RISKS Forum mailing list archives

Risks Digest 31.14


From: RISKS List Owner <risko () csl sri com>
Date: Tue, 26 Mar 2019 16:03:23 PDT

RISKS-LIST: Risks-Forum Digest  Tuesday 26 March 2019  Volume 31 : Issue 14


ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
  <http://catless.ncl.ac.uk/Risks/31.14>
The current issue can also be found at
  <http://www.csl.sri.com/users/risko/risks.txt>

  Contents:
Take Another Little Peek at my Heart (Dan Goodin)
Warnings of a Dark Side to AI in Health Care (NYTimes)
These 11 Weird Smart Home Devices Can Change Your Life (Lifewire)
Baristas beware: A robot that makes gourmet cups of coffee has
  arrived (The Washington Post)
Two Singapore consortia to develop/trial driverless road cleaning
  vehicles (The Straits Times)
Hackers Hijacked ASUS Software Updates to Install Backdoors on
  Thousands of Computers (motherboard)
iOS Safari Flaw Allows Deceptive News Headlines in Messages (Intego)
These Portraits Were Made by AI: None of These People Exist (The Verge)
The Spring That Prematurely Ended a Magical Summer (Now I Know)
Detroit Downloads Tesla's Software Strategy (WSJ)
Russia wants to cut itself off from the global Internet.
  Here's what that really means.  (MIT Tech Review)
Tweet by Soldier of FORTRAN on Twitter (Drew Dean)
Jeep stuck in Whately woods after GPS gives wrong directions (GazetteNet)
How Google's Bad Data Wiped a Neighborhood off the Map (Medium)
The Internet's Phone Book Is Broken (Medium)
Lithuanian Man Pleads Guilty to $100 Million Fraud Against Google, Facebook
  (SWJ)
EU passes their nightmare copyright legislation (Lauren Weinstein)
One dead battery + app = two dead batteries (Dan Jacobson)
Online voting, again (Fortune)
Tech subjects and the media (Rob Slade)
Apple Life+ (Rob Slade)
Re: Inside YouTube's struggles to shut down video of the New Zealand
  shooting -- and the humans who outsmarted its systems (Arthur Flatau)
Re: How a 50-year-old design came back... (Craig Burton)
Unproven declarations about healthcare (Paul Black)
Re: Is curing patients, a sustainable business model? (Toby Douglass)
The Newcastle RISKS SSL cert expired (Toby Douglass)
Abridged info on RISKS (comp.risks)

----------------------------------------------------------------------

Date: Mon, 25 Mar 2019 15:34:23 -0600
From: Cipher Editor <cipher-editor () ieee-security org>
Subject: Take Another Little Peek at my Heart (Dan Goodin)

Dan Goodin, Ars Technica, 21 Mar 2019, via IEEE Cipher

HOT-WIRE MY HEART: Critical flaw lets hackers control lifesaving devices
implanted inside patients; Implanted devices from Medtronic can have their
firmware rewritten, DHS warns.

https://arstechnica.com/information-technology/2019/03/critical-flaw-lets-hackers-control-lifesaving-devices-implanted-inside-patients/

Summary: There are many people alive today because they carry implanted
medical devices in their bodies.  The devices have computers and wireless
communication capabilities.  Unsurprisingly, if they are devoid of standard
security protections, they are completely hackable.  The Conexus Radio
Frequency Telemetry Protocol, which is Medtronic's proprietary means for the
monitors to wirelessly connect to implanted devices, has a "raft" of
security weaknesses that leave them open to everything from privacy
violations to complete reprogramming by anyone within wireless range.
Medtronic emphasizes that no device has ever actually been hacked, and that
they are responding to US Department of Homeland Security's Cybersecurity
and Infrastructure Security Agency' advisory
https://ics-cert.us-cert.gov/advisories/ICSMA-19-080-01 with all due speed.

