Category: wireless | 無線 |무선 네트워크 | 無線

This blog came out of the crater of the dot com bust and wireless growth. Wi-Fi was transforming the way we used the internet at home. I used to have my Mac next to my router on top of a cupboard that contained the house fuse panel and the telephone line. Many people had an internet room and used a desktop computer like a Mac Mini or an all-in-one computer like an iMac. Often this would be in the ‘den’ or the ‘man cave’. Going on the internet to email, send instant messages or surf the internet was something you did with intent.

Wi-Fi arrived alongside broadband connections and the dot com boom. Wi-Fi capable computers came in at a relatively low price point with the first Apple iBook. I had the second generation design at the end of 2001 and using the internet changed. Free Wi-Fi became a way to attract people to use a coffee shop, as a freelancer it affected where I did meetings and how I worked.

I was travelling more for work at the time. While I preferred the reliability of an ethernet connection, Wi-Fi would meet my needs just as well. UMTS or 3G wireless data plans were still relatively expensive and slow. I would eventually send low resolution pictures to Flickr and even write a blog post or two. But most of the time I used it to clear my email box, or use Google Maps if I was desperate.

4G wireless services, started to make mobile data a bit more useful, even if the telephony wasn’t great

 

  • Technical capability notice

    The Washington Post alleged that the British government had served a technical capability notice against Apple in December 2024 to provide backdoor global access into encrypted Apple iCloud services. The BBC’s subsequent report appears to support the Post’s allegations. And begs philosophical question about what it means when the government has a copy of your ‘digital twin’?

    DALL-E surveillance image

    What is a technical capability notice

    A technical capability notice is a legal document. It is issued by the UK government that compels a telecoms provider or technology company that compels them to maintain the technical ability to assist with surveillance activities like interception of communications, equipment interference, or data acquisition. When applied to telecoms companies and internet service providers, it is usually UK only in scope. What is interesting about the technical capability notice allegedly served against Apple is extra-territorial in nature. The recipient of a technical capability notice, isn’t allowed to disclose that they’ve been served with the notice, let alone the scope of the ask.

    Apple outlined a number of concerns to the UK parliament in March 2024:

    • Breaks systems
    • Lack of accountability in the secrecy
    • Extra-territoriality

    Tl;DR – what the UK wants with technical capability notices is disproportionate.

    Short history of privacy

    The expectation of privacy in the UK is a relatively recent one. You can see British spy operations going back to at least the 16th century with Sir Francis Walsingham. Walsingham had a network that read couriered mail and cracked codes in Elizabethan England.

    By Victorian times, you had Special Branch attached to the Metropolitan Police and related units across the British Empire. The Boer War saw Britain found permanent military intelligence units that was the forerunner of the current security services.

    By world war one the security services as we now know them were formed. They were responsible to intercept mail, telegraph, radio transmissions and telephone conversations where needed.

    Technology lept forward after World War 2.

    ECHELON

    ECHELON was a cold war era global signals intelligence network ran by Australia, Canada, New Zealand, the UK and the US. It originated in the late 1960s to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War, the ECHELON project became formally established in 1971.

    ECHELON was partly inspired by earlier US projects. Project SHAMROCK had started in 1940 and ran through to the 1970s photographing telegram communications in the US, or transiting through the US. Project MINARET tracked the electronic communications of listed American citizens who travelled abroad. They were helped in this process by British signals intelligence agency GCHQ.

    In 2000, the European Commission filed a final report on ECHELON claimed that:

    • The US-led electronic intelligence-gathering network existed
    • It was used to provide US companies with a competitive advantage vis-à-vis their European peers; rather like US defence contractors have alleged to undergone by Chinese hackers

    Capenhurst microwave tower

    During the cold war, one of the main ways that Irish international data and voice calls were transmitted was via a microwave land bridge across England and on to the continent.

    Microwave Network

    Dublin Dame Court to Holyhead, Llandudno and on to Heaton Park. Just next to the straight line path between Llandudno and Heaton Park was a 150 foot tower in Capenhurst on the Wirral. This siphoned off a copy of all Irish data into the British intelligence system. The Capenhurst tower wasn’t that secret, word got about it in the area after it had been built and pretty close guesses were made as to its usage.

    Post-Echelon

    After 9/11, there were widespread concerns about the US PATRIOT Act that obligated US internet platforms to provide their data to US government, wherever that data was hosted. After Echelon was exposed, it took Edward Snowden to reveal PRISM that showed how the NSA was hoovering up data from popular internet services such as Yahoo! and Google.

    RAMPART-A was a similar operation taking data directly from the world’s major fibre-optic cables.

    US programme BULLRUN and UK programme Edgehill were programmes designed to crack encrypted communications.

    So privacy is a relatively new concept that relies the inability to process all the data taken in.

    Going after the encrypted iCloud services hits different. We are all cyborgs now, smartphones are our machine augmentation and are seldom out of reach. Peering into the cloud ‘twin’ of our device is like peering into our heads. Giving indications of hopes, weaknesses and intent. Which can then be taken and interpreted in many different ways.

    What would be the positive reasons to do a technical capability notice?

    Crime

    Increasing technological sophistication has gone hand in hand with the rise of organised crime groups and new criminal business models such as ‘Klad‘. Organised crime is also transnational in nature.

    But criminals have already had access to dedicated criminal messaging networks, a couple of which were detailed in Joseph Cox’ Dark Wire . They use the dark web, Telegram and Facebook Marketplace as outlets for their sales.

    According to Statista less than six percent of crimes in committed in the UK resulted in a charge or summons in 2023. That compares to just under 16 percent in 2015.

    Is going after Apple really going to result in an increased conviction rate, or could the resources be better used elsewhere?

