james_davis_nicoll: (Default)
[personal profile] james_davis_nicoll


The embittered Martian aerialist and the nonconformist live a thousand-plus years apart, in different solar systems. What, then, connects them?

A Rebel’s History of Mars by Nadia Afifi
james_davis_nicoll: (Default)
[personal profile] james_davis_nicoll
Very nice and punctual but they've basically learned nothing in the year they've worked at the theatre. Not where to stand, not which row is which, or the general location of a given seat. The last two really matter during reserved seating shows. Whatever side that usher is on is going to have lines, and people may end up in the wrong seats.

So I was discussing the situation with my boss and I said my current approach was that each shift would be to pick one thing that usher does not know, and do my best to ensure they know it by the end of the shift. Last shift was "where to stand", for example. My reward is, I think, that usher is now _my_ special project who I will be working with whenever I HM.

I did assure my boss I do remember a previous HM who grilled ushers on seat location and would ding them a quarter hour for minor uniform infractions and that I wasn't going to use them as a model. Well, I do, but only in the sense of asking myself if the way I want to handle something is how that person would, and if it is, I do something else.
james_davis_nicoll: (Default)
[personal profile] james_davis_nicoll


An artisanal cheesemaker's attempt to save her precious cheese cave lands her in the middle of an interplanetary crisis.

The Transitive Properties of Cheese by Ann LeBlanc
james_davis_nicoll: (Default)
[personal profile] james_davis_nicoll
Have never worked a show run by human golden retrievers...
andrewducker: (my brain)
[personal profile] andrewducker
Reading this article on advice to teachers in the UK about using AI, they suggest using it for things like "marking quizzes" and "generating routine letters".

And what really annoys me about this is that it's a perfect example of where simple automation could be used without the need for AI.

The precise example in the article is "Generate a letter to parents about a head lice outbreak." - which is a fairly common thing to happen in schools. So why on earth isn't there one standard letter per school, if not one standard letter for the whole country, that can be reused by absolutely everyone whenever this standard event happens? Why does this require AI to generate a new one every time, rather than just being a standard email that gets sent?

Same with marking quizzes. If children get multiple-choice quizzes regularly across all schools, and marking them uses precious teacher time, why is there not a standard piece of software, paid for once (or written once internally) which enables all children to do quizzes in a standard way, and get them marked automatically?

If we're investing a bunch of money into automating the various processes that teachers spend far too much time on, start with simple automation, which is cheap, easy, and reliable.

Also, wouldn't it be sensible to do some research into how accurately AI marks homework *before* you tell teachers to use it to do that? Here's some research from February which shows that its agreement with examiners was only 0.61 (where 1.00 would be perfect agreement). So I'm sceptical about the quality of the marking it's going to be doing...

From This Day Forward by John Brunner

Jun. 10th, 2025 09:00 am
james_davis_nicoll: (Default)
[personal profile] james_davis_nicoll


The sudden, shocking, return of Shockwave Reader. Will the living envy the dead?

From This Day Forward by John Brunner
james_davis_nicoll: (Default)
[personal profile] james_davis_nicoll


No rules, no bureaucracy, just some randos messing around with the past, present, and future.

Five Stories About Time Travel on a Limited Scale

Clarke Award Finalists 2000

Jun. 9th, 2025 10:21 am
james_davis_nicoll: (Default)
[personal profile] james_davis_nicoll
2000: The theft of an Enigma Machine comes too late to play a significant role in World War Two, Sellafield highlight British dedication to nuclear saafety, and the Conservatives, informed polling has them 2% ahead of Labour, discover that they are actually trailing by 13%.

Poll #33234 Clarke Award Finalists 2000
Open to: Registered Users, detailed results viewable to: All, participants: 53


Which 2000 Clarke Award Finalists Have You Read?

View Answers

Distraction by Bruce Sterling
11 (20.8%)

A Deepness in the Sky by Vernor Vinge
39 (73.6%)

Cryptonomicon by Neal Stephenson
41 (77.4%)

Silver Screen by Justina Robson
8 (15.1%)

The Bones of Time by Kathleen Ann Goonan
4 (7.5%)

Time by Stephen Baxter
11 (20.8%)



Bold for have read, italic for intend to read,, underline for never heard of it.

