X-Roads

Crossroads. When you come to one, you have to decide where to go. I am coming up towards a crossroad soon. I will have to decide what I’d like to do for the rest of my life and work towards it. All this while, I have been hedging a bit, by doing things that weren’t entirely specific. But I think that the time has come to make a decision. To do that, I have to first ask myself, what I want and what’s within my power to deliver.

Some of my friends may think that I will just go home and go into business. But even if that turns out to be the case, I would still need to decide on the specific kind of business to do. Should I return to doing a business that can quickly earn me a high income but has limited growth potential, or should I do something that has infinite growth potential but will bleed me dry, or should I do something entirely different. There are many things to consider before a real decision can be made. I’ve got as many business ideas as I have friends. So, I’ll need to really sit down and weigh all the different options.

However, there’s also a part of me which feels that I need to contribute to nation building. There is a general feeling that the time is ripe for change back home. There are many things that need improving and I am perfectly suited to contributing my expertise into nation building. However, that would mean placing profit in the back seat and working like a charity. I do have some ideas on that as well and also have the necessary contacts to kick things off. Helping other people and giving them a better opportunity in life, is also a good thing to do.

Then, there is also a part of me that feels that I should just relax and enjoy working for someone else. It’s much easier living as an employee than it is as an employer. As my friends know, you just need to take one look at me to know that I don’t live lavishly. I’m very content having enough money to buy me my toys so that I can build things for the rest of my life. I’ll be happy driving a Proton car and living in a house with enough room for a small workshop. None of these things are out of my grasp.

But I think that between money, satisfaction and lifestyle, you are only allowed to choose any two. It would be so great it I could be rich, help others and enjoy a relaxed life, all at once. Unfortunately, I cannot really think of a way to combine all of them together. Or maybe I’m just lacking motivation for now.

If you knew of a way to have an easy life, wads of cash, and personal satisfaction, please share!

Wren Library

When I heard that there was going to be a concert in the famous Wren Library, I decided to go attend it, even if only to be able to see the inside of the library. As far as I know, entry into the Wren Library is fairly restricted, just like the Pepys Library at Magdalene. So, it was an opportunity to see the insides, and hopefully catch a glimpse of the Principia Mathematica penned by Newton, centuries ago.

Although the concert was free, the snag I hit was that the concert was only for members of the Trinity College Musical Society, for which I’m not. Anyone can join the society for a £11 membership fee. But I decided to put on a different hat and talk my way into a free ticket, which I got. So, the moment that I got in, I started snapping away with my camera and was promptly approached by one of the librarians who told me to stop taking any photographs. How sad.

The concert started with the Brandenburg Concerto #3, which is a rather famous piece. It was the first time that I had actually heard a harpsichord being played live. I’ve only ever heard it on CDs before. However, I could easily tell when the performer actually made mistakes, which he did several times. And I can also appreciate how different it is to play a harpsichord from any other keyboard instrument from the way it sounds.

The next performance was Fantasia on a Theme of Thomas Tallis by a former Trinity student who died 50 years ago. The piece was extremely haunting and brought on a lot of sad emotions in me. It even almost brought me to tears. It was surprisingly good. Unfortunately, it would have been better if the orchestra actually arranged themselves differently as the piece was obviously written with an echoing effect in mind.

The final piece was Metamorphosen by Richard Strauss, written towards the end of WWII. However, I couldn’t appreciate it as much, seeing that I had never been in a war before. Death and destruction doesn’t quite do it for me, especially not after the emotionally draining second piece.

Anyway, the concert was good, and I managed to get one good photo of the place. It could have been better but I did not have time to calibrate my camera inside the library. I had wanted to experiment with some HDR photography inside and I have learned one thing. Never shoot at a high ISO for HDR photos because the noise just gets amplified during tone-mapping.

Seditious Acts

It seems that RPK is being charged with sedition. I find that rather curious simply because I’m not sure if he had actually committed any act of sedition. According to the article in TheStar, he had written a blog entry entitled “Let’s send the Altantuya murderers to hell”. In that entry, he had implicated the involvement of our DPM and his wife in the scandal.

