On the sometimes devious UI design cues that subtly but powerfully affect our decision making. Our choices are not as free as you might think. “Are you upset that technology hijacks your agency? I am too. I’ve listed a few techniques but there are literally thousands. Imagine whole bookshelves, seminars, workshops and trainings that teach aspiring tech entrepreneurs techniques like these. Imagine hundreds of engineers … Continue reading How Technology Hijacks People’s Minds — from a Magician and Google’s Design Ethicist
Great read on the technology and cabling that makes the internet work around the world, including pictures from a visit to a landing site. “So, there we have it: the next time you click on a YouTube video, you’ll know exactly how it gets from a server in the cloud to your computer. It might seem absolutely effortless—and it usually is on your part—but now … Continue reading How the Internet works: Submarine fiber, brains in jars, and coaxial cables
Deleted online isn’t really deleted. It’s more like ‘deleted from view’. Unless you are the sole holder of the content on your devices, and you securely erase with multiple passes or the destruction of hardware, it’s better to assume that it will become public searchable data one day. “Nowadays it’s a bit more different. Now imagine if there would be also a field just like … Continue reading This is how your data lives forever. Even if deleted.
Around 20% of the retail price. Great article with detailed numbers, retailers don’t make as much as you might think. “Brands will incur costs otherwise absent in the wholesale business model; spends like leasing+manpower+operational costs, store set-up and periodic re-modelling cost, the entire risk of inventory, and costs associated with warehousing and distribution. That’s only at the store level, there will be additional off-site resources … Continue reading What does it cost to make a running shoe?
Mobile webapps are usually terrible. There are many reasons why mobile websites are given low priority by companies – the main one being they want you to download their app. Apps are more likely to be used often, have access to far more device sensors/location than webpages, allowing for greater demographic targeting. Nowadays, there are two main platforms to cover 90%+ of the population, so … Continue reading Our best practices are killing mobile web performance
No surprise here. The truth is, even if you are meticulous with your privacy, all it takes is somebody else in the majority of the population to have your details on their device and it’s there permanently. Not to be confused with equally noxious companies like Truecaller, who offer caller ID services by vacuuming up everybody’s address books. However, the author is incorrect, you CAN actually … Continue reading Surveillance: Google collects meta data (phone calls, SMS) from Android phones
Even with full-disk encryption, Qualcomm-based Android devices can be broken by OEMs who can self-sign TrustZone images to extract master keys which can then be brute-forced. Thus, set a sufficiently strong MASTER encryption password (the one that only needs to be entered on boot), preferably at least 16-20 characters with good entropy. To my knowledge, non-rooted devices CANNOT set a separate boot and unlock password, … Continue reading Extracting Qualcomm’s KeyMaster Keys – Breaking Android Full Disk Encryption