------------------------------

Date: Mon, 25 Mar 2019 12:05:09 -0400
From: ACM TechNews <technews-editor () acm org>
Subject: Warnings of a Dark Side to AI in Health Care (NYTimes)

Cade Metz and Craig S. Smith, *The New York Times*, 21 Mar 2019
via ACM TechNews, 25 Mar 2019

Harvard University and Massachusetts Institute of Technology (MIT)
researchers warn in a recently published study that new artificial
intelligence (AI) technology designed to enhance healthcare is vulnerable to
misuse, with "adversarial attacks" that can deceive the system into making
misdiagnoses being one example. A more likely scenario is of doctors,
hospitals, and other organizations manipulating the AI in billing or
insurance software in an attempt to maximize revenue. The researchers said
software developers and regulators must consider such possibilities as they
build and evaluate AI technologies in the years to come. MIT's Samuel
Finlayson said, "The inherent ambiguity in medical information, coupled with
often-competing financial incentives, allows for high-stakes decisions to
swing on very subtle bits of information." Changes doctors make to medical
scans or other patient data in an effort to satisfy the AI used by insurance
firms also could wind up in a patient's permanent record.

https://www.nytimes.com/2019/03/21/science/health-medicine-artificial-intelligence.html

  [Monty Solomon noted from that article:
Machine-learning systems could be a boon to medicine. But they also can be
hacked to mislead, researchers are discovering.
  PGN]

------------------------------

Date: Mon, 25 Mar 2019 13:58:11 -0400
From: Gabe Goldberg <gabe () gabegold com>
Subject: These 11 Weird Smart Home Devices Can Change Your Life (Lifewire)

https://www.lifewire.com/unusual-smart-home-devices-4145020

Smart:

  * Bed
  * Toaster
  * Fork
  * Garage door opener
  * Toilet
  * Egg tray
  * Toothbrush
  * Hairbrush
  * Pet feeder
  * Frying pan
  * Flood sensor

What ever could go wrong?

------------------------------

Date: Sun, 24 Mar 2019 11:59:31 +0800
From: Richard Stein <rmstein () ieee org>
Subject: Baristas beware: A robot that makes gourmet cups of coffee has
  arrived (The Washington Post)

http://www.washingtonpost.com/technology/2019/03/22/baristas-beware-robot-that-makes-gourmet-cups-coffee-has-arrived/

"The machine can make 100 cups per hour -- the output of four baristas, the
company says."

"All the numbers and data in the world can't actually tell you how the
coffee tastes," Geib said. "A big part of what a human brings is being able
to taste the coffee during the process of dialing in the flavor."

Risks: Denial of service, product satisfaction underachievement, and no
kibitzing with the barista.

------------------------------

Date: Thu, 21 Mar 2019 18:28:48 -0700
From: Richard Stein <rmstein () ieee org>
Subject: Two Singapore consortia to develop/trial driverless road cleaning
  vehicles (The Straits Times)

https://www.straitstimes.com/business/economy/two-singapore-consortia-to-develop-trial-driverless-road-cleaning-vehicles

------------------------------

Date: Mon, 25 Mar 2019 10:27:33 PDT
From: "Peter G. Neumann" <neumann () csl sri com>
Subject: Hackers Hijacked ASUS Software Updates to Install Backdoors on
  Thousands of Computers (motherboard)

  [via Geoff Goodfellow]
     [Be sure to chase down the Kaspersky securelist URL noted herein.
     Also, see Kim Zetter's take on this one:
https://motherboard.vice.com/en_us/article/pan9wn/hackers-hijacked-asus-software-updates-to-install-backdoors-on-thousands-of-computers
     The cleverness here is quite remarkable.  Bottom line for RISKS:
       Beware of compromised automated update mechanisms.  PGN]

The Taiwan-based tech giant ASUS is believed to have pushed the malware to
hundreds of thousands of customers through its trusted automatic software
update tool after attackers compromised the company's server and used it to
push the malware to machines.
https://motherboard.vice.com/en_us/article/pan9wn/hackers-hijacked-asus-software-updates-to-install-backdoors-on-thousands-of-computers

EXCERPT:

Researchers at cybersecurity firm Kaspersky Lab say that ASUS, one of the
world's largest computer makers, was used to unwittingly install a malicious
backdoor on thousands of its customers' computers last year after attackers
compromised a server for the company's live software update tool.  The
malicious file was signed with legitimate ASUS digital certificates to make
it appear to be an authentic software update from the company, Kaspersky Lab
says.

ASUS, a multi-billion dollar computer hardware company based in Taiwan
https://www.asus.com/us/ that manufactures desktop computers, laptops,
mobile phones, smart home systems, and other electronics, was pushing the
backdoor to customers for at least five months last year before it was
discovered, according to new research from the Moscow-based security firm.

The researchers estimate half a million Windows machines received the
malicious backdoor through the ASUS update server, although the attackers
appear to have been targeting only about 600 of those systems. The malware
searched for targeted systems through their unique MAC addresses. Once on a
system, if it found one of these targeted addresses, the malware reached out
to a command-and-control server the attackers operated, which then installed
additional malware on those machines.

