Weekly output: Game of Thrones, security, augmented reality, T-Mobile, phone insurance

Happy Easter!

DisCo Game of Thrones post

3/27/2013: Ethicists Make Lousy Economists, And Other Lessons From the Endless “Game of Thrones” Debate, Disruptive Competition Project

This started life as a draft here a year ago, when I’d gotten fed up by seeing the same old arguments thrown around on Twitter and in blog posts about the HBO series. Then I set it aside, which turned out be a good thing when I had a paying client interested in the topic.

3/29/2013: Social-Media Trend To Watch: Security That Doesn’t Have To Suck, Disruptive Competition Project

With Dropbox, Apple and, soon, Evernote and Twitter following Google’s lead in offering two-step verification as a login option, I’m cautiously optimistic that this competition will yield more usable security than what the efforts of corporate IT have yielded so far. The skeptical comments this post has since gotten have me wondering if I was too optimistic.

3/29/2013: Augmented Reality Doesn’t Need Google Glasses, Discovery News

I revisited a topic I last covered in depth in a 2009 column for the Post. Part of this post recaps how I still use some of the apps I mentioned back then, part suggests some other possible applications, and then I note how Windows Phone 8′s “Lenses” feature could foster “AR” on that platform. I’m not sure all of those parts hold together.

3/31/2013: Q&A: Is T-Mobile’s new math a good deal?, USA Today

The wireless carrier’s no-contract plans may not save you much money if you buy a new smartphone exactly every two years, but if you upgrade less often–or buy an unlocked phone from a third party–they can work well for you. (And if they foster the growth of a carrier-independent market for phones, they would work well for the rest of us.) The post also includes a reminder to watch out for phone-insurance charges on your bill.

Sulia highlights: calculating how much you’d spend on an iPhone 5 and two years of service at the four major wireless carriers; noting the belated arrival of threaded comments on Facebook pages; explaining why Google Maps doesn’t offer real-time arrival estimates for Metro and other transit systems; critiquing the woeful setup experience on a Linksys router.

About these ads

A fix for strange search results

Something looked broken with Web search on my computer yesterday, and it took me only about 18 hours of detours to figure out the problem. To spare you all the trouble of repeating my troubleshooting, here’s how things worked out.

search redirect network activityEverything started when I was doing a routine search for a post I’d written last winter on CEA’s blog. I clicked on Google’s link, saw a random address appear and then another, and found myself looking at a sketchy page with ads for some casino instead of my analysis of exemptions to the Digital Millennium Copyright Act’s anti-circumvention provisions.

My first thought–both frightened and angry–was that I’d finally gotten hit with a virus like DNSChanger on my own computer. But the same hijacked search happened in another Mac and on the Chromebook I’d just reviewed.

Maybe my wireless router had gotten compromised somehow? I had covered one reader’s experience with that two years ago, and my fellow tech journalist Glenn Fleishman (I’d say he’s forgotten more about WiFi than I’ll ever know, but he forgets nothing) thought that was likely too.

But the router had nothing amiss with its domain-name-server settings. Meanwhile, doing the same search in the browser on an AT&T Android phone (another recent review) didn’t yield any spurious results. Two replies on Twitter also suggested this issue might be specific to Internet providers.

My last move before getting distracted by our daughter was to try the same search on other sites. At Bing, the result also got hijacked; at DuckDuckGo, it did not.

This morning, as I was using Safari’s Web Inspector to see if I could get any more insight on the mechanics of the hijack (and take the screengrab you see above), another Twitter reply suggested that it could be an issue with CEA’s installation of WordPress. There is a history of exploits for that popular blogging platform that target incoming referrers from popular sites to send those clicks elsewhere; see, for instance, this Q&A thread.

(WordPress.com, this blog’s host, is a commercial service that runs WordPress; one of its selling points is having professionals stay on top of patches and security so I don’t have to.)

Sucuri LLC’s malware-checking site didn’t find any malware at CEA’s blog. But when I e-mailed somebody at the Arlington, Va., trade association, they did find a malicious script on the site that’s since been removed. And now, my original search takes me to the right page.

So I guess reporting this counts as this week’s good deed for the Internet… and maybe a start on next weekend’s USA Today column. But before I do that: Have you run into anything like this? Were you able to get it resolved? What else would you like to know about search hijacking?

Weekly output: Mat Honan, Mike Daisey, pausing telecom service, “Free Public WiFi”

Two of this week’s posts involved other people’s stories–either adding context to them or critiquing the storytelling itself. (I also filed one post and a podcast for CEA, but they haven’t gone up yet. I’m blaming the fact that it’s August in D.C.)

8/8/2012: Hacking Nightmare Comes True: Mat Honan’s Story, Discovery News

After reading Wired writer Mat Honan’s Tumblr post about how hackers had hijacked his iCloud and Twitter accounts, deleted his Google account and remote-wiped his iPad, iPhone and MacBook Air, I wanted to know how such a thing could be possible. After reading his explanation of the hack on Wired.com, I wanted to write about it myself–both to yell at Amazon and Apple for their (now fixed) security flaws that enabled the hack, and to remind readers of what they can to prevent the same thing from happening to them. It helped to talk to Honan over the phone on Tuesday morning and hear the stress and anger in his voice. (I enjoy Honan’s work, and he and I were on a radio show once, but I don’t think we’ve met face to face.)

8/8/2012: How Mike Daisey retooled The Agony and the Ecstasy of Steve Jobs, Ars Technica

Some 17 months after I first saw Daisey’s monologue about Apple, I returned to the Woolly Mammoth Theatre Company in downtown D.C. to catch the 2.0 version, stripped of the material he fabricated earlier about Apple’s outsourced manufacturing in China. This was the first time in years that I’d taken notes on a paper notepad (the prior item in this one was a set of questions I jotted down for a video interview with Steve Wozniak I did for the Post in late 2009).

It was also the first time in a while that the subject of a review wrote back to me. Maybe an hour after this post went up, Daisey e-mailed to contest my interpretation. He said I made him sound too trusting in the New York Times’ reporting and didn’t give him enough credit for addressing some of the related issues I mentioned in this piece in the program handed out to attendees. I replied that those were my reactions, as jotted down in real time in the dark; they may not be a correct interpretation, but the review is supposed to reflect what I thought at the time.

Meanwhile, the vast majority of the comments from Ars readers were far less sympathetic to Daisey’s case.

8/12/2012: How to pause cable, phone services, USA Today

I thought a reader’s question about whether he could suspend his Internet, TV and phone services while away from home would make for a nice, easy, “it’s August in D.C. and nobody wants to work too hard” item. Wrong. Some telecom firms have multiple policies that vary by region. The piece also reminds readers that the “Free Public WiFi” hot spot you might see is an artifact of a patched Windows XP bug. (Yes, you’ve read that from me before: I covered it in a 2009 article for the Post.)