The meat-and-potatoes of @mcmansionhell is making extraordinarily hilarious architectural criticism out of utterly mediocre "luxury" homes. Anyone can find hilarity in a tacky monstrosity, but finding the humor in unimaginative status-displays takes real insight and skill.
1/
That said.
When Wagner takes on an extraordinarily awful McMansion, it quickly becomes apparent that her focus on workaday bougie ugliness is all about the challenge - she plays boss-level because she's just TOO GOOD at the easy stuff.
2/
Which brings me to the latest installment of McMansion Hell: "An Especially Cursed House": a $2.2m, 5,420 sqft 4 bed/4.5 bath house in Colt’s Neck, NJ. The viral listing had attracted plenty of dunks, but Wagner's treatment? ::chef's kiss::
The difference between an "eccentric collector" and a "hoarder" is money. This was driven home when @greatdismal hipped me to Soane's Museum, a series of knocked-through Victorian houses filled with John Soane's vast, indiscriminate collections.
How to Fix the Internet is @EFF's amazing new podcast: nuanced discussions of tech law and ethics with incredible experts, interviewed and contextualized by EFF executive director Cindy Cohn and strategy director @mala.
Our discussion is about the role interoperability plays in helping technology users exercise self-determination, giving them alternatives to bad moderation, abusive lock-in, and poor security choices.
3/
Jetstream is the Walmart brand name for a line of cheap Chinese wifi base-station/routers; other popular, cheap brands like Wavlink and Winstars appear to come from the same manufacturer and they all share a grave security vulnerability: a powerful back-door.
1/
A collaboration between @CyberNews_com, @jtcsec, @0xLupin and @Lexcor1 documents the back-door, attempts to connect multiple corporate identities to a common owner, and presents (very) rough estimate of the number of devices that share this defect.
The researchers say that the back-door allows remote parties to "monitor and control all traffic coming through" affected devices, using an undocumented web-form that accepts commands and runs them as root.
3/
During the first dotcom bubble, @jwz coined Zawinski's Law: "Every program attempts to expand until it can read mail. Those programs which cannot so expand are replaced by ones which can." It's all three kinds of funny: funny ha-ha, funny strange, and funny serious.
1/
It's the software equivalent of carcinization, the tendency of every animal to eventually evolve into a crab. Crab's aren't the best animal, but they're the most versatile.
Today in @xkcd, Randall Munroe updates Zawinski's Law with a strip called "Unread," in the way that mounting unread message counts eventually turn every instant messaging platform into email.
Under the leadership of the murderer Mohammad bin Salman, the Saudi royal family (and the Saudi state it controls) have embarked on "Vision 2030," a plan to shift the country's economy from oil to not-oil.
1/
Extraction-based states are always dysfunctional. All you need to run an extraction economy is a hole in the ground surrounded by guns. Being a leader of such a state requires merely that you be able to judge which mercenaries and diggers to hire.
2/
When these leaders are called upon to do anything more sophisticated - particularly anything that requires forbearance, tolerance, and a degree of personal discomfort - they fail, badly.
Sure, MBS was up to the task of going to NYC to drink Starbucks with Bloomberg.
3/
Today on the Attack Surface Lectures (8 panels exploring themes from the third Little Brother book, hosted by @torbooks and 8 indie bookstores): Sci-Fi Genre with @gaileyfrey and @ChuckWendig, recorded on Oct 16 by @FountainBkstore.
1/
You can watch it without Youtube's surveillance courtesy of the @internetarchive:
Inside: Opsec and personal security; Australian predictive policing tool for kids; A textbook grift; Labor and large firms; The power of procurements; Guatemala's guilltoines; and more!