Alright, obviously RPK should not get away with randomly accusing people (especially prominent people) of being implicated in criminal offences, especially when the courts have not mentioned anything to such end. Regardless of what had transpired, it is generally considered wrong to fitnah anyone. As I understand it, this is an even more heinous crime than murder, in Islam.

This obviously qualifies as an act of libel. If our DPM or his wife feels slighted in any way, they should very well, sue RPK’s ass off in court for libel. They could very well bankrupt the man seeing that they are very prominent people, with fragile reputations to protect. So, the damages could be astronomical. However, it is rather curious to try to get RPK under the Sedition Act.

According to Wikipedia, under section 3(1), those acts defined as having a seditious tendency are acts with a tendency:

(a) to bring into hatred or contempt or to excite disaffection against any Ruler or against any Government;
(b) to excite the subjects of the Ruler or the inhabitants of any territory governed by any government to attempt to procure in the territory of the Ruler or governed by the Government, the alteration, otherwise than by lawful means, of any matter as by law established;
(c) to bring into hatred or contempt or to excite disaffection against the administration of justice in Malaysia or in any State;
(d) to raise discontent or disaffection amongst the subjects of the Yang di-Pertuan Agong or of the Ruler of any State or amongst the inhabitants of Malaysia or of any State;
(e) to promote feelings of ill-will and hostility between different races or classes of the population of Malaysia; or
(f) to question any matter, right, status, position, privilege, sovereignty or prerogative established or protected by the provisions of part III of the Federal constitution or Article 152, 153 or 181 of the Federal Constitution.

As I understand it, an act of sedition can only be committed against a government or ruler. You cannot commit a seditious act against a fellow citizen. So, reading the various definitions of sedition, I still don’t really know which one applies in this case. Obviously, I’m not a lawyer. So, I surrender to the better judgement of the legal people in these matters. However, it still smacks of a strong arm scare tactic in this case. Someone needed to shut RPK up for good and decided to invoke the heftiest penalties on him.

Seeing that RPK has been rather mischievous when it comes to the law, I doubt that he can expect any leniency from the magistrate. However, I do hope that things go well for him because he really seems to have a lot of insight into the inner workings of Malaysian politics. It would be a waste to see him go. I did enjoy reading some of his more flamboyant entries.

Orang Besi

Iron ManAwesome! Finally, a film where the resident engineer gets to be a superhero. Normally, if they ever bother to depict engineers in one of the main roles, it would inevitably be one of a sidekick, or someone who supplies the hero with the requisite technology to blow things up. But, in this Marvel of a movie, the uber engineer gets to play superhero and save dozens of Afghan kids and a hot chick in the process.

But there was one scene in the movie that clearly shows that Robert Downey is not a real engineer. Nobody cleans a soldering iron by dabbing it onto a wet sponge like he did in the film. That just cools the iron without removing any residue, which is bad. We swipe the iron tip across the sponge in order to remove any excess solder. But it’s a tiny error, which will go unnoticed by 99.9% of the film goers.

I’d like to point out that much of the technology featured in the film, already exists today, at least in the labs. The idea of a powered exoskeleton is nothing new. Same goes for the computer interface. Jet packs have also enjoyed some limited success. The only possible snag, as illustrated in the movie, is the power source. Until the day that we have desktop fusion reactors, I don’t think that there’s anything that can produce 3GW/s of power. That’s technically enough power to go back to the future, twice each second.

I have an affinity for flawed heroes that have a shining heart (in this case, his heart quite literally emits light). Robert Downey Jr is the perfect actor, as he carries off the quirky, flawed superhero complex to the maximum. I’m only a little worried about the sequel, where they intend to explore Tony Stark’s descent into alcoholism. Robert Downey has already got troubles with drugs. I hope that they serve him lots of tea in the sequel instead of real alcohol.

Spoiler
And yes, there is definitely going to be a sequel. Not only that, there are going to be a couple of spin-offs. For those of you who bothered to stay till after the end credits, you would have witnessed a scene between Robert Downey and Samuel L. Jackson, who says something like: “I’m the boss of SHIELD and I’d like to talk to you about the Avengers Initiative”.

The next two movies that I’m looking forward to are: Indiana Jones and Batman. This is going to be a happy summer for me!