    Public disorder

    Both the 2011 and 2024 riots caught the government off-guard. Back in 2011, there was concern that the perpetrators were organising over secure BlackBerry messaging. The reality that the bulk of it was being done over social media. It was a similar case with the 2024 public disturbances as well.

    So gaining access to iCloud data wouldn’t be that much help. Given the effort to filter through it, given that the signals and evidence were out there in public for everyone to see.

    The big challenge for the police was marshalling sufficient resources and the online narrative that took on a momentum of its own.

    Paedophiles

    One of the politicians strongest cards to justify invasion of privacy is to protect against nonces, paedos and whatever other label you use to describe the distribution of child sexual abuse images. It’s a powerful, emotive subject that hits like a gut punch. The UK government has been trying to explore ways of understanding the size of abuse in the UK.

    Most child abuse happens in the home, or by close family members. Child pornography rings are more complex with content being made around the world, repeatedly circulated for years though various media. A significant amount of the content is produced by minors themselves – such as selfies.

    The government has a raft of recommendations to implement from the The Independent Inquiry into Child Sexual Abuse. These changes are more urgently needed like getting the police to pay attention to vulnerable working-class children when they come forward.

    Terrorism

    The UK government puts a lot of work into preventing and combating terrorism. What terrorism is has evolved over time. Historically, cells would mount terrorist attacks.

    Eventually, the expectation of the protagonist surviving the attack changed with the advent of suicide tactics. Between 1945 and 1980, these were virtually unheard of. The pioneers seem to have been Hezbollah against UN peacekeepers in Lebanon.

    This went on to influence 9/11 and the London bombings. The 9/11 commission found that the security services didn’t suffer from a lack of information, but challenges in processing and acting on the information.

    More recently many attacks have been single actors, rather than a larger conspiracy. Much of the signs available was in their online spiral into radicalisation, whether its right-wingers looking to follow the example of The Turner Diaries, or those that look towards groups like ISIS.

    Axel Rudakubana’s actions in Southport doesn’t currently fit into the UK government’s definition of terrorism because of his lack of ideology.

    I am less sure what the case would be for being able to access every Apple’s cloud twin of their iPhone. The challenge seems to be in the volume of data and meta data to sift through, rather than a lack of data.

    Pre-Crime

    Mining data on enough smartphones over time may show up patterns that might indicate an intent to do a crime. Essentially the promise of predictive crime solving promised in the Tom Cruise dystopian speculative future film Minority Report.

    Currently the UK legal system tends to focus on people having committed a crime, the closest we have to pre-crime was more intelligence led operations during The Troubles that were investigated by the yet to be published Stalker/Sampson Inquiry.

    There are so many technical, philosophical and ethical issues with this concept – starting with what it means for free will.

    What are the negative reasons for doing a technical capability notice?

    There are tensions between the UK government’s stated opinion on encrypted services and the desire to access the data, outlined in Written testimony of Chloe Squires, Director National Security, Home Office.

    The UK Government supports strong encryption and understands its importance for a free, open and secure internet and as part of creating a strong digital economy. We believe encryption is a necessary part of protecting our citizens’ data online and billions of people use it every day for a range of services including banking, commerce and communications. We do not want to compromise the wider safety or security of digital products and services for law abiding users or impose solutions on technology companies that may not work within their complex systems.

    Extra-territorial reach

    Concerns about the US PATRIOT Act and PRISM saw US technology companies lose commercial and government clients across Europe. Microsoft and Alphabet were impacted by losing business from the likes of UK defence contractor BAE Systems and the Swedish government.

    The UK would likely experience a similar effect. Given that the UK is looking to biotechnology and technology as key sectors to drive economic growth, this is likely to have negative impact on:

    • British businesses looking to sell technology services abroad (DarkTrace, Detica and countless fintech businesses). They will lose existing business and struggle to make new sales.
    • Britain’s attractiveness to inbound investments be it software development, regional headquarter functions or infrastructure such as data centres. Having no exposure to the UK market may be more attractive to companies handling sensitive data.
    • You have seen a similar patten roll out in Hong Kong as more companies have moved regional headquarters to Singapore instead.

    The scope of the technical capability notice, as it is perceived, damages UK arguments around freedom-of-speech. State surveillance is considered to have a chilling effect in civilian discussions and has been criticized in the past, yet the iCloud backdoor access could be considered to do the exactly same thing as the British government opposes in countries like China, Hong Kong and Iran.

    Leverage

    The UK government has a challenge in terms of the leverage that it can bring to bear on foreign technology multinationals. While the country has a sizeable market and talented workforce, it’s a small part of these companies global revenues and capabilities.

    They can dial down services in the UK, or they can withdraw completely from the UK marketplace taking their jobs and infrastructure investment with them. Apple supports 550,000 jobs through direct employment, its supply chain, and the iOS app economy. In 2024, Apple claimed that it had invested over £18 billion over the previous five years.

    In terms of the number of people employed through Apple, it’s a big number, let me try to bring it to life for you. Imagine for a moment if every vehicle factory (making cars, tractors,, construction vehicles, race cars and wagons), parts plant, research and development, MOT station, dealership and repair shop in the UK fired half their staff. That is the toll that Apple leaving the UK would have on unemployment.

    Now think about how that would ripple through the community. Less goods bought in the supermarket, less pints poured in a pub or less frequent hair cuts given.

    Where’s the power in the relationship between the tech sector and the government?

    Precedent

    Once it is rumoured that Apple has given into one country’s demands. The equivalent of technical capability notices are likely to be employed by governments around the world. Apple would find it hard not to provide similar access to other 5is countries, China, India and the Gulf states.

    Even if they weren’t provided with access, it’s a lot easier to break in when you know that a backdoor already exists. A classic example of this in a different area is the shock-and-awe felt when DeepSeek demonstrated a more efficient version of a ChatGPT-like LLM. The team had a good understanding of what was possible and started from there.

