tag:blogger.com,1999:blog-45032929495327606182025-03-01T06:59:19.534-08:00DSHR's BlogI'm David Rosenthal, and this is a place to discuss the work I'm doing in Digital Preservation.David.http://www.blogger.com/profile/14498131502038331594[email protected]Blogger968125tag:blogger.com,1999:blog-4503292949532760618.post-37816588093257658522025-02-27T08:00:00.000-08:002025-02-27T08:00:00.120-08:00Software Liability: US vs. EUI have written before about the double-edged sword of software vendors' ability to disclaim liability for the performance of their products. Six years ago I wrote <a href="https://blog.dshr.org/2018/08/the-internet-of-torts.html"><i>The Internet of Torts</i></a> about software embedded in the physical objects of the Internet of Things. Four years ago I wrote about
<a href="https://blog.dshr.org/2020/09/liability-in-software-supply-chain.html"><i>Liability In The Software Supply Chain</i></a>.<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWIPBPpKs3fAUCjoaPvDBt-HOye-6up-u2d9ZpUFDornz8sGieYfnARgRnA0eu0y4cSD2o32e8RgZtQM7FpqaAjSN3I-K_QseEdwH3dn35_VgA3kCMCRlt3gqX3DwzzI_i_OVfKnZpxpJZJv8bgAXzZxa2__1f0PrLUJT7qASQ6Vrya-ZmeSP5HTUP45DT/s512/HandGrenade.jpg" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="293" data-original-width="512" height="114" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWIPBPpKs3fAUCjoaPvDBt-HOye-6up-u2d9ZpUFDornz8sGieYfnARgRnA0eu0y4cSD2o32e8RgZtQM7FpqaAjSN3I-K_QseEdwH3dn35_VgA3kCMCRlt3gqX3DwzzI_i_OVfKnZpxpJZJv8bgAXzZxa2__1f0PrLUJT7qASQ6Vrya-ZmeSP5HTUP45DT/w200-h114/HandGrenade.jpg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.lawfaremedia.org/article/the-eu-throws-a-hand-grenade-on-software-liability">Source</a></td></tr></tbody></table>
Last October, Tom Uren wrote <a href="https://www.lawfaremedia.org/article/the-eu-throws-a-hand-grenade-on-software-liability"><i>The EU Throws a Hand Grenade on Software Liability</i></a>:<br />
<blockquote>
The EU and U.S. are taking very different approaches to the introduction of liability for software products. While the U.S. kicks the can down the road, the EU is rolling a hand grenade down it to see what happens.
</blockquote>
It is past time to catch up on this issue, so follow me below the fold.<br />
<span><a name='more'></a></span>
<br />
<h2>USA</h2>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHcnAa0mSV3DTYj5FvERTFUTCNPeecQgYwrY8QdPKCRHnZg-C2okZmMEGyxVZTm_DSUzbHj1mjlijXgMUsn6QgwR6Z5hBgPBxjPTPaiA5omoVUI_R1DPKCcl5dz8ZO3SNx0c4mcKM7IxrvphINHNk5aSheGKwUxAi8kBCubDFz9YDSSR0HERo_wUm0pOTG/s2298/SolariumCommission.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="566" data-original-width="2298" height="49" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHcnAa0mSV3DTYj5FvERTFUTCNPeecQgYwrY8QdPKCRHnZg-C2okZmMEGyxVZTm_DSUzbHj1mjlijXgMUsn6QgwR6Z5hBgPBxjPTPaiA5omoVUI_R1DPKCcl5dz8ZO3SNx0c4mcKM7IxrvphINHNk5aSheGKwUxAi8kBCubDFz9YDSSR0HERo_wUm0pOTG/w200-h49/SolariumCommission.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.solarium.gov/">Source</a></td></tr></tbody></table>
In March 2020 the <a href="https://www.solarium.gov/">Cyberspace Solarium Commission</a>, a "bipartisan team of lawmakers and outside experts", launched their <a href="https://www.fdd.org/wp-content/uploads/2020/03/CSC-Final-Report.pdf">report</a>. Among its 82 recommendations were several related to liability:<br />
<ul>
<li>3.3.2: Clarify Liability for Federally Directed Mitigation, Response and Recovery Efforts</li>
<li>4.2 Congress should pass a law establishing that final goods assemblers of software, hardware, and firmware are liable for damages from incidents that exploit known and unpatched vulnerabilities</li>
<li>4.3 Congress should establish a Bureau of Cyber Statistics charged with collecting and providing statistical data on cybersecurity and the cyber ecosystem to inform policymaking and government programs</li>
</ul>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKZGTJz2mu4ZMLC8M2Gwh9yz4o8txgFk1Icpm0JloTHy4tcu5Fok6ispvVMdJjnbdY8u-E3YKARBn3vDkD7ONy36lG7RkOjBeol-f39SwR-tdI8CsIXbp5qG62549RIhpZCBAPokcXvE4_lqTbnzSXrCFt_EQmElvPRv8DtoPSx0U3w-GO4cXqmPzWLGuX/s1316/NationalCybersecurityStrategy.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="1316" data-original-width="1006" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKZGTJz2mu4ZMLC8M2Gwh9yz4o8txgFk1Icpm0JloTHy4tcu5Fok6ispvVMdJjnbdY8u-E3YKARBn3vDkD7ONy36lG7RkOjBeol-f39SwR-tdI8CsIXbp5qG62549RIhpZCBAPokcXvE4_lqTbnzSXrCFt_EQmElvPRv8DtoPSx0U3w-GO4cXqmPzWLGuX/w153-h200/NationalCybersecurityStrategy.png" width="153" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://web.archive.org/web/20230303001605/https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf">Source</a></td></tr></tbody></table>
In March 2023 the Biden administration announced their <a href="https://web.archive.org/web/20230303001605/https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf"><i>National Cybersecurity Strategy</i></a>. As regards liability, it stated:<br />
<blockquote>
Markets impose inadequate costs on — and often reward — those entities that introduce vulnerable products or services into our digital ecosystem. Too many vendors ignore best practices for secure development, ship products with insecure default configurations or known vulnerabilities, and integrate third-party software of unvetted or unknown provenance. Software makers are able to leverage their market position to fully disclaim liability by contract, further reducing their incentive to follow secure-by-design principles or perform pre-release testing. Poor software security greatly increases systemic risk across the digital ecosystem and leave[s] American citizens bearing the ultimate cost.
</blockquote>
What did the administration <a href="https://web.archive.org/web/20230303001605/https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf">propose to do about this</a>?:<br />
<blockquote>
The Administration will work with Congress and the private sector to develop legislation establishing liability for software products and services. Any such legislation should prevent manufacturers and software publishers with market power from fully disclaiming liability by contract, and establish higher standards of care for software in specific high-risk scenarios. To begin to shape standards of care for secure software development, the Administration will drive the development of an adaptable safe harbor framework to shield from liability companies that securely develop and maintain their software products and services. This safe harbor will draw from current best practices for secure software development, such as the NIST Secure Software Development Framework. It also must evolve over time, incorporating new tools for secure software development, software transparency, and vulnerability discovery.
</blockquote>
In October 2024 Eric Geller looked at what happened to the Cyberspace Solarium Commission's recommendations in <a href="https://therecord.media/cybersecurity-software-liability-standards-white-house-struggle"><i>The struggle for software liability: Inside a ‘very, very, very hard problem’</i></a>:<br />
<blockquote>
Six years after Congress tasked a group of cybersecurity experts with reimagining America’s approach to digital security, virtually all of that group’s proposals have been implemented. But there’s one glaring exception that has especially bedeviled policymakers and advocates: a proposal to make software companies legally liable for major failures caused by flawed code.
</blockquote>
It wasn't like the Commission invented the <a href="https://therecord.media/cybersecurity-software-liability-standards-white-house-struggle">liability problem</a>:<br />
<blockquote>
<a href="https://dl.acm.org/doi/10.1145/800176.809980">Since the 1980s</a>, legal scholars have discussed how liability should apply to flawed software. The fact that there still isn’t a consensus about the right approach underscores how complicated the issue is.<br />
<br />
One of the biggest hurdles is establishing a “standard of care,” a minimum security threshold that companies could meet to avoid lawsuits. There’s disagreement about “how to define a reasonably secure software product,” Dempsey said, and technology evolves so quickly that it might not be wise to codify one specific standard.<br />
<br />
Various solutions have been proposed, including letting juries decide if software is safe enough — like they do with other products — and letting companies qualify for “safe harbor” from lawsuits through existing programs like <a href="https://www.cisa.gov/secure-software-attestation-form">a government attestation process</a>.<br />
<br />
<a href="https://www.solarium.gov/report">The Solarium Commission proposed</a> safe harbor for companies that patch known vulnerabilities. But that would only address part of the problem.
</blockquote>
Even a very weak "duty of care" would be a big improvement. It would, for example, outlaw hard-wired passwords, require 2-factor authentication with FIDO or passkeys <a href="https://tech.slashdot.org/story/25/02/24/1442246/google-to-eliminate-sms-authentication-in-gmail-implement-qr-codes">not SMS</a>, require mailers to display the actual target of links, and so on.<br />
<br />
The industry pushback has been <a href="https://therecord.media/cybersecurity-software-liability-standards-white-house-struggle">ferocious</a>:<br />
<blockquote>
One of the industry’s chief arguments is that liability would distract companies from improving security and overburden them with compliance costs. “The more companies are spending their time on thinking about liability, the less they might be spending their time on higher-value activities,” said Henry Young, senior director of policy at the software trade group BSA.
</blockquote>
The problem is that the "higher-value activities" typically result in <i>adding</i> vulnerabilites to their products. I doubt that management at victim companies like <a href="https://blog.dshr.org/2017/10/not-whether-but-when.html">Equifax</a> or <a href="https://www.nytimes.com/2021/01/02/us/politics/russian-hacking-government.html">SolarWinds</a>' customers would think that adding flashy new features was "higher-value" than fixing vulnerabilities.<br />
<br />
You can't say the industry's flacks <a href="https://therecord.media/cybersecurity-software-liability-standards-white-house-struggle">aren't creative</a>:<br />
<blockquote>
Liability opponents say insecure software isn’t the biggest cybersecurity problem, pointing to widespread and devastating phishing attacks.
</blockquote>
Riiiiight! Phishing is a force of nature, not a tactic enabled by the industry's insecure products.<br />
<br />
Some of the industry's arguments are <a href="https://therecord.media/cybersecurity-software-liability-standards-white-house-struggle">laughable</a>:<br />
<blockquote>
They argue that even if policymakers want to focus on software security, there are better ways to prod vendors forward, such as encouraging corporate-board oversight.
</blockquote>
Board members are insulated from liability by D&O insurance, so "encouraging" them will have precisely zero effect.<br />
<br />
But this is my <a href="https://therecord.media/cybersecurity-software-liability-standards-white-house-struggle">favorite</a>:<br />
<blockquote>
And they warn that focusing on liability will distract the government from pursuing better policies with its limited resources.
</blockquote>
Exactly what are the "better policies" they desire? To be left alone to ship more buggy products.<br />
<br />
The industry whines that they wouldbe treated differently from others, conveniently ignoring that the others can't <a href="https://therecord.media/cybersecurity-software-liability-standards-white-house-struggle">disclaim liability</a>:<br />
<blockquote>
Critics also contend that it’s unfair to punish companies for digital flaws that are deliberately exploited by malicious actors, a scenario that’s rare in most industries with liability, such as food and automobiles.
</blockquote>
In 2023 nearly <a href="https://en.wikipedia.org/wiki/Motor_vehicle_fatality_rate_in_U.S._by_year">41,000</a> people were killed by automobiles in the US. Many, probably most of those deaths were caused by "malicious actors" exploiting flaws such as cars that know what the speed limit is but don't enforce it, or could but don't detect that the driver is drunk or sleepy. Liability hasn't caused the auto industry to get real about safety. Instead we have <a href="XXX">Fake Self-Driving</a> killing people.
<a href="https://usafacts.org/articles/how-many-people-get-sick-from-foodborne-illnesses/">And</a>:<br />
<blockquote>
Up to 48 million people get sick from a foodborne illness every year, and up to 3,000 are estimated to die from them.
</blockquote>
Finally, the industry claims that <a href="https://therecord.media/cybersecurity-software-liability-standards-white-house-struggle">everything in just fine</a>:<br />
<blockquote>
Industry leaders say liability is unnecessary because there’s already a working alternative: the marketplace, where businesses are accountable to their customers and invest in security to avoid financial and reputational punishment. As for contracts disclaiming liability, the industry says customers can negotiate security expectations with their vendors.<br />
<br />
“We're open to conversations about any way to improve software security,” Young said. “Our customers care about it, and we want to deliver for them.”
</blockquote>
Have you tried to "negotiate security expectations" with Microsoft, or have a conversation with Oracle about a "way to improve software security"? How did it go? I guess it <a href="https://therecord.media/cybersecurity-software-liability-standards-white-house-struggle">didn't go well</a>:<br />
<blockquote>
“Just telling organizations that not fixing security bugs will impact their business is not enough of an incentive,” a group of tech experts warned the Cybersecurity and Infrastructure Security Agency in <a href="https://s3.documentcloud.org/documents/25219051/cisa-cybersecurity-advisory-committee_draft-recommendations_20241011.pdf#page=5">a report</a> approved this month.<br />
<br />
Experts also rejected the idea that most customers could negotiate liability into their contracts. Few companies have leverage in negotiations with software giants, and few customers know enough about software security to make any demands of their vendors.
</blockquote>
Despite its laughable nature, the industry's pushback ensured that nothing happened <a href="https://therecord.media/cybersecurity-software-liability-standards-white-house-struggle">until it was too late</a>:<br />
<blockquote>
Senior administration officials haven’t lived up to their lofty rhetoric about shifting the burden of cybersecurity from customers to suppliers, Herr said. “There is an attitude in this White House of a willingness to defer to industry in operational questions in a lot of cases.”
</blockquote>
In the end it may come down to judges to determine whether the disclaimers of liability are effective, and there may be a siight ray of hope. Last December Sean Lyngaas reported that <a href="https://www.cnn.com/2024/12/20/tech/whatsapp-nso-group-pegasus/index.html"><i>Judge rules Israeli firm NSO Group liable for damages in WhatsApp hacking case</i></a>:<br />
<blockquote>
Messaging service WhatsApp claimed a major legal victory over Israeli spyware firm NSO Group on Friday after a federal judge ruled that NSO was liable under federal and California law for a 2019 hacking spree that breached over 1,000 WhatsApp users.<br />
<br />
It’s a rare legal win for activists who have sought to rein in companies that make powerful spyware, or software capable of surveilling calls and texts, that has reportedly been used on journalists, human rights advocates and political dissidents worldwide.
</blockquote>
So in the US the disclaimers of liability in the end user license agreement are, and will presumably continue to be, valid unless your product is intended to commit crimes such as violations of the <a href="https://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act">Computer Fraud and Abuse Act</a>. The bar for a victim to prove liability is impossibly high.<br />
<br />
Color me skeptical, but Jim Dempsey writes in <a href="https://www.lawfaremedia.org/article/the-maga-case-for-software-liability"><i>The MAGA Case for Software Liability</i></a>:<br />
<blockquote>
Under the current administration, the instinctive inclination of post-Reagan Republicans to rely only on market forces to hold businesses responsible for the consequences of their actions would seem to preclude the use of government policy to improve the security of software vital to business and government operations. Indeed, the Trump team has promised <a href="https://www.wsj.com/opinion/musk-and-ramaswamy-the-doge-plan-to-reform-government-supreme-court-guidance-end-executive-power-grab-fa51c020">wholesale repudiation</a> of regulations adopted in the past four years, so new limits on industry would seem especially unlikely.<br />
<br />
There are, however, good reasons why the new administration should not default to repealing the cybersecurity actions of the past four years and passively accepting severe cyber vulnerabilities in critical infrastructure. In fact, as I explained in a series last year on initiatives <a href="https://www.lawfaremedia.org/article/stitching-together-the-cybersecurity-patchwork-quilt--infrastructure">aimed at infrastructure</a> and <a href="https://www.lawfaremedia.org/article/stitching-together-the-cybersecurity-patchwork-quilt--data">data</a>, much of the Biden administration’s cybersecurity agenda was built on projects launched by President Trump in his first term. The Trump administration would do well to remember the underlying principles that spurred it to initiate these actions the first time around.
</blockquote>
<h2>EU</h2>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5vi69pi4b9NxWM0wBIniTun0pJ1YAYEN5tDmtiMNEnEcxLLn_XiKXigBHb9TSfR8knmpnmdKGQQij-XXaDjp4UmQHIgYLcwlRQ_Sd9DIyWblgCwGwprPuNhyup1ogfS23nzLINjP3a6rK8TClqQz6UUZR0Yu2IxoS7-BTJcSJlqJWvzpyo6FZ2C42gii4/s1434/BenceTuzson.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="456" data-original-width="1434" height="64" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5vi69pi4b9NxWM0wBIniTun0pJ1YAYEN5tDmtiMNEnEcxLLn_XiKXigBHb9TSfR8knmpnmdKGQQij-XXaDjp4UmQHIgYLcwlRQ_Sd9DIyWblgCwGwprPuNhyup1ogfS23nzLINjP3a6rK8TClqQz6UUZR0Yu2IxoS7-BTJcSJlqJWvzpyo6FZ2C42gii4/w200-h64/BenceTuzson.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.consilium.europa.eu/en/press/press-releases/2024/10/10/eu-brings-product-liability-rules-in-line-with-digital-age-and-circular-economy/">Source</a></td></tr></tbody></table>
The EU seems to be taking an opposite approach. Tom Uren <a href="https://www.lawfaremedia.org/article/the-eu-throws-a-hand-grenade-on-software-liability">wrote</a>:<br />
<blockquote>
Earlier this month, the EU Council <a href="https://www.consilium.europa.eu/en/press/press-releases/2024/10/10/eu-brings-product-liability-rules-in-line-with-digital-age-and-circular-economy/">issued a directive</a> updating the EU’s product liability law to treat software in the same way as any other product. <a href="https://single-market-economy.ec.europa.eu/single-market/goods/free-movement-sectors/liability-defective-products_en">Under this law</a>, consumers can claim compensation for damages caused by defective products without having to prove the vendor was negligent or irresponsible. In addition to personal injury or property damages, for software products, damages may be awarded for the loss or destruction of data.
</blockquote>
In the EU companies are presumed to be liable for a defective product unless they can qualify for a "<a href="https://www.lawfaremedia.org/article/the-eu-throws-a-hand-grenade-on-software-liability">safe harbor</a>":<br />
<blockquote>
Rather than define a minimum software development standard, the directive sets what we regard as the highest possible bar. Software makers can avoid liability if they prove a defect was not discoverable given the “objective state of scientific and technical knowledge” at the time the product was put on the market.
</blockquote>
The directive is based on <a href="https://single-market-economy.ec.europa.eu/single-market/goods/free-movement-sectors/liability-defective-products_en">2 main principles</a>:<br />
<blockquote>
<ul>
<li>the manufacturer has to compensate the damage caused by a defective product of theirs</li>
<li>the victim has to prove the product’s defectiveness, the damage that was caused and establish that this defectiveness was the cause of the damage</li>
</ul>
</blockquote>
And the <a href="https://www.consilium.europa.eu/en/press/press-releases/2024/10/10/eu-brings-product-liability-rules-in-line-with-digital-age-and-circular-economy/">products are defined thus</a>:<br />
<blockquote>
<ul>
<li>Digital economy: The new law extends the definition of “product” to digital manufacturing files and software. Also online platforms can be held liable for a defective product sold on their platform just like any other economic operators if they act like one.</li>
<li>Circular economy: When a product is repaired and upgraded outside the original manufacturer’s control, the company or person that modified the product should be held liable.</li>
</ul>
</blockquote>
Unlike the current and proposed US approaches, the EU's approach imposes victim-driven consequences for:<br />
<ul>
<li>Failure to use current software tools and development practices to prevent defects. Note that the directive gives victims the right to obtain evidence of this kind.</li>
<li>Failure to acknowledge and respond to defect reports from customers and third parties, because they were clearly discoverable via the "objective state of scientific and technical knowledge". But note the caveat "at the time the product was put on the market".</li>
<li>Failure to issue timely fixes for defects.</li>
</ul>
Uren <a href="https://www.lawfaremedia.org/article/the-eu-throws-a-hand-grenade-on-software-liability">concludes</a>:<br />
<blockquote>
Major software vendors used by the world’s most important enterprises and governments are publishing comically vulnerable code without fear of any blowback whatsoever. So yes, the status quo needs change. Whether it needs a hand grenade lobbed at it is an open question. We’ll have our answer soon.