Education Free

Seems like a recent development, but the Public Services Department, has announced that they will be offering scholarships to anyone, who scored 9As and above, in last year’s SPM examinations. In addition, anyone who manages to secure a place in a top international university, will also be given scholarships. All this is regardless of background. I’m not sure if this is a good thing or bad thing overall.

Something similar actually came up in our TehTarik discussions yesterday. There are many weaknesses in the system that need to be addressed but I won’t go into them, as we’ve already talked about it yesterday. When the write up is ready, I might link it in here. However, there are some things that I would like to look at:

  1. Purely results based award.
    This is a two edged sword. On the one side, it cuts through all sorts of arbitrary ethnic discrimination policies, which is a good thing. However, it cuts away all discriminatory policies, including the positive ones. Now, a 9A student from a rich family will be funded, while an 8A student from a poor one won’t be, which I think is not a great idea. The whole idea of getting an education is to gain social mobility. I also feel that a well-rounded 8A student deserves the scholarship more than a 9A bookworm. So, that is why I’m not sure if a totally blind policy, is a good thing.
  2. Publicly funded education at the university level.
    The new policy gives the students a lot of options in getting into university. They would be fully funded if they get into any of the local public universities, local foreign universities, and top international universities. So there should not be any complaints from any quarter. However, I’m only worried about where all this money is going to come from. The funding for public universities could be diverted from the existing PTPTN scheme. I’m a little concerned about the ones who get into top international universities.

Well, I’ve always been an advocate of our government’s policy of funding education. We are one of the few countries in this world, with such a generous government, when it comes to education. I also agree that we need to build human capital, in order to develop the country. However, one of the issues raised yesterday, was what to do with all these graduates.

We need to really ask ourselves if the existing job market is capable of absorbing all these people. With the numbers of unemployed graduates coming out each year, numbering more than 60000, we need to really ask ourselves what are we going to do with these people. I cannot help but wonder if the civil service actually has enough vacancies to staff all these scholars.

What will most likely happen, as has always been happening all this while, are that these scholars will not be absorbed into the civil service and be cast into the wind, so to speak. In the end, it wastes the tax dollars and the scholar’s time. So, maybe it’s a better idea to divert all that cash, into improving the economy and creating a job market first.

Some will say that this is a chicken and egg problem. But I think that it’s not and the evidence speaks for itself. The fact that our graduate unemployment rates are so high, means that there aren’t enough jobs for us. It is telling when we are importing foreign labour, to fill up all our low level jobs. When we start importing foreign nationals to fill up our professional jobs, that’s when we have a need for more graduates.

Production Reproduction

My favourite humanities professor, who taught me cultural anthropology, used to say this often. He said that the history of Man, is entirely about production and reproduction. If you look at the way we often look at history, his statement is rather true. History was essentially about lineage and what great people did. Hence, the two words. This random memory popped into my head when I read this article in the Beebs.

A local council employee in Japan has been punished after it was discovered he had accessed porn websites at work more than 780,000 times in nine months.

Shock! Horror! How could anyone possibly surf for porn at the rate of 20 pages per minute?! The dude must have been neither productive at work, nor reproductive at home. Granted, I’ve recently learnt of how progressive the Japanese are at sex but this is just a bit too much. I cannot even begin to put my shock and horror into words. The fact that he was 57 years old, shocked me even more.

He only got discovered after he caught an infection from a visit to a porn site. His computer caught a virus, which alerted the tech people in his office, who then investigated the source of the infection and discovered his habits. If you read this paragraph again, it’s kind of funny how, someone can catch something by visiting a porn site. It’s kind of ironic.

Well, I know that some people do regularly surf porn in the office, cause of the high speed connections that companies usually have. I’ve personally seen it happen at a place that I’ve worked at before. Some companies institute certain policies on what their networks can and cannot be used for. Most companies aren’t tech savvy enough to have such policies on paper. Regardless, it’s not always easy to police these policies.

The only way to do it would be to adopt a “default deny” security policy, which means denying access to every website unless it’s on an approved whitelist. But this will hamper the productivity of workers who are surfing genuinely work related websites. As a result, most companies adopt a “default allow” security policy, and only block access to certain time wasters like facebook and youtube. But it’s obviously impossible to catch everything like this.