Kaspersky Lab said it uncovered the attack in January 2019 after adding a
new supply-chain detection technology to its scanning tool to catch
anomalous code fragments hidden in legitimate code or catch code that is
hijacking normal operations on a machine. The company plans to release a
full technical paper and presentation about the ASUS attack, which it has
dubbed ShadowHammer, next month at its Security Analyst Summit
https://sas.kaspersky.com/ in Singapore.  In the meantime, Kaspersky has
published some of the technical details on its website.  [...]
https://securelist.com/operation-shadowhammer/89992/

------------------------------

Date: Mon, 25 Mar 2019 21:01:52 -0400
From: Monty Solomon <monty () roscom com>
Subject: iOS Safari Flaw Allows Deceptive News Headlines in Messages
  (Intego)

https://www.intego.com/mac-security-blog/ios-safari-flaw-allows-deceptive-web-page-previews-in-messages/

------------------------------

Date: Tue, 26 Mar 2019 08:56:07 -0700
From: geoff goodfellow <geoff () iconia com>
Subject: These Portraits Were Made by AI: None of These People Exist
  (The Verge)

Check out these rather ordinary looking portraits. They're all fake. Not in
the sense that they were Photoshopped, but rather they were *completely
generated by artificial intelligence*.  That's right: none of these people
actually exist.

NVIDIA researchers have published a new paper
https://arxiv.org/pdf/1812.04948.pdf
on easily customizing the style of realistic faces created by a generative
adversarial network (GAN).

*The Verge* points out that GAN has only existed for about four years.
https://www.theverge.com/2018/12/17/18144356/ai-image-generation-fake-faces-people-nvidia-generative-adversarial-networks-gans
In 2014, a landmark paper introduced the concept, and this is what the
AI-generated results looked like at the time.
https://arxiv.org/pdf/1406.2661.pdf

------------------------------

Date: Mon, 25 Mar 2019 14:25:25 -0400
From: Gabe Goldberg <gabe () gabegold com>
Subject: The Spring That Prematurely Ended a Magical Summer (Now I Know)

In the spring of 1990, Coke announced something called `MagiCans' — you
can see a (grainy) ad from the campaign here:
https://www.youtube.com/watch%3Fv%3DOBCKnhFwE_4

The stunt, the centerpiece to their $100 million `Magic Summer' marketing
push, was simple. Some cans of Coca-Cola Classic were loaded with coupons,
gift certificates, and most importantly, cash — up to $500. The prize cans
were spring-loaded, as seen above; if the mechanism worked properly, the
prize would pop up once the can was popped open. Those cans didn't contain
Coke, though; as the ad warned, ``If you see anything other than Coca-Cola
Classic in that can, don't drink from it,'' as prize cans were `winners'
but, alas, didn't contain any actual soda. Instead, they contained a sealed
chamber of chlorinated water with a foul odor, intending to mask the weight
of the prize while also stopping winners from taking a sip in case it
somehow leaked.

http://nowiknow.com/the-spring-that-prematurely-ended-a-magical-summer/

Technology -- what could go wrong? Too bad pre-Internet cans could have been
WiFi enabled to automatically broadcast sight and sound of people's
reactions to surprise contents. Not being a soda drinker, I missed this fun.

------------------------------

Date: Thu, 21 Mar 2019 22:39:30 -0400
From: Monty Solomon <monty () roscom com>
Subject: Detroit Downloads Tesla's Software Strategy (WSJ)

Industry moves toward wireless updates to repair problems and deliver extras

https://www.wsj.com/articles/auto-makers-steer-in-teslas-direction-on-wireless-updates-11553083202

------------------------------

Date: Mon, 25 Mar 2019 10:14:41 -0700
From: geoff goodfellow <geoff () iconia com>
Subject: Russia wants to cut itself off from the global Internet.
  Here's what that really means.  (MIT Tech Review)

*The plan is going to be tricky to pull off, both technically and
politically, but the Kremlin has set its sights on self-sufficiency.*

EXCERPT:

In the next two weeks, Russia is planning to attempt something no other
country has tried before. It's going to test whether it can disconnect from
the rest of the world electronically while keeping the Internet running for
its citizens. This means it will have to reroute all its data internally,
rather than relying on servers abroad.

