Articles, speeches, stories and novels by an award-winning science fiction writer, read aloud in small regular chunks
This week on my podcast, I read part four of “Spill“, a new Little Brother story commissioned by Clay F Carlson and published on Reactor, the online publication of Tor Books. Also available in DRM-free ebook form as a Tor Original.
I didn’t plan to go to Oklahoma, but I went to Oklahoma.
My day job is providing phone tech support to people in offices who use my boss’s customer-relationship management software. In theory, I can do that job from anywhere I can sit quietly on a good Internet connection for a few hours a day while I’m on shift. It’s a good job for an organizer, because it means I can go out in the field and still pay my rent, so long as I can park a rental car outside of a Starbucks, camp on their WiFi, and put on a noise-canceling headset. It’s also good organizer training because most of the people who call me are angry and confused and need to have something difficult and technical explained to them.
My comrades started leaving for Oklahoma the day the Water Protector camp got set up. A lot of them—especially my Indigenous friends—were veterans of the Line 3 Pipeline, the Dakota Access Pipeline, and other pipeline fights, and they were plugged right into that network.
The worse things got, the more people I knew in OK. My weekly affinity group meeting normally had twenty people at it. One week there were only ten of us. The next week, three. The next week, we did it on Zoom (ugh) and most of the people on the line were in OK, up on “Facebook Hill,” the one place in the camp with reliable cellular data signals.
This week on my podcast, I read part three of “Spill“, a new Little Brother story commissioned by Clay F Carlson and published on Reactor, the online publication of Tor Books. Also available in DRM-free ebook form as a Tor Original.
I didn’t plan to go to Oklahoma, but I went to Oklahoma.
My day job is providing phone tech support to people in offices who use my boss’s customer-relationship management software. In theory, I can do that job from anywhere I can sit quietly on a good Internet connection for a few hours a day while I’m on shift. It’s a good job for an organizer, because it means I can go out in the field and still pay my rent, so long as I can park a rental car outside of a Starbucks, camp on their WiFi, and put on a noise-canceling headset. It’s also good organizer training because most of the people who call me are angry and confused and need to have something difficult and technical explained to them.
My comrades started leaving for Oklahoma the day the Water Protector camp got set up. A lot of them—especially my Indigenous friends—were veterans of the Line 3 Pipeline, the Dakota Access Pipeline, and other pipeline fights, and they were plugged right into that network.
The worse things got, the more people I knew in OK. My weekly affinity group meeting normally had twenty people at it. One week there were only ten of us. The next week, three. The next week, we did it on Zoom (ugh) and most of the people on the line were in OK, up on “Facebook Hill,” the one place in the camp with reliable cellular data signals.
This week on my podcast, I read part two of “Spill“, a new Little Brother story commissioned by Clay F Carlson and published on Reactor, the online publication of Tor Books. Also available in DRM-free ebook form as a Tor Original.
I didn’t plan to go to Oklahoma, but I went to Oklahoma.
My day job is providing phone tech support to people in offices who use my boss’s customer-relationship management software. In theory, I can do that job from anywhere I can sit quietly on a good Internet connection for a few hours a day while I’m on shift. It’s a good job for an organizer, because it means I can go out in the field and still pay my rent, so long as I can park a rental car outside of a Starbucks, camp on their WiFi, and put on a noise-canceling headset. It’s also good organizer training because most of the people who call me are angry and confused and need to have something difficult and technical explained to them.
My comrades started leaving for Oklahoma the day the Water Protector camp got set up. A lot of them—especially my Indigenous friends—were veterans of the Line 3 Pipeline, the Dakota Access Pipeline, and other pipeline fights, and they were plugged right into that network.
The worse things got, the more people I knew in OK. My weekly affinity group meeting normally had twenty people at it. One week there were only ten of us. The next week, three. The next week, we did it on Zoom (ugh) and most of the people on the line were in OK, up on “Facebook Hill,” the one place in the camp with reliable cellular data signals.
This week on my podcast, I read part one of “Spill“, a new Little Brother story commissioned by Clay F Carlson and published on Reactor, the online publication of Tor Books. Also available in DRM-free ebook form as a Tor Original.
Doctors smoke. Driving instructors text and drive. Dentists eat sugary snacks before bed. And hackers? Well, we’re no better at taking our own advice than anyone else.
Take “There is no security in obscurity”—if a security system only works when your enemies don’t understand it, then your security system doesn’t work.
A couple of years ago, I decided I wanted to move off the cloud. “There’s no such thing as the cloud, there’s only other peoples’ computers.” If you trust Google (or Apple, or, God help you, Amazon to host your stuff, well, let’s just say I don’t think you’ve thought this one through, pal).