What’s actually needed are Artificial Intelligence based network monitoring systems. Systems that can decide But these are still in their infancy and unfortunately, there has not been much progress in the field of AI for decades. But I digress.

So, in conclusion, I do think that there’s some truth in the belief that the adult industry is the largest one on the Internet. There’s just not been any conclusive study done on this matter. Maybe some economist should study this.

Information Insecurity

In light of recent developments in Malaysia, with the computers of certain prominent anti-establishment bloggers, consistently being confiscated for dubious investigative purposes, I thought that it might be a suitable time to write a little about information security. The whole idea behind information security isn’t to foil justice, but to make sure that the rights of people are not infringed.

With harddisk sizes going into the Terabyte range, there are lots of things stored on a person’s personal computer, including personal information that nobody has any right to access. Sometimes, these confiscated computers are subject to random checks in the hope of finding something, anything, that can be used to entrap the owner. So, let’s start with the basics.

Email Security
Although the technology has been around for more than a decade, I’m surprised that most people do not know about it, much less use it. Email, is transmitted in the clear. So, anything that is said through an email, can be easily intercepted and read by others. The only way to protect the content of email messages is through the use of public key (PKI) cryptography.

The most commonly used software is PGP or if you want an open source version, GNUPG (GPG). Both these software integrate fairly well with all popular email programmes, whether it be Outlook, Thunderbird or Kmail. So, you wouldn’t even need to know any voodoo to get it to work. If you use a webmail programme, these tools also provide a regular text based mode, which can encrypt/decrypt plain text documents, which you can then cut-and-paste into the webmail client.

This software allows you to encrypt every email that you write, so that the only person who can read it is your intended receipient. So, I would urge everyone to install and learn how to use these tools. These tools should be used for all business communications as well, if you don’t want your competition eavesdropping on your sensitive communiques.

How PKI works is by exchanging public keys. A public key is a very large number that is represented in text, as shown below. When you send me an email message, your private key and my public key is used to generate a secret key that is used to encrypt the message. When I receive it, I will be able to decode the email using my private key and your public key. So, at no time would either of us need to expose our private keys. All these things happen mathemagically.


-----BEGIN PGP PUBLIC KEY BLOCK-----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=wwef
-----END PGP PUBLIC KEY BLOCK-----

Any eavesdropper would only end up reading a bunch of random letters and numbers (much like the ones above). As an additional step of protection, do not store your emails locally in an unencrypted form. Leave them encrypted and have your email programme decrypt them each time you wish to read them. All these steps add an additional layer of protection.

There are no known exploits that can easily defeat this scheme, at least not until computers can factorise extremely large numbers quickly enough, at which point, you just double the size of the encryption key and continue using it. The easiest way to steal a PKI protected email is to just haul you to court and force you to divulge it’s contents.

Harddisk Security
It’s no use just protecting our communications channel if we do not protect our data storage as well. So, all harddisks, whether internal or external, should be encrypted. Truecrypt is a tool that runs on all platforms, which allows on-the-fly-encryption (OTFE). OTFE essentially intercepts all access to the harddisk and encrypts anything being saved and decrypts anything being read, transparently.

So, if you ever lose your laptop due to carelessness, theft or legal confiscation, at the very least, your data is safely tucked away. Anyone who tries to access your data without the correct keys, will only end up reading a bunch of random gibberish again. So, all your private communications, photos and videos, will be protected under heavy lock and key.

However, there is one caveat to using OTFE encryption, which only applies if you’re traveling to the US. The government is legally allowed to make copies of your harddisk data at the border. If your computer is encrypted, they are also empowered to deny you entry or to confiscate your computer. So, it may not be a good idea to travel with encrypted data through US customs.

There is one currently known exploit, to defeat this system, but it involves a lot of preplanning. The attacker would need to physically compromise your computer within minutes of it being shutdown, and preserve the memory contents by freezing your memory module, as illustrated through the following video. The solution to this problem is to not leave your computer running, unattended. Given enough off-time, the following attack would not be plausible.