    The backdoor will be discovered, if not by hackers then by disclosure like the Capenhurst microwave tower that was known about soon after it went up, or by a Edward Snowden-like whistle-blower given the amount of people that would have access to that information in allied security apparatus.

    This would leave people vulnerable from around the world to authoritarian regimes. The UK is currently home to thousands of political emigres from Hong Kong who are already under pressure from the organs of the Chinese state.

    Nigel Farage

    From a domestic point-of-view while the UK security services are likely to be extremely professional, their political masters can be of a more variable quality. An authoritarian populist leader could put backdoors allowed by a technical capability notice to good use.

    Criminal access

    The hackers used by intelligence services, especially those attributed to China and Russia have a reputation for double-dipping. Using it for their intelligence masters and then also looking to make a personal profit by nefarious means. Databases of iCloud data would be very tempting to exploit for criminal gain, or sell on to other criminals allowing them to mine bank accounts, credit cards, conduct retail fraud.

    Vladimir Putin

    It could even be used against a country’s civilians and their economy as a form of hybrid warfare that would be hard to attribute.

    Xi Jinping

    In the past intelligence agencies were limited in terms of processing the sea of data that they obtained. But technology moves on, allowing more and more data to be sifted and processed over time.

    What can you do?

    You’ve got nothing to hide, so why worry? With the best will in the world, you do have things to hide, if not from the UK government then from foreign state actors and criminals – who are often the same people:

    • Your bank account and other financial related logins
    • Personal details
    • Messages that could be taken out of context
    • I am presuming that you don’t have your children’s photos on your social media where they can be easily mined and fuel online bullying. Your children’s photos on your phone could be deep faked by paedophiles or scammers.
    • Voice memos that can be used to train a voice scammer’s AI to be good enough
    • Client and proprietary information
    • Digital vehicle key
    • Access to academic credentials
    • Access to government services

    So, what should you do?

    Here’s some starting suggestions:

    • Get rid of your kids photos off your phone. Get a digital camera, have prints made to put in your wallet, a photo album book, use an electronic picture frame that can take an SD card of images and doesn’t connect to the web or use a cloud service.
    • Set up multi-factor authentication on passwords if you can. It won’t protect you against a government, but it will make life a bit more difficult for criminals who may move on to hacking someone else’s account instead – given that there is a criminal eco-system to sell data en-masse.
    • Use the Apple password app to generate passwords, but keep the record off them offline in a notebook. If you are writing them down, have two copies and use legible handwriting.
    • You could delete ‘important’ contacts from your address book and use an old school filofax or Rolodex frame for them instead. You’re not likely to be able to do this with all your contacts, it wouldn’t be practical. If you are writing them down, have two copies and use legible handwriting.
    • Have a code word with loved ones. Given that a dump of your iCloud service may include enough training data for a good voice AI, having a code word to use with your loved ones could prevent them from getting scammed. I put this in place ages ago as there is enough video out there on the internet of me in a public speaking scenario to train a passable voice generative AI tool.
    • Use Signal for messaging with family and commercially sensitive conversations.
    • My friend and former Mac journalist Ian Betteridge recommended using an alternative service like Swiss-based Proton Cloud. He points out that they are out of the legal jurisdiction of both the US and UK. However, one has to consider history – Crypto AG was a Swiss-based cryptography company actually owned by the CIA. It gave the intelligence agency access to secure communications of 120 countries including India, Pakistan and the Holy See. Numerous intelligence services including the Swiss benefited from the intelligence gained. So consider carefully what you save to the cloud.
    • if you are not resident in the UK, consider using ‘burn devices’ with separate cloud services. When I worked abroad, we had to do client visits in an authoritarian country. I took a different cellphone and laptop to protect commercially sensitive information. When I returned these were both hard reset by the IT guy and were ready for future visits. Both devices only used a subset of my data and didn’t connect to my normal cloud services, reducing the risk of infiltration and contamination. The mindset of wanting to access cloud services around the world may be just the thin end of the wedge. Countries generally don’t put down industrial and political espionage as justifications for their intelligence services powers.

    What can criminals do?

    Criminals already have experience procuring dedicated secure messaging services.

    While both dark web services and messaging platforms have been shut down, there is an opportunity to move the infrastructure into geographies that are less accessible to western law enforcement: China, Hong Kong, Macau or Russia for instance. A technical capability notice is of no use. The security services have two options to catch criminals out:

    • Obtain end devices on the criminal:
      • While they are unlocked and put them in a faraday cage to prevent the device from being wiped remotely.
      • Have an informant give you access to their device.
    • Crack the platform:
      • Through hacking
      • Setting the platform up as a sting in the first place.

    If the two criminals are known to each other a second option is to go old school using a one-time pad. This might be both having the same edition of a book with each letter or word advancing through the book .

    So if you used the word ‘cat’ as the fourth word on line 3 of page 2 in a book you might get something like 4.3.2, which will mean nothing if you don’t have the same book and if the person who wrote the message or their correspondent don’t use 4.3.2 to signify cat again. Instead they would move onwards through the book to find the next ‘cat’ word. A sleuthing cryptographer may be able to guess your method of encryption by the increasing numbers, but unless they know the book your feline secret is secure from their efforts.

    NSA DIANA one time pad

    Above is two pages from an old one-time pad issued by the NSA called DIANA.

    The point is, those criminals that really want to evade security service understanding their business can do. Many criminals in the UK are more likely to rely on a certain amount of basic tactics (gloves, concealing their face, threatening witnesses) and the low crime clearance rate in the UK.

    Instead of a technical capability notice, these criminals are usually caught by things like meta analysis (who is calling who, who is messaging who, who is transferring money etc.), investigative police work including stings, surveillance and informers.

    Why?

