Category: Network Lifestyle And Activities

Cross-platform online game leaderboards–how about it?

Lenovo Yoga Tab Android tablet

Playing that game on a mobile tablet or..

Most video and computer games nowadays implement an online leaderboard as part of the way they operate. They typically require you to log in to the leaderboard to persist game data “in the cloud”, support social gameplay including discovering newer opponents or the maintenance of challenges and leaderboards so players can compete against each other on the game.

Game studios tend to write their own leaderboard that is specific to that game’s needs but the game-distribution platforms are running their own leaderboards to offer this same functionality to all studios and games.

USB-C connector on Samsung Galaxy S8 Plus smartphone

a smartphone or..

It typically leads to a game-recommendation engine to recommend games similar to what you play a lot, subscription-driven gameplay or digital software locker functionality for the titles, typically to keep you with that platform. In some cases, they offer a means to measure your prowess as a gameplayer or as a specialist in particular game types, typically to match you with opponents of a particular skill level in that kind of game.

The leaderboards offered by the distribution platforms make it feasible for a small-time or indie studio to have this functionality without the game developer having to create a leaderboard and rent the necessary server space by themselves.

Sony PS4

a games console like the Sony PS4 or ..

But there is a reality for users who play the same game title across multiple platforms. It is highlighted through someone owning or regularly using computing devices based on different platforms for gameplay such as a “gaming rig” that runs Windows 10, a smartphone that could either run iOS or Android, and perhaps a mobile-platform tablet running either iOS or Android along with a set-top box or games console. The set-top box situation is very real as an increasing number of set-top and smart-TV platforms like the Apple TV or the “décodeurs” offered by French telcos as part of their “n-box” triple-play platforms within France are moving towards the kind of performance associated with games consoles.

Dell XPS 13 9360 8th Generation clamshell Ultrabook

a laptop like the Dell XPS 13 9360 8th Generation clamshell Ultrabook or ..

Increasingly, it encourages game studios to port titles to many different platforms but there has to be an approach that allows the player to carry the online experience between the platforms. At the moment, Facebook has achieved the goal of a cross-platform leaderboard but it requires players to be part of this social network which may put some people off the idea due to the various controversies about this Silicon Valley giant. Facebook’s leaderboard supports “provisioning” from one’s Facebook account along with support for native and Web-based games.

Microsoft has extended their XBox Live leaderboard beyond the XBox One games console and Windows 10 computers by providing limited support for iOS and Android mobile platforms. But this is focused towards a Windows 10 or XBox One setup as your main gaming platform.

Apple TV 4th Generation press picture courtesy of Apple

a set-top device like the Apple TV should lead towards you keeping score and matching opponents on one or more cross-platform online leaderboards

What needs to happen is an effort towards a truly platform-independent gaming leaderboard that facilitates cross-platform gameplay and appeals to multiple game developers and distributors. It has to appeal to a userbase and developer-base that wants to stay away from large social-media powerhouses who see users’ data as the new gold.

A key feature would be to provide support for native-coded and Web-coded games including the newer Progressive Web App games. This is more so as independent game studios work on “free-to-play” games that are written as Web-coded games for play in a Web browser as well as being ported in a native-coded form to iOS and Android mobile platforms. As well, the Progressive Web App is being pitched as a “write once run anywhere” app solution for mobile, tablet and desktop computing.

XBox leaderboard app in Windows 10

The expected functionality would include:

  • the ability to persist gameplay data and scores in the cloud
  • support for challenges and leaderboards including allowing venues, sponsors and others who partner with the game developer to run their own challenges
  • social gaming with opponent discovery on a local and global basis, in-game chat on a one-to-one or party-line basis, and gift exchange for in-game items like microcurrency or game lives.

The leaderboard would have to be child-safe according to established norms and protocols like requirement of parental permission for signing in or participating in sponsored challenges, and support for minimum ages.

Google Play Games app

Google Play Games – the online leaderboard for the Android platform

The issue of allowing venues and marketers to use the leaderboard to run their own challenges may be of concern to some people who want a life free from marketers and commercialism. But there are people who want to build a tighter relationship with the brands that they value and allow these brands to participate in their online life. Similarly, some games studios may associate with various popular brands to underscore their players’ relationship with these brands and as a monetisation tool.

As well, user privacy would need to be valued in many different ways like user discovery or game-chat access. It also includes whether a notification about gaming accomplishments or level-up scenarios should be shared on to outside social networks, which social networks should be used and who should see this information.

It also includes the ability to provide a single-sign-on experience that can work with a wide variety of credential pools. This is important where a user maintains a set of personal credentials with multiple different credential pools like Apple ID for iOS, MacOS and Apple TV devices; Facebook; Microsoft Account for Windows 10 and XBox One; and Google for Android and ChromeOS.  The reason this can happen is due to playing the same game across the multiple platforms.

This could be a goal for companies who are behind content-streaming services, IP-telephony services and the like to engage in if they do want to diversify their offerings. European companies could even jump on the bandwagon especially if they want to tout their end-user privacy and data-security prowess.

What needs to happen is for the games studios to gain access to one or more highly-capable cross-platform game leaderboards so that users can play the games and benefit from leaderboard or game-recommendation functionality no matter the platform they use without being required to “reinvent the wheel”.

WhatsApp now highlights messaging services as a fake-news vector

Articles

WhatsApp debuts fact-checking service to counter fake news in India | Engadget

India: WhatsApp launches fact-check service to fight fake news | Al Jazeera

From the horse’s mouth

WhatsApp

Tips to help prevent the spread of rumors and fake news {User Advice)

Video – Click or tap to play

My Comments

As old as the World-Wide-Web has been, email has been used as a way to share online news amongst people in your social circle.

Typically this has shown up in the form of jokes, articles and the like appearing in your email inbox from friends, colleagues or relatives, sometimes with these articles forwarded on from someone else. It also has been simplified through the ability to add multiple contacts from your contact list to the “To”, “Cc” or “Bcc” fields in the email form or create contact lists or “virtual contacts” from multiple contacts.

The various instant-messaging platforms have also become a vector to share links to articles hosted somewhere on the Internet in the same manner as email, as has the carrier-based SMS and MMS texting platforms when used with a smartphone.