The test is key to a proposed `sovereign Internet' law currently working its
way through Russia's government. It looks likely to be eventually voted
through and signed into law by President Vladimir Putin, though it has
stalled in parliament for now.

Pulling an iron curtain down over the Internet is a simple idea, but don't
be fooled: it's a fiendishly difficult technical challenge to get right. It
is also going to be very expensive. The project's initial cost has been set
at $38 million by Russia's financial watchdog, but it's likely to require
far more funding than that. One of the authors of the plan has said it'll
be more like $304 million, Bloomberg reports, but even that figure,
industry experts say, won't be enough to get the system up and running, let
alone maintain it.

Not only that, but it has already proved deeply unpopular with the general
public. An estimated 15,000 people took to the streets in Moscow earlier
this month to protest the law, one of the biggest demonstrations in years.

* Operation disconnect*

So how will Russia actually disconnect itself from the global Internet?
``It is unclear what the `disconnect test' might entail,'' says Andrew
Sullivan, president and CEO of the Internet Society. All we know is that if
it passes, the new law will require the nation's Internet service providers
(ISPs) to use only exchange points inside the country that are approved by
Russia's telecoms regulator, Roskomnadzor.

These exchange points are where Internet service providers connect with
each other. It's where their cabling meets at physical locations to
exchange traffic. These locations are overseen by organizations known as
Internet exchange providers (IXPs). Russia's largest IXP is in Moscow,
connecting cities in Russia's east but also Riga in neighboring Latvia.

MSK-IX, as this exchange point is known, is one of the world's largest. It
connects over 500 different ISPs and handles over 140 gigabits of throughput
during peak hours on weekdays. There are six other Internet exchange points
in Russia, spanning most of its 11 time zones. Many ISPs also use exchanges
that are physically located in neighboring countries or that are owned by
foreign companies. These would now be off limits. Once this stage is
completed, it would provide Russia with a literal, physical `on/off switch'
to decide whether its Internet is shielded from the outside world or kept
open.

* What's in a name?*

As well as rerouting its ISPs, Russia will also have to unplug from the
global domain name system (DNS) so traffic cannot be rerouted through any
exchange points that are not inside Russia.

The DNS is basically a phone book for the Internet: when you type, for
example, `google.com' into your browser, your computer uses the DNS to
translate this domain name into an IP address, which identifies the correct
server on the Internet to send the request. If one server won't respond to a
request, another will step in. Traffic behaves rather like water -- it will
seek any gap it can to flow through.

``The creators of the DNS wanted to create a system able to work even when
bits of it stopped working, regardless of whether the decision to break
parts of it was deliberate or accidental,'' says Brad Karp, a computer
scientist at University College London. This in-built resilience in the
underlying structure of the Internet will make Russia's plan even harder to
carry out.

The actual mechanics of the DNS are operated by a wide variety of
organizations, but a majority of the `root servers', which are its
foundational layer, are run by groups in the US. Russia sees this as a
strategic weakness and wants to create its own alternative, setting up an
entire new network of its own root servers.

``An alternate DNS can be used to create an alternate reality for the
majority of Russian Internet users,'' says Ameet Naik, an expert on Internet
monitoring for the software company ThousandEyes.  ``Whoever controls this
directory controls the Internet.''  Thus, if Russia can create its own DNS,
it will have at least a semblance of control over the Internet within its
borders.

This won't be easy, says Sullivan. It will involve configuring tens of
thousands of systems, and it will be difficult, if not impossible, to
identify all the different access points citizens use to get online (their
laptops, smartphones, iPads, and so on). Some of them will be using servers
abroad, such as Google's Public DNS, which Russia simply won't be able to
replicate -- so the connection will fail when a Russian user tries to access
them... [...]  MIT
https://www.technologyreview.com/s/613138/russia-wants-to-cut-itself-off-from-the-global-internet-heres-what-that-really-means/

------------------------------

Date: Mon, 25 Mar 2019 18:16:24 -0700
From: Drew Dean <ddean () csl sri com>
Subject: Tweet by Soldier of FORTRAN on Twitter

Condensed from a Twitter thread starting at: https://twitter.com/mainframed767/status/1108782021571076096, 
@mainframed767 tells the following story:

  Auditors were reviewing logs for some appliance that used a default
  account.  Every time the account was used, it wrote the username and
  password in the logs as an easy-to-identify log entry. ... So, how did
  they fix it?  The vendor wouldn't fix the issue because the product was no
  longer supported, but the business still needed it for a few more years.
  Search your heart and guess what they did:

    1 - Migrated to a new app
    2 - Disabled logging as a whole
    3 - Changed the default password to ********

  If you guessed option 3 you're right! They changed the password to
  ********, and then when the auditors reviewed it they just assumed it was
  fixed because the passwords looked as if they had been masked!  Genius.