Which 2000 Clarke Award Finalists Have You Read?
Distraction by Bruce Sterling
A Deepness in the Sky by Vernor Vinge
Cryptonomicon by Neal Stephenson
Silver Screen by Justina Robson
The Bones of Time by Kathleen Ann Goonan
Time by Stephen Baxter

Timing

Jun. 8th, 2025 07:06 pm
james_davis_nicoll: (Default)
[personal profile] james_davis_nicoll
I swung by Old Goat Books to pick up a book I ordered, which meant I was in the right place at the right time hear the confused customer next to me ask "What's speculative fiction?" Which, after I explained what it meant, was followed by the question. "Do you know anything about Andre Norton?"

It was only with great effort that I resisted shouting "BEHOLD! I AM Marshall McLuhan" before helping.

The Heirs of Babylon by Glen Cook

Jun. 8th, 2025 09:18 am
james_davis_nicoll: (Default)
[personal profile] james_davis_nicoll


A decrepit fleet sails from Germany to play its role in a futile war, crewed by sailors who seem more eager to kill each other than the perfidious Australians.

The Heirs of Babylon by Glen Cook

Nebula winners announced

Jun. 7th, 2025 11:15 pm
james_davis_nicoll: (Default)
[personal profile] james_davis_nicoll
Best Novel: Someone You Can Build a Nest In, John Wiswell (DAW; Arcadia UK)

Best Novella: The Dragonfly Gambit, A.D. Sui (Neon Hemlock)

Best Novelette: Negative Scholarship on the Fifth State of Being, A.W. Prihandita (Clarkesworld 11/24)

Short Story: Why Don’t We Just Kill the Kid in the Omelas Hole, Isabel J. Kim (Clarkesworld 2/24)

Andre Norton Award for Middle Grade and Young Adult Fiction: The Young Necromancer’s Guide to Ghosts, Vanessa Ricci-Thode (self-published)

Best Game Writing: A Death in Hyperspace, Stewart C Baker, Phoebe Barton, James Beamon, Kate Heartfield, Isabel J. Kim, Sara S. Messenger, Naca Rat, Natalia Theodoridou, M. Darusha Wehm, Merc Fenn Wolfmoor (Infomancy.net)

Ray Bradbury Award for Outstanding Dramatic Presentation: Dune: Part Two by Jon Spaihts, Denis Villeneuve (Warner Bros)

Kevin O'Donnell, Jr Special Service Award: C.J. Lavigne

just Create - Laptop Edition

Jun. 7th, 2025 12:59 pm
silvercat17: a bodiless head with a sad face held in somebody's hands (head)
[personal profile] silvercat17 posting in [community profile] justcreate
What are you working on? What have you finished? What do you need encouragement on?

Are there any cool events or challenges happening that you want to hype?

What do you just want to talk about?

What have you been watching or reading?

Chores and other not-fun things count!

Remember to encourage other commenters and we have a discord where we can do work-alongs and chat, linked in the sticky

Photo cross-post

Jun. 7th, 2025 12:29 pm
andrewducker: (Default)
[personal profile] andrewducker


My brother Mike got me this for my birthday, and it just takes a weight off my mind being able to say "bring the steam temperature up to 95 degrees and hold it there"

(Control over oil temperature when frying eggs is also awesome.)
Original is here on Pixelfed.scot.

The Sickening Has Me

Jun. 6th, 2025 08:20 pm
andrewducker: (xkcd boomdeyada)
[personal profile] andrewducker
I spent the day feeling bad for lacking focus, and wondering why I couldn't get anything done.
And then I slept for an hour on no notice.
And now I'm very wobbly and all of my muscles gently ache.
So I think I'm going to chalk it up as "The Plague" and hope I feel better tomorrow.
laurapalmer: (SOF: Mod)
[personal profile] laurapalmer posting in [site community profile] dw_community_promo

Introducing [community profile] seasons_of_fandom, an interactive fandom challenge community/landcomm that allows you to create work for any fandom you can think of! We were previously [community profile] lands_of_magic, a name we ran under for over 10 years, but we figured we needed a facelift and a name change since it has been a long time since we had only focused on fantasy fandoms. We welcome TV, movies, books, games, music, anime, celebrities... almost anything goes! We have all kinds of challenges- writing, graphics, games, and some challenges that are miscellaneous fanworks! This round we'll also be trying out monthly drabble and icon contests.