    Which begs the questions:

    • Why Apple and why did they choose to serve it in December 2024?
    • What trade-offs have the UK government factored in considering the potiential impact on its economic growth agenda and political ramifications?
    • The who-and-why of the leak itself? Finally, the timing of the leak was interesting, in the early days of the Trump administration.

    I don’t know how I feel about the alleged technical capability notice and have more questions than answers.

    More information

    European Commission Final Report on Echelon  and coverage that appeared at the time of the report’s release: EU releases Echelon spying report • The Register

    Patriot Act und Cloud Computing | iX – German technology press on the risks posed by the Patriot Act

    US surveillance revelations deepen European fears | Reuters – PRISM negatively impacted US technology companies

    NSA’s Prism surveillance program: how it works and what it can do | guardian.co.uk

    The strange similarities in Google, Facebook, and Apple’s PRISM denials | VentureBeat

    Tech Giants Built Segregated Systems For NSA Instead Of Firehoses To Protect Innocent Users From PRISM | TechCrunch

    Computer Network Exploitation vs. Computer Network Attack | Schneier on Security

    EXPLANATORY MEMORANDUM TO THE INVESTIGATORY POWERS (TECHNICAL CAPABILITY) REGULATIONS 2018

  • Pagers + more things

    Pagers

    Pagers went back into the news recently with Hizbollah’s exploding pagers. YouTuber Perun has done a really good run down of what happened.

    Based on Google Analytics information about my readership the idea of pagers might need an explanation. You’ve probably used a pager already, but not realised it yet.

    A Twosome Place wifi puck
    A restaurant pager from Korean coffee shop / dessert café A Twosome Place.

    For instance if you’ve been at a restaurant and given puck that brings when your table is ready, that’s a pager. The reason why its big it to prevent customers stealing them rather than the technology being bulky.

    On a telecoms level, it’s a similar principle but on a bigger scale. A transmitter sends out a signal to a particular device. In early commercial pagers launched in the 1960s such as the ‘Bellboy’ service, the device made a noise and you then got to a telephone, phoned up a service centre to receive a message left for you. Over time, the devices shrunk from something the size of a television remote control to even smaller than a box of matches. The limit to how small the devices got depended on display size and battery size. You also got displays that showed a phone number to call back.

    By the time I had a pager, they started to get a little bigger again because they had displays that could send both words and numbers. These tended to be shorter than an SMS message and operators used shortcuts for many words in a similar way to instant messaging and text messaging. The key difference was that most messages weren’t frivolous emotional ‘touchbases’ and didnt use emojis.

    Beepers
    A Motorola that was of a similar vintage to the one I owned.

    When I was in college, cellphones were expensive, but just starting to get cheaper. The electronic pager was a good half-way house. When I was doing course work, I could be reached via my pager number. Recruiters found it easier to get hold of me, which meant I got better jobs during holiday time as a student.

    I moved to cellphone after college when I got a deal at Carphone Warehouse. One Motorola Graphite GSM phone which allowed two lines of SMS text to be displayed. I had an plan that included the handset that cost £130 and got 12 months usage. For which I got a monthly allowance of 15 minutes local talk time a month.

    I remember getting a call about winning my first agency job, driving down a country road with the phone tucked under my chin as I pulled over to take the call. By this time mobile phones were revolutionising small businesses with tradesmen being able to take their office with them.

    The internet and greater data speeds further enhanced that effect.

    Pagers still found their place as communications back-up channel in hospitals and some industrial sites. Satellite communications allowed pagers to be reached in places mobile networks haven’t gone, without the high cost of satellite phones.

    That being said, the NHS are in the process of getting rid of their pagers after COVID and prior to COVID many treatment teams had already moved to WhatsApp groups on smartphones. Japan had already closed down their last telecoms pager network by the mid-2010s. Satellite two-way pagers are still a niche application for hikers and other outward bound activities.

    Perun goes into the reasons why pagers were attractive to Hesbollah:

    • They receive and don’t transmit back. (Although there were 2-way pager networks that begat the likes of the BlackBerry device based on the likes of Ericsson’s Mobitex service.)
    • The pager doesn’t know your location. It doesn’t have access to GNSS systems like GPS, Beidou, Gallileo or GLONASS. It doesn’t have access to cellular network triangulation. Messages can’t transmit long messages, but you have to assume that messages are sent ‘in the clear’ that is can be read widely.

    Consumer behaviour

    Yes, CEOs are moving left, but ‘woke capitalism’ is not the whole story | FT

    Culture

    ‘We were cheeky outlaws getting away with it’: the total euphoria of Liverpool’s 90s club scene | The Guardian – maybe one day I will tell my side of this tale. It’s all a bit more nuanced and I was stone cold sober throughout it all, which is a rare perspective.

    Economics

    Invest 2035: the UK’s modern industrial strategy – GOV.UK

    Corporate Germany is on sale | FT

    Health

    Ukraine’s pioneering virtual reality PTSD therapy | The Counteroffensive

    Korea

    The sabukaru Guide to Seoul’s PC Room Culture | Sabukaru

    Luxury

    How luxury priced itself out of the market | FT – brands have tested the elasticity of pricing and pushed beyond the limits for their middle class customer base

    Watch-maker Jaeger-LeCoultre expands into fragrances inspired by its Reverso dress watches: Jaeger-LeCoultre fragrances take form | Luxury Daily

    Ozempic is transforming your gym | FT, The Vogue Business Spring/Summer 2025 size inclusivity report | Vogue Business – GLP-1s blamed for stalled progress.

    Ferrari, Hermès lead global luxury brand growth in 2024: Interbrand | Luxury Daily

    What is Chinese style today? | Vogue Businessstreet style at Shanghai Fashion Week has been low-key. The bold looks of the past have given way to a softer aesthetic that’s more layered and feminine, with nods to Chinese culture and history. This pared-back vibe was also found on the runways. Part of this might be down to a policy led movement against conspicuous consumption typified by Xi Jinping’s ‘common prosperity‘.

