Internet


What does the TikTok ban mean?

Biden signed a bill banning access to an Internet service. The Supreme Court has upheld the ban, ruling in effect that claiming “national security” overrides the First Amendment. What happens next isn’t clear, but the sloppy news reports I’ve seen indicate that it could be worse than I thought. The law doesn’t do much directly to ByteDance, which is a foreign company. It’s really a ban on what businesses in the USA can do.

CNN’s report is typically sloppy and alarming in what it suggests.
(more…)


A strange experience on Bluesky   Recently updated !

I maintain the @filknews account on Bluesky, which is a manually maintained mirror of the one on Mastodon. It includes reports of upcoming conventions, online filksings, and other things of interest to filkers. This morning I got an email saying:

A Bluesky account you control has been assessed as a spammy, fake, or inauthentic account. Your account was reviewed by Bluesky content moderators and was found to be in violation of our Community Guidelines. As a result, your account has been taken down.
 
As a reminder, Bluesky requires that users not use Bluesky to do harm to others, including spamming, phishing or otherwise using technical means to disrupt the Bluesky experience for other users.

(more…)


Let’s bring back blogrolls

Blogrolls used to be a standard feature of many, if not most, blogs. A blogroll is a simple thing: a list in a sidebar or footer of links to like-minded or interesting blogs. They’re a way for related blogs to be mutually supporting. I’ve added one to the sidebar of this site, and it will grow in the future.

Blogrolls were popular until Google modified its ranking algorithm to downgrade their links. Maybe they had a good reason; it’s easy to set up a bunch of dummy blogs linking to each other to boost their search rank. But even if they don’t improve a blog’s Google rank, the links are worth posting as an alternative to the search engines. Readers will find interesting blogs and add their RSS or Atom feeds to a feed reader, letting them keep up with information on their favorite topics or from their favorite people. They will in turn have links to other interesting blogs. It isn’t mandatory to reciprocate when others add you to their blogrolls, but it’s considered courteous. (Hint to anyone I’ve listed.)
(more…)


Uses and abuses of Bluesky moderation

I’m enjoying Bluesky quite a lot. Here’s my profile, in case you’re on Bluesky and want to follow me. With few exceptions, I limit my posts there to music, silent film, and an occasional bit of humor or trivia. I intentionally avoid most political discussion, because I like to relax there. But Bluesky has developed the inevitable echo chambers, and I avoid following accounts that veer into hostility and mockery.

Bluesky offers lots of moderation tools at the personal level. You can use the content filters and the optional Bluesky moderation service, which are found under the Moderation category of your settings. Remember that any system-wide moderation system will make mistakes, blocking harmless material or letting disgusting stuff through. Having user-controlled moderation frees the staff to deal with the worst offenders, as opposed to content that others just find annoying.

Users can create moderation lists. These are lists of users which others can use to mute or block accounts that the list creator thinks are best avoided. That’s helpful but has its risks. You can use a moderation list selectively, for confirmation that someone else thinks certain users are nuisances. You can block or mute the whole list, but then you’re delegating your decision to someone else.
(more…)


Words without meaning 8

To answer an accusation, you have to know what it means. If the words have no fixed meaning, no argument can show that it’s false. Certain words in the culture of the left serve this purpose. They allow irrefutable accusations — irrefutable because they mean whatever the accuser wants them to. Denying the accusation or defending someone else against it can even become evidence of guilt. Words are supposed to be the tools of thought, but these words are designed to make thought impossible.
(more…)


Why is it so intimidating to subscribe? 1

I believe in paying for what I get. Various websites get my financial support when I think they’ve earned it. I’ve complained regularly on this blog about the news media, but Vox is more concerned with facts and objectivity than most, so it seemed worth a paid subscription. However, when I went to sign up, I was pointed at the terms of use, a document of 12,081 words. That’s long enough to be a novelette by the Hugo Awards’ definition.

Agreeing to terms of service without knowing exactly what they say can have serious consequences. By signing up for Disney Plus, you waive your right to file a wrongful-death lawsuit, or at least so their lawyers claim. Disney later backed off in that particular case, but it was a one-time exception in the face of heavy publicity.
(more…)


Strange stuff happening on LinkedIn

Yesterday I logged into LinkedIn, and shortly afterward I got an email saying:

Your request to activate Remember me on your Firefox, Mac OS X in Boston, Massachusetts, United States was not successful. This is because you have 2-Factor Authentication enabled on your account for additional security.

This was followed by information plausibly matching my last login. However, I didn’t know what “Remember me” is, and I certainly didn’t intentionally activate any feature by that name yesterday. This sounded like a bug. I went into LinkedIn’s help, which makes it difficult to contact a human, and eventually figured out how to report it. If it was happening to me, I figured, it must be happening to others.
(more…)


It’s time to stop using Authy

Multi-factor authentication is a valuable security measure. If someone guesses or steals your password, it’s another barrier to their getting into your account. Using an application that generates access codes is one of the better ways to do it. Several applications are available, most of which use the same protocol. The Open Authentication architecture sets the standard, and many applications implement it, offering advantages or disadvantages. I’ve used Authy from Twilio for some time, but it’s time to leave.

The biggest dangers of using a 2FA application are a breach in its security and the loss of its availability. Authy has been deficient on both counts. In June, Twilio suffered a data breach. The exposed information wasn’t critical, but it could aid malicious parties in getting 2FA codes by trickery. Worse, Authy’s availability on various devices and computers has been erratic.
(more…)


The march of Internet censorship

Legislation all over the USA is attacking freedom to communicate over the Internet. Some states have enacted age-verification requirements that endanger anonymous speech and limit minors’ access to information they may urgently need. Others are enacting bans on “deceptive” information, leaving open the questions of just what will be deemed deceptive and how people can defend themselves against such claims. An example of the latter is California’s AB 2655, recently signed into law. FIRE and the First Amendment Coalition have issued statements against it, while left-wing media sites have often been sympathetic. I posted earlier about how AP gave Harris’s call for “oversight” and “regulation” of websites as merely wanting “increased accountability.”
(more…)


Please don’t spread misinformation: Part 2

A few weeks ago, I discussed the mostly innocent spreading of misinformation through jokes and satire. A person on Mastodon said I should have called them lies, but a lie means intent to deceive. A lot of widespread claims start without malice. That seems to have been the case with the story of Haitian immigrants stealing and eating people’s pets in Springfield, Ohio. It now appears to have started with a Facebook post that posted a garbled version of a neighbor’s claim without expecting anything significant to come of it. Others picked it up, embellishing it from vague stories they’d heard or from their imagination. Another source was claims of immigrants poaching on waterfowl, which may or may not have been true but is in a far different category from killing pets.
(more…)