     [I took the liberty of a little detwittered editing for readability.
     PGN]

------------------------------

Date: Mon, 25 Mar 2019 09:28:57 -0400
From: Monty Solomon <monty () roscom com>
Subject: Jeep stuck in Whately woods after GPS gives wrong directions
  (GazetteNet)

https://www.gazettenet.com/GPS-misleads-Jeep-into-Whately-woods-24262171

------------------------------

Date: Fri, 22 Mar 2019 14:58:43 -0400
From: Monty Solomon <monty () roscom com>
Subject: How Google's Bad Data Wiped a Neighborhood off the Map (Medium)

https://onezero.medium.com/how-googles-bad-data-wiped-a-neighborhood-off-the-map-80c4c13f1c2b

------------------------------

Date: Fri, 22 Mar 2019 15:01:04 -0400
From: Monty Solomon <monty () roscom com>
Subject: The Internet's Phone Book Is Broken (Medium)

https://onezero.medium.com/the-internets-phone-book-is-broken-9fcdd6ca726b

------------------------------

Date: Thu, 21 Mar 2019 20:28:32 -0400
From: Monty Solomon <monty () roscom com>
Subject: Lithuanian Man Pleads Guilty to $100 Million Fraud Against Google,
  Facebook (WSJ)

The two tech giants fell victim to an elaborate scheme orchestrated by the
defendant, prosecutors say

https://www.wsj.com/articles/lithuanian-man-pleads-guilty-to-100-million-fraud-against-google-facebook-11553126126

------------------------------

Date: Tue, 26 Mar 2019 08:09:51 -0700
From: Lauren Weinstein <lauren () vortex com>
Subject: EU passes their nightmare copyright legislation

The EU has passed their nightmare copyright legislation that will crush the
rights of ordinary EU users and will attempt to infect the rest of the world
with its poisons.

My recommendation -- seriously -- is to cut EU countries off from the Net in
all related respects as soon as they start to try make trouble for non-EU
countries or global firms.

Based on Article 11, I'd cut them off from Google News entirely, and
drastically cut back their appearances in Google Search if they try to push
their link tax onto Google.

Global firms should consider refusing all content uploads from EU countries
where Article 13 issues are in force.

If the EU wants to treat their own citizens in such an atrocious way that's
their business. But the rest of the planet doesn't have to put up with this
sociopathic behavior by the EU.

Wall off the EU from all associated global Internet services until they come
to their senses.

------------------------------

Date: Mon, 25 Mar 2019 11:41:35 +0800
From: Dan Jacobson <jidanni () jidanni org>
Subject: One dead battery + app = two dead batteries

It was a foggy night. My pal parked his spanking new rental car on the
remote mountaintop.

Everything was fine except that one red blinking dashboard light that we
couldn't get to turn off. (That might mean a dead battery when we get
back... Stranded on the mountain!)

Each "on" part of the light's on-off cycle was so short that there was
not enough time for the eye to figure out its complex shape and thus
meaning.

Shining a flashlight on it just revealed a flat panel, with the shape
template invisible below.

"Hmmm, all doors closed, but perhaps not locked." I said. (No criminals
on the misty mountain, plus I bet he will lock himself out, but let's
try it anyway.)

"I need to use the rental company app to lock the doors, but my phone is
out of battery." he said.

RISK: one dead battery leads to another dead battery when an app is involved.

(How about just disconnecting the battery cable? Better not. What if the
car starts talking in Italian like in Toy Story, or detect it is being
attacked and lift off and fly home to mother?)