I Am Good at Nerd, and managing a server for my own email and file transfers and streaming media didn’t seem that hard. I’d been building PCs since I was fifteen. I even went through a phase where I built my own laptops, so why couldn’t I just build myself a monster-ass PC with stupid amounts of hard drives and RAM and find a data center somewhere that would host it?
This week on my podcast, I read “Vigilant“, a new Little Brother story commissioned by Nelda Buckman and published on Reactor, the online publication of Tor Books. Also available in DRM-free ebook form as a Tor Original.
Kids hate email.
Dee got my number from his older brother, who got it from Tina, my sister-in-law, who he knew from art school. He texted me just as I was starting to make progress with a gnarly bug in some logging software I was trying to get running for my cloud servers.
My phone went bloop and vibrated a little on the kitchen table, making ripples in my coffee. My mind went instantly blank. I unlocked my phone.
> Is this marcus
I almost blocked the number, but dammit, this was supposed to be a private number. I’d just changed it. I wanted to know how it was getting out and whether I needed to change it again.
> Who’s this?
Yeah, I punctuate my texts. I’m old.
> I need help with some school stuff some spying stuff at school i heard your good at that
This week on my podcast, I read my latest Pluralistic.net column, “Anti-cheat, gamers, and the Crowdstrike disaster” about the way that gamers were sucked into the coalition to defend trusted computing, and how the Crowdstrike disaster has seen them ejected from the coalition by Microsoft:
As a class, gamers *hate* digital rights management (DRM), the anti-copying, anti-sharing code that stops gamers from playing older games, selling or giving away games, or just *playing* games:
https://www.reddit.com/r/truegaming/comments/1x7qhs/why_do_you_hate_drm/
Trusted computing promised to supercharge DRM and make it orders of magnitude harder to break – a promise it delivered on. That made gamers a weird partner for the pro-trusted computing coalition.
But coalitions are weird, and coalitions that bring together diverging (and opposing) constituencies are *very* powerful (if fractious), because one member can speak to lawmakers, companies, nonprofits and groups that would normally have nothing to do with another member.
Gamers may hate DRM, but they hate *cheating* even more. As a class, gamers have an all-consuming hatred of cheats that overrides all other considerations (which is weird, because the cheats are *used* by gamers!). One thing trusted computing is pretty good at is detecting cheating. Gamers – or, more often, game *servers* – can use remote attestation to force each player’s computer to cough up a true account of its configuration, including whether there are any cheats running on the computer that would give the player an edge. By design, owners of computers can’t override trusted computing modules, which means that even if you *want* to cheat, your computer will still rat you out.
(Image: Bernt Rostad, Elliott Brown, CC BY 2.0)
This week on my podcast, I read my latest Locus Magazine column, “Marshmallow Longtermism” a reflection on how conservatives self-mythologize as the standards-bearers for deferred gratification and making hard trade-offs, but are utterly lacking in these traits when it comes to climate change and inequality.
I’m no fan of Charles Koch, but I agree that his performance at the helm of Koch Industries demonstrated impressive discipline and self-control, and that his enormous economic and political power stems in large part from his ability to resist temptation and reinvest patient money in patient technologies.
But Koch’s foresight is extremely selective. Much of Koch’s fossil-fuel fortune has been spent on funding climate denial and inaction. Koch claims that he sincerely believes that the climate emergency isn’t real or urgent, which is awfully convenient, given the centrality of fossil fuels to Koch’s power and wealth.
The rigor Koch applies to evaluating the technical propositions of new, efficient coal extraction and refining processes disappears when it comes to climate science. If Koch held coal-tech to the same evidentiary standard that he applies to the climate, he never would have bought a single piece of gear.
This week on my podcast, I read a recent post from my Pluralistic.net blog/newsletter: “AI’s productivity theater,” about the severe mismatch between the bosses who buy AI to increase their workers’ efficiency, and the utter bafflement of the workers who are expected to use the AI…somehow.
A new research report from the Upwork Research Institute offers a look into the bizarre situation unfolding in workplaces where bosses have been conned into buying AI and now face the challenge of getting it to work as advertised:
https://www.upwork.com/research/ai-enhanced-work-models
The headline findings tell the whole story:
* 96% of bosses expect that AI will make their workers more productive;
* 85% of companies are either requiring or strongly encouraging workers to use AI;
* 49% of workers have no idea how AI is supposed to increase their productivity;
* 77% of workers say using AI decreases their productivity.
