The Future of Internet

Up until the WikiLeaks hullabaloo, we all thought that internet was international (ok, with obvious american predominance, but still) and a platform for free speech, more so than the other media, if for nothing else than for its ease of access and ease of participation (anyone can have a blog or website on the internet, with zero costs; not everyone can publish an article in the newspapers, a book, or make a TV program or movie; it costs and takes much more time, and is ultimately dependant on the editors/publishers/producers/distributors). And now, it seems, we see the Emperor as it is, in its New Clothes which don’t leave much to imagination – unfortunately.

It all began some time before, in March 2009, with an introduction of the Cybersecurity Act of 2009, presented in the American Senate, that with one provision that “gives the President unfettered authority to shut down Internet traffic in an emergency and disconnect critical infrastructure systems on national security grounds“. Second draft wasn’t improved much, and the final bill, now called Protecting Cyberspace as a National Asset Act of 2010, was introduced to the US Senate and House of Representatives, now amended to limit the maximum time the (US) President could control the network to 120 days, and is expected to be voted on before the year ends. Supposedly, the US president can close off the US internet from, say, China, or whatever country, but can it really be done? Some of us still remember the Pakistan/YouTube incident from February 2008, when the Pakistani provider, wanting to shut-off the access to YouTube from Pakistan, through a misconfiguration actually blocked the whole of YouTube. Of course, we can protect the network from that kind of error, but it will be something else entirely if someone where to do it intentionally, with the help of the whole internet infrastructure.

And here we come to the WikiLeaks incidents. First they got attacked, then they got booted of the Amazon cloud, then their DNS provider EveryDNS cancelled their DNS records, then PayPal confiscated froze their account (after Moneybookers did it previously) and Visa and Mastercard stopped processing payments; Twitter is suspected of suppressing the WikiLeaks trend. And all that because of stale news that everyone knew, in the form of not-so-secret and dangerous diplomatic cables, that they didn’t actually steal but had only published. And if you think that all this was court-ordered through due process, with a judge, jury, public prosecutor and a defender – think again. It was enough for a congressman’s staff to call and say (or even insinuate) what needs to be done, and hey, job done! The excuse? WikiLeaks has violated the provider’s Terms of service by supposedly not respecting the Intelectal Property.

a small note: this actually happens a lot more than you think – my former company’s website was attacked with DDoS, and our provider not only didn’t help us find the attackers, but promptly cancelled our account, deleted all our data and wouldn’t let us access the backups. And said we were unfair to the others on the same server, because we have blocked it. This is the equivalent of the judge saying to the rape victim that it’s all her fault because she provoked the rape, that she is forbidden to come out of the house again, to confiscate all her clothes, and to be ashamed of what she’d done. But hey, Terms and Conditions of the contract…

Those who think that couldn’t happen again, or to them, better think again. Internet in its current form is under almost total US domination – most servers and routers performing the basic internet functions are stationed in the US. And almost all the important companies are multinationals but still American: Amazon and the most powerful cloud servers, PayPal, Visa, Mastercard and other payment processing and credit card companies, DNS servers for com, org and net domains… There’s a kill switch for “emergencies” and in the meantime, any dissent can be quickly silenced, even when it’s not your citizen that does it. And we thought “Enemy of the State” was paranoid.

Of course, all this WikiLeaks brouhaha has brought these things out in the open. Hopefully, something can be done now to remedy all these structural problems of the internet and “globalized” economy to become really international. We need other, non-American powerful server clouds, located in Europe, South America and Asia; we need dispersed DNS servers and updated DNS standards, non-American credit card companies and payment processors etc. And not even the educational instutions will help much in that, because even they are dependent on companies and government, sometimes both at the same time. Internet won’t be safe until it’s done.

Internet’s dead – long live the Internet!

PS. Note that I didn’t touch upon the seizing of the Assange’s personal accounts in Switzerland, his arrest in the UK because of the charges of rape in Sweden, public calls for his assassination, calls for pronouncing WikiLeaks a terrorist organization, etc. It just goes to show the power of politicians and the state, even when they don’t use the regular state and government institutions. And – different from the above, where it shows how much companies fear the state and want to earn more money through appeasing it – shows how much politicians actually fear for the state(s), thinking it so weak that one NGO publishing so-so news is a legitimate threat to the international diplomacy and world order. Is it really that fragile? Maybe Umberto Eco is right, that this is a blow only for the US:

How can a power hold up if it can’t even keep its own secrets anymore? It is true, as Georg Simmel once remarked, that a real secret is an empty secret (which can never be unearthed); it is also true that anything known about Berlusconi or Merkel’s character is essentially an empty secret, a secret without a secret, because it’s public domain. But to actually reveal, as WikiLeaks has done, that Hillary Clinton’s secrets were empty secrets amounts to taking away all her power. WikiLeaks didn’t do any harm to Sarkozy or Merkel, but did irreparable damage to Clinton and Obama.