    Marketing

    Adland’s talent spill: Seniors double blocked as ageism, cost-cutting compounded by ‘threatened’ younger managers | Mi3

    Where to start with multisensory marketing | WARC – 61% of consumers looking for brands that can “ignite intense emotions”. Immersive experiences that are holistic tap into people’s emotions and linger in the memory. It’s also an opportunity for using powerful storytelling to communicate a brand story.

    Media

    Tesco to launch location-based self-scanner adverts in stores – Retail Gazette

    Everyone is burning out on the news, including journalists – Baekdal

    Online

    Roblox: Inflated Key Metrics For Wall Street And A Pedophile Hellscape For Kids – Hindenburg Research

    How Google Influences Public Opinion | HackerNoon

    Software

    Apple macOS 15 Sequoia is officially UNIX • The Register

    Web-of-no-web

    Airbus to cut 2500 staff in Space Systems | EE News Europe“In recent years, the defence and space sector and, thus, our Division have been impacted by a fast changing and very challenging business context with disrupted supply chains, rapid changes in warfare and increasing cost pressure due to budgetary constraints,” said Mike Schoellhorn, CEO of the Airbus Defence and Space business.

    Wireless

    Boeing plans quantum satellite | EE News Europe

    Elon Musk battles Indian billionaires over satellite internet spectrum | FT

  • Apple Watch Ultra 2

    I was fortunate to get an Apple Watch Ultra 2. It is the third Apple Watch that I have owned and the sixth wearable. My previous history in wearables were:

    A Yamasa Tokei analogue pedometer (I received it around the time I was in primary school. It came in handy for guesstimating walking distances when I was in the scouts). What I didn’t know at the time is that the 1960s-era interest in pedometers that eventually spawned my device was driven by Japanese interest in combating obesity due to modernisation during the post-war economic miracle.

    If you are focusing on your 10,000 steps a day you can thank Dr Yoshiro Hatano and manufacturers like Yamasa who eventually sold their ‘Manpo-kei’ (10,000 step measure) in the west as ‘Manpo-meter’ devices from the 1960s through to the late 1990s.

    Nike Fuelband – I really enjoyed the simplicity of this device, but it was very fragile and I ended up going through three devices in a matter of months.

    NIKE+ FUELBAND SE

    Casio G-Shock+ connected device that was let down by its software, but very much a go-anywhere device.

    blue G-shock

    Polar Loop fitness tracker – it was more reliable than Nike’s Fuelband but I didn’t really enjoy it as device.

    The Polar Loop activity tracker looking super cool. Check out the full review wp.me/p4oEpL-ld #health #fitness

    Apple Watch series 1 and 2 – I lasted about 48 hours wearing the series 1 Apple Watch, but did better with a series 2 device.

    apple watch series one

    Apple Watch Ultra 2

    Apple Ultra 2

    My expectations have been impacted by poor experiences with earlier devices.

    How have I found the Apple Watch Ultra 2?

    I have worn tool watches all my adult life, a mix of mechanical dive watches and Casio G-Shocks. That meant that I didn’t think about where I took my watches. Into the shower, or the swimming pool – the watches could take it all in their stride. But the Apple Watch couldn’t.

    The Apple Watch Ultra 2 is a classic ‘go anywhere’ watch. It is waterproof like a Casio G-Shock. So fine for swimming, in the shower or scuba diving. Titanium means that it’s hypoallergenic, and corrosion resistant; even more so than most grades of stainless steel. However, if you wear it in the sea or at the swimming pool, rinse the watch in clean fresh water afterwards, like you should do with any other dive watch.

    I found the default straps sold with the Apple Watch Ultra 2 were excessively clunky. Awkward to wear and got snagged in random situations. Instead I favoured a Nike Sports silicone band which is ideal for the gym or working in the office.

    I bought a cheap clear bumper for the Apple Watch Ultra 2. It keeps fingerprints off the screen and gives items like the buttons and digital crown a modicum of protection from being activated by putting on a jacket as we go into a cooler wetter autumn.

    Battery life on it seems to be more generous than the older Apple Watch models I have used and based on what I have seen I think you could get a weekend out of it without a charge.

    The ubiquity of Apple watches on the wrists of Londoners mean that this doesn’t attract any good or bad attention.

    What’s it like?

    Compared to previous Apple watch models I have used the Apple Watch Ultra 2 is faster and more sophisticated. I get the sense that the Apple WatchOS is now supported by less non-health related apps than previously. My watch supports alerts for my train ticket bookings, airline flights and my preferred taxi app.

    Part of this might be down to watch might make contextual sense in the 10 second app usage time that a consumer would have. And when does it make sense to just pull the phone out of your pocket.

    There isn’t the same lag that made the first series Apple Watch unusable, as the device has become more powerful and more processing happens on the watch. Apple’s health app is more tracking than I need, so I haven’t used it with apps like Strava.

    What’s good about it?

    All of the Apple watch models have been impressive pieces of engineering and the Apple Watch Ultra 2 is no exception. In their own way, they challenge Swiss industry for a different type of engineering prowess.

    I really like the strap that I landed on. The material is the right texture and unlike other straps I have worn it doesn’t hinder my typing on a laptop. That being said the strap owes a lot to Marc Newson’s prior work in the early 1990s for Ikepod. This all means that you have a device that feels nice on the wrist.

    One of the first things that I liked about the Apple Watch Ultra 2 is ‘night mode’ a plain red on black face, rather than the distracting colour complications. It would be great if this could be a universal theme carried through all the watch faces.

    Thanks to mobile phone contracts, Apple watches like G-Shocks are surprisingly poor signals of status. In a city like London, that has its benefits.

