(I think this is the reason for the shortness of this post. As is often the case, we start with journal stuff, then nerd stuff and, hidden at the end, some backyard philosophy stuff.)
The weekend part on the other hand started with a welcome-back-braai (HI MOM!) on Friday, followed by a sublime oxtail potjie on Saturday and concluded today with a sublime long(ish, by my standards as always) run in the morning (showing a little solidarity with the Comrades participants whilst not completely busting my barefoot-style-acclimatising feet and ankles) plus Helderberg stroll and lunch, and is now ending with a WHV writing session.
(Sundays which start with a run, have family stuff in between, and end with WHV are automatically awarded a 12/10-would-do-again rating according to my patented How Was Your Day Honey evaluation system.)
Just in case you missed it, Google’s Gboard keyboard for iOS quietly shipped an update last week that includes as one of its new features support for Afrikaans. This brings the number of smart iOS keyboards (smart, as in AI-based) that support Afrikaans up to the total of two (2). The other is SwiftKey, which has supported Afrikaans for some years now.
(The lack of a mobile keyboard with native support for one’s language can really complicate effective communication. Preferring fully formed sentences, I’ve never really gotten the hang of SMS-speak.)
After a slight detour with a number of other books that have featured on this blog, I have returned to Yuval Harari’s Homo Deus.
I am about 75% through, but I can already say that this is one of the best works I’ve read in the past decade.
The way in which Harari, a history professor, weaves together so many strands of history and present to extrapolate our planet’s future is nothing short of magical. Along the way, he takes the reader along on many mind-expanding tangents.
The one tangent I made note of to mention here, was his treatment of the illusion, which we are all brought up to entertain, that each human houses a single ego or individual.
By citing and discussing several examples of humans with separated brain hemispheres, he makes a strong case for the observation that most probably you house multiple identities.
There is a strong narrating self who tries to weave together the experiences and inputs of the other selves, and who will go to great lengths to make everything fit.
Thinking about all of the internal discussions one has throughout every day, and the seeming disagreements one can have between yesterday’s you and today’s you, Harari’s thesis starts to sound like a really good explanation.
This soon leads to interesting new questions: What would be the best way to manage one’s multiple aspects, especially in the light of the fact that “one” does not even know with certainty who is asking this question?
(Astute readers will have noticed that my choice of a title for this blog has finally been vindicated after all this time.)
See you next week, my suddenly multitudinous readers!
P.S. Harari says that intelligence and consciousness don’t necessarily go together. We are entering a future where many of us are going to be made obsolete by constructs which don’t possess consciousness but are far more intelligent than we are.
P.P.S. For one of the best hard sci-fi books dealing with our often-held but anthropocentrically flawed perspective that consciousness and intelligence go together, you can do a lot worse than Blindsight, by Peter Watts. Read that book.
During a brilliant breakfast chat with friends who are visiting from afar, friend S (now 16.67% name-dropped) admitted that the WHV, strange unfocused mishmash of thoughts that it is, contributed positively to his information diet.
In spite of this admission adding to my already considerable posting anxiety, I am enormously grateful for the encouragement. I often worry about this mishmash, as I also aspire to enter the fabled halls of A-list bloggers one day.
Perhaps I should just embrace the mishmash. Again.
In this edition of the mishmash, I extremely sparsely review the weeks from Monday May 8 to Sunday June 11.
During our weekly extra math, science and philosophy lessons, GOU#1 (now 11 years old) and I arrived through serendipity at the topic of Pythagoras. Her mind almost visibly expanded when she discovered the relationship between the 9, 16 and 25 square adjacent squares I drew for her on the 3-4-5 example triangle. Her eyes went wide when I explained that this works for any right-angled triangle.
She was soon happily squaring, adding (long-form on paper of course) and square-rooting away on geometry problems.
Seeing your own child discover the beauty that is math is brilliant.
After complaining about subpar android security and dismal android performance on this blog, I finally decided to bite the bullet and acquired a second-hand iPhone 6S 64GB on May 10, 2017. The phone is in mint condition, and the price was excellent.
So far, the performance is substantially better than any of my previous Androids. In fact, so far I’ve never had to wait for anything on this phone, which was my main issue with the Androids. (Google Maps anyone?!) Besides that, when Apple pushes a software update, all phones immediately get that update, without interference from any third parties, including carriers.
(A word to the wise: There is no official way to transfer your complete WhatsApp message history from Android to iPhone, which was a huge disappointment. There are unofficial, closed-sourced, solutions that require one to connect one’s Android phone in USB debugging mode to the PC. That risk is a bit too great for me.)
Setting up FastCGI apps on WebFaction – I love it when work leads to spin-off blog posts! In this case, to get the visible-orbit high-res slice viewer working on WebFaction, I had to jump some hoops. This post shows you how to jump them too.
Extracting the Jaxx 12-word wallet backup phrase – After a few hours of analysis on Saturday (yesterday), I discovered a serious vulnerability in a popular multi-cryptocurrency wallet. The post has been picked up by a number of other blogs, and has caused good discussion on the various social media outlets.
Three of those five posts have to do with cryptocurrency, which is to a certain extent a reflection of my free-time mental cycles at the moment. Looking at how technology such as Ethereum and its Smart Contracts (a Smart Contract blog post is currently forming in the back of my head…) seem to be breaking through, I can’t help but be reminded of stories such as those by Charlie Stross in Accelerando (at least the first bits).
Do we find ourselves at the start of something truly significant, or is this just an extremely elegant and high-tech dead-end?
What a time to be alive!
P.S. Here, have another outdoorsy photo on the house!