This week on my podcast, I read my latest Locus Magazine column, Unpersoned>; about the enormous power that we’ve given to tech giants to determine who can participate in modern life, and why the answer to the giants’ failure to wield that power wisely is to take it away, rather than attempting to perfect their use of it.
AT THE END OF MARCH 2024, the romance writer K. Renee discovered that she had been locked out of her Google Docs account, for posting “inappropriate” content in her private files. Renee never got back into her account and never found out what triggered the lockout. She wasn’t alone: as Madeline Ashby recounts in her excellent Wired story on the affair, many romance writers were permanently barred from their own files without explanation or appeal. At the time of the lockout, Renee was in the midst of ten works in progress, totaling over 200,000 words (Renee used Docs to share her work with her early readers for critical feedback).
This is an absolute nightmare scenario for any writer, but it could have been so much worse. In 2021, “Mark,” a stay-at-home dad, sought telemedicine advice for his young son’s urinary tract infection (this was during the acute phase of the covid pandemic, all but the most urgent medical issues were being handled remotely). His son’s pediatrician instructed Mark to take a picture of his son’s penis and upload it using the secure telemedicine app.
Mark did so, but his iPhone was running Google Photos, with auto-synch turned on, so the image was also uploaded to his private Google Photos directory. When it arrived there, Google’s AI scanned the photo and flagged it for child sexual abuse material. Google turned the issue over to the San Francisco Police Department, and furnished the detective assigned to the case with all of Mark’s data — his location history, his email, his photos, his browsing history, and more.
At the same time, Google terminated Mark’s account and deleted all of their own copies of his data. His phone stopped working (he had been using Google Fi for mobile service). His email stopped working (he was a Gmail user). All of his personal records disappeared from his Google Drive. His Google Authenticator, used for two-factor authentication, stopped working. Every photo was deleted from his Google Photos account, including every photo he’d taken of his son since birth.
This week on my podcast, I read The reason you can’t buy a car is the same reason that your health insurer let hackers dox you, a column from one of last week’s editions of my Pluralistic newsletter; it describes a monopoly pattern whereby companies execute a series of mergers to dominate a sector, leaving their IT systems brittle and tangled – and vital to the nation.
Just like with Equifax, the 737 Max disasters tipped Boeing into a string of increasingly grim catastrophes. Each fresh disaster landed with the grim inevitability of your general contractor texting you that he’s just opened up your ceiling and discovered that all your joists had rotted out – and that he won’t be able to deal with that until he deals with the termites he found last week, and that they’ll have to wait until he gets to the cracks in the foundation slab from the week before, and that those will have to wait until he gets to the asbestos he just discovered in the walls.
Drip, drip, drip, as you realize that the most expensive thing you own – which is also the thing you had hoped to shelter for the rest of your life – isn’t even a teardown, it’s just a pure liability. Even if you razed the structure, you couldn’t start over, because the soil is full of PCBs. It’s not a toxic asset, because it’s not an asset. It’s just toxic.
Equifax isn’t just a company: it’s infrastructure. It started out as an engine for racial, political and sexual discrimination, paying snoops to collect gossip from nosy neighbors, which was assembled into vast warehouses full of binders that told bank officers which loan applicants should be denied for being queer, or leftists, or, you know, Black
This week on my podcast, I read my Microsoft DRM talk, first delivered 20 years and one day ago in Redmond, Washington. It was a viral hit in the nascent blogosphere and became a defining document in the fight against DRM.
Greetings fellow pirates! Arrrrr!
I’m here today to talk to you about copyright, technology and DRM, I work for the Electronic Frontier Foundation on copyright stuff (mostly), and I live in London. I’m not a lawyer — I’m a kind of mouthpiece/activist type, though occasionally they shave me and stuff me into my Bar Mitzvah suit and send me to a standards body or the UN to stir up trouble. I spend about three weeks a month on the road doing completely weird stuff like going to Microsoft to talk about DRM.
I lead a double life: I’m also a science fiction writer. That means I’ve got a dog in this fight, because I’ve been dreaming of making my living from writing since I was 12 years old. Admittedly, my IP-based biz isn’t as big as yours, but I guarantee you that it’s every bit as important to me as yours is to you.
Here’s what I’m here to convince you of:
1. That DRM systems don’t work
2. That DRM systems are bad for society
3. That DRM systems are bad for business
4. That DRM systems are bad for artists
5. That DRM is a bad business-move for MSFT
Your feedback is valuable to us. Should you encounter any bugs, glitches, lack of functionality or other problems, please email us on [email protected] or join Moon.FM Telegram Group where you can talk directly to the dev team who are happy to answer any queries.