------------------------------

Date: Sun, 24 Mar 2019 20:55:26 -0400
From: Gabe Goldberg <gabe () gabegold com>
Subject: Online voting, again (Fortune)

Author says:

I recently spoke to Nimit Sawhney, CEO and cofounder of Voatz, the
blockchain-based, mobile voting software provider, whose technology West
Virginia piloted
https://click.email.fortune.com/%3Fqs%a342b38f08e68b2b352488b282394d1e6b44ec5566899b5687131ecd06b8e9c5d752e501e43c57f03cb6ac596f17e3c2140abff8659b9873

during last year's general midterm election. Sawhney came up with the idea
https://click.email.fortune.com/%3Fqs%a342b38f08e68b2b3da3b37e741b3624abe33987cbb5c477226b214de4958cbf48e029bde2823e428c611669ca877284a9c350dfa917201a
for the project with his brother when the two competed in -- and won -- a
hackathon at Austin's SXSW festival in 2014. Since then, Sawhney has
formally established a company, based in Boston, to develop the product.

Voatz's technology is making inroads. Sawhney's 14-person team recently
won over Denver, Colo.
https://click.email.fortune.com/%3Fqs%a342b38f08e68b2b861611ebd403f430f4dd8863abe4563daa28d537552afe116eb1e69e65be9ecb502717262fb47d01edd581c6df8536af
as the second testing ground for its voting system. The city is trying the
app in its May 7th municipal election, early voting for which starts today.

I asked Sawhney why he decided to incorporate a blockchain into his
system. He says it's so that IT administrators within and outside his
company can't manipulate or delete records at will. Voatz uses so-called
permissioned ledgers, meaning only authorized parties can operate them.  In
this case, the voting database is distributed across 32 computing nodes
running the Linux Foundation's Hyperledger Fabric and Hyperledger Sawtooth
software on machines hosted by Amazon
https://click.email.fortune.com/%3Fqs%a342b38f08e68b2bb7d7dae8fe85186812ca961c46c93054b3e79e8532d99c531666b5e2f8871bf3335510949d8dfa40f0c9545eda231fb1
Web Services and Microsoft
https://click.email.fortune.com/%3Fqs%a342b38f08e68b2b213946a7073ace4502c08fcbcc22aaee793f78c06f7d9fc354ec43b46a86fb861ee7a3761c4ef590a56aed4e8f9d83d6
Azure. Voatz stewards the nodes alongside select nonprofits that act as
independent monitors, a small cadre Voatz hopes to expand to include other
major stakeholders -- political parties, media entities, and others -- over
time.

https://view.email.fortune.com/%3Fqs%592c9ecd5951d82b21b03ca032478224af503a2b8e1ae0ec8aab39184d16029f7ad4c2e57d415978db00277b7fd2de81bdef1c5ab69c08fcd3ab61add7f656fcf3de08f777373f1f

------------------------------

Date: Fri, 22 Mar 2019 11:24:34 -0700
From: Rob Slade <rmslade () shaw ca>
Subject: Tech subjects and the media

I have been known, from time to time, to make ... "unkind" ... remarks about
the ability of the general (and sometimes even the trade) media to gets
things right when addressing technical, and particularly infosec, topics.

So I was intrigued to find that I'm getting some agreement from scientists
in general.  They are even calling it "fake news."
https://vancouversun.com/news/local-news/vancouver-scientists-critical-of-media-misrepresentation-of-their-work-in-era-of-fake-news
or
https://is.gd/pfIFXF

I'm not sure if the media, under increasing pressure from the online world,
is getting worse, or if people are getting fed up, or if the increasing mass
of real fake news (mostly from the online world) is making people more
attuned to the problem ...

------------------------------

Date: Tue, 26 Mar 2019 08:52:03 -0800
From: Rob Slade <rmslade () shaw ca>
Subject: Apple Life+

Apple has always had partisans with a devotion bordering on fanaticism.
(Although UNIX is the one, true operating system, and Thompson is its
prophet, it is Apple that has inspired the most hard core religious wars in
computerdom.)  Apple started out with the "open" Apple ][ system.  Since
then, with the Mac and various iOS devices, Apple has been firmly closed,
and has increasingly tried to lock users into the Apple branded world.

With the iPod, and iTunes, Apple moved to control music, expanding somewhat
into movies, with extensions into podcasts (the very word deriving from the
iPod) and other audio and video content.  Then came Apple TV and Apple News.

With the recent "plus"es added to those, Apple has an enormous platform for
information, entertainment, infotainment, and all manner of content
delivery, all within the Apple environment and under Apple control.
Interest has been expressed in the medical benefits of the fitness tracker
on the Apple watch, with its ability to alert the user (or others) when
anomalous fitness readings are detected.  All of this, your phone and email
contacts and traffic, and many home IoT devices, can be controlled, managed,
recorded (and the details fed back to Apple) by Siri.  People have been
concerned over the information that Facebook and Google collect on users:
it's very difficult to believe that Apple has less access to personal user
data.

