Republican North Dakota legislators have introduced #SB2333, a bill that prohibits large tech companies from locking their users into a single app store or payment processor.
While his has implications for Android and other large tech platforms, its most immediate and far-reaching effects with be on Apple, whose Ios platform uses lock-in to monopolize both apps and payments (and another domain, not mentioned in the bill: repairs).
2/
Predictably, this has thrown Apple into a fury, with Apple's privacy chief @erikn telling the SD legislature that Apple uses its monopoly over the app store to protect its users' privacy and security.
Back in the early 2010s, people started falling into open sewer entrances in New York City and other large metros - because a China-driven spike in the price of scrap metal, combined with post-2008 unemployment, gave rise to an army of metal-thieves.
A decade later, there's a new precarity- and bubble-fuelled metal-theft epidemic: stealing catalytic converters out of parked cars to harvest their palladium and rhodium for re-use in the global auto-sector, which is facing strict emissions controls.
Palladium and rhodium prices are soaring: palladium is up from $500/oz in 2016 to $2000-$2500/oz; rhodium rose from $640/oz to $21,900/oz (!). This puts a serious dent in auto profits - in 2019, the industry spent an extra $18b on metals (it was higher in 2020).
3/
Adam Curtis is a brilliant documentarian, and films like Hypernormalization and series like All Watched Over by Machines of Loving Grace had a profound effect on my thinking about politics, technology and human thriving.
1/
In this interview with The @idler's @TWHodgkinson, Curtis lays out a compact, incisive and important critique of the big social media platforms - and of their critics, who give these companies far too much credit.
Curtis puts Big Tech's self-serving boasts about how good it is at manipulating public opinion in the same bucket as other outlandish claims of secret, astounding accomplishments, such as those made by British spy agencies.
3/
In "Dependency Confusion," security researcher @alxbrsn describes how he made a fortune in bug bounties by exploiting a new supply-chain attack he calls "dependency confusion," which allowed him to compromise "Apple, Microsoft and dozens of others."
Dependency Confusion is incredibly, delightfully clever. It is grounded in the fact that software developers rely on "dependencies" (prebuilt, modular code libraries) when they build new versions of their software.
2/
The javascript files used to build new versions are often public, and by looking inside them, you can find out the names of the libraries used to build popular applications, from Uber to Yelp to Netflix.
3/
Inside: Crooked cops play music to kill livestreams; Duke is academia's meanest trademark bully; Tory donors reap 100X return; A criminal enterprise with a country attached; and more!