We have four wonderful teams- The Spring Court, The Summer Court, The Autumn Court, and The Winter Court.

Sign-ups for new members start today, and though our first round under our new name doesn't start until August, we will have two challenges open before the round officially starts. To sign up, all you have to do is read the rules and fill out the survey here.

We look forward to seeing you there!
andrewducker: (Default)
[personal profile] andrewducker
I see we're back at the "Labour attempt to introduce a mandatory ID card" stage of history*.

My feeling last time, was that the main problem that they always have is that they *start* with the cards being mandatory.

If you start with "Here is a thing that makes your life much easier, that you can carry about if you like." then that will get you 85% of the way there. And then, once you have a voluntary ID card that's not causing any problems for anyone, and that 85% of the population is using to make their life easier, *then* you move in and say "The only people who don't carry an ID card are weirdos and troublemakers, and they're causing friction in the system, we could make it all run more smoothly if only they *had* to carry one."

But no, they always try to go instantly from "Nobody has an ID card." to "Everyone must carry one at all times." - which forms a coalition of all sorts of people from across the political spectrum, and ends up being far more politically costly to them than if they'd just boiled their frog slowly.

(None of which should be taken as me taking a position on ID cards. I'm just constantly bemused by their inability to get things done by trying to rush them through in the most authoritarian manner possible.)

*Younger readers may not remember the fuss in 2006 (repealed in 2011)

Numamushi by Mina Ikemoto Ghosh

Jun. 6th, 2025 09:09 am
james_davis_nicoll: (Default)
[personal profile] james_davis_nicoll


A foundling boy raised by a great snake becomes intrigued by a reclusive calligrapher living near the river snake and boy call home.

Numamushi by Mina Ikemoto Ghosh
james_davis_nicoll: (Default)
[personal profile] james_davis_nicoll
When a woman looked around her for her husband, who had been right behind her on the stairs but was now nowhere to be seen. I was very worried I was facing a repeat of the time not too long ago when I spent an hour looking for a missing patron.

The missing husband turned out not to have been behind his wife on the stairs after all, so mystery solved. The missing patron I spent that hour looking for was found once I thought about where she had to be to have not been found where we looked: row H or J, somewhere near seat 26.
[personal profile] mjg59
As I wrote in my last post, Twitter's new encrypted DM infrastructure is pretty awful. But the amount of work required to make it somewhat better isn't large.

When Juicebox is used with HSMs, it supports encrypting the communication between the client and the backend. This is handled by generating a unique keypair for each HSM. The public key is provided to the client, while the private key remains within the HSM. Even if you can see the traffic sent to the HSM, it's encrypted using the Noise protocol and so the user's encrypted secret data can't be retrieved.

But this is only useful if you know that the public key corresponds to a private key in the HSM! Right now there's no way to know this, but there's worse - the client doesn't have the public key built into it, it's supplied as a response to an API request made to Twitter's servers. Even if the current keys are associated with the HSMs, Twitter could swap them out with ones that aren't, terminate the encrypted connection at their endpoint, and then fake your query to the HSM and get the encrypted data that way. Worse, this could be done for specific targeted users, without any indication to the user that this has happened, making it almost impossible to detect in general.

This is at least partially fixable. Twitter could prove to a third party that their Juicebox keys were generated in an HSM, and the key material could be moved into clients. This makes attacking individual users more difficult (the backdoor code would need to be shipped in the public client), but can't easily help with the website version[1] even if a framework exists to analyse the clients and verify that the correct public keys are in use.

It's still worse than Signal. Use Signal.

[1] Since they could still just serve backdoored Javascript to specific users. This is, unfortunately, kind of an inherent problem when it comes to web-based clients - we don't have good frameworks to detect whether the site itself is malicious.
james_davis_nicoll: (Default)
[personal profile] james_davis_nicoll


An arduous journey in a prince's entourage offers a courier escape from immediate, judicial danger, at the cost of an entirely different assortment of dangers.


