Four short links: 31 March 2016

Accountable Machines, Forbidden Gaming, Make Things, and Crypto Monoculture

By Nat Torkington
March 31, 2016
  1. Accountable MachinesSome of the proposals discussed at our workshop included having machine learning processes verify the outcomes of algorithmic decisions and provide transparency, and that systems should be designed to permit auditing as well as to audit other related systems. To me this appeared as an especially accountable version of bureaucracy, where results from each system’s accounting dynamically report up through an iterative (but still accountable) chain of command. This is not bureaucratic in the sense of inventing process for its own sake, but it is bureaucratic in the sense that it establishes many processes of accountability that are the responsibility of entities who report to one another through a structure where trust is related to the capacity to validate decisions.
  2. Russia Bans Queue — banned the Polish board game that recreates the experience of life under Communism. Games that are simulations are effective educational experiences, too effective for Russia.
  3. Learn faster. Dig deeper. See farther.

    Join the O'Reilly online learning platform. Get a free trial today and find answers on the fly, or master something new and useful.

    Learn more
  4. Tech Economies Must Still Make Things (Vaclav Smil) — Bill Gates’s favorite scientist/policy analyst weighs in on the next economy. Take away manufacturing and you’re left with…selfies.
  5. On the Impending Crypto Monoculture (Peter Gutmann) — A number of IETF standards groups are currently in the process of applying the second-system effect to redesigning their crypto protocols. A major feature of these changes includes the dropping of traditional encryption algorithms and mechanisms like RSA, DH, ECDH/ECDSA, SHA-2, and AES, for a completely different set of mechanisms, including Curve25519 (designed by Dan Bernstein et al), EdDSA (Bernstein and colleagues), Poly1305 (Bernstein again) and ChaCha20 (by, you guessed it, Bernstein). What’s more, the reference implementations of these algorithms also come from Dan Bernstein (again with help from others), leading to a never-before-seen crypto monoculture in which it’s possible that the entire algorithm suite used by a security protocol, and the entire implementation of that suite, all originate from one person. How on earth did it come to this?
Post topics: Four Short Links
Share: