach is to let the free market solve problems, but security guru Bruce Schneier explains why it might not work in this case, because the incentives that usually drive free market corrections aren’t there:

The market can’t fix this because neither the buyer nor the seller cares. Think of all the CCTV cameras and DVRs used in the attack against Brian Krebs. The owners of those devices don’t care. Their devices were cheap to buy, they still work, and they don’t even know Brian. The sellers of those devices don’t care: they’re now selling newer and better models, and the original buyers only cared about price and features. There is no market solution because the insecurity is what economists call an externality: it’s an effect of the purchasing decision that affects other people. Think of it kind of like invisible pollution.

What this all means is that the IoT will remain insecure unless government steps in and fixes the problem. When we have market failures, government is the only solution. The government could impose security regulations on IoT manufacturers, forcing them to make their devices secure even though their customers don’t care. They could impose liabilities on manufacturers, allowing people like Brian Krebs to sue them. Any of these would raise the cost of insecurity and give companies incentives to spend money making their devices secure.

What else can be done, part 3: Internet service providers need to get better at detecting and mitigating these attacks

submarine-cable-map

A map of the world’s submarine cables. Click to see the source.

In a world that is increasingly dependent on computers, devices, and networking, internet service providers can’t be content to simply shuttle bits around. They may need to consider examining the kind of traffic they allow through them, and we’ll all need to consider what kind of impact this move would have on security, privacy, and the principle of network neutrality.