</blockquote>
<h2>Open Source</h2>
Neither the US nor the EU approaches seem to take account of the fact that many of the "products" they propose to regulate are based upon open source code. An under-appreciated feature of the rise of IT has been the extraordinary productivity unleashed by the 1988 <a href="https://en.wikipedia.org/wiki/BSD_licenses">Berkeley Software Distribution license</a> and Richard Stallman's 1989 <a href="https://en.wikipedia.org/wiki/GNU_General_Public_License">GNU General Public License</a>. <a href="https://www.gnu.org/licenses/gpl-3.0.en.html">Version 3 of the Gnu Public License</a> Section 15 states:<br />
<blockquote>
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
</blockquote>
And Section 16 <a href="https://www.gnu.org/licenses/gpl-3.0.en.html">states</a>:<br />
<blockquote>
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
</blockquote>
That these licenses disclaimed warranties and liabilities was the key to the open source revolution because it enabled <i>individuals</i>, rather than developers protected by their employer's lawyers, to contribute. Without the disclaimers individual developers would face unacceptable legal risk. On the other hand, open source is also a channel for malware. Shaurya Malwa reports on an example in <a href="https://www.coindesk.com/tech/2025/02/26/hackers-are-using-fake-github-code-to-steal-your-bitcoin-kaspersky"><i>Hackers Are Using Fake GitHub Code to Steal Your Bitcoin: Kaspersky</i></a>:<br />
<blockquote>
The report warned users of a “GitVenom” campaign that’s been active for at least two years but is steadily on the rise, involving planting malicious code in fake projects on the popular code repository platform.<br />
<br />
The attack starts with seemingly legitimate GitHub projects — like making Telegram bots for managing bitcoin wallets or tools for computer games.<br />
<br />
Each comes with a polished README file, often AI-generated, to build trust. But the code itself is a Trojan horse: For Python-based projects, attackers hide nefarious script after a bizarre string of 2,000 tabs, which decrypts and executes a malicious payload.<br />
<br />
For JavaScript, a rogue function is embedded in the main file, triggering the launch attack. Once activated, the malware pulls additional tools from a separate hacker-controlled GitHub repository.
</blockquote>
<br />
Balancing the need to stop vendors "publishing comically vulnerable code" with the need to nurture the open source ecosystem is a difficult problem.<br />
<br />
David.http://www.blogger.com/profile/14498131502038331594[email protected]1tag:blogger.com,1999:blog-4503292949532760618.post-91510907621990212222025-02-06T08:00:00.000-08:002025-02-06T08:00:00.117-08:00On Not Being Immutable<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgK5BRioU4dfjvRLcTC3PfNU4ELV8sWtDVv6DdDtaf734UY2n5Pid0uUy55mrx71LUqyCJ5FvJTj3j12XTx6xKkHW5Il7PT48xEZANDDhPcvvrH4_jb47QSgjFflCl3hJ9RkCX4J0DBB7cZ6hk1O2E9zXFotF3wV3Fx9FxFbiaxdStgfUoi4Z5YXTXV5jVw/s1281/EconomistCover.jpg" imageanchor="1" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="1281" data-original-width="960" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgK5BRioU4dfjvRLcTC3PfNU4ELV8sWtDVv6DdDtaf734UY2n5Pid0uUy55mrx71LUqyCJ5FvJTj3j12XTx6xKkHW5Il7PT48xEZANDDhPcvvrH4_jb47QSgjFflCl3hJ9RkCX4J0DBB7cZ6hk1O2E9zXFotF3wV3Fx9FxFbiaxdStgfUoi4Z5YXTXV5jVw/w150-h200/EconomistCover.jpg" width="150" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.economist.com/weeklyedition/2025-02-01">Economist 2/1/25</a><br /></td></tr></tbody></table>
Regulation of cryptocurrencies was an issue in last November's US election. Molly White documented the immense sums the industry devoted to electing a <a href="https://www.citationneeded.news/issue-70/">crypto-friendly Congress</a>, and converting Trump's skepticism into enthusiasm. They had two goals, pumping the price and avoiding any regulation that would hamper them ripping off the suckers.<br />
<br />
Back in November of 2022 I added an entry to this blog's list of <a href="https://blog.dshr.org/2022/09/impossibilities.html"><i>Impossibilities</i></a> for <a href="https://datafinnovation.medium.com/the-compliance-innovation-trade-off-72b9f8026f56"><i>The Compliance-Innovation Trade-off</i></a> from the team at ChainArgos. It started:<br />
<blockquote>
<i>tl;dr: DeFi cannot be permissionless, allow arbitrary innovation and comply with any meaningful regulations. You can only choose two of those properties. If you accept a limited form of innovation you can have two-and-a-half of them.</i><br />
<br />
Fundamental results in logic and computer science impose a trade-off on any permissionless system’s ability to both permit innovation and achieve compliance with non-trivial regulations. This result depends only on long-settled concepts and the assumption a financial system must provide a logically consistent view of payments and balances to users.<br />
<br />
This is a semi-technical treatment, with more formal work proceeding elsewhere.
</blockquote>
Two years later, the "more formal work" has finally been published in a peer-reviewed Nature Publishing journal, <a href="https://www.nature.com/srep/"><i>Scientific Reports</i></a>, which claims to be the 5<sup>th</sup> most cited journal in the world. Jonathan Reiter tells me that, although the publishing process took two years, it did make the result better.<br />
<br />
Below the fold I discuss <a href="https://www.nature.com/articles/s41598-024-84612-9"><i>Tradeoffs in automated financial regulation of decentralized finance due to limits on mutable turing machines</i></a> by Ben Charoenwong, Robert M. Kirby & Jonathan Reiter.<br />
<span><a name='more'></a></span>
<br />
This team were pioneers in applying fundamental computer science theorems to blockchain-based systems, starting in April 2022 with <a href="https://datafinnovation.medium.com/the-consequences-of-scalable-blockchains-8c4d23c6af4d"><i>The Consequences of Scalable Blockchains</i></a> in which they showed that implementing an Ethereum-like system whose performance in all cases is guaranteed to be faster than any single node in the network is equivalent to solving the great unsolved problem in the theory of computation, nicknamed P vs. NP. And thus that if it were implemented, the same technique could break all current cryptography, including that underlying Ethereum.<br />
<br />
But, I believe, they were not the first. That appears to have been Tjaden Hess, River Keefer, and Emin Gün Sirer in <a href="https://hackingdistributed.com/2016/06/28/ethereum-soft-fork-dos-vector/"><i>Ethereum's DAO Wars Soft Fork is a Potential DoS Vector</i></a> (28<sup>th</sup> June 2016), which applied the "<a href="https://en.wikipedia.org/wiki/Halting_problem">halting problem</a>" to "smart contracts" when analyzing possible defenses against DOS attacks on a "soft fork" of Ethereum proposed in response to "The DAO".<br />
<br />
Charoenwong <i>et al</i>'s abstract <a href="https://doi.org/10.1038/s41598-024-84612-9">states</a>:<br />
<blockquote>
We examine which decentralized finance architectures enable meaningful regulation by combining financial and computational theory. We show via deduction that a decentralized and permissionless Turing-complete system cannot provably comply with regulations concerning anti-money laundering, know-your-client obligations, some securities restrictions and forms of exchange control. Any system that claims to follow regulations must choose either a form of permission or a less-than-Turing-complete update facility. Compliant decentralized systems can be constructed only by compromising on the richness of permissible changes. Regulatory authorities must accept new tradeoffs that limit their enforcement powers if they want to approve permissionless platforms formally. Our analysis demonstrates that the fundamental constraints of computation theory have direct implications for financial regulation. By mapping regulatory requirements onto computational models, we characterize which types of automated compliance are achievable and which are provably impossible. This framework allows us to move beyond traditional debates about regulatory effectiveness to establish concrete boundaries for automated enforcement.
</blockquote>
They summarize the fundamental problem for the automation of <a href="https://doi.org/10.1038/s41598-024-84612-9">DeFi regulation</a>:<br />
<blockquote>
DeFi features some computationally challenging properties: (1) Turing-complete programming, (2) permissionless access to both transact and publish code and (3) selectively immutable code. The permissionless mutability of the system combined with the Turing completeness motivates our inquiry. A system running Turing-complete code where updates can be published permissionlessly cannot make any guarantees about its future behavior, a conclusion from early work on Universal Turing Machines (UTM).
</blockquote>
Despite this, they show that if it is possible to enforce <a href="https://doi.org/10.1038/s41598-024-84612-9">less-than-Turing-complete programming</a>:<br />
<blockquote>
it is possible to construct both (1) classes of algorithms that can make credible promises and (2) restricted update mechanisms that enable credible promises. In other words, DeFi platforms can provide compliant services like traditional centralized providers through fully automatic mechanisms.
</blockquote>
What exaxctly do they mean by "<a href="https://doi.org/10.1038/s41598-024-84612-9">compliant</a>"?<br />
<blockquote>
Consider an economy modeled as a Turing Machine, where the machine’s state corresponds to the state of the real economy. We formalize compliance as a property of system state transitions that can be verified mechanically, following Theorem 5.8.5 of Savage. Specifically, a compliant system is one where no sequence of permitted operations can result in a state that violates predefined regulatory constraints set by an external regulator.
</blockquote>
They translate this into <a href="https://doi.org/10.1038/s41598-024-84612-9">economic terms</a>:<br />
<blockquote>
For example, if a regulation prohibits transactions with certain addresses, compliance means no sequence of permitted operations can transfer value to those addresses, either directly or indirectly. Similarly a regulator may impose requirements on intermediaries transacting in certain assets or products akin to depository receipts for those assets. Compliance would then require ensuring one does not unknowingly transact in “products akin to depository receipts” for a given list of assets.
</blockquote>
Because they model regulated systems in terms of states and the transitions between them, they can apply <a href="https://doi.org/10.1038/s41598-024-84612-9">results from compputer science</a>:<br />
<blockquote>
This formulation maps to well-known results in computability, such as the Halting Problem and the more general impossibility known as Rice’s Theorem: No algorithm exists to determine from the description of a [Turing Machine] whether or not the language it accepts falls into any proper subset of the recursively enumerable languages. In other words, we cannot categorize arbitrary programs into specific subsets automatically and reliably. In financial regulation, the canonical “proper subset” is a ban on interacting with a given address: interactions involving a banned address are forbidden, and the acceptable subset of states includes no such transfers.
</blockquote>
They proceed to use cryptocurrency "mixers" as an example. They explain that Rice's Theorem means that because any general description of "mixers" defines a "proper subset" of all programs, and thus there is no automatic or reliable method by which a "smart contract" can be assessed against the general description.<br />
<br />
Of course, as Justice Potter Stewart famously said "<a href="https://en.wikipedia.org/wiki/I_know_it_when_I_see_it">I know it when I see it</a>". Human regulators will have no difficulty in recognizing a "smart contract" as a mixer, if only because in order to function it needs liquidity. To attract it the "smart contract" needs to advertise its service. So can the regulators ban interactions with the specific addresses of the mixers they recognize? Charoenwong <i>et al</i> make <a href="https://doi.org/10.1038/s41598-024-84612-9">two arguments</a><br />
<blockquote>
First, this severely limits the regulator’s power from regulating a mutable set of protocols to only specific ones. In other words, what is often called “principles-based” regulations (as opposed to rules-based regulations) are impossible. We cannot ban “mixers” generally – we can only ban “mixers A, B and C.” In some sense, this is akin to banning specific means of murder rather than simply banning murder, no matter the means.
</blockquote>
Then they introduce the time element inherent in <a href="https://doi.org/10.1038/s41598-024-84612-9">human regulation</a>:<br />
<blockquote>
Second, and more importantly, we cannot enforce even these more straightforward rules reliably. Consider these steps:<br />
<ol>
<li>Deploy a new, confusingly-coded, “mixer” labeled X</li>
<li>Send funds to the mixer X</li>
<li>Withdraw from the mixer X and feed into the mixer A</li>
<li>Withdraw from the mixer A and feed into the mixer X</li>
<li>Withdraw from the mixer X and spend freely</li>
</ol>
This procedure works because we cannot identify arbitrary mixers, so we are free to deploy and then use them before they get put on the banned list. As a result, the regulator cannot even ban all interaction with enumerated mixers – it can only reliably ban some forms of interaction. This result is a severe limit on regulatory power.<br />
<br />
If we consider that compliance exists in an automated form, operating on publicly available data in real-time, anyone accepting that final transfer must operate in a compliant fashion. If, instead, the plan is to decide these things later based on non-mechanical analysis, we are simply operating a conventional legal system with some more computers involved. Concretely, if that last transfer can be ruled illegal after the fact, it was never an automated financial system.
</blockquote>
This result generalizes to services other than mixers. Rice's Theorem means it isn't possible to ban a class of services, and banning individual services identified by humans will always be behind the curve.<br />
<br />
The authors illustrate the application of their result with real-world examples of <a href="https://doi.org/10.1038/s41598-024-84612-9">regulatory failure</a>:<br />
<blockquote>
These case studies-The DAO, Beanstalk Finance, Compound, Terra/LUNA, and MakerDAO-collectively illustrate the practical manifestations of our paper’s theoretical findings. Each example demonstrates a different facet of the challenges in implementing reliable, automated compliance mechanisms in decentralized, Turing- complete systems. From governance attacks to stablecoin collapses and liquidation issues, these incidents underscore the impossibility of guaranteeing specific regulatory outcomes without compromising system flexibility or introducing external interventions.
</blockquote>
The authors argue that there are two ways to construct a system that does allow automated regulation, by making it permissioned rather than permissionless, or by enforcing a non-Turing-complete language for the "smart contracts". In practice many cryptocurrencies are permissioned — in <a href="https://blog.dshr.org/2024/04/decentralized-systems-arent.html"><i>Decentralized Systems Aren't</i></a> I pointed out that:<br />
<blockquote>
The fact that the coins ranked 3, 6 and 7 by "market cap" don't even claim to be decentralized shows that decentralization is irrelevant to cryptocurrency users.
</blockquote>
There are many examples of cryptocurrency systems that claim to be decentralized but are actually permissioned. Patrick Tan described one in <a href="https://medium.com/chainargos/binance-built-a-blockchain-except-it-didnt-5759224ba7aa"><i>Binance Built a Blockchain, Except it Didn’t</i></a>:<br />
<blockquote>
For all its claims of promoting decentralization, Binance runs two “blockchains” that are not just highly centralized, but regularly alter history, undermining one of the core tenets of the blockchain — immutability.
</blockquote>
The authors' example of a <a href="https://doi.org/10.1038/s41598-024-84612-9">non-Turing-complete language</a> is:<br />
<blockquote>
Consider a scripting language where we cannot have variables. A simple “splitting the tab” contract might look like:<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNRgz5Wcc3tXJJfFQUQ_9jJ06vS-o0TmbHdKvoPx8SvkaNsqwBBE6o8wpoH2TNeqxoQAbVEQYBQft94zKcBy7HO8DsoVxzJm1-Vk9M5ukqAX8L-e8YeF4P9Zlk25GUb82lLgII5ImDaSnPyTYyYgXkZbVfJTKVE7PDHx6WSevfYhyphenhyphenlNaX9TKNksAX_p4uq/s1292/SplitTheTab.png" style="display: block; padding: 1em 0px; text-align: center;"><img alt="" border="0" data-original-height="392" data-original-width="1292" height="121" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNRgz5Wcc3tXJJfFQUQ_9jJ06vS-o0TmbHdKvoPx8SvkaNsqwBBE6o8wpoH2TNeqxoQAbVEQYBQft94zKcBy7HO8DsoVxzJm1-Vk9M5ukqAX8L-e8YeF4P9Zlk25GUb82lLgII5ImDaSnPyTYyYgXkZbVfJTKVE7PDHx6WSevfYhyphenhyphenlNaX9TKNksAX_p4uq/w400-h121/SplitTheTab.png" width="400" /></a>
This is dangerous if we have a regulation that certain addresses cannot be paid. The issues raised surrounding the DAO hack, discussed above, apply here. But what if the only way to transfer a token is to call SendTo and that function looks like:<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEis5GTH5H1GMc41uu95_FzidtecuhCDVSrGfzDFlImPZX5Am8tgq4CT5ibQO6wg-NIlMt4aNhXQM4J70GV1O_dJd498TvSXBrW8xHqPX9J_lo80o2Gn60aSQJL6LB4z6gmf0aCD9gQYskTDlzIUKcg7bFGepYe2-nL_xnSR1tcdxnXLVA-RU6y8AId0zSYC/s1014/SendTo.png" style="display: block; padding: 1em 0px; text-align: center;"><img border="0" data-original-height="530" data-original-width="1014" height="167" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEis5GTH5H1GMc41uu95_FzidtecuhCDVSrGfzDFlImPZX5Am8tgq4CT5ibQO6wg-NIlMt4aNhXQM4J70GV1O_dJd498TvSXBrW8xHqPX9J_lo80o2Gn60aSQJL6LB4z6gmf0aCD9gQYskTDlzIUKcg7bFGepYe2-nL_xnSR1tcdxnXLVA-RU6y8AId0zSYC/w320-h167/SendTo.png" width="320" /></a>
There is no issue if a function only calls RealSendTo from SendTo. In such cases, the regulator’s responsibility is to maintain the BannedList, and the system is permissioned.
</blockquote>
Their example of a system that is not-Turing-complete is not useful, because it requires BannedList to be a constant. As they point out, if the system is to be useful, BannedList must be a variable that is updated by the regulator, and thus the system is permissioned. It may well be that, because BannedList is a variable, that the system is Turing-complete after all. I can't do the analysis to determine if this is the case, but it is known that even a small number of variables makes a system Turing-complete.<br />
<br />
Thus the paper is somewhat misleading, in the sense that it reads as if regulated systems can be either permissioned <b>or</b> not-Turing-complete, but it fails to provide an example of a system that is permissionless and not-Turing-complete. The example that looks as if it is going to be not-Turing-complete but permissionless seems to be permissioned <b>and</b> not-Turing-complete.<br />
<br />
I would argue somewhat differently:<br />
<ul>
<li>Charoenwong <i>et al</i> show that a permissionless, Turing-complete system cannot be regulated.</li>
<li>In the real world no-one is going to cripple their system by making it not-Turing-complete.</li>
<li>Even if a not-Turing-complete system could be built it isn't clear that it would be useful.</li>
<li>In essence, the regulatory act of enforcing that a system is, and remains, not-Turing-complete <i>is</i> permissioning the system.</li>
<li>Thus in practice permissionless systems cannot be regulated.</li>
</ul>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6hjwDMkOxROhlMzdPaW6YdRFy6APUywusainCKLh70ufmNrdO-_8xAq0GnEBY8ta8fwf2lDTi_RvbAocuwxESgb2hHM6DvlXwRObiJY2IXYMGooU4MC78o6oq-gaUbEyN2knH5oKIuK8aNYxS2uIoHZtms3JoVxfm982kKzrMjkTDjwAuDR0cQ366ukYq/s1132/CryptoInflows.png" imageanchor="1" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="300" data-original-width="1132" height="85" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6hjwDMkOxROhlMzdPaW6YdRFy6APUywusainCKLh70ufmNrdO-_8xAq0GnEBY8ta8fwf2lDTi_RvbAocuwxESgb2hHM6DvlXwRObiJY2IXYMGooU4MC78o6oq-gaUbEyN2knH5oKIuK8aNYxS2uIoHZtms3JoVxfm982kKzrMjkTDjwAuDR0cQ366ukYq/w320-h85/CryptoInflows.png" width="320" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.ft.com/content/b783ddd9-b8f2-4ac0-874c-89e0153ca6c3">JPMorgan</a><br /></td></tr></tbody></table>
While Charoenwong <i>et al</i>'s paper is of theoretical interest, in the two years since their initial post it has been overtaken by events. Craig Coben asks <a href="https://www.ft.com/content/b783ddd9-b8f2-4ac0-874c-89e0153ca6c3"><i>Has Michael Saylor’s ‘infinite money glitch’ run into a hitch?</i></a>:<br />
<blockquote>
<a href="https://www.ft.com/content/0ca06172-bfe9-11de-aed2-00144feab49a">Reflexivity</a> has been MicroStrategy’s secret sauce. The company prints equity or equity-linked securities to buy bitcoin, boosting bitcoin’s price, which in turn inflates MicroStrategy valuation. This allows it to issue more stock and repeat the cycle.<br />
<br />
This MonoStrategy has enabled MicroStrategy to acquire <a href="https://www.mstr-tracker.com/">2.25 per cent of all bitcoin in existence</a>, a hoard worth around $46bn at current prices. The company trades at nearly double the value of its underlying bitcoin holdings, a testament to belief of some investors in Michael Saylor’s project.<br />
...<br />
As long as the stock trades at a premium to its bitcoin holdings, the company can keep issuing novel securities and finding new buyers. Meanwhile, with MicroStrategy comprising a sizeable portion of crypto inflows (28 per cent in 2024, <a href="https://d1e00ek4ebabms.cloudfront.net/production/uploaded-files/chrome_jnUot7ZhN1-55c34936-6e70-4def-b995-30a3c8ea2612.png">according to JPMorgan</a>), it has helped sustain bitcoin’s ascent.
</blockquote>
Both our co-Presidents are heavily invested in pumping cryptocurrencies. The new administration is planning to solve the <a href="https://blog.dshr.org/2022/11/greater-fool-supply-chain-crisis.html"><i>Greater Fool Supply-Chain Crisis</i></a> by turning the Federal government into the greater fool of last resort by establishing the <a href="https://www.bloomberg.com/news/articles/2025-02-04/crypto-czar-sacks-is-studying-feasibility-of-us-bitcoin-reserve">strategic Bitcoin reserve</a>. What better greater fool than one who can print his own money? The result is that the <a href="https://www.nytimes.com/2025/02/04/business/sec-crypto-task-force.html"><i>S.E.C. Moves to Scale Back Its Crypto Enforcement Efforts</i></a>, as Matthew Goldstein, Eric Lipton and David Yaffe-Bellany report:<br />
<blockquote>
The Securities and Exchange Commission is moving to scale back a special unit of more than 50 lawyers and staff members that had been dedicated to bringing crypto enforcement actions, five people with knowledge of the matter said.