Your phone probably contains banking, payment and personal information that can be remotely stolen via numerous known and unknown bugs in the Android software. This is attractive to criminals.
Vendors (LG, Samsung, Xiaomi, etc.), after selling you their phone, have no incentive to keep your phone’s software up to date with Google’s fixes. Your Android phone is probably out of date and therefore a gaping security hole through which attackers can steal your stuff from the safety of their own laptops.
Read on for more.
An illustration: MediaTek / BLU phones are uploading your data.
You might recently have read about the incident with the popular BLU phones sold by Amazon in the US (interestingly, the author deleted their article from both hackernoon.com and from medium; I now link to the Wayback Machine’s stored copy). It turned out that these phones were regularly sending bunches of personal information to servers in China: text messages, call logs, contact lists and so forth. After more investigation, it came to light that this was happening via a low-level piece of software called ADUPS.
When Google had previously updated its systems to check for ADUPS, MediaTek (they make the chipset in millions of low-end phones) simply modified their system software to evade Google’s checks. Nice one MediaTek!
This is a painful example of the fact that the software on your phone, although based on Google’s software, is customised by the phone vendor. The further frustrating effect of this is that when Google releases security patches to Android (which they do regularly), there is very little incentive for the phone vendor to spend money on updating phones they have already sold.
What about A-list phone makers?
I bought my LG G3 in 2014 here in South Africa. It was LG’s flagship in that year, and sold extremely well. LG is a well-known smartphone OEM.
However, only because I took steps to flash the official KDZ image (V30a-ZAF-XX), which consumers would normally not do, am I now running Android 6. However, my security patch level is 2016-03, meaning there are 6 months of security updates I don’t have. (You can check your Android security patch level by going to Settings | General | About Phone | Software info.)
The most severe of these issues is a Critical security vulnerability that could enable remote code execution on an affected device through multiple methods such as email, web browsing, and MMS when processing media files.
In short, your phone could be hacked wide open from afar through a single innocent-looking email, MMS or web-page.
My friend’s South African LG G3 is still stuck on Android 5.0 (V20n-ZAF-XX). Most probably this is being blocked due to his carrier (MTN). In any case, 5.0 does not even show the security patch level, so we have no idea how many months of security fixes this phone is missing.
So my manually updated LG G3 is still very much vulnerable to QuadRooter. In theory, my phone could be (or already has been) rooted and pillaged by any old innocent-looking app, although I keep mostly to the official Play Market, so the risk is slightly mitigated.
At this stage, even as a relatively knowledgeable user, there’s not much I can do to patch my phone against this vulnerability.
Google’s leniency cuts both ways: More than a billion Android users, but most of them vulnerable.
It’s fantastic that Google’s openness and leniency with Android has helped to make smartphone technology accessible to more than a billion users (probably closer to 2 billion taking into account Chinese Android phones not connected to Google services, see Ben Evans’s post). However, this same leniency allows manufacturers to be irresponsible about keeping their customers safe.
The fundamental problem here is that there are a great deal of Android phone vendors who make phones from absolute entry-level to top-of-the-line flagships, who have very little incentive to spend money on post-sale security updates.
Once you’ve paid for the phone, you’re not important enough anymore to have a secure(ish) telephone.
What can we do?
Buy an iPhone. No really.
I’ve been using Android since the HTC Desire Z. I love Android, because I love Linux which I have been using since 1993.
However, if money is no object, my only sound advice can be to buy an iPhone. Apple is still shipping security updates, albeit on iOS 9, for the iPhone 4s which was released in 2011 (5 years ago). The iPhone 5 is still being kept up to date with iOS 10.
If you prefer sticking with Android, the best choice is getting an official Google device, which means either a Nexus or a new Pixel. Google’s policy for Pixel and Nexus security states that they will ship security updates either for three years after device introduction, or for 1.5 years after the device was last officially sold from the Google Store, whichever is longer.
Unfortunately, iPhones are really expensive, and Google’s new Pixel devices are also aiming for the higher-end market. The previous generation Nexus phones offer a more mid-range but very temporary reprieve.
In other words, most normal consumers on a budget, i.e. the largest part of the Android user base, actually of the smartphone-using world, are stuck with insecure, vulnerable phones. This is not cool.
Consider installing a custom ROM.
Installing a custom ROM such as Cyanogenmod brings with it another set of issues with regard to the phone being rooted, and with regard to driver-level support of proprietary hardware. In any case, this is not something your average consumer will have access to, but Android gurus can certainly apply.
Efforts like CopperheadOS (hardened Android) are certainly promising, but it will be quite a while before they are accessible to the largest group of Android users.
Update: David Metcalfe pointed out in the comments that you can buy a secure Android phone from Copperhead. If you are in the US or Canada, and you have some budget, you could buy the LG Nexus 5x or the Huawei Nexus 6P with CopperheadOS pre-installed. It’s great that this is available, but due to price and geography not really accessible to most Android users.
Keep manufacturers honest.
Ideally, Google starts taking a much harder line with manufacturers who put Android on their phones. They could for example maintain and publish a list of phone models that are kept up to date with the latest security fixes, and a list of those that aren’t.
I was happy to see that at least Huawei has a pretty good record in terms of keeping their Android phones up to date (although the results were probably skewed as they counted the Huawei-produced Nexus 6P phones, and these formed the majority of the test set, doh). This factor will play a role in the next smartphone that I buy.
Do you know of any (other) manufacturers of more affordable Android phones who are committed to keeping their users safe? Please let me know in the comments!
Addendum: Android phones with acceptable security update records