Buried in yesterday's announcement was the Apple credit card.  With its
enormous cash reserves, Apple can easily become a bank, and provide (and
manage) all kinds of financial services.

All Apple needs is a piece of Amazon's retail sector, and perhaps a
ride-sharing service (or, maybe, Apple might do an end-run, and start up a
drone-sharing telepresence service) and the Apple World+ is complete.  Many
science-fiction stories have posited a world where governments have become
irrelevant and been replaced by corporations: I suspect Apple is closest to
making this holistic control over the user's life a reality.

I expect iReligion+ to be announced any day.  Where others might go for the
cut-rate "Repent and be saved!  This is an exclusive TV offer" 20% off
salvation route, I presume Apple will for for the premium offer to save your
soul (backed up in the clouds) to an Apple branded heaven, with easy access
to forbidden fruit, as long as you only take one bite ...

------------------------------

Date: Fri, 22 Mar 2019 11:46:09 -0500
From: Arthur Flatau <flataua () acm org>
Subject: Re: Inside YouTube's struggles to shut down video of the New
  Zealand shooting -- and the humans who outsmarted its systems (RISKS-31.13)

If YouTube really wanted to be able to control the spread of video like
this, it would be simple.  They could simply shutdown uploads for a time,
until they can figure out how to screen the videos for the offensive
content.  Or they could, for a period of time, make it so uploads have to be
reviewed by a person before going live.  Obviously this would hinder other
people uploading to YouTube for a time.  However if they really wanted to
limit the rapid dissemination of certain videos, they could do so easily,
they just choose not to.

------------------------------

Date: Fri, 22 Mar 2019 10:34:29 +1100
From: Craig Burton <craig.alexander.burton () gmail com>
Subject: Re: How a 50-year-old design came back... (RISKS-31.13)

larger engines and altered aerodynamics -- led to the complex flight
control software system

I guess this list is very familiar with these but in case not I have to
bring up Joseph Tainter here about the increasing cost of complexity (more
complex solutions solve previous complexity problems)
https://www.youtube.com/watch%3Fv%3DG0R09YzyuCI%7C45af72342bde4ceb7ed608d6ae55cb1d%7C40779d3379c44626b8bf140c4d5e9075%7C1
And an old joke about the Space Shuttle dimensions and two horses' behinds
http://www.astrodigital.org/space/stshorse.html

I also understand that the Stealth Bomber is such a complex shape that it
can only be flown by software.

It seems like the risk of something going wrong is not a risk but a
certainty?

------------------------------

Date: Mon, 25 Mar 2019 14:15:07 -0400
From: Paul Black <drpaule () gmail com>
Subject: Unproven declarations about healthcare (Re: Ward, RISKS-31.13)

Mr. Ward made a number of statements about for-profit businesses working in
healthcare that sound quite reasonable. I ask, are there studies to support
them?

For instance, "... the more sick people there are (especially those that
need expensive treatments), the more profit there is to be made." For the
same premiums, insurance companies *far* prefer healthy clients to sick
ones.

"Managing symptoms is more profitable than curing a disease;" Really?
Perhaps Big Pharma makes little on cough medicine, but has a tidy margin on
treatments for TB.

"Expensive drugs are more profitable than, for example, recommending simple
changes to diet ..." Sadly, few Americans follow recommendations to change
their diet. Americans *will* take pills.

"... encouraging unhealthy habits is beneficial to a healthcare company."
My insurance company and the mailers I get from hospitals and doctors all
encourage me to have healthy habits.

"... its a good business practice to test for everything ..." Much
over-testing is a reaction to massive litigation in the U.S. Doctors and
hospitals may be sued for millions if they ever fail to test for some rare
disease.

Government-run medicine is no panacea. The U.S. federal government has been
incredibly wasteful and has not always picked winners, for instance, the
Tuskegee Syphilis Study and the Enron scandal.

------------------------------

Date: Sat, 23 Mar 2019 14:22:08 +0200
From: Toby Douglass <risks () winterflaw net>
Subject: Re: Is curing patients, a sustainable business model? (Ward, R-31.13)

When healthcare is a business, the more sick people there are
(especially those that need expensive treatments), the more profit
there is to be made. This has many bad consequences:

Not directly and not in and of itself.

In all things, there are factors which encourage, and there are factors
which discourage, and in the end, you get what you get.