But the concern raised about the distribution of misinformation and fake news has been focused on the popular social media and image / video sharing platforms. This is while fake news and misinformation creep in to your Inbox or instant-messaging client thanks to one or more of your friends who like passing on this kind of information.

WhatsApp, a secure instant-messaging platform owned by Facebook, is starting to tackle this issue head-on with its Indian userbase as that country enters its election cycle for the main general elections. They are picking up on the issue of fake news and misinformation thanks to the Facebook Group being brought in to the public limelight due to this issue. As well, Facebook have been recently clamping down on inauthentic behaviour that was targeting India and Pakistan.

WhatsApp now highlighting fake news problem in India, especially as this platform is seen as a popular instant-messenger within that country. They are working with a local fact-checking startup called Proto to create the Checkpoint Tipline to allow users to have links that are sent to them verified. It is driven on the base of a “virtual contact” that the WhatsApp users forward questionable links or imagery to.

But due to the nature of its end-to-end encryption and the fact that service is purely a messaging service, there isn’t the ability to verify or highlight questionable content. But they also have placed limits on the number of users one can broadcast a message to in order to tame the spread of rumours.

It is also being used as a tool to identify the level of fake news and misinformation taking place on the messenger platform and to see how much of a vector these platforms are.

Personally, I would like to see the various fact-checking agencies have an email mailbox where you can forward emails with questionable links and imagery to so they can verify that rumour mail doing the rounds. It could operate in a similar vein to how the banks, tax offices and the like have set up mailboxes for people to forward phishing email to so these organisations can be aware of the phishing problem they are facing.

The only problem with this kind of service is that people who are astute and savvy are more likely to use it. This may not affect those of us who just end up passing on whatever comes our way.

Netflix works harder on interactive video

Article Netflix official logo - courtesy of Netflix

Netflix to create more interactive content | Advanced Television

With Interactive TV, Every Viewer Is a Showrunner Now | WIRED

My Comments

Netflix is working harder towards providing interactive video as part of its subscription video-on-demand service.

This popular service took baby steps towards this goal with the Puss N Boots children’s TV show, using it as a proof-of-concept show. It is part of having to compete with Apple and Disney who are running or wanting to launch subscription video-on-demand services that are replete with family-friendly content. There is also the public-service broadcasters who are filling their broadcast-video-on-demand services with children’s content of high educational value as part of their public-service remit.

But Netflix have taken this concept in to the mainstream with Black Mirror Bandersnatch which is a sci-fi “time-travel” program about creating a video game in the 1980s. It uses an interactive metaphor that is based on the “Choose Your Own Adventure” books but could be also seen as something similar to some interactive films or adventure games released through the 1980s and 1990s.

With these two titles, they have taken the video-on-demand concept further by linking it to interactive video. It is facilitated by streaming alternate video content under the user’s control rather than loading it from local storage whether it’s an optical disc of some sort or a computer’s local file system.

User-experience problems and inconsistencies

Netflix still faces problems with how their interactive-video efforts work with the different client-side setups that their users use. What is being highlighted is that some of their platforms and viewing setups won’t play this interactive content properly and is underscored most with popular setups involving the large-screen TV. For example, the popular Apple TV device, whether through its interface or as an AirPlay target for an iOS device, doesn’t handle these titles as doesn’t the Chromecast device or the Windows Netflix app.

This is a key issue regarding interactive video because video content has always been conducive towards viewing on a large-screen TV, especially in a “lean-back” manner.

Some titles like Puss N Boots do resolve to running as a traditional linear experience if the viewing setup doesn’t support interactivity whereas others just won’t play at all.

Netflix will have to answer this problem by updating the client software for tvOS, Windows 10, Chromecast and other platforms to cater towards interactivity. Some articles even raised issues like multiple buffering for interactive titles especially where the devices don’t have much in the way of RAM or storage.

Privacy issues associated with interactive content

The technology press are raising concerns about the issue of end-user privacy when users engage with interactive content. It is although the responses are encrypted using SSL encryption technology used to make Websites secure.

In the Black Mirror Bandersnatch application, the user interactivity would be considered to be benign with “The Register” seeing it like whether one liked Thompson Twins or the contents of a “Now That’s What I Call Music” compilation album. But the interactivity in a subsequent title could be seen as a way to identify factors such as a householder’s political affiliations for example.

If an interactive-video platform is being used to gather user preferences, there needs to be a user-privacy and data security framework concerning this activity. For example, any data to be collected has to be anonymised so it doesn’t point to particular households.

Taking it further

Different genres

Netflix is intending to take the interactive concept towards other genres like history, adventure and romance especially by making this kind of content targeted towards adults. This will lead towards a way to legitimise interactive video content and cause the screen arts community to explore it further.

This could be achieved through modelling the interactive titles on various point-and-click graphic adventure games that existed through the 1980s and 1990s and working these concepts harder.

As well, it has to be realised that non-fiction content like documentaries can benefit heavily from interactive video. For example, viewers could work through one of these shows but choose to see more detail on something they are curious about, whether as a slideshow, animation or full-motion video. Similarly, a non-fiction title can give viewers the know-how and opportunity to follow a call-of-action relevant to the title at any point during the viewing session.

Different approaches

Most likely, interactive video will be underscored in the form of  a multiple-choice storyline where certain options affect how the content evolves.

But it can also be in the form of a traditional linear storyline that has the ability to “telescope” at particular points. This is where viewers have the option to view a more-detailed version of a concept that is a point in the storyline, whether as video, animation or on-screen text. It can also extend to a 360-degree video-tour of a space relevant to the storyline where the viewer can use their remote control to navigate that space and, perhaps, see explanations about particular details. It is more so with remote controls that implement trackpads or gyroscopic sensors.

In some cases, you could integrate a “mini-game” or programmatic simulation within the title that the user can play if they so wish. An example of how this could take place could be a crime drama based on the Dick Francis novels that are set within the murky world of horseracing and betting. In this case, there could be the option to emulate one or more betting scenarios concerning one of the subject horse races or see comparative “market odds” for a race before and after a situation highlighted within the drama’s storyline.

This kind of approach may require the use of computing power within the client device or the server to perform any necessary calculations. Here, it may depend on how powerful the client device is and what is being expected for the necessary calculations.

Interactivity as an option

One thing that needs to be thought of as interactive video catches on is the concept of offering “interactivity as an option”.

This is where the content is run in a linear fashion following a known storyline from beginning to end in order to satisfy group-viewing scenarios, viewing setups that don’t support interactivity or simply where you just want to simply relax and view. It may also allow critics to get the essence of the content to make a fair judgement on what the content’s baseline is about.

But it has to allow the user to enable an interactive-viewing mode to allow the individual viewer to benefit from the interactivity.

Taking the interactive TV concept to other VOD platforms

As well, other video-on-demand platforms will want to explore interactive TV as part of their operating software so they can work towards creating their own interactive content. Here, it could be achieved through an operator offering a white-label interactivity solution that other video-on-demand platforms could implement.

Then there is also the issue of having end-user setups work properly with interactive-TV abilities. Here, it will require the software on all of the platforms especially the popular “big-screen” ones, that facilitates the end-user experience whether as a Web-page or a native app to work tightly with these experiences. It also includes operational setups that are used to “point” a regular computer’s or mobile device’s screen to the big screen such as a hard-wired connection, AirPlay or Chromecast.

One of the video-on-demand providers or a third party may decide to approach this situation by offering a “white-box” interactive-TV solution with software libraries for playout and end-user applications. This approach can then speed up the deployment of an interactive-video experience within a video-on-demand service, especially if the service provider is a broadcast video-on-demand type or one that targets niche audiences.

Conclusion

By issuing Black Mirror Bandersnatch as an interactive video title, Netflix is putting forward a strong case for taking interactive video content in to the mainstream. But they will need to work harder to make this new content type work properly for everyone.

Microsoft to allow streaming of games from your laptop to XBox One

Article

XBox One games console press image courtesy Microsoft

You can use the XBox One to play PC games hosted on your computer through the big screen

Microsoft’s Wireless Display app streams PC games to your Xbox | Engadget

Microsoft now lets you stream PC games to an Xbox One and use a controller | The Verge

My Comments

Microsoft is now making it feasible to stream your Windows 10 computer’s video output via your XBox One games console. It is being pitched at people who play Windows-based games on their computer, whether from a CD or an online games resource like Steam, GOG or the Windows Store.

This is based on the same Miracast technology used to stream PowerPoint presentations, video clips and the like from a laptop to the Surface Hub large-screen conference-room computer. There is also the ability to use the XBox One’s controllers attached to the XBox to provide player input to the PC game.

You have to have your Windows computer and your XBox One on the same logical network and have the latest version of the Wireless Display app on both devices. It can stream video and audio from most apps and games on the computer to the XBox. The only exception would be protected video content like iTunes or Netflix.

Dell G7 15 gaming laptop press picture courtesy of Dell USA

You could play a game that exists on this Dell G Series gaming laptop through your XBox One

As well, your XBox’s game controllers can become the player input for your Windows-based computer game, something that may be of benefit in those games where the keyboard may not be ideal. The software has variable latency configurations so you can set your controller input and display output’s behaviour in an optimum manner for the game you are playing.

At the moment, a keyboard or mouse connected to the XBox cannot serve as an input device for your regular computer, which may be of a limitation to game players who deal with “point-and-click” user interfaces or for combining remote-desktop / remote-assistance software with  the biggest screen in the house. You can get around this situation by using a keyboard and pointing device connected to or integrated in your computer.

Another question that will be worth raising with the evolution of this software is whether you are limited to stereo soundmixes when it comes to the sound that passes through this setup. This may be of concern with Windows games that are being offered with surround-sound mixes rather than just stereo mixes.

Here, I would see the new step towards linking your Windows PC to your XBox One as being beneficial for gamers who spend their gaming time between console and PC games. This is more so if they want to use the same large screen for both activities.

Microsoft runs a Super Bowl ad about inclusive gaming

Article

Microsoft’s moving Xbox ad was the best thing about the Super Bowl | CNet

Microsoft Super Bowl Ad video – Click or tap to play

My Comments

In the USA, the Super Bowl football match isn’t just the final NFL football match of the season. It is a TV-viewing experience that encompasses the half-time show and a showcase of highly-polished commercials along with the football game. Here. you enjoy this with your friends while digging those chips in to some fabulous dips or chomping on those chicken wings and drinking plenty of beer or soda (soft drink).

One of the ads that was ran during this showcase was to promote Microsoft’s XBox Adaptive Controller. This is a game controller specifically designed for children and adults who have mobility or dexterity limitations and is about having these children being able to play video games with the XBox console or Windows-based computer. It is also designed to accept a range of assistive devices as user-input devices thanks to various standard connections like dry-contact switches or USB analogue joysticks.

The software supplied with Windows 10 or XBox One also allows accessory controllers that are connected to this device along with this device’s buttons to be “mapped” to particular functions, leading to the most custom gaming experience. Even the packaging is designed to allow people with limited mobility or dexterity to open up the box, something that works well when these controllers are given as a gift for an occasion.

The CNet article called out the ad as going against the grain of sports and video-gaming cultures where people who don’t fit the expected mould of a participant i.e. the young male able-bodied person are effectively shut out. The fact that it was shown during America’s big sporting event of the year hammered this concept home regarding opening up video and computer gaming to more classes of people.

It also goes along with Microsoft’s “open-frame” approach to computing and gaming which allows the creation of games and applications for Windows 10 and the XBox One games console. This can also allow the development of therapy-focused games that can help people with special needs or undergoing particular therapies, and underscores the idea of using this kind of technology in a therapeutic role.

It also shows that computer and video gaming can be part of the course for people who have limitations affecting their mobility or dexterity through the use of assistive technology that is accepted by others who are more able.

Business-email compromise phishing now affects consumers

Article

House in Toorak

The sale of a property is an area where consumers can easily be caught up in a business-email compromise scam

Email crooks swindle woman out of $150K from home sale | Naked Security blog

An email scam has caused $200,000 in losses to real estate agents and home buyers in Victoria | Smart Company

My Comments

Ordinary householders can be at risk of a “business email compromise“ phish attempt in the same way as those in large business.

The business email compromise scam

This scam typically has the trickster research as much as they can about their victim and his or her employer or business partners. The victim that is usually targeted is someone who is likely to facilitate business-sensitive transactions or handles business-sensitive data like the payroll. They will find out whom they report to within the organisation such as the chief financial officer, or beyond the organisation like their accountant, lawyer or the tax department.

Then they place an urgent request to the victim to wire funds to a particular account as part of a wire fraud. Or they could be asked to reply to the email with organisationally-sensitive data like employee data typically presented as a “wages and tax-witholding” statement like a W2 (USA), P60 (UK and Ireland) or Group Certificate (Australia) to facilitate identity theft against the business’s staff.

How can ordinary people get caught up in these scams?

Apartment block in Elwood

as can having that rental apartment managed by someone else

But this kind of email scam can similarly happen with personal transactions, especially those that are high-stakes in nature, typically requiring the engagement of legal counsel. A key example of these transactions would be the sale of real-estate, businesses or investments.

Similarly, the probate settlement of a deceased estate or a property settlement after a divorce or separation could be at risk because these can involve a collection of items including high-value goods like real-estate or collectables. In that case, you are dealing with a real-estate transaction along with the valuation and sale of items.

It can also extend to transactions where you are delegating an agent to manage assets. Examples of these include trust funds typically for minor children, powers of attorney, or rental properties managed by a property manager or estate agent.

These transactions typically involve the frequent exchange of documents during the closure or settlement period where the transaction is in the process of being realised. They also involve dealing with different entities like conveyancers, law firms, estate agents and the like to facilitate the transactions. In addition, due to electronic transaction technologies like online document signing, there will be many emails between the parties that will have links to various resources like document repositories including document-signing platforms or results pages. They are also vulnerable towards the end of the settlement period where a last-minute change could be rushed in “under the radar”.

What can happen, for example, is that a fraudulent email could be used to “steer” the proceeds of a house sale away from the vendor’s account towards a fishy-sounding account.  Or funds due to an estate’s beneficiary could be steered away to an account not under the control of that person.

What can you do?

Compose Email or New Email form

Protect yourself against this scam by practising safe email habits

To protect yourself, make sure everything about the transaction is properly “cut and dried” as it evolves. This includes identifying and documenting sources, currencies and destinations of any funds along with procedures affecting the high-stakes transaction at the start of the transaction. Especially be careful of last-minute changes that crop up towards the end of the settlement.

Protect email accounts that are party to the transaction such as implementing security measures that the email service or client software would provide. With Webmail services,using multi-factor authentication may work as a secure measure, as will verifying that you log in to the service at its known proper address.

Carefully examine emails associated with the transaction to be sure they come from the proper email addresses. As far as links to online resources are concerned, make sure you know the proper domain name for these resources and that the links point to resources at that domain name. Attachments should also come through as proper representations of their filetype and you may have to use your endpoint security software to scan for document-laden malware.

Similarly, you may have to make sure Word documents or Excel spreadsheets are viewed in “Protected View” where macros cannot be run or the document can’t be edited. You would need to exit this mode if you are editing the document such as filling in a form or amending a spreadsheet, or printing it out.

In some cases, a regular personal computer running desktop applications and Web browsers may become a better device to use for verification than a mobile-platform device like a smartphone or tablet. This is because the desktop operating system and software tends to offer a more detailed user experience than their mobile equivalents.

If someone changes their email or other communications details, confirm these details through another communications means that you and them trust. You may have to use one of the prior or alternate communications details as a tool for confirmation if a significant number of details is changed such as through a change of employment.

You may have to double-check invoices, account numbers and the like directly with the other party especially if these details are changed. It is best to do this in person or on the phone using independently-verified phone numbers such as numbers you already have for them.

Avoid the use of untrusted networks like insecure public-access networks to do your sensitive business. Here, you may find that using a mobile-broadband connection and/or a VPN may work with this kind of business if you are away from home or office networks you can trust.

Be especially careful about creditors where the payment-destination account number, the payment method or currency changes during the course of your business. There may be a legitimate reasons such as a creditor changing banks or accounts for something that suits their needs better. But an impostor could be steering money that you owe them to an account under the control of the grifter who is impersonnating them.

If the high-stakes transaction has any international dimension about it, don’t be afraid to seek consular help regarding any aspect of that transaction. It may mean talking with your country’s foreign-affairs government department or the embassy or consulate associated with the foreign country. This is now important with people relocating overseas while maintaining assets like homes in their own or other countries, or goods being purchased via the Internet from foreign sellers.

For example, participants of a transaction conducted across international borders can use consular help to verify each others’ identities. Similarly, they can organise official translation of any official documents that are part of the transaction and are in a language that one of the parties doesn’t understand. Or you simply may need to confirm the legitimacy of that transaction in the foreign country including any steps you need to take.

Conclusion

We as consumers can become vulnerable to the business-email compromise scam when we are dealing with high-stakes transactions like real-estate purchases. To protect yourself, it’s about secure computing and email practices along with making sure everything in the transaction is “cut and dried” including verifying changes through another communications path you trust.

Connected novelties and toys–security and useability issues that affect this product class

Giftware chook (rooster)

Connected versions of classic novelties and giftware will be subject to severe scrutiny

An issue that is rearing its ugly head is the rise in availability of connected novelties and toys. They are toys, novelties, giftware, seasonal decorations and other items that are able to connect with your computer or network. This connectivity function is often sold as one of the key marketing features with it able to work with an online service of some sort.

When I talk of toys, I don’t just talk of what children play with with but also other toys that adults end up playing with. These can include the so-called “executive toys” that live on the office desk for one to keep the other hand busy while they are on the phone.

Who typically sells these products

Toys and novelties are typically sold through a large range of online and bricks-and-mortar retailers, whether they be toy stores, gift stores, souvenir outlets or multi-facet outlets including department and discount stores. In some cases such as rural areas, a store like a newsagent’s could even sell novelties or toys.

Another factor is that novelties are given away to people and businesses as a gift or premium. This can typically happen as part of a “loot bag” offered out at conferences or tradeshows or simply used as a giveaway during a presentation to encourage audience participation.

Christmas wreath

Seasonal decorations that connect to the Internet can also be a security or setup risk

The common factor here is that most of the outlets that sell this kind of product are staffed by people who don’t have much technological know-how. This can affect the procurement process affecting whether the item exhibited at the gift fair should be stocked, or providing customer advice during and after the sale including how to get the connected novelty fully operational.

Artisans who make these gifts and novelties

Amazon Echo on kitchen bench press photo courtesy of Amazon USA

Your Amazon Echo will soon be expected to work with a wide range of toys and novelties

There is also the fact that craftspeople like to make various toys, novelties, gifts and other items and sell them directly to customers or on a wholesale basis. But they do want to add some extra functionality like musicality or flashing lights to some of their product lines.

Typically, if they want this extra functionality in these gifts that they make, they have someone else make and supply the necessary components like clockwork movements or electronic-circuit kits to fulfil the extra functionality in a pre-assembled form.  Then the artisan installs the pre-assembled mechanisms or circuits in the toy or gift as part of putting the whole thing together.

It allowed these artisans to focus on their craftwork and build the items they want to sell, while being able to offer a wide range of goods. The same comments that apply to finished goods also apply to the various components and kits that are being sold to these artisans for their projects.

In this case, the artisans have to be aware of what they procure when they are being sold a “connected functionality” kit for installation in their projects. For them, they have to be aware of customer-support issues including setup and data-security issues regarding this extra functionality.

Connected modules for construction sets and similar hobbies

The same concept also extends to construction-set platforms like Meccano, Lego and FischerTechnik where children and adults build items using the pieces that are part of the respective platforms. In this case, anyone to do with these platforms could offer connected modules or kits that have the ability to control one or more items in their platform-based project like a motor, light or solenoid using an “Internet Of Things” approach. Here, these modules have to be able to seen as equivalent to a connected toy or novelty, especially if the idea is to implement cameras, microphones or GPS sensors.

It also applies to model railways, track-based car-racing sets and the like where they can be extended with functionality modules sold by the set’s vendor or a third party catering to these hobbies. Again the modules also need to be designed for security if they are capable of being part of the Internet of Things.

Use of these items

There is the desire for people to buy these toys and novelties as gifts for others in their life. It also includes the fact that the recipient wants to get the item “up and running” as soon as possible.

This will involve having the device connected to a host device through Bluetooth or USB or to a home network for proper reliable use. It should be about a standard process that is implemented for onboarding including the installation of any extra software.

Key security issues

A key security issue concerning the connected toy, novelty or similar device is that it can be an espionage item presented in an innocuous form. It can concern us both at home and in the office because we can easily be talking about items that are confidential and sensitive in our personal and business lives.

This was highlighted in a crime-fiction form to the Germanic viewership in Europe through the Munich-based Tatort “Wir Kriegen Euch Alle” (We Get You All) episode shown there on Sunday 9 December 2018. This story was focused around a connected doll that was given by strangers to various childrens’ families in middle-class Munich and was used as a surveillance tool to facilitate crimes against the families.

It underscored that Germany has some very strict policies where the sale of surveillance devices that are disguised as innocuous items isn’t allowed in that country. But, in the story, these dolls were imported in to Munich from a location in Austria which is a short drive away and facilitated by the Schengen Agreement in the European Union.

Let’s not forget the recent cyberattacks such as the Mirai botnet that were facilitated by dedicated-purpose devices like network-infrastructure equipment and videosurveillance cameras which were running compromised software. Then there are factors regarding data-storage devices and “bag-stuffer” novelties given away during business conferences where there is the possibility of them being loaded with questionable software.

What would I like to see

Security

There has to be identification on the toy’s or novelty’s packaging about what kind of sensors like location sensors, microphones or cameras that the device has, as well as whether the device transmits data to online services. This includes whether the device does this directly or via intermediary software running on other computer devices such as mobile devices running companion mobile-platform apps. Even a hang tag attached ti the novelty could highlight what kind of sensors or online services it uses which would be important for those items sold without packaging.

Preferably, this can be achieved through standard graphical symbols indicating the presence of particular sensors or the use of online services and social networks. It can also identify whether the toy’s or novelty’s functionality are dependent on these sensors or online services.

App stores and other software platforms that host “connector” software have to implement stringent permissions for these kind of devices especially if they use a microphone, camera or location sensor. There could be standards on whether the software is allowed to record from these sensors over a long time or keep the recording persistent on the host device or online service.

A limitation I would also like to see for connected toys and novelties that if they work with another computing device including a smart speaker, the connection can only be effectively within the same premises. This can be tested through the use of a peripheral-grade connection like Bluetooth or USB to a computing device or limiting the range of discovery for network-based devices to that of the same logical private network or subnet. Here, it represents all the devices on the LAN side of a home-network’s router and excludes devices existing on other logical networks served by the same physical device like “guest” or “community” networks.

As far as Bluetooth is concerned, the toys should implement authentication processes during the setup phases. Then the device ceases to be able to be discovered once it is paired with a host device. It is like what we are seeing with Bluetooth headsets and similar devices that have been recently released. They may also have to work on a limited radio range to prevent successful connection from a distance.

There should also be a simple “factory-reset” process to allow the user to place the toy or novelty in to setup mode, effectively wiping data from the device. This allows a recipient to effectively “claim possession” of the device as if it is new, avoiding the situation where they may be given something that is compromised to do what someone else wants it to do. It also applies to situations where you are dealing with ex-demo stock or gift-fair samples.

This should also apply to online services associated with these toys or novelties where the user has proper account control for the device’s presence on that service and any data collected by that device.

There are devices that observe particular functions according to a particular device class supported by many platforms like a novelty nightlight or illuminated Nativity scene that works with a “smart-home” setup or a novelty Bluetooth speaker. These devices have to work according to the standards in force for that device class and its connection to the host device or network. It is more important where the device may perform further tricks while running alongside dedicated vendor-created software but is able to have basic functionality without this software.

A software-level security approach could be achieved through an open-source or peer-reviewed baseline software that ticks the necessary boxes. This would apply to the firmware installed in the device and any apps or other companion software that is required to be run on other computing devices for the novelty to operate. It also includes a requirement that this software be reviewed regularly for any bugs or weaknesses that could be exploited, along with compliance requirements.

This could be assessed according to a set of European norms because the continental-European countries are very concerned regarding privacy thanks to their prior history.

As far as modules for integration in to toys, novelties and giftware is concerned, the modules should meet the same requirements as finished products that would have the same functionality. Craftspeople should also be aware of data security and user privacy issues when it comes to choosing modules for their projects that are dependent on computer devices or networks.

Setup and Connectivity

Another area that is a sore point for connected toys and novelties is bringing these devices on board for you to use. In a lot of cases, this is exacerbated through awkwardly-written instructions that can test one’s patience and not much knowledge about what is needed for the device to work fully.

The device packaging could use Wi-Fi, Bluetooth or other standard logos to indicate what kind of connectivity it needs to operate fully. This is to be highlighted with the “app store” logos for various operating-system app stores if the device is dependent on companion apps for full functionality. Similarly, use of other official platform logos can be used to identify compatibility with platforms like smart-TVs or voice-driven home-assistants.

Simple-yet-secure setup and onboarding procedures are to be paramount in the design of these devices. For Bluetooth-based devices, they should use “simple-pairing” such as pressing a button on the device to make them discoverable. This is even made easier with a trend towards “out-of-the-box” discoverability if the device isn’t paired with any host. Then the user activates their host device in “Bluetooth Scan” mode to discover the device,  subsequently with them selecting the device through its presentation name.

Windows, Android and iOS are even implementing simplified device-discovery routines for Bluetooth devices, with the ability to lead users to visit the app store to install complementary software. This will make things easier for users to get the toy or novelty up and running.

Wi-Fi-based devices would have to use WPS-PBC push-button setup, Wi-Fi Easy Connect, or other simplified setup processes for integration with the home network. It also applies to other network connection standards where you have to enrol the device on to that network.

Smart-home devices that implement Zigbee, Z-Wave and similar standards also have to implement simplified discovery protocols implemented in these standards to bring them on-board.

In relationship to security, I underscored the need for use of device-class standards as much as possible. But it also applies to connectivity and useability where a device that honours device-class standards is also easier to use because you are operating it the same for its peers.

Conclusion

This year will become a time where security and useability will be of critical importance when toys, novelties and other similar goods that connect to the home network and the Internet are designed and sold to consumers. Here, these issues may avoid these kind of toys ending up in disuse due to security or setup issues.

Your local library now facilitates a video-on-demand service

Article

Kanopy independent cinema page

Kanopy works with your local library to offer independent video content to stream

The Totally Free Streaming Service You Didn’t Know You Have | Gizmodo

From the horse’s mouth

Kanopy

Home Page

My Comments

I am keeping an eye out for video-on-demand services that are offering niche content like foreign-language content. This is in response to recent market consolidation in the video-on-demand market and is able to easily survive that kind of activity in the mainstream sector.

A part of the home-video era was the fact that your local library stocked video movies and made them available for loan to its members. In most cases, this was from a government-funded or private film repository that primarily offered educational content along with some locally-produced classic and historic film content. Subsequently, these libraries offered some family-friendly and niche content from the main video distributors whom they had a lending agreement with.

This has fallen away thanks to the rise of video-on-demand services that work via the Internet. But an Australian startup began to partner with various film studios, especially those out of the current mainstream, to offer a video-on-demand service that works in tandem with the local libraries and universities. Examples of this include some classic films as well as a plethora of indie material released over the years, typically material that would have been offered by some of the video distributors during home video’s early years or syndicated by TV stations when they had the ability to choose what they could ran with.

The Gizmodo article called this service out due to the loss of the Filmstruck video-on-demand service which focused on classic cinema, typically material from the Criterion collection. They were lamenting the reduced availability of evergreen video content available to see on cable TV or stream via a video-on-demand service.

You have to be a student or faculty at one of the participant universities or be a member of one of the participating local libraries. As well, in the case of library memberships, you have to make sure your membership is current and correct before you create your account or add them to your account. That includes things like overdue fines and other obligations and you may have to check if that dusty library card has expired or not, including whether it needs to be “brought forward” to their current IT setup. It does support multiple library memberships such as students at a university using a local library card or people living on the border of two different municipalities.

Kanopy works on regular computers with your Web browser but has native clients for the iOS and Android platforms. As far as smart-TV and set-top applications are concerned, they also have native clients for the Android TV, Apple TV (tvOS) and Roku platforms including the Telstra TV repackaged Roku client.  This can be improved upon through the support for Netflix-style “download to view” to allow offline viewing of content during the loan period. Here, it would come in handy with long roadtrips or flights where you don’t have reliable access to the Internet for streaming.

At the moment, Kanopy works on the same principle as the “public lending rights” that libraries pay to authors and publishers for the right to lend out the content. Typically a participating library will pay Kanopy to allow its members to view a certain number of titles per month and this will be paid to the film studios to “lend out” the content.

Kanopy could go further by approaching the public-service broadcasters around the world like the ABC, BBC and SBS to offer their homegrown content catalogues to library members through this platform.  Typically these broadcasters have built up a large amount of content that they have commissioned through the years and most of this content would fit in with Kanopy’s remit. It is already happening with the ABC and some of their shows but can easily go further. Companies and other organisations who create their own educational and training content could offer this to the Kanopy platform for public viewership.

Similarly, Kanopy could approach other organisations to expose their service to their membership. One group would be the primary and secondary schools who would use some of this material as part of their curriculum. Similarly, they could “knock on the door” of more independent studios and quality film distributors to make your local library a viable alternative to what Hollywood puts out. As well, the travel industry could benefit from having access to the Kanopy platform for in-flight or in-room entertainment that is enriching and thought-provoking.

What at least is happening is that Kanopy is bringing the concept of the videos or DVDs made available for loan through the public library systems into the 21st century thanks to online streaming via your home network.

Being cautious about fake news and misinformation in Australia

Previous Coverage

Australian House of Representatives ballot box - press picture courtesy of Australian Electoral Commission

Are you sure you are casting your vote or able to cast your vote without undue influence?

Being aware of fake news in the UK

Fact-checking now part of the online media-aggregation function

Useful Australian-based resources

ABC Fact Check – ran in conjunction with RMIT University

Political Parties

Australian Labor Party (VIC, NSW)

Liberal Party – work as a coalition with National Party (VIC, NSW)

National Party – work as a coalition with Liberal Party (VIC, NSW)

Australian Greens – state branches link from main page

One Nation (Pauline Hanson)

Katter’s Australia Party

Derryn Hinch’s Justice Party

Australian Conservatives

Liberal Democratic Party

United Australia Party

My Comments

Over the next six months, Australia will see some very critical general elections come to pass both on a federal level and in the two most-highly-populated states that host most of that country’s economic and political activity. On October 30 2018, the election writs were recently served in the state of Victoria for its general election to take place on November 24 2018. Then, on the 23 March 2019, New South Wales will expect to go to the polls for its general election. Then the whole country will expect to go to the polls for the federal general election by 18 May 2019.

As these election cycles take place over a relatively short space of time and affecting , there is a high risk that Australians could fall victim to misinformation campaigns. This can subsequently lead to state and federal ballots being cast that steer the country against the grain like what happened in 2016 with the USA voting in Donald Trump as their President and the UK voting to leave the European Union.

Google News - desktop Web view

Look for tags within Google News that describe the context of the story

The issue of fake news and misinformation is being seen as increasingly relevant as we switch away from traditional media towards social media and our smartphones, tablets and computers for our daily news consumption.  This is thanks to the use of online search and news-aggregation services like Google News; or social media like Facebook or Twitter which can be seen by most of us as an “at-a-glance” view of the news.

As well, a significant number of well-known newsrooms are becoming smaller due to the reduced circulation and ratings for their newspaper or radio / TV broadcast thanks to the use of online resources for our news. It can subsequently lead to poor-quality news reporting and presentation with a calibre equivalent to the hourly news bulletin offered by a music-focused radio station. It also leads to various mastheads plagiarising content from other newsrooms that place more value on their reporting.

The availability of low-cost or free no-questions-asked Web and video hosting along with easy-to-use Web-authoring, desktop-publishing and desktop-video platforms make it feasible for most people to create a Web site or online video channel. It has led to an increased number of Websites and video channels that yield propaganda and information that is dressed up as news but with questionable accuracy.

Another factor that has recently been raised in the context of fake news, misinformation and propaganda is the creation and use of deepfake image and audio-visual content. This is where still images, audio or video clips that are in the digital domain are altered to show a falsehood using artificial-intelligence technology in order to convince viewers that they are dealing with original audio-visual resource. The audio content can be made to mimic an actual speaker’s voice and intonation as part of creating a deepfake soundbite or video clip.

It then becomes easy to place fake news, propaganda and misinformation onto easily-accessible Web hosts including YouTube in the case of videos. Then this content would be propagated around the Internet through the likes of Twitter, Facebook or online bulletin boards. It is more so if this content supports our beliefs and enhances the so-called “filter bubble” associated with our beliefs and media use.

There is also the fact that newsrooms without the resources to rigorously scrutinise incoming news could pick this kind of content up and publish or broadcast this content. This can also be magnified with media that engages in tabloid journalism that depends on sensationalism to get the readership or keep listeners and viewers from switching away.

The borderless nature of the Internet makes it easy to set up presence in one jurisdiction to target the citizens of another jurisdiction in a manner to avoid being caught by that jurisdiction’s election-oversight, broadcast-standards or advertising-standards authority. Along with that, a significant number of jurisdictions focus their political-advertising regulation towards the traditional media platforms even though we are making more use of online platforms.

Recently, the Australian Electoral Commission along with the Department of Home Affairs, Australian Federal Police and ASIO have taken action on an Electoral Integrity Assurance Task Force. It was in advance of recent federal byelections such as the Super Saturday byelections, where there was the risk of clandestine foreign interference taking place that could affect the integrity of those polls.

But the issue I am drawing attention to here is the use of social media or other online resources to run fake-news campaigns to sway the populace’s opinion for or against certain politicians. This is exacerbated by the use of under-resourced newsrooms that could get such material seen as credible in the public’s eyes.

But most of Silicon Valley’s online platforms are taking various steps to counter fake news, propaganda and disinformation using these following steps.

Firstly, they are turning off the money-supply tap by keeping their online advertising networks away from sites or apps that spread misinformation.

They also are engaging with various fact-check organisations to identify fake news that is doing the rounds and tuning their search and trending-articles algorithms to bury this kind of content.

Autocomplete list in Google Search Web user interface

Google users can report Autocomplete suggestions that they come across in their search-engine experience/

They are also maintaining a feedback loop with their end-users by allowing them to report fake-news entries in their home page or default view. This includes search results or autocomplete entries in Google’s search-engine user interface. This is facilitated through a “report this” option that is part of the service’s user interface or help pages.

Most of the social networks and online-advertising services are also implementing robust user-account-management and system-security protocols. This includes eliminating or suspending accounts that are used for misinformation. It also includes checking the authenticity of accounts running pages or advertising campaigns that are politically-targeted through methods like street-address verification.

In the case of political content, social networks and online-advertising networks are implementing easily-accessible archives of all political advertising or material that is being published including where the material is being targeted at.

ABC FactCheck – the ABC’s fact-checking resource that is part of their newsroom

Initially these efforts are taking place within the USA but Silicon Valley is rolling them out across the world at varying timeframes and with local adaptations.

Personally, I would still like to see a strong dialogue between the various Social Web, search, online-advertising and other online platforms; and the various government and non-government entities overseeing election and campaign integrity and allied issues. This can be about oversight and standards regarding political communications in the online space along with data security for each stakeholder.

What can you do?

Look for any information that qualifies the kind of story if you are viewing a collection of headlines like a search or news-aggregation site or app. Here you pay attention to tags or other metadata like “satire”, “fact checking” or “news” that describe the context of the story or other attributes.

Most search engines and news-aggregation Websites will show up this information in their desktop or mobile user interface and are being engineered to show a richer set of details. You may find that you have to do something extra like click a “more” icon or dwell on the heading to bring up this extra detail on some user interfaces.

Trust your gut reaction to that claim being shared around social media. You may realise that a claim associated with fake news may be out of touch with reality. Sensationalised or lurid headlines are a usual giveaway, along with missing information or copy that whips up immediate emotional responses from the reader.

Check the host Website or use a search engine like Google to see if the news sources you trust do cover that story. You may come across one or more tools that identify questionable news easily, typically in the form of a plug-in or extension that works with your browser if its functionality can be expanded with these kind of add-ons. It is something that is more established with browsers that run on regular Windows, Mac or Linux computers.

It is also a good idea to check for official press releases or similar material offered “from the horse’s mouth” by the candidates, political parties, government departments or similar organisations themselves. In some cases during elections, some of the candidates may run their own Web sites or they may run a Website that links from the political party’s Website. Here, you will find them on the Websites ran by these organisations and may indicate if you are dealing with a “beat-up” or exaggeration of the facts.

As you do your online research in to a topic, make sure that you are familiar with how the URLs are represented on your browser’s address bar for the various online resources that you visit. Here, be careful if a resource has more than is expected between the “.com”, “.gov.au” or similar domain-name ending and the first “/” leading to the actual online resource.

Kogan Internet table radio

Sometimes the good ol’ radio can be the trusted news source

You may have to rely on getting your news from one or more trusted sources. This would include the online presence offered by these sources. Or it may be about switching on the radio or telly for the news or visiting your local newsagent to get the latest newspaper.

Examples of these are: the ABC (Radio National, Local radio, News Radio, the main TV channel and News 24 TV channel), SBS TV, or the Fairfax newspapers. Some of the music radio stations that are part of a family run by a talk-radio network like the ABC with their ABC Classic FM or Triple J services will have their hourly newscast with news from that network. But be careful when dealing with tabloid journalism or commercial talkback radio because you may be exposed to unnecessary exaggeration or distortion of facts.

As well, use the social-network platform’s or search engine’s reporting functionality to draw attention to fake news, propaganda or misinformation that is being shared or highlighted on that online service. In some cases like reporting inappropriate autocomplete predictions to Google, you may have to use the platform’s help options to hunt for the necessary resources.

Here, as we Australians faces a run of general-election cycles that can be very tantalising for clandestine foreign interference, we have to be on our guard regarding fake news, propaganda and misinformation that could affect the polls.

Could a NAS be relevant to console gaming?

QNAP 2-disk NAS

Could a NAS like this QNAP 2-disk NAS – be used as storage for a games console?

The games console that connects to your TV is still relevant to video gaming, especially where the idea is to be able to lean back during gameplay or have a dedicated games machine to use in the living room or recreation room.

The key trends affecting video gaming

Video gaming is becoming a data-thirsty activity where there is emphasis on having a large amount of data being available to the players as they continue to play these games.

Download rather than packaged media

But there are key directions that are affecting video and computer games, especially those targeted towards games consoles. Primarily, they are being made available to download from online storefronts rather than being sold as packaged media or the packaged media is sold as a “get-you-going” option.

A continual supply of extra content available for download

Game players for all game classes are being able to benefit from free or premium downloadable content that is being continually authored by the game studios. This continued availability of extra content is providing for continued playability beyond the first rounds or sessions of the game. In some cases, some studios are even providing time-limited bonus missions or seasonal content in order to keep the players interested.

It extends to most of the games studios working on a high-quality-control regime which includes the supply of frequent updates for each of these games.

Games needing extra data as they go

Sony PS4

Games consoles like the Sony PS4 will need to benefit from extra storage offered by a NAS

More games are requiring extra data as you keep playing them. Typically with games of the “open-world” kind, some strategy games or adventure / role-playing games, this is about loading extra scenery, missions or other data that facilitates further game play. In some cases, you completing a mission in a game brings down extra data.

The best example of this would be Forza Horizon 4 which is set in the UK. Here, players complete race challenges to buy individual cars, or they could buy a property to gain access to further challenges and further vehicles. In some cases, they may have access to so-called “barn-find” cars that are discovered when they visit particular buildings and they have to restore these vehicles so that they can be used as competition vehicles. The game even adds seasonality with particular

USB portable hard disk

These portable USB hard disks are seen as a way to expand storage capacity on a games console

vehicles, areas and challenges available during particular seasons.

What is being done to answer the problem

USB hard disks or aftermarket hard-disk upsizing

But most setups are requiring the connection of USB hard disks to these consoles as a way to offload extra game data from the console’s hard disk. Or third-party repair shops simply upsize games consoles with newer larger-capacity hard disks and solid-state drives to improve performance or create extra storage space.

A problem that will easily surface with USB hard disks or aftermarket hard-disk upsize installations is the maximum capacity that a games console’s firmware can address for any mass-storage device that the console can handle. In the case of USB hard disks, there will be an expectation that these disks are a single logical volume, something that is common with consumer-electronics and similar devices that use USB mass-storage.

What could be done here

Use of network-attached-storage devices

But games-console manufacturers could look towards using network-attached storage devices as another way of storing extra game data. Here, the NAS system could be about “parking” games data if a game isn’t being played including data for missions and levels yet to be played, to share common data across games machines on the same network for multiple-player multiple-machine gameplay.

It could be feasible to share common data between a regular computer and a games console if the data is the same format for both devices. This would appeal to platforms like the XBox One where there is a strong effort to maintain a common codebase and common data between regular computers and games consoles to avoid duplication of effort in a game’s lifecycle. It is important where the goal is to port a game to as many platforms as possible.

Here, this may be about keeping player-specific data like gameplay-specific data or common data like game assets relating to a specific game. But some game assets such as games or premium downloadable content may be particular to a player or console as a way of binding it to a player who had bought the game or DLC or won the bonus content.

The advantage that a NAS can offer is that the NAS simply defines the maximum storage capacity available to the client device such as through an account-specific quota or a maximum volume offered by that device.

The main problem associated with games consoles and NAS units

Onboarding games consoles to NAS units

Integrating a NAS device may be about a difficult path with the use of the SMB data-sharing protocol being supported in these consoles. It will then require users to supply share names and username / password credentials to their consoles to make use of these network shares. In some cases, the player may have to create a player-private user account on the NAS for player-specific data.

An easier path that the games-console industry and NAS vendors could work towards is a simplified provisioning and device-discovery setup protocol. This could allow for the creation and allocation of player-specific and common data space on a NAS device for storing game data over the network.  Such a protocol could be based on the UPnP AV / DLNA protocols for device and content discovery. As well, it could be facilitated on existing equipment through firmware updates or add-on apps for both the NAS and the games consoles.

Other uses

Of course, there is the issue of being able to draw upon one’s own multimedia content library which would be hosted on at least one DLNA-compliant NAS. This could come in to its own with, for example, open-world car-racing games where you can equip your in-game car with a “virtual car radio” that plays audio content from different online or network content sources.

Another direction that may be looked at with higher-performance NAS units of the QNAP or Synology ilk would be to run them as games servers for LAN-based multiplayer multi-machine gaming. The idea may be about a purely local game that is independent of an Internet-hosted online service or it could simply be about creating localised competition elements in addition to the Internet-hosted online competition elements.

Conclusion

A network-attached-storage device can be considered a relevant device for console-based video gaming as an approach towards offloading or backing up video-game data. It can also be used as an approach for sharing common game data amongst multiple consoles or other devices that are playing the same game.