    What could be improved?

    The Apple Watch is over nine years old. A number of problems have been there since the first device launch and the Apple Watch Ultra 2 is merely the latest in the line to carry them.

    You can’t wear your watch on the inside of your wrist. I used to scuba dive without a dive computer, relying on pre-planned dive tables, a depth gauge and air pressure gauge for my tank. I got into the habit of wearing my watch on the inside of my right wrist so I could hold my gauge console in my hand and see my elapsed dive time at the same time. It also means that your watch is less on-show in public settings.

    Screens default to being overly busy with Apple trying to cram in as many complications as possible which compromises ‘glanceability’ – the key experience benefit that wearables like the Apple Watch Ultra 2 provide. Apple should also start to think about accessibility on across the Apple Watch range as much as it does on a Mac. I have have worked bleary eyed from deep sleep, looked at the watch and not being able to read it until my focus kicks in. How could the haptics function in the Apple Watch be used better?

    Less apps now support the Apple Watch than have done previously. The more apps that support a platform, the more likely you are to get at least some sticky experiences that add to the utility of the device.

    It’s not a particularly stylish device to look at, but it also doesn’t lean into function in the same way that a Casio G-Shock does. This means that it could be better protected out of the box than it is.

    The battery life is better than previous generations of Apple Watch, but it still creates battery anxiety. Unlike Casio or other manufacturers, there’s no solar top-up option.

    I don’t know how precise the data is. It measures blood oxygen level but freely admits its data isn’t good enough to be used in a medical situation. If you move to an Apple device from a Garmin or similar, you may find that your step count and activity measures may vary.

    Price-wise, it’s expensive. It does offer value for what it does, but it’s expensive. You can spend as much, if not more money on a G-Shock than an Apple Watch Ultra 2; but the G-Shock won’t be a worry on issues like obsolescence, software support or even battery replacement in the same way that the Apple Watch Ultra 2 is. I have G-Shocks that I have owned for almost 20 years and are perfectly fine. I won’t be able to say the same of any Apple Watch.

    What’s its use?

    Still a great question. When I had my first Apple Watch, I stopped using it after 48 hours for a few reasons:

    • I couldn’t see a good user case coming thorough in the product at the time
    • It was slow
    • It had poor battery life

    At the time Apple had thrown a number of things at the wall. There was a luxury line with a $17,000 version with a gold case and official third-party leather straps by Hermès. Apple still sells a Hermès co-branded range, but the gold models are no longer made.

    In the intervening years Apple has committed to a number of areas:

    • An extension of your phone, on your wrist.
    • Integration with payments
    • Integration with identity
    • The quantified self

    The use cases I have personally favoured included being an extension of my phone, when it rings my watch vibrates. But since I work most of the time at home and the phone sits on a stand in front of me, this tends to be only useful when I am out. Glanceable updates from a few apps, notably weather and my taxi app.

    The Apple Watch Ultra 2 can work as a standalone phone attached to your existing number, but that depends on your mobile carrier supporting it. I didn’t opt for this for reasons relating to my current service plan with 3 UK.

    Tracking activity and the quality of my sleep. The quantified self is the area where Apple really pushes now, as do third-party developers such as Strava.

    Apple also allows integration with Apple wallet, but you have to turn your wrist in an awkward position to work with most ‘tap-and-go’ systems. It is just as easy to do it with your phone or card.

    Finally, Apple and some car manufacturers have been looking at using Apple devices as your car key. I live in London and even if I did need a car, I would be going for a pre-owned vehicle.

    Is it a watch?

    Is the Apple Watch Ultra 2 actually a watch at first glance seems like a ridiculous proposition, if for no other reason than you have the word ‘watch’ twice in close succession.

    But on closer examination, it’s a pertinent question. Watch sales actually dropped as cellphones became ubiquitous. You had the time in your pocket or purse and the phone went everywhere with you. If you went abroad on holiday, it even changed time zones unless you specifically set it not to do so.

    Watches offered some benefits from using the cellphone as a portable clock.

    • Easy to read / glanceable.
    • An analogue face allowed you to visually understand elapsed time.
    • It sent social signals in work about taking time seriously and likely punctuality.
    • More broadly the watch demonstrates signals about style, wealth, taste and even sub-cultures. This can be especially true of luxury brands and the countless collaborations that Casio has done with its G-Shock range over the years.
    • Finally, if you have an automatic movement watch or a solar powered quartz one, you don’t need to worry about a dead cellphone battery.

    Smartwatches in general, have put a simplified version of your smartphone on your wrist. Depending who your mobile service provider is, your Apple Watch Ultra 2 can become a fallback phone, allowing you to leave it charging at home.

    But as a watch it’s trying to do too many other things. Update you on your messages, provide a simplified experience of some apps (airlines and taxi services in particular) and activity tracking. All of which is squeezed into a screen area about an eighth the size of my smartphone’s screen.

    This all comes with experience choices and compromises. It’s this lack of functional purity that is a moat between even the most technical G-Shock and an Apple Watch Ultra 2. Your watch will never compromise on telling you the time despite being a really shitty dive recorder or digital compass.

    Yes you can spend the price of a Porsche; on a Patek Philippe watch with lots of complications, but realistically it’s an objet d’art that happens to look like a wrist watch. On that measure the Apple Watch Ultra 2 isn’t a watch, despite sitting on your wrist.

    More information

    On smart watches, I’ve decided to take the plunge | renaissance chambara

    Wearable devices | renaissance chambara

    Living with the Apple Watch | renaissance chambara

  • Zynternet + more things

    Zynternet is a portmanteau made up of Zyn and internet. If you’re reading this internet is self-explanatory, the Zyn in question is tabacco-free Skoal bandit type nicotine pouches. Zyn comes in a tin and has various flavours.

    Frat boy support!