I may be wrong, but I concur with the above description as *a* factor.

There are however *more* factors - a primary factor being competition: for
example, if a single entity offers cure, rather than symptom management,
they clean up the market, and on sane person will prefer a provider with
endless tests and symptom management over a few tests and a cure.

The extent to which competition is removed from the market, which can happen
through many means, such as absence of information for making choices, or
through State regulation constraining choice of provider (as happens in the
USA, through tax relief on employer provided health care) or, by being heavy
and onerous regulation, preventing new entry to market and so defending a
few large, existing, entrenched entities, the more the unpleasantness
Mr. Ward describes becomes less discouraged.

Contrast this with universal healthcare and government-funded medical
research.  If you are allocated with a certain budget per person and
tasked with improving health you will have a very different set of
priorities.

The State obtains funding through taxation and creates a health care entity.
All patients -must- pay (taxation) and if the service is no good, there is
nowhere else for them to go, or, if private health care is permitted, they
must continue to pay anyway for State health care.

In all things there are factors which encourage, and factors which
discourage, and in the end, you get what you get : to be sure there will be
professionalism and human decency, both encouraging factors for positive
patient outcomes, but there will also be apathy, carelessness, inefficiency
and empire building, with no forces at work to remove them, for the really
profound encouraging factors, that the customer pays you and can go
somewhere else, are removed.  You then get what you get.

I may be wrong, but I think the great safety for normal, ordinary, powerless
people, is competition.  Safety lies in choice, which requires both the
freedom to buy as they wish and the freedom for there to *be* many different
providers to buy from.  Removal of one or both of these freedoms is an
encumbrance of serfdom.

Many evils come from ordinary people being constrained, such that they are
unable then to say "this is bloody awful, I'm leaving" and are instead
forced to endure.

------------------------------

Date: Sat, 23 Mar 2019 00:28:24 +0200
From: Toby Douglass <risks () winterflaw net>
Subject: The Newcastle RISKS SSL cert expired

https://catless.ncl.ac.uk/Risks/
Cert expired on 22 Mar, apparently.

  [NOW FIXED, TNX to Lindsay.  PGN]

------------------------------

Date: Mon, 14 Jan 2019 11:11:11 -0800
From: RISKS-request () csl sri com
Subject: Abridged info on RISKS (comp.risks)

 The ACM RISKS Forum is a MODERATED digest.  Its Usenet manifestation is
 comp.risks, the feed for which is donated by panix.com as of June 2011.
=> SUBSCRIPTIONS: The mailman Web interface can be used directly to
 subscribe and unsubscribe:
   http://mls.csl.sri.com/mailman/listinfo/risks

=> SUBMISSIONS: to risks () CSL sri com with meaningful SUBJECT: line that
   includes the string `notsp'.  Otherwise your message may not be read.
 *** This attention-string has never changed, but might if spammers use it.
=> SPAM challenge-responses will not be honored.  Instead, use an alternative
 address from which you never send mail where the address becomes public!
=> The complete INFO file (submissions, default disclaimers, archive sites,
 copyright policy, etc.) is online.
   <http://www.CSL.sri.com/risksinfo.html>
 *** Contributors are assumed to have read the full info file for guidelines!

=> OFFICIAL ARCHIVES:  http://www.risks.org takes you to Lindsay Marshall's
    searchable html archive at newcastle:
  http://catless.ncl.ac.uk/Risks/VL.IS --> VoLume, ISsue.
  Also,  ftp://ftp.sri.com/risks for the current volume
     or ftp://ftp.sri.com/VL/risks-VL.IS for previous VoLume
  If none of those work for you, the most recent issue is always at
     http://www.csl.sri.com/users/risko/risks.txt, and index at /risks-31.00
  Lindsay has also added to the Newcastle catless site a palmtop version
  of the most recent RISKS issue and a WAP version that works for many but
  not all telephones: http://catless.ncl.ac.uk/w/r
  ALTERNATIVE ARCHIVES: http://seclists.org/risks/ (only since mid-2001)
 *** NOTE: If a cited URL fails, we do not try to update them.  Try
  browsing on the keywords in the subject line or cited article leads.
  Apologies for what Office365 and SafeLinks may have done to URLs.
==> Special Offer to Join ACM for readers of the ACM RISKS Forum:
    <http://www.acm.org/joinacm1>

------------------------------

End of RISKS-FORUM Digest 31.14
************************


Current thread: