Today in Tech History – March 5, 2016

20140404-073853.jpgIn 1975 – The Homebrew Computer Club, held its first meeting in the garage of Gordon French in Menlo Park, California. 32 people showed up for the first meeting. John Draper, Steve Wozniak and Steve Jobs were some of the more famous members of the club.

In 1981 – The ZX81 was launched by Sinclair Research in Britain for £69.95 and would go on to sell over 1.5 million units around the world. It was much more successful than it’s predecessor the ZX80.

In 1982 – Four days after it’s twin, the second of two Soviet probes to Venus, the Venera 14 landed on the planet. Venera 13 and 14 would continue to send data until 1983.

Like Tech History? Get the illustrated Year in Tech History at Merritt’s Books site.

DTNS 2704 – FBI’s Image Issues

Logo by Mustafa Anabtawi thepolarcat.comCould the FBI get into the iPhone 5C without Apple’s help? Darren Kitchen runs through some of the options and their likelihood of success with Tom Merritt. And Len Peralta illustrates the show!

MP3

Using a Screen Reader? Click here

Multiple versions (ogg, video etc.) from Archive.org.

Please SUBSCRIBE HERE.

Follow us on Soundcloud.

A special thanks to all our supporters–without you, none of this would be possible.

If you are willing to support the show or give as little as 5 cents a day on Patreon. Thank you!

Big thanks to Dan Lueders for the headlines music and Martin Bell for the opening theme!

Big thanks to Mustafa A. from thepolarcat.com for the logo!

Thanks to our mods, Kylde, TomGehrke, sebgonz and scottierowland on the subreddit

Show Notes
To read the show notes in a separate page click here!

Today in Tech History – March 4, 2016

20140404-073853.jpgIn 1976 – The first Freon-cooled Cray-1 supercomputer was shipped to Los Alamos Laboratories, in New Mexico at a cost of $19,000,000.

In 2000 – The Sony PlayStation 2 went on sale in Japan.

In 2007 – Election Day was held in Estonia, and for the first time in the world, voters were allowed to vote on the Internet. Approximately 30,000 voters took advantage of electronic voting. Ballots had to be completed three days before election day.

Like Tech History? Get the illustrated Year in Tech History at Merritt’s Books site.

DTNS 2703 – Is There an Echo in Here

Logo by Mustafa Anabtawi thepolarcat.com
Amazon adds two new devices to its Alexa-powered voice-recognition devices. Tom Merritt and Justin Young discuss whether Amazon is slowly, quietly, taking over the smart home.

MP3

Using a Screen Reader? Click here

<!–Multiple versions (ogg, video etc.) from Archive.org.–>

Please SUBSCRIBE HERE.

Follow us on Soundcloud.

A special thanks to all our supporters–without you, none of this would be possible.

If you are willing to support the show or give as little as 5 cents a day on Patreon. Thank you!

Big thanks to Dan Lueders for the headlines music and Martin Bell for the opening theme!

Big thanks to Mustafa A. from thepolarcat.com for the logo!

Thanks to our mods, Kylde, TomGehrke, sebgonz and scottierowland on the subreddit

Show Notes
To read the show notes in a separate page click here!

Today in Tech History – March 3, 2016

20140404-073853.jpgIn 1847 – In Edinburgh, Scotland, an expert in vocal physiology and elocution welcomed his newborn son into the world. He was named after his father. Alexander Graham Bell would go on to become synonymous with the telephone.

In 1885 – The American Telephone and Telegraph Company was incorporated in New York State as a subsidiary of American Bell Telephone.

In 1966 – The BBC announced plans to begin broadcasting television programmes in colour the following year, becoming the first European broadcaster to provide regular colour broadcasts.

Like Tech History? Get the illustrated Year in Tech History at Merritt’s Books site.

DTNS 2702 – Everything’s Coming Up Augmented

Logo by Mustafa Anabtawi thepolarcat.comWill we replace smartphones with augmented reality glasses? Tom Merritt and Scott Johnson discuss. Plus the latest on the Apple encryption debate.

MP3

Using a Screen Reader? Click here

Multiple versions (ogg, video etc.) from Archive.org.

Please SUBSCRIBE HERE.

Follow us on Soundcloud.

A special thanks to all our supporters–without you, none of this would be possible.

If you are willing to support the show or give as little as 5 cents a day on Patreon. Thank you!

Big thanks to Dan Lueders for the headlines music and Martin Bell for the opening theme!

Big thanks to Mustafa A. from thepolarcat.com for the logo!

Thanks to our mods, Kylde, TomGehrke, sebgonz and scottierowland on the subreddit

Show Notes
To read the show notes in a separate page click here!

The Risk to Apple’s Code-Signing Key

One thing that gets glossed over in the Apple encryption discussion is whether Apple can or cannot make the requested software that it can be used only once. The problem is it’s not a simple yes or no answer.

Technologically, Apple can absolutely make software that will only work on the one phone. Steve Gibson has an excellent explanation of that on Security Now.

“If Apple complies with this case, there would be no risk of “leaking” anything “dangerous”, at least not any more than there is today of Apple’s private key leaking.“

But some experts believe that key is where the problem is.

Bruce Schneier writes “They would need to have stolen Apple’s code-signing key so that the phone would recognize the hacked as valid, but governments have done that in the past with other keys and other companies. We simply have no idea who already has this capability.”

A fair point. But maybe he’s wrong. Maybe, and hopefully, Apple has not lost control of its key. The question then becomes could this case make it harder to protect the key

The EFF thinks so. “If the government begins routinely demanding new phone-specific cracking software, this could overwhelm the security of this process by requiring many more signatures. This is another valid reason why Apple is right to fight this order.”

Also the court processes for validating an ‘instrument’ like this puts the code through many more hands, meaning more risks for the key to get out. The risks are lined out by Jonathan Zdziarski

To create a forensically sound tool that would hold up in court, it must be peer reviewed and validated by third parties.

But even then the key can be protected. Lets assume, optimistically, that even with multiple agencies handling the software, the key remains uncompromised because best practices are always followed by everyone involved.

The risk gets greater as more people handle the code. And more people will handle the code if these kinds of request were to become routine.

The best summary of this issue came from Susan Landau in her testimony to Congress.

“The FBI statements that the update will be under Apple’s control and can be tied to work only on Farook’s phone are factually correct. But they miss the point of the risks involved.

She alludes to the risks that Zdziarski illuminates and also expands on the risk of this becoming a routine process if law enforcement regularly needs to break into encrypted phones.

“All it takes for things to go badly wrong is a bit of neglect in the process or the collaboration of a rogue employee. And if the FBI, CIA, and NSA can suffer from rogue employees, then certainly Apple can as well.”

So there you have it. Technically the FBI is right. Software can be made that will work only one time in this one case with no danger of causing harm to other phones.

The question is then how often you believe the process would happen and how well Apple can protect its key in that case.

Today in Tech History – March 2, 2016

20140404-073853.jpgIn 1908 – Gabriel Lippman proposed using a series of lenses at a picture’s surface instead of opaque barrier lines, allowing three dimensional pictures. He titled his presentation to the French Academy of Sciences “La Photographie Integral”.

In 1983 – CBS Records launched the first major compact disc music marketing campaign, launching 16 titles. CDs had gone on sale to the public the previous October in Japan.

In 2004 – Review site Engadget launched with a post about T-Flash, a new memory card format, by founder Peter Rojas.

In 2010 – The Federal Constitutional Court of Germany rejected legislation requiring electronic communications traffic data retention for a period of 6 months as a violation of the guarantee of the secrecy of correspondence.

Like Tech History? Get the illustrated Year in Tech History at Merritt’s Books site.

#245 – Terry Pratchett Helps Us Feel Better

We’re very excited about the debut of our first Sword and Laser Inkshares collection book, The Life Engineered by JF Dubeau. We’re a little bummed that Tom forgot to bring more than water to drink. We’re super-excited about the Nebula Award nominees. And we were a little bummed at some of the reactions to The Sword of Shannara. But Vickie helped us out with an amazing Terry Pratchett quote, and all was well in Swordandlaserville.