    According to journalist Max Read, the Zynternet is a kind of 90s to early 2000s sports obsessed ‘lad’ type culture; but in the 2020s. There are shades of ‘white van man’ in there as well.

    a broad community of fratty, horndog, boorishly provocative 20- and sometimes (embarrassingly) 30-somethings–mostly but by no means entirely male–has emerged to form a newly prominent online subculture.

    Hawk Tuah and the Zynternet | Max Read

    Despite Read’s definition defining it as a 20 to 30-something thing, the subculture seems to bleed into 40-something Dads and draws on creators like Barstool Sports. They’re less extreme than the Andrew Tate acolytes. They care more about sports and professional golf than they do about current affairs and politics. But they’ll be voting Republican. They like college sports, sports betting, light beers and Zyn nicotine pouches.

    The culture has grown prominent on the laissez-faire Musk era Twitter.

    Zynternet stretch

    It would be very easy to point to the Zynternet audience and draw parallels to the ‘proles’ of George Orwell’s Nineteen Eighty Four. And then go down a dystopian k-hole.

    I’ll leave the last words to David Ogilvy for those despairing about the Zynternet:

    You aren’t advertising to a standing army; you are advertising to a moving parade. Three million consumers get married every year. The advertisement which sold a refrigerator to those who got married last year will probably be just as successful with those who’ll get married next year. An advertisement is just like a radar sweep, constantly hunting new prospects as they come into the market. Get a good radar and keep it sweeping.

    David Ogilvy

    TL;DR if you’re not reaching the zynternet, you’re probably not doing political marketing properly. More related content here.

    Hawk Tuah and the Zynternet | Read Max.

    ‘Hawk Tuah Girl’ has our attention. Next, she would like our money. | BusinessInsider

    How the Right Won the Hawk Tuah Girl | Slate

    ‘Hawk tuah,’ the Zynternet, & the bro-vote; plus, cowboys are having a moment | It’s been a minute on NPR

    Business

    Destructive investing and the siren song of software • Apperceptive and Goldman Sachs on AI: GEN AI: TOO MUCH SPEND, TOO LITTLE BENEFIT? (PDF)

    Consumer behaviour

    Changing Trends Due To Japan’s Ageing Population – Tokyoesque

    28% of Britons say the outcome of general elections has little to no impact on them personally | YouGov

    Culture

    Architect I.M. Pei never wanted a retrospective. How Hong Kong got to host one at last | South China Morning Post – iconic despite not teaching or having a theory, just by doing. What’s fascinating about the Hong Kong exhibition is how it looks to address the ‘Chineseness’ of Pei. The discussion goes somewhat along the lines of ‘Yes he had Chinese ancestors, but did he write or speak Chinese?’. We know that he at least wrote Chinese.

    The Vogue Archive — Google Arts & Culture

    Design

    Longevity by design | Apple – interesting whitepaper on how Apple designs in reliability and physical resilience

    A massive Lego theft ring was busted by the cops | Quartz – any form of value that can be resold will be taken

    Energy

    Generative AI is a climate disaster | Disconnect AI

    Finance

    Li Ka-shing’s CK Infrastructure considering secondary listing overseas | South China Morning Post

    EU ends Apple Pay antitrust probe with binding commitments to open up contactless payments | TechCrunch

    Gadgets

    HP is ditching its bait-and-switch printer DRM — but only for LaserJets – The Verge

    Can Samsung’s new Galaxy Ring smart device help its China comeback? | South China Morning Post

    Health

    David Beckham is ‘strategic investor’ in Hong Kong’s Prenetics to set up IM8 health brand | South China Morning Post – IM8 will focus on “cutting-edge” consumer health products, the Nasdaq-listed Prenetics said, without divulging the financial details of Beckham’s investment

    How to

    Marcus Byrne – Midjourney prompts

    Innovation

    Walmart delivery drones being shot by Americans | Quartz – only in America

    Japan

    Dami Lee on Akira’s Neo Tokyo.

    Luxury

    Content or couture? Balenciaga’s 30-minute dress becomes the flashpoint of the season | Vogue Business“It feels a little like a fast fashion iteration of haute couture,” says Victoria Moss, fashion director of The Standard, of the swirling mass of black nylon. “This feels at odds with what fashion at this level should be, which is exquisitely made pieces that somewhat justify their extreme pricing.” She adds that many invest in couture to have garments perfectly fitted to their bodies — and made to last for years.

    “Is it beautiful? That’s debatable. Is it impressive? Not really. Is it brazen? Absolutely. Is it a meditation on the creative process? Maybe. Are we bored of these kinds of gimmicks at Balenciaga? Clearly not, as Demna’s work continues to be both a lightning rod and a conversation starter. “Call it ‘pret-a-polarize’,” says fashion journalist and ‘Newfash’ podcast host Mosha Lundström. “To my eye and understanding, I see this look as content rather than couture.”

    Why Peter Copping Is a Good Choice to Lead Lanvin – Puck

    Materials

    A New Age of Materials Is Dawning, for Everything From Smartphones to Missiles – WSJ

    Marketing

    In Singapore, McDonald’s new metaverse unlocks perks for Grimace NFT holders | Trendwatching – while crypto and NFTs were seen as a flash in the pan by western marketers, they seem to have had a deeper longer-lasting resonance in Singapore.