</blockquote>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8a6M1QXV5uy8ZL-FdXSpF2CDks4v1w1yvuovAF_8Umt42QHrAzG-oztDwqnuZU_HUHmZU8Ywq7-Z5ng3DhvDv6sBp2u524ei2OoXBAzxmFzU57SYv4_Kh3phkVprtJamM_uIU7xCsWyTuUrwHsr-Px2P8PyQ4NTgtMgbWDVVLkqnNT76q8vE8d6oihxVa/s1724/SatoshiStacker.png" imageanchor="1" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="1724" data-original-width="1646" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8a6M1QXV5uy8ZL-FdXSpF2CDks4v1w1yvuovAF_8Umt42QHrAzG-oztDwqnuZU_HUHmZU8Ywq7-Z5ng3DhvDv6sBp2u524ei2OoXBAzxmFzU57SYv4_Kh3phkVprtJamM_uIU7xCsWyTuUrwHsr-Px2P8PyQ4NTgtMgbWDVVLkqnNT76q8vE8d6oihxVa/w191-h200/SatoshiStacker.png" width="191" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.bloomberg.com/news/newsletters/2025-02-04/a-sunday-night-flash-crash-in-the-most-insane-casino-ever-created">Source</a></td></tr></tbody></table>
Even if it were possible to regulate real-world cryptocurrencies, there no longer appears to be any political support for doing so. And thus Michael P. Regan reports on <a href="https://www.bloomberg.com/news/newsletters/2025-02-04/a-sunday-night-flash-crash-in-the-most-insane-casino-ever-created"><i>A Sunday Night Flash Crash in the ‘Most Insane Casino Ever Created’</i></a>:<br />
<blockquote>
a major flash crash in Ether as leveraged positions were liquidated served as a stark reminder of how digital-asset markets still lack almost all of the guardrails installed on traditional markets over the years due to various misadventures that hurt investors. The second-largest token was down a bit as traditional markets opened for trading Monday morning in Asia, reacting to concerns about US tariffs against Canada and Mexico. Then in a matter of minutes its losses extended to about 27%, before quickly recovering.<br />
...<br />
There’s no indication that any of that is likely to change anytime soon. So Sunday night’s price action in Ether – and similar dives in a slew of other altcoins and memecoins – serves as a reminder that for better or worse this asset class still exists far outside of the padded walls of traditional markets, regardless of how much tradfi embraces it.
</blockquote>David.http://www.blogger.com/profile/14498131502038331594[email protected]1tag:blogger.com,1999:blog-4503292949532760618.post-41605334257294592132025-01-31T10:00:00.000-08:002025-01-31T10:00:00.122-08:00Paul Evan Peters Award<table align="right" border="2" cellpadding="5" cellspacing="0" cols="2" style="font-size: 8pt;">
<thead>
<tr><th>Year</th><th>Awardee</th></tr>
</thead>
<tbody>
<tr><td><a href="https://www.cni.org/about-cni/awards/pep-award/2024-tony-hey">2024</a></td><td>Tony Hey</td></tr>
<tr><td><a href="https://www.cni.org/about-cni/awards/pep-award/2022-paul-courant">2022</a></td><td>Paul Courant</td></tr>
<tr><td><a href="https://www.cni.org/about-cni/awards/pep-award/2020-francine-berman">2020</a></td><td>Francine Berman</td></tr>
<tr><td><a href="https://www.cni.org/about-cni/awards/pep-award/2017-van-de-sompel">2017</a></td><td>Herbert Van de Sompel</td></tr>
<tr><td><a href="https://www.cni.org/about-cni/awards/pep-award/2014-donald-lindberg">2014</a></td><td>Donald A.B. Lindberg</td></tr>
<tr><td><a href="https://www.cni.org/about-cni/awards/pep-award/2011-christine-l-borgman">2011</a></td><td>Christine L. Borgman</td></tr>
<tr><td><a href="https://www.cni.org/about-cni/awards/pep-award/2008-daniel-e-atkins">2008</a></td><td>Daniel E. Atkins</td></tr>
<tr><td><a href="https://www.cni.org/about-cni/awards/pep-award/2006-paul-ginsparg">2006</a></td><td>Paul Ginsparg</td></tr>
<tr><td><a href="https://www.cni.org/about-cni/awards/pep-award/2004-brewster-kahle">2004</a></td><td>Brewster Kahle</td></tr>
<tr><td><a href="https://www.cni.org/about-cni/awards/pep-award/2002-vinton-gray-cerf">2002</a></td><td>Vinton Gray Cerf</td></tr>
<tr><td><a href="https://www.cni.org/about-cni/awards/pep-award/2000-tim-berners-lee">2000</a></td><td>Tim Berners-Lee</td></tr>
</tbody>
</table>
It has just been announced that at the Spring 2025 Membership Meeting of the <a href="https://cni.org/">Coalition for Networked Information</a> in Milwaukee, WI April 7<sup>th</sup> and 8<sup>th</sup>, Vicky and I are to receive the <a href="https://www.cni.org/about-cni/awards/pep-award">Paul Evan Peters Award</a>. The press release announcing the award is <a href="https://www.cni.org/news/lockss-co-founders-honored-with-2025-paul-evan-peters-award">here</a>.<br />
<br />
Vicky and I are honored and astonished by this award. Honored because it is the premiere award in the field, and astonished because we left the field more than seven years ago to take up our new full-time career as grandparents. We are all the more astonished because we are not even eligible for the award; the <a href="https://www.cni.org/about-cni/awards/pep-award">rules clearly state that</a> the "award will be granted to <b>an individual</b>".<br />
<br />
You can tell this is an extraordinary honor from the list of previous awardees, and the fact that it is the first time it has been awarded in successive years. Vicky and I are extremely grateful to the <a href="https://arl.org">Association of Research Libraries</a>, <a href="https://cni.org">CNI</a> and <a href="https://www.educause.edu/">EDUCAUSE</a>, who sponsor the award.<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: left; margin-right: 1em; text-align: left;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsW7x_4i-TUwFG6xNVH2q_nk5jXabNhRGxUbnEeDV6vKapZoAmu9eDP1JY4Oavw508eDSbFy734Gxb2crvCI-eAQVjL-3LjYp0olWhqIR4OM6AhehgFJTKFxrKEdrLJHUOdsrPCeODqpu4dVDUT2sggb73rBj_EomjFI1YirWH2THzPUgP4_KwTIDX1Q/s151/LOCKSS.logo.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="151" data-original-width="151" height="151" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsW7x_4i-TUwFG6xNVH2q_nk5jXabNhRGxUbnEeDV6vKapZoAmu9eDP1JY4Oavw508eDSbFy734Gxb2crvCI-eAQVjL-3LjYp0olWhqIR4OM6AhehgFJTKFxrKEdrLJHUOdsrPCeODqpu4dVDUT2sggb73rBj_EomjFI1YirWH2THzPUgP4_KwTIDX1Q/s1600/LOCKSS.logo.png" width="151" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">Original Logo<br /></td></tr></tbody></table>
Part of the award is the opportunity to make an extended presentation to open the meeting. The text of our talk, entitled <i>Lessons From LOCKSS</i>, with links to the sources and information that appeared on slides but was not spoken, should appear here on April 7<sup>th</sup>.<br />
<br />
The work that the award recognizes was not ours alone, but the result of a decades-long effort by the entire <a href="https://www.lockss.org">LOCKSS team</a>. It was made possible by support from the LOCKSS community and many others, including Michael Lesk then at NSF, Donald Waters then at the Mellon Foundation, the late Karen Hunter at Elsevier, Stanford's Michael Keller and CNI's Cliff Lynch.<br />David.http://www.blogger.com/profile/14498131502038331594[email protected]2tag:blogger.com,1999:blog-4503292949532760618.post-50004836554300122462025-01-16T08:00:00.000-08:002025-01-16T08:00:00.112-08:00A Prophet Of The Web<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4uNBSGncpDuahU327woHMV6IbSTAfHghJt5sruliN1APCfR4xjwjHGVGWjrzFy2Mg4NTZvHJQRvZUT3mQGC9FENveT8O05Fodf9VE9fqycphBlywle0W8xAWQJYzkNQ39WKATmuX585CADQeCKqm7npsBpzitmNCVjI1aE5TpgiVO2qks6OWVg0iBypUo/s1600/Title.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" data-original-height="1508" data-original-width="1600" height="189" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4uNBSGncpDuahU327woHMV6IbSTAfHghJt5sruliN1APCfR4xjwjHGVGWjrzFy2Mg4NTZvHJQRvZUT3mQGC9FENveT8O05Fodf9VE9fqycphBlywle0W8xAWQJYzkNQ39WKATmuX585CADQeCKqm7npsBpzitmNCVjI1aE5TpgiVO2qks6OWVg0iBypUo/w200-h189/Title.png" width="200" /></a>
While doing the research for a future talk, I came across an obscure but impressively prophetic report entitled <a href="https://eric.ed.gov/?id=ED368360"><i>Accessibility and Integrity of Networked Information Collections</i></a> that Cliff Lynch wrote for the federal Office of Technology Assessment in 1993, 32 years ago. I say "obscure" because it doesn't appear in Lynch's <a href="https://www.cni.org/about-cni/staff/clifford-a-lynch/publications/lynch-pubs-pre97">pre-1997 bibliography</a>.<br />
<br />
To give you some idea of the context in which it was written, unless you are over 70, it was more than half your life ago when in November 1989 Tim Berners-Lee's <a href="https://en.wikipedia.org/wiki/Tim_Berners-Lee">browser first accessed a page from his Web server</a>. It was only about the same time that the first commercial, as opposed to research, Internet Service Providers started with the <a href="https://en.wikipedia.org/wiki/History_of_the_Internet">ARPANET being decommissioned</a> the next year. Two years later, in December of 1991, the Stanford Linear Accelerator Center put up the <a href="https://blog.dshr.org/2014/11/first-us-web-page.html">first US Web page</a>. In 1992 Tim Berners-Lee <a href="https://www.w3.org/Protocols/HTTP/HTRESP.html">codified and extended the HTTP protocol</a> he had earlier implemented. It would be another two years before Netscape became the <a href="http://books.google.com/books?id=dR2G0oPufe0C&lpg=PA69&ots=UnIlNi_km1&dq=netscape%20SSL%201.0&pg=PA69#v=onepage&q=netscape%20SSL%201.0&f=false">first browser to support HTTPS</a>. It would be two years after that before the ITEF approved HTTP/1.0 in <a href="https://datatracker.ietf.org/doc/html/rfc1945">RFC 1945</a>. As you can see, Lynch was writing among the birth-pangs of the Web.<br />
<br />
Although Lynch was insufficiently pessimistic, he got a lot of things exactly right. Below the fold I provide four out of many examples.<br />
<span><a name='more'></a></span>
<br />
Page numbers refer to the PDF, not to the original. Block quotes without a link are from the report.<br />
<h3>Disinformation</h3>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxG2aSnQh-l5fwOwwSBumMDpR0NX-iW8c__C3bQnan6lSQF7qF0pVVAD0KeQ0lOAtTDl_rVRg98owRUH97t9K6Wq2acUO5cwWftsksPgrr_wwXdLj8ZmIKiwI33nRpCNMLdo7huPFlO7Z_rumJjM02PWWRGJFQGuyOnvCnIrJ5ZGlJJcvzrARrnQ9Slv_1/s2706/Page66.png" style="clear: right; display: block; margin-left: auto; margin-right: auto; padding: 1em 0px; text-align: center;"><img alt="" border="0" data-original-height="956" data-original-width="2706" height="71" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxG2aSnQh-l5fwOwwSBumMDpR0NX-iW8c__C3bQnan6lSQF7qF0pVVAD0KeQ0lOAtTDl_rVRg98owRUH97t9K6Wq2acUO5cwWftsksPgrr_wwXdLj8ZmIKiwI33nRpCNMLdo7huPFlO7Z_rumJjM02PWWRGJFQGuyOnvCnIrJ5ZGlJJcvzrARrnQ9Slv_1/w200-h71/Page66.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">Page 66<br /></td></tr></tbody></table>
When discussing the "strong bias in the Internet user community to prefer free information sources" he was, alas, prescient although it took more than "a few years":<br />
<blockquote>
The ultimate result a few years hence — <i>and it may not be a bad or inappropriate response, given the reality of the situation</i> — may be a perception of the Internet and much of the information accessible through it as the "net of a million lies", following science fiction author Vernor Vinge's vision of an interstellar information network characterized by the continual release of information (which may or may not be true, and where the reader often has no means of telling whether the information is accurate) by a variety of organizations for obscure and sometimes evil reasons.
</blockquote>
The Vernor Vinge reference is to <a href="https://en.wikipedia.org/wiki/A_Fire_Upon_the_Deep"><i>A Fire Upon the Deep</i></a>:<br />
<blockquote>
In the novel, the Net is depicted as working much like the <a href="https://en.wikipedia.org/wiki/Usenet">Usenet</a> network in the early 1990s, with transcripts of messages containing header and footer information as one would find in such forums.
</blockquote>
The downsides of a social medium to which anyone can post without moderation were familiar to anyone who was online in the days of the <a href="https://en.wikipedia.org/wiki/Usenet">Usenet</a>:<br />
<blockquote>
Usenet is culturally and historically significant in the networked world, having given rise to, or popularized, many widely recognized concepts and terms such as "FAQ", "flame", sockpuppet, and "spam".<br />
...<br />
Likewise, many conflicts which later spread to the rest of the Internet, such as the ongoing difficulties over spamming, began on Usenet.:<br />
<blockquote>
"Usenet is like a herd of performing elephants with diarrhea. Massive, difficult to redirect, awe-inspiring, entertaining, and a source of mind-boggling amounts of excrement when you least expect it."<br />
<br />
— Gene Spafford, 1992
</blockquote>
</blockquote>
Earlier in the report Lynch had written (Page 23):<br />
<blockquote>
Access to electronic information is of questionable value if the integrity of that information is seriously compromised; indeed, access to inaccurate information, or even deliberate misinformation, may be worse than no access at all, particularly for the naive user who is not inclined to question the information that the new electronic infrastructure is offering.
</blockquote>
This resonates as the wildfires rage in Los Angeles.<br />
<h3><a href="https://search.worldcat.org/title/918590403">Information Doesn't Want To Be Free</a></h3>
Although Tim Berners-Lee's initial HTTP specification included the status code <a href="https://www.w3.org/Protocols/HTTP/HTRESP.html"><b>402 Payment Required</b></a>:<br />
<blockquote>
The parameter to this message gives a specification of charging schemes acceptable. The client may retry the request with a suitable ChargeTo header.
</blockquote>
the Web in 1993 lacked paywalls. But Lynch could see them coming (Page 22):<br />
<blockquote>
There is a tendency to incorrectly equate access to the network with access to information; part of this is a legacy from the early focus on communications infrastructure rather than network content. Another part is the fact that traditionally the vast bulk of information on the Internet has been publicly accessible if one could simply obtain access to the Internet itself, figure out how to use it, and figure out where to locate the information you wanted. As proprietary information becomes accessible on the Internet on a large scale, this will change drastically. In my view, access to the network will become commonplace over the next decade or so, much as access to the public switched telephone network is relatively ubiquitous today. But in the new "information age" information will not necessarily be readily accessible or affordable;
</blockquote>
The current <a href="https://datatracker.ietf.org/doc/html/rfc9110">RFC 9110</a> states:<br />
<blockquote>
The 402 (Payment Required) status code is reserved for future use.
</blockquote>
Instead today's Web is infested with paywalls, each with their own idiosyncratic user interface, infrastructure, and risks.<br />
<h3>The Death Of "First Sale"</h3>
Lynch understood the highly consequential nature of the change in the business model of paid information access from <i>purchasing</i> a copy to <i>renting</i> access to the publisher's copy; from a legal framework of copyright and the <a href="https://en.wikipedia.org/wiki/First-sale_doctrine">"first sale" doctrine</a>, to one of copyright and contract law (Page 30):<br />
<blockquote>
Now, consider a library acquiring information in an electronic format. Such information is almost never, today, sold to a library (under the doctrine of first sale); rather, it is licensed to the library that acquires it, with the terms under which the acquiring library can utilize the information defined by a contract typically far more restrictive than copyright law. The licensing contract typically includes statements that define the user community permitted to utilize the electronic information as well as terms that define the specific uses that this user community may make of the licensed electronic information. These terms typically do not reflect any consideration of public policy decisions such as fair use, and in fact the licensing organization may well be liable for what its patrons do with the licensed information.
</blockquote>
The power imbalance between publishers and their customers is of long standing, and it especially affects the academic literature. In 1989 the Association of Research Libraries published <a href="https://books.google.com/books?id=xuXgAAAAMAAJ&pg=PA39-IA19&lpg=PA39-IA19&dq=chuck+hammicker+serials+pricing+crisis&source=bl&ots=9ZMEXp73DG&sig=n4WexMPTa5kqWbilLv-WJoX959g&hl=en&sa=X&ved=0ahUKEwiw07nvot3aAhXqh1QKHdInDu8Q6AEIXTAH#v=onepage&q=%22the%20sun%22&f=false"><i>Report of the ARL Serials Prices Project</i></a>:<br />
<blockquote class="tr_bq">
The ARL Serials Initiative forms part of a special campaign mounted by librarians in the 1980s against the high cost of serials subscriptions. This is not the first time that libraries have suffered from high serial prices. For example, in 1927 the Association of American Universities reported that:<br />
<blockquote class="tr_bq">
"Librarians are suffering because of the increasing volume of publications and rapidly rising prices. Of special concern is the much larger number of periodicals that are available and that members of the faculty consider essential to the successful conduct of their work. Many instances were found in which science departments were obligated to use all of their allotment for library purposes to purchase their periodical literature which was regarded as necessary for the work of the department"
</blockquote>
</blockquote>
The oligopoly rents extracted by academic publishers have been a problem for close on a century, if not longer! Lynch's analysis of the effects of the Web's amplification of this power imbalance is wide-ranging, including (Page 31):<br />
<blockquote>
Very few contracts with publishers today are perpetual licenses; rather, they are licenses for a fixed period of time, with terms subject to renegotiation when that time period expires. Libraries typically have no controls on price increase when the license is renewed; thus, rather than considering a traditional collection development decision about whether to renew a given subscription in light of recent price increases, they face the decision as to whether to lose all existing material that is part of the subscription as well as future material if they choose not to commit funds to cover the publisher's price increase at renewal time.
</blockquote>
Thus destroying libraries' traditional role as stewards of information for future readers. And (Page 30):<br />
<blockquote>
Of equal importance, the contracts typically do not recognize activities such as interlibrary loan, and prohibit the library licensing the information from making it available outside of that library's immediate user community. This destroys the current cost-sharing structure that has been put in place among libraries through the existing interlibrary loan system, and makes each library (or, perhaps, the patrons of that library) responsible for the acquisitions cost of any material that is to be supplied to those patrons in electronic form. The implications of this shift from copyright law and the doctrine of first sale to contract law (and very restrictive contract terms) is potentially devastating to the library community and to the ability of library patrons to obtain access to electronic information — in particular, it dissolves the historical linkage by which public libraries can provide access to information that is primarily held by research libraries to individuals desiring access to this information. There is also a great irony in the move to licensing in the context of computer communications networks — while these networks promise to largely eliminate the accidents of geography as an organizing principle for inter-institutional cooperation and to usher in a new era of cooperation among geographically dispersed organizations, the shift to licensing essentially means that each library contracting with a publisher or other information provider becomes as isolated, insular organization that cannot share its resources with any other organization on the network.
</blockquote>
<h3>Surveillance Capitalism</h3>
Lynch also foresaw the start of "surveillance capitalism" (Page 60):<br />
<blockquote>
we are now seeing considerable use of multi-source data fusion: the matching and aggregation of credit, consumer, employment, medical and other data about individuals. I expect that we will recapitulate the development of these secondary markets in customer behavior histories for information seeking in the 1990s; we will also see information-seeking consumer histories integrated with a wide range of other sources of data on individual behavior.<br />
<br />
The ability to accurately, cheaply and easily count the amount of use that an electronic information resource receives (file accesses, database queries, viewings of a document, etc.) coupled with the ability to frequently alter prices in a computer-based marketplace (particularly in acquire on demand systems that operate on small units of information such as journal articles or database records, but even, to a lesser extent, by renegotiating license agreements annually) may give rise to a number of radical changes. These potentials are threatening for all involved.
</blockquote>
He described search-based advertising (Page 61)<br />
<blockquote>
The ability to collect not only information on what is being sought out or used but also who is doing the seeking or using is potentially very valuable information that could readily be resold, since it can be used both for market analysis (who is buying what) and also for directed marketing (people who fit a certain interest profile, as defined by their information access decisions, would likely also be interested in new product X or special offer Y). While such usage (without the informed consent of the recipient of the advertising) may well offend strong advocates of privacy, in many cases the consumers are actually quite grateful to hear of new products that closely match their interests. And libraries and similar institutions, strapped for revenue, may have to recognize that usage data can be a valuable potential revenue source, no matter how unattractive they find collecting, repackaging and reselling this information.
</blockquote>
Of course, it wasn't the libraries but Google, spawned from the <a href="https://en.wikipedia.org/wiki/Stanford_Digital_Library_Project">Stanford Digital Library Project</a>, which ended up collecting the information and monetizing it. And the power imbalance between publishers and readers meant that the reality of tracking was hidden (Page 63):<br />
<blockquote>
when one is accessing (anonymously or otherwise) a public-access information service, it is unclear what to expect, and in fact at present there is no way to even learn what the policy of the information service provider is.
</blockquote>
David.http://www.blogger.com/profile/14498131502038331594[email protected]0tag:blogger.com,1999:blog-4503292949532760618.post-16286872459373202772025-01-07T08:00:00.000-08:002025-01-13T12:47:14.873-08:00Storage RoundupIt is time for another roundup of topics in storage that have caught my eye recently. Below the fold I discuss the possible ending of the HAMR saga and various developments in archival storage technology.<br />
<span><a name='more'></a></span>
<br />
<h3>Heat-Assisted Magnetic Recording</h3>
Unless you have been tracking storage technology for many years, it is hard to appreciate how long the timescales are. My go-to example for communicating this is Seagate's development of HAMR.<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMEtHjIgtxAHlXzy_DQUhs8BB0KgahIURfneVHh3b49Byhf-rd_j7Qf9_7aSbFmWjIArop5kBHWS95UuOMYFrA9hbiNoEyDGnJNb7MOjLGtqRGFHfe9jb7HfpcbAsMVNGyh_-meN9PY7LEz1C4vIzDQDynC6EhUX3PV8K0wJ55NZwt2Hmk187QRdN5_pyr/s730/DaveAnderson.png" style="clear: right; display: block; float: right; padding: 1em 0px; text-align: center;"><img alt="" border="0" data-original-height="497" data-original-width="730" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMEtHjIgtxAHlXzy_DQUhs8BB0KgahIURfneVHh3b49Byhf-rd_j7Qf9_7aSbFmWjIArop5kBHWS95UuOMYFrA9hbiNoEyDGnJNb7MOjLGtqRGFHfe9jb7HfpcbAsMVNGyh_-meN9PY7LEz1C4vIzDQDynC6EhUX3PV8K0wJ55NZwt2Hmk187QRdN5_pyr/s200/DaveAnderson.png" width="200" /></a>
Seagate first <a href="https://web.archive.org/web/20190813175046/https://www.seagate.com/news/news-archive/seagate-swings-increase-disc-drive-densities-master-pr/">demonstrated HAMR in 2002</a>. In 2008 they published this graph, predicting HAMR would supplant Perpendicular Magnetic Recording (PMR) starting in 2009.<br />
<br />
I first wrote skeptically about projections of HAMR's deployment <a href="https://blog.dshr.org/2012/12/talk-at-fall-2012-cni.html">twelve years ago</a>.
Seagate had just demonstrated <a href="https://www.theregister.com/2012/03/20/seagate_terabit_areal_density/">HAMR at a terabit per square inch</a> and predicted market entry in 2014.<br />
<br />
I wrote again in <a href="https://blog.dshr.org/2013/07/dr-pangloss-and-road-maps.html">2013</a>. In <a href="https://blog.dshr.org/2015/10/storage-technology-roadmaps.html">2015</a> I wrote more about it. Then in <a href="https://blog.dshr.org/2016/03/dr-pangloss-loves-technology-roadmaps.html">2016</a> I wrote about it again.<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEoC3JZfZ5X0tm_59NFBmmu-DKaY18ZxgKzNA7ogjbqPYtAZ5RwzgCn0BQmKY3XuRE3e-xIdhhTLtGRL-K4TEdARUqfvCmNCku_-aZajafbskRDNPfDlgWMGkFI7uzeRdECkPwbOvyytgn/s950/seagate_why_hamr_950.jpg" style="clear: right; display: block; margin-bottom: 1em; margin-left: auto; margin-right: auto; padding: 1em 0px; text-align: center;"><img alt="" border="0" data-original-height="528" data-original-width="950" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEoC3JZfZ5X0tm_59NFBmmu-DKaY18ZxgKzNA7ogjbqPYtAZ5RwzgCn0BQmKY3XuRE3e-xIdhhTLtGRL-K4TEdARUqfvCmNCku_-aZajafbskRDNPfDlgWMGkFI7uzeRdECkPwbOvyytgn/s200/seagate_why_hamr_950.jpg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><tiny><a href="https://www.theregister.co.uk/2018/11/02/seagate_hamr_roadmap/">Seagate's 2018 HAMR roadmap</a></tiny></td></tr></tbody></table>
In <a href="https://blog.dshr.org/2018/11/whats-happening-to-storage.html">2018</a> I wrote about Chris Mellor's <a href="https://www.theregister.com/2018/11/02/seagate_hamr_roadmap/"><i>Seagate HAMRs out a roadmap for future hard drive recording tech</i></a>::<br />
<blockquote>
Seagate has set a course to deliver a 48TB disk drive in 2023 using its HAMR (heat-assisted magnetic recording) technology, doubling areal density every 30 months, meaning 100TB could be possible by 2025/26. ... Seagate will introduce its <a href="https://www.theregister.co.uk/2018/03/21/seagate_to_drop_multiactuator_hamr_in_2020/">first HAMR drives in 2020</a>. ... a 20TB+ drive will be rolled out in 2020.
</blockquote>
So in a decade the technology had gone from next year to the year after next. The year after next Jim Slater wrote <a href="https://arstechnica.com/gadgets/2020/02/hamr-dont-hurt-em-laser-assisted-hard-drives-are-coming-in-2020/"><i>HAMR don’t hurt ’em—laser-assisted hard drives are coming in 2020</i></a>:<br />
<blockquote>
Seagate has been trialing 16TB HAMR drives with select customers for more than a year and <a href="https://blog.seagate.com/craftsman-ship/hamr-milestone-seagate-achieves-16tb-capacity-on-internal-hamr-test-units/">claims</a> that the trials have proved that its HAMR drives are "plug and play replacements" for traditional CMR drives, requiring no special care and having no particular poor use cases compared to the drives we're all used to.
</blockquote>
But no, it would be another four years before we saw the first signs of HAMR drives in the market. In December 2024 Matthew Connatser reported that <a href="https://www.tomshardware.com/pc-components/hdds/seagate-launches-32tb-exos-m-hard-drive-based-on-hamr-technology-mozaic-3-drives-are-the-worlds-first-generally-available-hamr-hdds"><i>Seagate launches 32TB Exos M hard drive based on HAMR technology – Mozaic 3+ drives are the world’s first generally available HAMR HDDs</i></a>:<br />
<blockquote>
Seagate’s biggest-ever hard drive is finally here, coming with 32TB of capacity courtesy of the company’s new HAMR technology (via <a href="https://www.expreview.com/97328.htm">Expreview</a>).<br />
<br />
It has almost been a year since Seagate said it had finally made <a href="https://www.tomshardware.com/pc-components/hdds/seagates-mozaic-3-hamr-platform-targets-30tb-hdds-and-beyond#xenforo-comments-3834163">a hard drive based on heat-assisted magnetic recording</a> (HAMR) technology using its new Mozaic 3+ platform.<br />
...<br />
Exos drives based on Mozaic 3+ were initially released to select customers in small quantities, but now the general release is (nearly) here, <a href="https://www.tomshardware.com/pc-components/hdds/seagates-hamr-hdds-qualified-by-customers-volume-shipments-imminent">thanks to mass production</a>.
</blockquote>
Note that the drives that are "(nearly) here" are still not available from Amazon, although they are featured on <a href="https://www.seagate.com/products/enterprise-drives/exos/exos-m-3-plus/">Seagate's web site</a>.
Kevin Purdy <a href="https://arstechnica.com/gadgets/2024/12/after-decades-of-talk-seagate-seems-ready-to-actually-drop-the-hamr-hard-drives/">writes</a>:<br />
<blockquote>
Drives based on Seagate's Mozaic 3+ platform, in standard drive sizes, will soon arrive with wider availability than its initial test batches. The driver maker put in a <a href="https://d18rn0p25nwr6d.cloudfront.net/CIK-0001137789/5a69d4a1-883e-41f3-a6b8-f4cfdea91d09.pdf">financial filing earlier this month</a> (PDF) that it had completed qualification testing with several large-volume customers, including "a leading cloud service provider," akin to Amazon Web Services, Google Cloud, or the like. Volume shipments are <a href="https://www.tomshardware.com/pc-components/hdds/seagates-hamr-hdds-qualified-by-customers-volume-shipments-imminent">likely soon to follow</a>.<br />
<br />
There is no price yet, nor promise of delivery, but you can do some wishful thinking on the product page for the Exos M, where 30 and 32TB capacities are offered. That's 3TB per platter, and up to three times the efficiency per terabyte compared to "typical drives," according to Seagate.
</blockquote>
More indications that volume shipments could happen "next year" comes from Chris Mellor's <a href="https://blocksandfiles.com/2024/12/19/wds-hamr-switch-could-be-closer-than-we-think/"><i>WD’s HAMR switch could be closer than we think</i></a>:<br />
<blockquote>
Intevac has said there is strong interest in its HAMR disk drive platter and head production machinery from a second customer, which could indicate that Western Digital is now involved in HAMR disk developments following Seagate’s move into volume production.<br />
<br />
<a href="https://www.intevac.com/">Intevac</a> supplies its <a href="https://www.intevac.com/thin-film/hard-disk-drive/200-lean/">200 Lean</a> thin-film processing machines to hard disk drive media manufacturers, such as Seagate, Showa Denko and Western Digital. It claims more than 65 percent of the world’s HDD production relies on its machinery. The Lean 200 is used to manufacture recording media, disk drive platters, for current perpendicular magnetic recording (PMR) disks.<br />
<br />
Intevac’s main customer for HAMR-capable 200 Lean machines is Seagate, which first embarked on its HAMR development in the early 2000s. It is only this year that a prominent <a href="https://blocksandfiles.com/2024/12/04/seagate-hamr-disk-drive-qualification/">cloud service provider</a> has certified Seagate’s Mozaic 3 HAMR drives for general use, more than 20 years after development first started. The lengthy development period has been ascribed to solving difficulties in producing drives with high reliability from high yield manufacturing processes, and Intevac will have been closely involved in ensuring that its 200 Lean machines played their part in this.
</blockquote>
<h3>Archival Media</h3>
Maybe 2025 will be the year I can finally bring my 12-year-long series about HAMR shipment schedules to a close, 26 years after Seagate started work on the technology. Why have I been HAMR-ing on Seagate all these years, and again now? Not to denigrate Seagate's engineering. Getting a HAMR drive into volume production that meets both the incredibly demanding standards for storage media reliability and performance, and the manufacturing yields needed for profit, is an extraordinarily difficult feat. It is not a surprise that it took a couple of decades.<br />
<br />
My criticisms have been aimed at the storage industry's marketing and PR, which hypes developments that are still in the lab as if they are going to solve customers' problems "next year". And at the technology press, which took far too long to start expressing skepticism. Seagate's marketing eventually lost all credibility, with their predictions about HAMR becoming an industry joke.<br />
<br />
The situation is far worse when it comes to archival media. The canonical article about some development in the lab starts with the famous IDC graph projecting the amount of data that will be generated in the future. It goes on to describe the density some research team achieved by writing say a gigabyte into their favorite medium in the lab. This conveys four false impressions:<br />
<ul>
<li>That there is some possibility they could scale their process up to a meaningful fraction of IDC's projected demand, or even to the microscopic fraction of the projected demand that makes sense to archive. There is no such possibility. Archival media is a much <i>smaller</i> market than regular media.</li>
<li>That the researcher's favorite medium could make it into the market in the timescale of IDC's projections. As we see with HAMR, where research started <a href="https://web.archive.org/web/20190813175046/https://www.seagate.com/news/news-archive/seagate-swings-increase-disc-drive-densities-master-pr/">twenty-six years ago</a>, it won't. Research on the silica medium started <a href="https://www.storagenewsletter.com/2014/10/31/rd-hitachi-rw-of-digital-data-in-fused-silica-glass/">fifteen years ago</a>. Research on the DNA medium started <a href="https://doi.org/10.2307/777811">thirty-six years ago</a>. Neither is within five years of market entry.</li>
<li>That even if the researcher's favorite medium did make it into the market it would be a product that consumers could use. As <a href="https://blog.dshr.org/2014/09/more-on-facebooks-cold-storage.html">Kestutis Patiejunas figured out</a> more than a decade ago, the only way to make the economics of archival storage work is to do it at data-center scale and harvest the synergies that come from not needing data-center power, cooling, staffing, etc.</li>
<li>That anyone either cares or even knows what medium their archived data lives on. Only the hyper-scalers do. Consumers believe their data is safe in the cloud. If anyone really cares about archiving they use a service such as Glacier, when they definitely have no idea what medium is being used.</li>
</ul>
Consumers already have an affordable, durable archival medium. As <a href="https://blog.dshr.org/2024/08/2024-optical-media-durability-update.html">I have shown</a>:<br />
<blockquote>
Surprisingly, with no special storage precautions, generic low-cost media, and consumer drives, I'm getting good data from CD-Rs more than 20 years old, and from DVD-Rs nearly 18 years old.
