This week, I got an email from the SEO coordinator at Alaska Airlines:
My name is Shawn with Alaska Airlines. I'm reaching out concerning a specific link on blog.braverman.org. As you may have heard, Alaska Airlines acquired Virgin America last year. We are in the process of updating all Virgin America links to go directly to our website, https://www.alaskaair.com.
We want to make sure your readers are being sent to the correct place!
We would really appreciate it if you could update the link and anchor text, Virgin America, on this page: http://blog.braverman.org/2009/09/default to:https://www.alaskaair.com and Alaska Airlines.
Please let me know if you have any questions.
If you're not the appropriate person to contact about this, can you put me in contact with the right person?
(The actual post he meant me to change is here.)
See, Alaska took over Virgin America, and now they want to scrub the Internet of all references to the old airline. I politely told Shawn that, no, I was not about to change a 9-year-old blog post to send Virgin down the memory hole.
He replied that he understood, but could I just change the URL to point to Alaska Air at least?
No, Shawn. I'm not editing the post, full stop. It reflects the state of the world in 2009, and to me, it's a document that needs to remain unaltered.
I'm sure the SEO coordinator of an airline believes that it's a doubleplusgood thing to help people who may inadvertently discover a blog post from 2009 not get misdirected. But the whole thing really creeped me out. Alaska or one of its vendors had to go through every one of the over 6,500 posts I've written looking for references to Virgin America, and then Shawn had to field my response to his (no doubt automated) email request. That's a lot of effort to pretend Virgin America never existed.
Did I mention Virgin America Airlines? Just making sure.
Lots of stuff crossed my inbox this morning:
Back to my wonderful, happy software debugging adventure.
Via Raymond Chen, Eric Shlaepfer built a 6502 emulator out of full-size components:
The MOnSter 6502
A dis-integrated circuit project to make a complete, working transistor-scale replica of the classic MOS 6502 microprocessor.
How big is it?
It's a four layer circuit board, 12 × 15 inches, 0.1 inches thick, with surface mount components on both sides.
Can you hook it up inside an Apple ][ and run Oregon Trail?
No, not directly. It's neat to think of plugging the MOnSter 6502's in-circuit emulator (ICE) in-circuit replica (ICR) cable directly into a socket inside an Apple ][, but that wouldn't actually work. The Apple ][ design relies on a number of clever tricks that derive timing for video generation and peripheral control from the main clock signal — all of which will fail if you need to run at a slower speed.
Are you going to make one out of vacuum tubes next?
Make sure you watch the 2-minute video.
Before diving back into one of the most abominable wrecks of a software application I've seen in years, I've lined up some stuff to read when I need to take a break:
OK. Firing up Visual Studio, reaching for the Valium...
While trying to debug an ancient application that has been the undoing of just about everyone on my team, I've put these articles aside for later:
Back to the mouldering pile of fetid dingo kidneys that is this application...
Just an historical note: as of today, I've been working with Microsoft .NET for 17 years. The first time I picked it up was 10 September 2001, which, if you think about it, is a very easy date to remember.
Uncle Bob riffs on Martin Fowler's speech at Agile Australia this week. He is saddened:
It was programmers who started the Agile movement as a way to say: “Hey look! Teams matter. Code should be clean. We want to collaborate with the customer. And we want to deliver early and often.”
The Agile movement was started by programmers, and software professionals, who held the ideals of Craftsmanship dear. But then the project managers rushed in and said: “Wow! Agile is a cool new variation on how to manage projects.”
There’s an old song, by Alan Sherman, called J. C. Cohen. It’s about a subway conductor who did such a great job at pushing people into the train cars, that he pushed the engineer out. This is what happened to the Agile movement. They pushed so many project managers in, they pushed the programmers out.
The programmers continued to pursue Agile as it was originally conceived. Read the opening line of the Agile Manifesto: “We are uncovering better ways of developing software by doing it and helping others do it.” It is Software Crafts-men and -women who are continuing that work. It’s not the project managers in the Agile movement. They’re off pursuing something else?
He has hit on the sadness all us old craftsmen feel when we encounter Management.
Via Bruce Schneier, retired USMC Colonel Mark Canclan has authored a report outlining what threats we're likely to face in the next few years, and how to cope with them. He includes some chilling strategic possibilities:
The cyber attacks varied. Sailors stationed at the 7th Fleet' s homeport in Japan awoke one day to find their financial accounts, and those of their dependents, empty. Checking, savings, retirement funds: simply gone. The Marines based on Okinawa were under virtual siege by the populace, whose simmering resentment at their presence had boiled over after a YouTube video posted under the account of a Marine stationed there had gone viral. The video featured a dozen Marines drunkenly gang-raping two teenaged Okinawan girls. The video was vivid, the girls' cries heart-wrenching the cheers of Marines sickening And all of it fake. The National Security Agency's initial analysis of the video had uncovered digital fingerprints showing that it was a computer-assisted lie, and could prove that the Marine's account under which it had been posted was hacked. But the damage had been done.
There was the commanding officer of Edwards Air Force Base whose Internet browser history had been posted on the squadron's Facebook page. His command turned on him as a pervert; his weak protestations that he had not visited most of the posted links could not counter his admission that he had, in fact, trafficked some of them. Lies mixed with the truth. Soldiers at Fort Sill were at each other's throats thanks to a series of text messages that allegedly unearthed an adultery ring on base.
The report is fascinating, and the vignettes that Canclan describes should be keeping US military and defense personnel up at night.
Via Schneier, Stuart Schechter has an excellent article for MFA n00bs people new to multi-factor authentication:
Many online accounts allow you to supplement your password with a second form of identification, which can prevent some prevalent attacks. The second factors you can use to identify yourself include authenticator apps on your phone, which generate codes that change every 30 seconds, and security keys, small pieces of hardware similar in size and shape to USB drives. Since innovations that can actually improve the security of your online accounts are rare, there has been a great deal of well-deserved enthusiasm for two-factor authentication (as well as for password managers, which make it easy to use a different random password for every one of your online accounts.) These are technologies more people should be using.
However, in trying to persuade users to adopt second factors, advocates sometimes forget to disclose that all security measures have trade-offs . As second factors reduce the risk of some attacks, they also introduce new risks. One risk is that you could be locked out of your account when you lose your second factor, which may be when you need it the most. Another is that if you expect second factors to protect you from those attacks that they can not prevent, you may become more vulnerable to the those attacks.
Before you require a second factor to login to your accounts, you should understand the risks, have a recovery plan for when you lose your second factor(s), and know the tricks attackers may use to defeat two-factor authentication.
Read it, and then send it to all of your non-technical friends, unless they happen to be politicians in a certain elephantine party in the U.S.
Shocking, I know, but politicians seem comically unaware of how technology works:
We’re now a dozen years past the infamous “series of tubes” speech. Yet our political leaders still don’t seem to have learned much about those “tubes” or the cyber-sewage that frequently flows through them.
Consider a recent, noncomprehensive history.
These days Trump lashes out at private companies that suspend nut jobs and neo-Nazis, decrying that “censorship is a very dangerous thing & absolutely impossible to police.” But in what feels like a million years of crazy ago, then-candidate Trump said he planned to hobble recruiting by the terrorist Islamic State by asking Bill Gates to “clos[e] that Internet up in some way.”
This was a baffling proposal, not only because Chinese-style, government-enforced Internet censorship would run afoul of the First Amendment. The other problem was that the Microsoft founder-turned-philanthropist does not, uh, “control” the Internet.
Don’t get me wrong, there are some politicians out there who seem to know their way around the information superhighway. Rep. Ro Khanna (D-Calif.), who represents part of Silicon Valley but has called for stronger privacy rights, is among them. Sens. Richard Burr (R-N.C.) and Mark R. Warner (D-Va.), as Senate Intelligence Committee chair and vice chair, respectively, have shown an inclination to ask tougher questions of tech companies on Russian interference.
But the problems infecting the tech sector go well beyond those limited areas, alas. And, generally speaking, our policymakers are ill prepared to protect the public from those who wish us harm — or even from companies willing to profit off that harm.
None of this is really new. Politicians typically know less than most people about the daily lives of the people they represent. What's different, at least as far as the governing party in the U.S. goes, is that they're proud of their ignorance. That is what we should be afraid of.