Technorati : , , , ,
Del.icio.us : , , , ,

Friendly Stalking

Yesterday I tried to add a person to my friends on Facebook, but I was ignored. OK, it doesn’t happen often, but no biggie, just someone I saw a few times at the University. But, the strange thing was, that person has its Facebook profile totally open – you can see literally everything, from contact details to photos and everything in between. So, actually, there was no reason for me to ask for a friendship because I could already see everything. On the other hand, there was no reason to refuse, because the only thing that would change would be that instead of having to visit the profile manually to see what I wanted to know, I would’ve received automatic updates.

But isn’t that already stalking? Here’s someone who refused the friendship invitation – or someone who you haven’t even asked – and you’re checking their profile, photos, links etc? Come on, admit it, everyone has done it, whether looking up your ex, your relatives, bosses and who knows who. Even the employers (current and prospective) and governments do it. You just want to see what’s going on, and that’s perfectly normal. It’s the real world equivalent of asking a mutual acquaintance or friend “how’s X?”, it’s just that you’re asking Facebook (or Google), and, importantly, you’re only seeing what the other person wants everyone to see, so it’s not as if your friend is telling you a secret or something. Everything is perfectly normal and even more polite and limited than in the real world.

But are online friendships the same as in the real world i.e. are the psychological and sociological components the same?

Continue »

Visual identity of the New Apple

[ download in PDF ]

 What’s in a logo?

Lets first begin with an already existing analysis – albeit a bit outdated, done by Jean-Marie Floch in his book Visual Identities (p. 30), written in 1995 – of Apple’s and IBM’s logo, seen then by him as two IT giants that are “perfect illustrations of how corporate design is a matter of both difference and continuity” (difference because of brand positioning and continuity as evidence of ongoing values of the company). He sees their logos as “signs – or more appropriately as visual statements – which are integrated into the respective corporate discourses of these two IT companies“.

IBM’s logo was designed in 1956 by Paul Rand, using the initials of the company name, and he created it by actually slightly modifying the original Egyptian typeface (City Medium), thus making it, paradoxically, ” more solid, grounded and balanced “, a single block, where form was characterized by strength and angularity (holes in the letter B are square). Actually, there was a slightly older logo with just the initials in “Beton Bold” typeface, which didn’t have quite the visual impact; so a new version was designed when new IBM chairman, Tom Watson Jr., was installed – this change was to communicate subtly that there will be changes in the company. New, final version(s) came in 1972 (Floch says in 1962), with bars which were to suggest ” speed and dynamism “. 8-bar and 13-bar versions were made, one for corporate stationary and one for commercial documents and ads (8-bar version that survived in the end). There were also designed different positive and negative versions, where relationship between dark and light stripes is inverted (dark stripes are slightly thicker than the light ones in the positive version), and slight change can be seen in the point of the letter M. But, also, it was designed so as to respect the technical limitations of photocopiers in the 1970s – solid areas were poorly copied – so logos that avoided large solid areas were avoided. Curiously enough, in the 1980s those photocopier limitations were gone, but because of the limitations of the new low-resolution digital printers, 13-bar logo was difficult to reproduce and was abandoned.

IBM logo is thus virtually unchanged from 1972 (effectively from 1947), and we have a solid, but dynamic-looking logo, whose letters “constitute a kind of tryptich”, and whose “stripes create repetition of the a-b-a-b type that is made of thick, horizontal , distinct, monochromatic lines”. It’s also important to note that IBM always used blue for its logos and often for the enclosures of his computers, hence the “Big Blue” nickname.

logo used from 1947 to 1956

logo designed in 1956, in use until 1972

striped logo used from 1972, 8-bar version

Apple, on the other hand, in the first 2 years of its life had 2 very different logos. First one was actually less of a logo and more a vignette, as Floch says “reminiscent of a ‘Dungeons and Dragons’ card“. It was designed by Ronald Wayne, a third “co-founder” of Apple, and actually a fellow engineer. It shows Newton sitting under the tree, reading the book, thus invoking the fall of apple on Newton’s head, event which, according to the legend, led to a discovery that would spawn a birth of the modern physics, mathematics and astronomy. The text inside was from William Wordsworth: “Newton… ‘A Mind Forever Voyaging Through Strange Seas of Thought… Alone.’”As Floch says, “in the anthropologist Andre Leroi-Gourhan’s sense of the term, it’s a pictogram – it suggests a ‘before’, a ‘during’ and an ‘after’”. It’s obviously not a logo made to industry standards, and was used only for Apple-1 computer ads and user manuals – coincidentally, it itself not up to industry standards (more on that later).

Apple’s first logo, 1975-1976 (used only for Apple 1 )

Apple’s logo from 1976-2001

Continue »