The Witch Roads (The Witch Roads, volume 1) by Kate Elliott

NDP display firm resolve

Jun. 5th, 2025 09:04 am
james_davis_nicoll: (Default)
[personal profile] james_davis_nicoll
Pursuing their vow to bring down the government, NDP ... do nothing of the sort.

I wonder if they got phone calls from voters expressing their displeasure at the prospect of an election so soon after the previous one?
[personal profile] mjg59
(Edit: Twitter could improve this significantly with very few changes - I wrote about that here. It's unclear why they'd launch without doing that, since it entirely defeats the point of using HSMs)

When Twitter[1] launched encrypted DMs a couple
of years ago, it was the worst kind of end-to-end
encrypted - technically e2ee, but in a way that made it relatively easy for Twitter to inject new encryption keys and get everyone's messages anyway. It was also lacking a whole bunch of features such as "sending pictures", so the entire thing was largely a waste of time. But a couple of days ago, Elon announced the arrival of "XChat", a new encrypted message platform built on Rust with (Bitcoin style) encryption, whole new architecture. Maybe this time they've got it right?

tl;dr - no. Use Signal. Twitter can probably obtain your private keys, and admit that they can MITM you and have full access to your metadata.

The new approach is pretty similar to the old one in that it's based on pretty straightforward and well tested cryptographic primitives, but merely using good cryptography doesn't mean you end up with a good solution. This time they've pivoted away from using the underlying cryptographic primitives directly and into higher level abstractions, which is probably a good thing. They're using Libsodium's boxes for message encryption, which is, well, fine? It doesn't offer forward secrecy (if someone's private key is leaked then all existing messages can be decrypted) so it's a long way from the state of the art for a messaging client (Signal's had forward secrecy for over a decade!), but it's not inherently broken or anything. It is, however, written in C, not Rust[2].

That's about the extent of the good news. Twitter's old implementation involved clients generating keypairs and pushing the public key to Twitter. Each client (a physical device or a browser instance) had its own private key, and messages were simply encrypted to every public key associated with an account. This meant that new devices couldn't decrypt old messages, and also meant there was a maximum number of supported devices and terrible scaling issues and it was pretty bad. The new approach generates a keypair and then stores the private key using the Juicebox protocol. Other devices can then retrieve the private key.

Doesn't this mean Twitter has the private key? Well, no. There's a PIN involved, and the PIN is used to generate an encryption key. The stored copy of the private key is encrypted with that key, so if you don't know the PIN you can't decrypt the key. So we brute force the PIN, right? Juicebox actually protects against that - before the backend will hand over the encrypted key, you have to prove knowledge of the PIN to it (this is done in a clever way that doesn't directly reveal the PIN to the backend). If you ask for the key too many times while providing the wrong PIN, access is locked down.

But this is true only if the Juicebox backend is trustworthy. If the backend is controlled by someone untrustworthy[3] then they're going to be able to obtain the encrypted key material (even if it's in an HSM, they can simply watch what comes out of the HSM when the user authenticates if there's no validation of the HSM's keys). And now all they need is the PIN. Turning the PIN into an encryption key is done using the Argon2id key derivation function, using 32 iterations and a memory cost of 16MB (the Juicebox white paper says 16KB, but (a) that's laughably small and (b) the code says 16 * 1024 in an argument that takes kilobytes), which makes it computationally and moderately memory expensive to generate the encryption key used to decrypt the private key. How expensive? Well, on my (not very fast) laptop, that takes less than 0.2 seconds. How many attempts to I need to crack the PIN? Twitter's chosen to fix that to 4 digits, so a maximum of 10,000. You aren't going to need many machines running in parallel to bring this down to a very small amount of time, at which point private keys can, to a first approximation, be extracted at will.

