Notes from underground

يارب يسوع المسيح ابن اللّه الحيّ إرحمني أنا الخاطئ

Archive for the category “communications”

In defence of Facebook

I’ve often been critical of Facebook in the past, and since the recent Cambridge Analytica affair many people have been deleting their Facebook accounts and challenging others to do so.

Some speak of Facebook addiction, and suggest that failure to delete your Facebook account may be a sign of addiction. But that makes about as much sense as saying that if you don’t get rid of all your telephones, you must have a telephone addiction.

For all its faults, Facebook has its uses and I use it, like a telephone and other media of communication, to communicate with people that I want to communicate with. Sometimes one has to devise workarounds for the obstacles that Facebook puts in the way of communication, often in the name of utterly bogus “privacy” concerns, but in spite of this, I think the advantages of using Facebook outweigh the disadvantages.  As one of the critics acknowledges Facebook: is it time we all deleted our accounts?:

In many ways, being able to distance yourself from Facebook these days is a privilege. As Safiya Noble, an assistant professor of information studies at the University of Southern California and the author of Algorithms of Oppression, notes: “For many people, Facebook is an important gateway to the internet. In fact, it is the only version of the internet that some know, and it plays a central role in communicating, creating community and participating in society online.”

Even if you’ve got multiple ways to communicate and participate in society online, there is not really a good replacement for Facebook. There’s no one portal that reminds you of your friends’ birthdays, connects you to relatives across the world and stores photos from 10 years ago. Deleting Facebook inevitably means missing out on certain things and having to make more of an effort to connect with people in other ways.

Deleting your Facebook account is like locking the garage after the car has been stolen. You data is already out there, and deleting your Facebook account won’t recall it.

I mentioned Facebook’s totally bogus concern for privacy. For example, it keeps warning me about “Who can see this post?” when I make posts public. But it does not warn me when I don’t make them public. I posted something recently for friends only, and Facebook failed to warn me that the next five posts were also marked for friends only.

If there is something I don’t want people to see, I don’t put it on Facebook. If I put it on Facebook, I think it’s OK for people to see it. If I make it “friends only” it’s not because I don’t want people to see it, but because I think people might find it boring. I’ve no doubt that many people out there do find stuff I post boring, and one of my biggest gripes with Facebook is that its algorithm seems to show people things that will bore them, and not show them things that will interest them. For example “Top Stories”, which has recently become the default, is what Facebook thinks are the top stories, not what I think are the top stories.

But the other day I saw a very ominous invitation from Facebook with no privacy warning. I can’t remember the exact wording, but it was something to the effect of “Tell people something about yourself that they don’t know?” According to my bullshit detectors, that has BIG DATA written all over it, rather than the “Who can see this?” nonsense.

Most third-party apps, quizzes and games, especially the ones that say stupid stuff like “Which of your friends will spring you from jail?” serve no other purpose than to get access to your data and that of your Facebook friends. They do warn you that the app or quiz or whatever will give access to your friends list, but true addicts won’t care about that.

 

 

Early Social Media

It was 30 years ago this month that I first encountered online social media.

I borrowed a modem from a friend and used it to access Beltel, which was run by Telkom. The modem was a Saron (perhaps made in Saron in the Western Cape, perhaps not). It is so far lost in the mists of history that a Google search produced no information. A few months later I bought one. There were two gadgets we wanted back then — a modem and a microwave oven. We could not afford both, so we got the microwave oven. But then someone who had upgraded their modem to a faster one advertised a Saron modem second hand, and so I bought it.

Ceefax screen display from the UK. The Beltel display was similar.

Beltel was accessed by a 300/75 baud modem. It would download data at 300 baud, and upload it at 75 baud. “Baud” for those who don’t know, was roughly equivalent to bits per second. The Beltel system was similar to the Prestel and Ceefax system in the UK, and lasted until 1999, when it closed because the software was not Y2K compatible.

The Beltel system produced a 40 character screen display.

One of the features of Beltel was Comnet, which was like a bulletin board, with sections for discussing various topics. It worked a lot like Facebook, except that it had very crude graphics, it was much slower, and because it used 40 characters across the screen, it was easier to read.