    Opinion: Why Oracle Advertising Is Really Shutting Down | AdWeek

    Playbrary – by national library board of Singapore. It uses text based games (think Dungeons and Dragons) to introduce Singaporeans to classic books

    With AI-generated videos, Cadbury’s helps Aussies and Kiwis celebrate sporting volunteers – production-wise it is Jib-Jab vs. generative AI

    Media

    Paramount CEOs Say ‘Business As Usual’ After Merger, As Layoffs Loom – Business Insider

    Lonely Planet exits China, sparking nostalgia among netizens | Dao Insights

    Online

    Google considered blocking Safari users from accessing its new AI features, report says – 9to5Mac

    How Influencers and Algorithms Are Creating Bespoke Realities for Everyone | WIRED

    OpenAI Faces More Lawsuits Over Copyrighted Data Used to Train ChatGPT – Business Insider

    U.S. says Russian bot farm used AI to impersonate Americans : NPR and DOJ seizes ‘bot farm’ operated by the Russian government | The Verge

    The trouble with age-gating the internet – POLITICO

    Retailing

    Fast fashion frenzy: 62M Zara items on Vinted reveal the paradox of recommerce | Trendwatching

    Security

    Japan declares victory in effort to end government use of floppy disks | Reuters – yes stories like this are funny because ‘modern’ Japan with its flip phones, fax machines and floppy discs are an anachronism. But there’s a few other things to consider. There might be issues in terms of investment a la the NHS and critical systems that for whatever reason can’t be ported on to modern systems (like the problems had with security based on ActiveX).

    Dumb systems also have security benefits, you can’t steal nearly as much data on even a compressed floppy disk as you can on a USB stick.

    How Apple Intelligence’s Privacy Stacks Up Against Android’s ‘Hybrid AI’ | WIRED

    Defense AI startup Helsing raises $487M Series C, plans Baltic expansion to combat Russian threat | TechCrunch

    Software

    Interesting use cases for generative AI in China which sounds like a plot line from Ghost In The Shell.

    Baidu – World No. 1? – Radio Free Mobile – is Baidu ERNIE really the number one generative AI service? It depends on if the numbers are true. 14 million developers, 950,000 models within the eco-system

    Alphabet Shelves Its Interest in HubSpot (GOOGL, HUBS) – Bloomberg

    Technology

    China plays down importance of lithography tools in semiconductor challenges – Interesting report from Taiwan’s DigiTimes semiconductor trade magazine: China seems to be deliberately playing down the importance of lithography tools as it identifies the challenges for the development of its semiconductor industry in a recently published dossier.

    Telecoms

    Starlink Mini is now available for anyone in the US to roam – The Verge

    Tools

    Cassidy | The AI Workspace for your team

    Wireless

    Germany orders ban on Chinese companies from its 5G network | FT

    Switching from Google Photos to iCloud will soon be a lot less painful – The Verge

  • Dogfight by Fred Vogelstein

    The story Dogfight tells feels much more recent than it now is almost two decades on, and yet so far away as smartphones are central to our lives. Back in the mid and late 2000s Silicon Valley based journalist Fred Vogelstein was writing for publications like Wired and Fortune at the time Apple launched the iPhone and Google launched Android. He had a front-row seat to the rivalry between the two brands.

    Dogfight

    And being on the ground in Silicon Valley would have meant that he would have had access to scuttlebutt given in confidence of anonymity as well as official media access.

    But he’s probably best known for being part of the story itself: Fred Vogelstein wrote about his experiences with Microsoft’s PR machine for Wired back in 2007.

    The fight

    Original iPhone - The Motorola ROKR
    The Motorola ROKR E1 I was given, but eventually threw out.

    Dogfight starts some time after Apple had withdrawn support for Motorola’s ROKR phone, which was able to sync with iTunes for music downloads. This particular track of Apple’s history isn’t really documented in Dogfight.

    The book goes through two separate but entangled story strands. The first is Apple’s development of the Apple iPhone and iPad. At that time Apple in the space of a decade had gone from almost going under, to having the iPod and iTunes music store, together with a resuscitated computer range thanks to the iMac and Mac OS X.

    The Google of this era was at its peak, search had become a monopoly and the company was overflowing with wondrous and useful web services from Google Earth to Google Reader. What was less apparent was that inside Google was chaos due to internal politics and massive expansion. Into this walked Andy Rubin who had built and designed the Danger Hiptop, sold exclusively on T-Mobile as the Sidekick.

    T-Mobile Sidekick2 w/ skin

    The Sidekick had been a text optimised mobile device. It featured email, instant messaging and SMS text messages. His new company Android had been acquired by Google to build a new type of smartphone that would continue to provide a mobile audience for Google services.

    Dogfight’s style

    Dogfight is undemanding to read but doesn’t give insight in the way that other works like Insanely Great, Where Wizards Stay Up Late and Accidental Empires did. Part of this might be down to the highly orchestrated public relations campaigns happening at the time.

    Instead Vogelstein documents developments, from video recordings, marketing materials and court documents. Some of the things covered were items that I had largely forgotten about like music labels launching albums as multimedia apps on the new iPhone ecosystem. This was doing in software with what the Claudia Schiffer Palm Vx or the U2 autograph edition iPod had previously done in hardware.

    U2 iPod (front)

    Google’s decision to ‘acquihire’ the Android team to build their mobile operating system, wasn’t examined in depth. Yet there are clear parallels with the Boca Raton team in IBM which came up with the IBM PC a quarter of a century earlier. Vogelstein kept to the facts.

    It’s a workman-like if uninspiring document. And that mattered deeply to me. Part of the reason why I went into agency life was because I was inspired about the possibility of working the technology sector. This inspiration had been fired up by the chutzpah and pioneering spirit portrayed in older technology of history books. Some of them were flawed characters, but all of them had an energy and vibrancy to make the world a better place.

    Wired magazine issues had a similar effect. Yet in Dogfight Vogelstein brought neither of those influences to the table, instead he was writing an account that will probably only read by academics citing his material as a contemporary account in a future thesis.

    Dogfight isn’t the Liar’s Poker of the smartphone world, it isn’t even that illuminating about the nature of Silicon Valley.

    This is probably why Vogelstein hasn’t had a book published since Dogfight – he’s a reporter, not a writer. You can find more book reviews here.