Tomorrow (Aug 13), I'm co-presenting a program item at @Defcon (Las Vegas) called "Literal Self-Pwning: Why Patients - and Their Advocates - Should Be Encouraged to Hack, Improve, and Mod Med Tech" with @CDameffMD & @jefftullymd:
My book "How to Destroy Surveillance Capitalism" is a critique of Big Tech connecting conspiratorial thinking to the rise of tech monopolies (proposing a way to deal with both) is now out in paperback:
My ebooks and audiobooks (from @torbooks, @HoZ_Books, @mcsweeneys, and others) are for sale all over the net, but I sell 'em too, and when you buy 'em from me, I earn twice as much and you get books with no DRM and no license "agreements."
My first picture book is out! It's called Poesy the Monster Slayer and it's an epic tale of bedtime-refusal, toy-hacking and monster-hunting, illustrated by Matt @MCRockefeller. It's the monster book I dreamt of reading to my own daughter.
If you're a @Medium subscriber, you can read these essays - as well as previews of upcoming magazine columns and early exclusives on doctorow.medium.com.
If you prefer a newsletter, subscribe to the plura-list, which is also ad- and tracker-free, and is utterly unadorned save a single daily emoji. Today's is "🐓". Suggestions solicited for future emojis!
Best Defcon talk so far, how a high school senior Rick rolled his entire school district, hijacking every projector, locking out their remotes, disabling their physical off switches, and pwning every PA speaker in every building in the district.
The point of entry was the extraordinarily invasive spyware used by the district to monitor student laptops, which was also wildly insecure... And installed on staff computers, including campus security.
They also discovered multiple vulns and even manufacturer's backdoor. Lots of default passwords... And in one instance, a password that had been changed from the default to the example from the manual.
“ The BX-15 is designed for use in small studios. 2 mechanically/electrically separate and isolated channels make it possible to handle 2 independent signal sources with different decay times (1.5 - 3.5 seconds), treble, bass and reverb intensity. “
The biggest fallacy in the online privacy is that there is a difference between "state surveillance" and "commercial surveillance." Bizarrely, it's a fallacy that is widely held by both government snoops and Big Tech snoops. 1/
If you'd like an essay-formatted version of this thread to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
Many's the time I've spoken to a DC audience about privacy, only to have an audience member say, "I'm OK with Uncle Sam spying on me - after all, I handed every sensitive scrap of personal information to the Office of Personnel Management when I applied for security clearance. 3/