There was also a more sophisticated version of Comnet called “The Network” for which one had to pay extra.

Most of the discussion was about computers. The main exception was a couple of right-wing white racists Adrian and Karen Maritz, who used it for racist propaganda. The were supported by someone using the pseudonym “Computer Advisory”, whom I suspect was Henry Martin, who later also posted racist propaganda under his own name. Most of the other users were white middle-class computer geeks, who whatever they may have thought about people of other races, reacted against the very crude racism of the propagandists.

A few years later Adrian Maritz and Henry Martin booby trapped a computer, which they sent to Durban, where it blew up and killed some poor innocent computer tech who was trying to compare it. They were arrested, and made it on to the news when they had a hunger strike in prison. An investigative journalist, Jacques Paauw, followed up the story, and 30 years later he’s still around, still digging up the dirt on politicians and the like. Henry Martin and Adrian Marits scarpered overseas to the UK. Perhaps they are still involved in right-wing politics over there.

Through Beltel I discovered BBSs — Bulletin Board Systems. These could be set up by anyone with a computer, a modem and a telephone line, and could both transmit and receive data at 300 Baud, and quite soon 1200 Baud. Then Baud as a measurement became obsolete, and new modems could transmit and receive at 2400 bits per second, which could not be measured in Baud. But even at 300 Baud, seeing characters appear on my screen and realising that they were coming from another computer 150 km away was an amazing thing. Now I’m typing this and it’s being saved on a computer on the other side of the world and I think nothing of it.

One of the first BBSs I used was Capital ComTech, run by Geoff Dellow from Centurion, which was only a local call away. I visited him one day, and also met the notorious Adrian and Karen Maritz, who were visiting at the same time. Most BBSs were run by computer geeks, and the main thing most of them wanted to talk about was computers. They would make their systems available to those who wanted to talk about other things, but regarded those as irrelevant fluff, and not the really important stuff. That seemed weird to me — like people only wanting to use telephones to talk about telephones (well, since the introduction of cell phones I think many people do want to use telephones to talk about telephones, but back in the 1980s it did seem to be ridiculous). Nevertheless, most BBSs had about 10-20 sections, called “conferences”, for discussing various aspects of computers, and perhaps one or two for non-computer stuff, which most sysops (BBS system operators) regarded as an unnecessary luxury, needed only to keep off-topic stuff out of the computer conferences.

So I wonder how many people are around who remember those early days of social media, who participated in ComNet and The Network on Beltel. Somewhere on my hard disk I’ve still got some conversations saved from those days.

How US Net Neutrality affects the rest of us

Those of us outside the US may have observed their debates on net neutrality, and wondered whether it would affect us.

Even if it is something confined purely to the US, however, the loss of net neutrality there will affect people all over the world. But when people speak of the loss of net neutrality, there are many ways in which it has already been lost, or rather, it is an ideal that has never been fully realised.

This article helps to explain what it means for people in the US — Someone Finally Illustrated What The Loss Of Net Neutrality Really Looks Like, And You Won’t Like It:

Net neutrality has become a volatile, high-profile news story, and with good reason: Americans are in danger of losing it. But what is net neutrality, and why is it important? Why are some lawmakers fighting so hard to make it a thing of the past?

The answer is complex, rooted in technological progress, a changing economic landscape, and a society and culture that is seeing greater class divisions than at any other time in our history. Some in our government are determined to make the internet a profit-driven product, and while this may sound understandable in a capitalist society, the dangers are very real.

Aptly illustrated by this picture:

If you live in South Africa, say, and you post some family photos on Facebook, the loss of net neutrality in the US might mean that your cousin in the US may not be able to see them, because their ISP has decided to charge more for access to Facebook.

Of course even with net neutrality your cousin in the US might not have been able to see your photos, because Facebook’s algorithm already decides who gets to see what you post, and who doesn’t get to see it.

Think of another example. An academic researcher in South Africa posts a research query in a blog, trying to verify some fact, or get reactions to a conjecture or hypothesis. With net neutrality, anyone with a web connection can see the blog and respond to the post. But without net neutrality, an ISP can decide to make that particular blogging platform only accessible to some of its subscribers who pay extra for it.

Even without legal protection of “net neutrality”, there have been all kinds of attempts to corral users into a closed system. Facebook’s Messaging app is an example. Get people to use that, and people have to join Facebook to communicate with you. Others may have attempted the same thing, but it might have backfired on them. In an earlier post, The decline and decline of tumblr | Notes from underground, I noted that tumblr had gradually reduced the functionality of their site to make it a closed world. Perhaps they did this in the hope that they, like Facebook, might be able to lock users in to their site, though the actual effect was to remove the incentive for many people to visit their site at all. To lock people in successfully, you have to be big like Facebook, not small like tumblr.

We had something similar in South Africa. A few years ago people who used MWeb as their ISP found it difficult to access certain web sites, because MWeb was trying to lock them in and steer them towards its own offerings. I don’t know if they still do that, but there was quite an outcry at the time.

Something similar was seen back in the 1990s, when dial-up BBSs were popular. Telkom, whose phone lines were being used for it, wanted to charge more for data calls to BBSs than for voice calls, but the counter argument was that Telkom was a “common carrier” — their job was to provide the connections, for which they could charge, but the content of the calls was none of their business. The “common carrier” principle is the same principle as net neutrality — an ISP charges you for the internet connection and the band width you use, but the content of your connection is none of their business.

The “common carrier” principle provided a great deal of freedom, because anyone could set up a BBS, and so BBSs were a great enhancement to free speech. It was one of the factors that helped to topple a lot of dictatorial regimes in the annus mirabilis of 1989. It was how news of the Tianamnen Square massacre in China reached the rest of the world; pro-democracy activists used a BBS conference called ASIAN_LINK to communicate with each other and the rest of the world.

So the loss of New Neutrality takes the USA another step further away from the “free world” that it once claimed to be the leader of.

 

 

 

The proliferation of unreadable e-mail

I’m getting more and more unreadable e-mails.

About a month ago I noted that WordPress’s response forms, which used to be a useful feature, are now unreadable and unusable.

More and more people seem to be sending e-mails with little more than long URLs that take up several lines of text, and make the actual message, if any, very hard to read, and have to be copied and pasted into a web browser because they haven’t bothered to enclose them in angle brackets. Don’t they know that Tiny URL is free? — please use it.

http://tinyurl.com/create.php

And then more and more people, especially church organisations and banks and the like, are sending HTML-only messages that are not only very hard to read, but also contain Lazy HTML, which prompts my mail reader to display the following warning:

What’s more, these messages are usually sent from a no-reply e-mail address, so you can’t even ask for clarification.

Whenever that warning pops up, I usually delete the message unread.

If they really wanted me to read the message, they would not have:

  1. Disguised it to make it look like spam or malware
  2. Deliberately made it hard to read
  3. Made it “no-reply” so you can’t ask for clarification

So if you are sending e-mails, please remember some courtesy rules:

  • No Lazy HTML
  • No HTML-only messages
  • No long URLS

To which I might add “No Comic Sans”, except that if you feel an irresistible compulsion to use HTML in e-mails, Comic Sans is a lot more readable than some of the squitty and faint fonts that some commercial firms feel compelled to use.

 

Facebook recovery must wait

Today’s the day I thought I might try to regain control of my Facebook account, but it looks like it may have to wait till payday when we may be able to afford to buy more data.

Oh well, more time to try to finish the library book I’m reading.

We do have an emergency device that can be used for such things as blog posts (pre-written and uploaded), and reading email on sites like Gmail, but quite hopeless for reading stuff online, especially graphics-heavy stuff like Facebook.

 

 

Facebook hacked, distributing malware?

I got a very weird message on Facebook, saying that my last post was spam and I should check it.

I was curious to know what that was, so went to look at it.

I then got this message:

Let’s check your device for malicious software
Hi Steve, we’re continuously working to keep your account secure. We’ve noticed that this device may be infected with malicious software. To continue to use Facebook, you can either use other devices or clean this device by downloading the scanner provided by Facebook and Trend Micro.

Note, no information about the alleged “spam” message, but an invitation to download an unknown program and run it.

So I suspect that the initial message was a ruse to grab my Facebook password and hack my account.

I advise anyone receiving such a message to ignore it, and warn others about it as well, and try to find out from “Facebook Site Governance” what is going on.

Tweet and retweet this, and share a link to this post on Facebook before you too are locked out.

Appendix

I thought it might be useful to others to describe exactly what happened, in case they encounter the same thing.

  1. I got a “notification” that something I posted was suspected spam. It wasn’t clear if it was a post or a comment on someone else’s post.  It said I could click on the notification to see the suspicious post.
  2. I wanted to see the suspicious post, because I wanted to see if it was something I had posted, or if it was someone else impersonating me. Several of my friends have had people impersonating them on Facebook in the past.
  3. I clicked on the notification, and was asked to log in to Facebook. That made sense. If someone was impersonating me, they would want to make sure it was actually me, rather than the impostor.
  4. But when I logged in, I was not shown the offending post, but the message shown above. That sounded all the alarm buzzers, like the terrain warning alarm on an aircraft flying too low “Terrain! Terrain! Pull up! Pull up!”
  5. This was not showing me a post that was suspected spam — it was asking me to download something to my computer.
  6. I copied the message displayed, and saved it, and then went out of Facebook, and tried to go in again afresh.
  7. It asked me to log in and then displayed the same message I had copied.
  8. I concluded that when I had logged in, expecting to see the spam message, they had stolen my password, and changed it, so I could no longer log in to Facebook.
  9. It was at that point that I thought I should warn others of this.
  10. I’m pretty sure that whatever it is they asking me to download is malware of some kind. So if you see a “notification” that something you’ve posted is suspected spam, whatever you do, don’t click on it!

 

Firefox is Bloatware

I’ve just reloaded Firefox for the sixth time this morning.

It crashed three times, but each time I restarted it it tried to reload all the stuff that had made it crash in the first place, so I had to close it and restart it again.

I remember when Mozilla’s flagship browser was Netscape. It was what I used when I first started exploring the Web, 21 years ago. But it became bloated and cumbersome, and so they wisely decided to split it — the browser part became Firefox, and the mail and news reader became Thunderbird, and they were lean, mean and fast.

Now, however, Firefox has become as bloated and clunky as the old Netscape.

I first began to notice a serious slowdown when I tried to download a PDF file, and instead of downloading it, Firefox opened and displayed it. I wasted quite a lot of time and bandwidth trying to discover how to download the file in order to have it for future reference. It seems that Firefox had added its own PDF reader, which made its memory footprint bigger, and slowed it down quite a lot.

Then it seems to have added something called “Pocket”, which it tells me is better than bookmarks (how?), and that seems to have slowed it down even more. It’s costing me a lot in coffee.

Why? Because when I’m working on something, and want to check a fact on the web, the date of a monarch, or the spelling of a word, I go to make a cup of coffee while waiting for the page to load.

They say they don’t want to develop Firefox for Windows XP any more, because it’s too much hassle to put all these bells and whistles into it.

Well that’s OK, just go back to a version that had fewer bells and whistles and more pistons and cylinders, and re-release that. Then you can go back to playing around producing bloatware for those who can  afford to keep up with the Joneses by buying a new computer every year with more and more memory.

Twitter vs Facebook and blog stats

This blog got the biggest number of hits over the last 30 days on 21 February, when I re-announced an old post on Home Schooling and Bigotry on both Facebook and Twitter.

I just checked the blog stats for that day, and the home schooling post was the most popular. It was interesting, though, that 45 visitors were referred from Facebook, and only 2 from Twitter.

I’m not a great one for stats, and don’t often look at them, though I have noticed that since I moved this blog from Blogger to WordPress the number of visitors dropped drastically and still hasn’t recovered. I moved it because the Blogger editor became more difficult to use.

But another blog I read, A Pilgrim in Narnia, had an article on blogging stats, and so I thought I’d take a closer look at them. And it seems that that blog, too, gets far more hits from Facebook than from Twitter.

Perhaps as a result of this, Twitter has started trying to imitate the Facebook way of doing things, and I suspect that that will cause them to lose a lot more ground a lot more quickly. Instead of doing what Twitter did well, the people at Twitter are trying to do what Facebook does, and doing it badly.

To start with, Twitter was a quick and concise way of sharing information, if necessary with links to where one could get more detail (so great for announcing blog posts). The 140 character limit ensured that. But then they added pictures, which made nonsense of the 140-character limit. Now, like Facebook, they are deciding what to show people, which means that big organisations get more exposure than individuals, and eventually the individuals will leave Twitter to the big organisations to tweet to each other.

There were other tools that enabled one to fine related material on blogs, but they’ve all killed themselves off, perhaps by trying, like Twitter, to emulate the Facebook model instead of doing something useful and unique. There were Technorati and BlogCatalog, which killed themselves off in that way.

So statistically, at any rate, Facebook seems to be one of the best ways of announcing blog posts at the moment

 

 

Technology addiction?

This morning at TGIF Dr Marlena Kruger spoke on the impact of our technology addiction.

I think she made some useful points, for example that young children learn more from playing with hands-on toys that from playing with simulations of them on a computer screen.

Shape sorting toy

Shape sorting toy

When our kids were small, they had one of these shape sorting toys. It would be possible to design a computer app to match the same shapes to spaces on the screen, but kids learn a lot more by handling the shapes, coordinating their sense of sight with the sense of touch by feeling it, and yes, putting it in their mouths.

So playing with computer apps is no substitute for playing with actual things in the real world.

But the problem with this kind of talk about “technology” is that people seem to get locked into a narrow two-dimensional world like a computer screen. What do we mean by words like “technology”?

Consider, for example, this article, which seems to be making a similar point to that made by Dr Kruger — 10 Reasons Why Handheld Devices Should Be Banned for Children Under the Age of 12 | The Huffington Post:

The American Academy of Pediatrics and the Canadian Society of Pediatrics state infants aged 0-2 years should not have any exposure to technology, 3-5 years be restricted to one hour per day, and 6-18 years restricted to 2 hours per day (AAP 2001/13, CPS 2010). Children and youth use 4-5 times the recommended amount of technology, with serious and often life threatening consequences (Kaiser Foundation 2010, Active Healthy Kids Canada 2012).

Think about it for a while, especially the heading, because it is an example of tunnel vision — like limiting yourself to the number of pixels on a computer screen, and seeing nothing outside that.

What is a “handheld device”? A pen, a pencil, a crayon, a pair of scissors — all these are handheld devices. All these are technology. Specialists in early childhood education have been saying that children should learn to handle such things long before they start school.

Ah, you say, but those are mechanical devices, and we are talking about electronic devices.

But experts in early childhood education say that listening to music is important for the development of young children. Does that mean you are going to take your toddlers to symphony concerts? No recordings, because playing recordings nowadays usually requires electronic devices — when last did you hear a wind-up gramophone played? No discos, because there they use electronic devices to amplify the music.

I’m not simply being pedantic here. Before making huge generalisations about “technology” and “hand-held devices” we need to see the three-dimensio0nal world beyond the computer screen. When you dig in a garden you are using a hand-held device and a spade is technology. Technology is part of what makes us human. Saying that children under 2 should have no exposure to technology is insane. No cooked food, because cooking uses technology.

huntgathEven hunter-gatherer societies use technology, at least for the “hunter” part. Without technology we would just be gatherers.

So when we talk about being “addicted” to technology, we need to think about the wider meaning of technology, and the extent to which technology has made us human.

And when we speak of a remedy for addiction to technology, we need to think about whether the addiction is to technology, or to something else that the technology is used for.

When television was invented, people learnt how to send images to a cathode-ray screen (later LCD) in a remote location. At first, in television, the image was controlled by the sender. The receivers were passive. They could perhaps choose between images sent by different senders, but they had no control over the content of the images received.

Technophobes lamented the bad influence on children — “the flickering blue parent” was one phrase bandied about.

But it was not the TV that was generating the images. They were being sent by people who decided on what was sent, to serve their own purposes. It was one-way communication, yes, but it was one-communication from one group of people to another. The technology facilitated the communication, and to some extent determined it (yes, I’m old enough to have been influenced by Marshall McLuhan, and maybe I’ll say more about him some other time) but it was still communication from people to people.

For me it was a huge liberation when personal computers came along.

Yes, there I was looking at images on a cathode ray tube (CRT), but they were images that I put there. They were things I could control. For a while the rest of the family thought I was opting out of family life. I was “playing with the computer” instead of being sociable and watching TV with the family. That was tantamount to being accused of being addicted to technology. But it wasn’t. If I wrote a letter on the computer, I was no more addicted to the computer as technology than I was addicted to the typewriter before I had a computer, or addicted to a fountain pen before I had a typewriter.

In every case I was “using technology” to communicate with other people, and what I was doing was not “playing with the computer” any more than a handwritten letter is “playing with a pen”. Yes, I do sometimes play with a pen. I twiddle it, I idly click a ballpoint pen so the tip comes in and out.  But using it for a task is not “playing with it”. Is doodling “playing with” a pen? Idly and absentmindedly drawing little pictures? Is sketching fellow participants at a meeting playing with a pen? Perhaps great art exists because some people were addicted to playing with the technology of paint and paintbrushes.

One of the things Marlena Kruger said was coming home and putting your cell phone down and not touching it. Abstain from using the cellphone, because people are more important than the device.

But on Wednesday night we went to church in Brixton, Johannesburg. On the way home at 9:30 pm, on a badly lit road, with cars with bright lights coming the other way, we hit a pothole which dented the wheel rim so the tyre went flat. It was the first time in 11 years and 250000 km that we had had a flat tyre. Where is the jack? We’ve never had to use it before.

So I phone my son, who is a Toyota mechanic and knows these things. And ask where is the jack (it’s dark, you see). It’s under a plastic cover under the front passenger seat. You’d never find it by feeling for it. And how do you remove the cover, and how do you get it out?

But if he switches off his phone, because he’s not going to be addicted to it, it’s not a mere device. There is a person at the other end of the device. So by switching off the phone, you are switching off the person.

So speaking of “technology addiction” can be a bit simplistic. Your addiction can be to the device, like a cell phone, but more often it is addiction to what you do with the device. A cell phone is mainly used to communicate with other people. And you have the stereotype of a group of people all sitting together, all using their cell phones. Are they addicted to their phones? Not necessarily. What it means is that they prefer to communicate with people elsewhere than communicate with the people they are close to at that moment. The problem is not so much with the device used to communicate, but with human relations, that you would rather communicate with someone other than the people you happen to be with.

I said personal computers were a liberation, and its true. I can store information on my computer and find it much more quickly than if I had written it down on bits of paper. I’m writing an essay or an academic paper or even a blog post, and I need to verify the date of a historical event. Google leads me to that information much more quickly than trying to see if I have a reference book that has it.

E-mail was a liberation too.

I used to hate phoning people, and still do. I don’t know if I will be interrupting them when they are doing something important. If I send them e-mail, then they can read it and reply to it at their convenience.

But the people who liked the one-way, one-to-many model of broadcasting did not like this liberation. They wanted their captive audience. And Microsoft developed Windows 98 which was the first version of Windows to be integrated with the Internet, and the developed “push” technology for it. It was an attempt to re-enslave people that personal computers had liberated — by networking those computers and then pushing stuff at them.

And now cell phones use “push” technology too. My smartphone had “push” notifications for Facebook and Twitter, which drove me mad until I found how to switch them off (they don’t give you a manual, so it’s not easy to find out how to do that). So yes, cell phones are useful, but they can drive you mad. And there’s even a cell phone advertising itself with the slogan “Never miss a moment” — you’ll be so busy not missing moments that you’ll never have a moment to do anything.

But even though this is labelled “push technology”, it is not the technology that is doing the pushing. It is people doing the pushing. Yesterday I downloaded 90 emails and 85 of them were spam, sent to my “junk and suspicious mail” folder and deleted in bulk. They may have been sent by bots, but it was people who programmed the bots to send them.

Then back to TGIF, where technology, even electronic technology, was not absent.

TGIF: technology addiction. Two laptops and a projector

TGIF: technology addiction. Two laptops and a projector

I’m not against using educational technology. At one time I used some quite complicated gadgets to improve students’ reading skills, or at least show them how they could improve their won reading skills. But there is also this: Universities should ban PowerPoint — It makes students stupid and professors boring – Business Insider:

Overreliance on slides has contributed to the absurd belief that expecting and requiring students to read books, attend classes, take notes and do homework is unreasonable.

Courses designed around slides therefore propagate the myth that students can become skilled and knowledgeable without working through dozens of books, hundreds of articles and thousands of problems.

I’m not sure I agree with that article either. A lot depends on the content of what is being taught. Some topics can be enhanced by the use of slides, and others not. I must say that in this morning’s presentation I paid very little attention to the slides, and can remember little of what was on them

Incommunicado

For more than three weeks we have had a faulty ADSL line, and have been virtually incommunicado.

Every time we tried to connect to a Web page, the following message appeared:

Secure Connection Failed

The connection to notepad-plus-plus.org was interrupted while the page was loading.

The page you are trying to view cannot be shown because the authenticity of the received data could not be verified.
Please contact the website owners to inform them of this problem.

Learn more…

Report errors like this to help Mozilla identify and block malicious sites

Today the problem has been fixed, and we can communicate again.

Instead of reporting it to the Website owners or to Mozilla (how would we do that when we are unable to send e-mail?) we reported it to Telkom. They sent a couple of people round who informed us that our router was at fault and pushed off. We spent R1000 on a new router, and installed it and it had exactly the same problem. So we reported it again to Telkom.

The people came back, restrung the wire between the house and the pole, and tested various other things, but could not solve the problem.

huaweiWe were able to communicate to a limited extent with a mobile WiFi gadget supplied by Telkom, which works on 3G. We’ve previously used it when travelling, but it proved quite useful for emergency use when the ADSL line wasn’t working. Unfortunately, however, it only has 1 Gb a month on our contract, and when that was used up, even our limited emergency access to the Web came to an end. We asked Telkom if we could transfer some of our bandwidth from the ADSL line to the 3G mobile WiFi device until the ADSL line was repaired, but in spite of their advertising such devices in their brochures as “failover”, they said it wasn’t possible. We’d only get another 1Gb at the end of the month. They would give us a credit on our phone bill for the time the line wasn’t working. In the mean time, of course, there is still snail mail.

I’ve actually been able to download most of my e-mail, usually after 5-20 attempts. But none of the queued replies were sent.

 

Telkom subcontractors trying, unsuccessfully, to repair our line

Telkom subcontractors trying, unsuccessfully, to repair our line

I’ve been thinking uncharitable thoughts about who ever it was who invented and recommended outsourcing. On a previous occasion when our phone line was down, we got two different subcontractors, who could not sort out the problem. The third one came in a Telkom van, and fixed it. This time it was the second subcontractor. But outsourcing such things seems to be a remarkably inefficient way to run a telecoms business.

But my main purpose in writing this is not just to complain about Telkom’s rigidity in being unwilling to allow us to use the 3G device while the the ADSL line waa not working (if you ever see this, it will be working again). It is about the bad advice from Mozilla.

Reporting such errors to Website owners or to Mozilla, as the error message suggests, could be not merely misleading but could cause a lot of unneccessary problems. There is nothing a Website owner can do about a line fault, which might be in another country or another continent.

Similarly, the line fault does not necessarily mean that a site is malicious, and so reporting such things to Mozilla could lead to a lot of quite innocuous sites being identified as malicious and blocked.

So I suggest that Mozilla add a line to their error message along the lines of “if this error is reported for several sites, report it to your ISP, as your connection may be faulty”.

 

Post Navigation