Juicebox attempts to defend against this by supporting sharding your key over multiple backends, and only requiring a subset of those to recover the original. I can't find any evidence that Twitter's does seem to be making use of this,Twitter uses three backends and requires data from at least two, but all the backends used are under x.com so are presumably under Twitter's direct control. Trusting the keystore without needing to trust whoever's hosting it requires a trustworthy communications mechanism between the client and the keystore. If the device you're talking to can prove that it's an HSM that implements the attempt limiting protocol and has no other mechanism to export the data, this can be made to work. Signal makes use of something along these lines using Intel SGX for contact list and settings storage and recovery, and Google and Apple also have documentation about how they handle this in ways that make it difficult for them to obtain backed up key material. Twitter has no documentation of this, and as far as I can tell does nothing to prove that the backend is in any way trustworthy. (Edit to add: The Juicebox API does support authenticated communication between the client and the HSM, but that relies on you having some way to prove that the public key you're presented with corresponds to a private key that only exists in the HSM. Twitter gives you the public key whenever you communicate with them, so even if they've implemented this properly you can't prove they haven't made up a new key and MITMed you the next time you retrieve your key)

On the plus side, Juicebox is written in Rust, so Elon's not 100% wrong. Just mostly wrong.

But ok, at least you've got viable end-to-end encryption even if someone can put in some (not all that much, really) effort to obtain your private key and render it all pointless? Actually no, since you're still relying on the Twitter server to give you the public key of the other party and there's no out of band mechanism to do that or verify the authenticity of that public key at present. Twitter can simply give you a public key where they control the private key, decrypt the message, and then reencrypt it with the intended recipient's key and pass it on. The support page makes it clear that this is a known shortcoming and that it'll be fixed at some point, but they said that about the original encrypted DM support and it never was, so that's probably dependent on whether Elon gets distracted by something else again. And the server knows who and when you're messaging even if they haven't bothered to break your private key, so there's a lot of metadata leakage.

Signal doesn't have these shortcomings. Use Signal.

[1] I'll respect their name change once Elon respects his daughter

[2] There are implementations written in Rust, but Twitter's using the C one with these JNI bindings

[3] Or someone nominally trustworthy but who's been compelled to act against your interests - even if Elon were absolutely committed to protecting all his users, his overarching goals for Twitter require him to have legal presence in multiple jurisdictions that are not necessarily above placing employees in physical danger if there's a perception that they could obtain someone's encryption keys
james_davis_nicoll: (Default)
[personal profile] james_davis_nicoll


Exuberant Youko and stoic Airi continue their tour through the remaining wonders of post-apocalyptic Japan. Carpe diem!

Touring After the Apocalypse, volume 4 by Sakae Saito
james_davis_nicoll: (Default)
[personal profile] james_davis_nicoll


In an uncommon turn for famed author Card, he presents a very special boy in very difficult circumstances faced with great responsibility. What will the Young People make of it?

Young People Read Old Nebula Finalists: Mikal's Songbird by Orson Scott Card

Two Comments

Jun. 3rd, 2025 09:01 am
james_davis_nicoll: (Default)
[personal profile] james_davis_nicoll
This sure is different from how RPGs were covered in the news in the 1980s.

It never occurred to me that people would be worried about playing wrong. Would-be gatekeepers complaining that people play wrong, sure. I am sure that started in 1974. But I didn't consider performance anxiety.

Port Eternity by C J Cherryh

Jun. 3rd, 2025 08:50 am
james_davis_nicoll: (Default)
[personal profile] james_davis_nicoll



Made-to-order slaves fear their eccentric owner will tire of and dispose of them... until a calamity renders the issue moot.

Port Eternity by C J Cherryh

That was fast

Jun. 2nd, 2025 05:40 pm
james_davis_nicoll: (Default)
[personal profile] james_davis_nicoll
blood work results in. I am immune to measles, mumps, and some other stuff I didn't not. Not Hep A or B, though.

Bundle of Holding: Pride Games

Jun. 2nd, 2025 02:05 pm
james_davis_nicoll: (Default)
[personal profile] james_davis_nicoll


For Pride Month, an assortment of LGBTQ+-themed tabletop roleplaying games.

Bundle of Holding: Pride Games

Profile

birguslatro: Birgus Latro III icon (Default)
Carl B. Latro

January 2023

S M T W T F S
1234567
891011121314
15161718192021
22232425262728
293031    

Most Popular Tags

Page Summary

Style Credit

Expand Cut Tags

No cut tags