</blockquote>
The market for DVD-R media and drives is gradually dying because they have been supplanted in the non-archival space by streaming, an illustration that <a href="http://www.usenix.org/events/fast08/tech/marshall.pdf">consumers really don't care</a> about archiving their data!<br />
<h3>DNA Storage</h3>
In 2018's <a href="https://blog.dshr.org/2018/02/dnas-niche-in-storage-market.html"><i>DNA's Niche in the Storage Market</i></a> I imagined myself as the product marketing guy for an attempt to build a rack-scale DNA storage system, and concluded:<br />
<blockquote>
Engineers, your challenge is to increase the speed of synthesis by a factor of a quarter of a trillion, while reducing the cost by a factor of fifty trillion, in less than 10 years while spending no more than $24M/yr.
</blockquote>
The only viable market for DNA storage is the data-center, and the two critical parameters are still the write bandwidth and the write cost. As far as I'm aware despite the considerable progress in the last 6 years both parameters are still many orders of magnitude short of what a system would have needed back then to enter the market. Worse, the last six years of data center technology development have increased the need for write bandwidth and reduced the target cost. DNA storage is in a <a href="https://en.wikipedia.org/wiki/Red_Queen's_race">Red Queen's Race</a> and it is a long way behind.<br />
<br />
Nevertheless, DNA's long-term <i>potential</i> as an archival storage medium justifies continued research. Among recent publications is <a href="https://dx.doi.org/10.1038/s41586-024-08040-5"><i>Parallel molecular data storage by printing epigenetic bits on DNA</i></a> by Cheng Zhang <i>et al</i>, which avoids the need to synthesize strands of DNA by attaching the bits to prexisting strands.
In principle this can be done in parallel.
As is traditional, they start by asserting:<br />
<blockquote>
The markedly expanding global data-sphere has posed an imminent challenge on large-scale data storage and an urgent need for better storage materials. Inspired by the way genetic information is preserved in nature, DNA has been recently considered a promising biomaterial for digital data storage owing to its extraordinary storage density and durability.
</blockquote>
The paper attracted comment from, among others, <a href="https://www.theregister.com/2024/10/25/epibit_dna_storage_research/"><i>The Register</i></a>, <a href="https://arstechnica.com/science/2024/10/how-can-you-write-data-to-dna-without-changing-the-base-sequence/"><i>Ars Technica</i></a> and <a href="https://doi.org/10.1038/d41586-024-03312-6"><i>Nature</i></a>. In each case the commentary included some skepticism. Here are Carina Imburgia and Jeff Nivala from the University of Washington team in <a href="https://doi.org/10.1038/d41586-024-03312-6"><i>Nature</i></a>:<br />
<blockquote>
However, there are still challenges to overcome. For example, epigenetic marks such as methyl groups are not copied by the standard PCR techniques used to replicate DNA, necessitating a more complex strategy to preserve epi-bit information when copying DNA data. The long-term behaviour of the methyl marks (such as their stability) in various conditions is also an open question that requires further study.<br />
<br />
Another challenge is that many applications require random access memory (RAM), which enables subsets of data to be retrieved and read from a database. However, in the epi-bit system, the entire database would need to be sequenced to access any subset of the files, which would be inefficient using nanopore sequencing. Moreover, the overall cost of the new system exceeds that of conventional DNA data storage and of digital storage systems, limiting immediate practical applications;
</blockquote>
You have to read a long way into the <a href="https://dx.doi.org/10.1038/s41586-024-08040-5">paper to find that</a>:<br />
<blockquote>
we stored 269,337 bits including the image of a tiger rubbing from the Han dynasty in ancient China and the coloured picture of a panda ... An automatic liquid handling platform was used to typeset large-scale data at a speed of approximately 40 bits s<sup>−1</sup>
</blockquote>
This is interesting research but the skepticism in the commentaries doesn't exactly convey the difficulty and the time needed to scale from writing less than 40KB in a bit under 2 hours, to the petabyte/month rates (about 2.8TB every 2 hours) Facebook was writing <a href="https://blog.dshr.org/2013/02/facebooks-cold-storage.html">a decade ago</a>. This would be a speed-up of nearly 11 orders of magnitude to compete with decade-old technology.
<h3>Diamonds</h3>
<a href="https://www.theregister.com/2024/11/29/chinese_boffins_find_way_to/"><i>Chinese boffins find way to use diamonds as super-dense and durable storage medium</i></a> by Laura Dobberstein reports that:<br />
<blockquote>
The research, published in <a href="https://www.nature.com/articles/s41566-024-01573-1i">Nature Photonics</a>, highlights that the breakthrough extends beyond density. It is said to offer significant improvements in write times – as little as 200 femtoseconds – and lives up to the promise that "a diamond is forever" by offering millions of years of allegedly maintenance-free storage. Diamonds are highly stable by nature and the the authors have claimed their medium could protect data for 100 years even if kept at 200°C.<br />
<br />
High-speed readout is demonstrated with a fidelity of over 99 percent, according to the boffins.<br />
<br />
Scientists have been eyeing diamonds as storage devices for a while. Researchers at City College of New York in 2016 <a href="https://www.science.org/doi/10.1126/sciadv.1600911">claimed</a> to be the first group to demonstrate the viability of using diamond as a platform for superdense memory storage.
</blockquote>
These researchers, like so many others in the field, fail to understand that the key to success in archival storage is reducing total system cost. Long-lived but expensive media like diamonds are thus counter-productive.<br />
<h3>Project Silica</h3>
I wrote about Microsoft's Project Silica last March, in <a href="https://blog.dshr.org/2024/03/microsofts-archival-storage-research.html"><i>Microsoft's Archival Storage Research</i></a>. The more I think about this technology, the more I think it probably has the best chance of impacting the market among all the rival archival storage technologies:<br />
<ul>
<li>The media is very cheap, so the effect of Kryder's Law economics driving media replacement and thus its economic rather than technical lifetime is minimal.</li>
<li>The media is quasi-immortal and survives benign neglect, so opex once written is minimal.</li>
<li>The media is write-once, and the write and read heads are physically separate, so the data cannot be encrypted or erased by malware. The long read latency makes exfiltrating large amounts of data hard.</li>
<li>The robotics are simple and highly redundant. Any of the shuttles can reach any of the platters. They should be much less troublesome than tape library robotics because, unlike tape, a robot failure only renders a small fraction of the library inaccessible and is easily repaired.</li>
<li>All the technologies needed are in the market now, the only breakthroughs needed are economic, not technological.</li>
<li>The team has worked on improving the write bandwidth which is a critical issue for archival storage at scale. They can currently write hundreds of megabytes a second.</li>
<li>Like <a href="https://blog.dshr.org/2014/09/more-on-facebooks-cold-storage.html">Facebook's archival storage technologies</a>, Project Silica enjoys the synergies of data center scale without needing full data center environmental and power resources.</li>
<li>Like Facebook's technologies, Project Silica has an in-house customer, Azure's archival storage, with a need for a product like this.</li>
</ul>
The expensive part of the system is the write head, because it uses costly femtosecond lasers. The eventual system's economics will depend upon the progress made in cost-reducing the lasers.
<br />
David.http://www.blogger.com/profile/14498131502038331594[email protected]4tag:blogger.com,1999:blog-4503292949532760618.post-2724125453319868992024-12-31T08:00:00.000-08:002024-12-31T08:00:00.118-08:00Self-Own<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://imgs.xkcd.com/comics/duty_calls.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="330" data-original-width="300" height="200" src="https://imgs.xkcd.com/comics/duty_calls.png" width="182" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">Credit: <a href="https://xkcd.com/386/">XKCD</a><br /></td></tr></tbody></table>
The Cambridge dictionary defines the verb to <a href="https://dictionary.cambridge.org/dictionary/english/bullshit">bullshit</a> as:<br />
<blockquote>
a rude word meaning to try to persuade someone or make them admire you by saying things that are not true
</blockquote>
The essence of successful bullshit is that it should be both plausible and presented authoritatively. Bullshitters are always tempted to buttress the appearance of authority by including actual evidence rather than just their interpretation of the evidence, but this is often a fatal mistake. Below the fold I discuss a classic example from MAGA's campaign to demonize immigrants.<br />
<span><a name='more'></a></span>
<br />
<a href="https://x.com/GabeGuidarini/status/1873114153105121647">@GabeGuidarini tweeted</a>:<br />
<blockquote>
<b>𝐓𝐡𝐢𝐬 𝐢𝐬 𝐭𝐡𝐞 𝐦𝐨𝐬𝐭 𝐢𝐦𝐩𝐨𝐫𝐭𝐚𝐧𝐭 𝐩𝐨𝐬𝐭 𝐲𝐨𝐮’𝐥𝐥 𝐞𝐯𝐞𝐫 𝐫𝐞𝐚𝐝 𝐨𝐧 𝐦𝐚𝐬𝐬 𝐢𝐦𝐦𝐢𝐠𝐫𝐚𝐭𝐢𝐨𝐧 𝐢𝐧𝐭𝐨 𝐭𝐡𝐞 𝐔𝐧𝐢𝐭𝐞𝐝 𝐒𝐭𝐚𝐭𝐞𝐬</b>:
<br />
<br />In 1924, President Calvin Coolidge signed the Johnson-Reed Immigration Act, which halted mass immigration into the United States.
<br />
<br />The act completely stopped immigration from Asia, and set strict quotas on immigration from other places including Europe.
<br />
<br />Wages began to dramatically increase.
<br />
<br />By the 1950s, America reached the peak of its economic and industrial might. Economic inequality was low. Large businesses and workers alike were prospering.
<br />
<br />Then, in 1965 the Hart-Cellar Immigration Act was signed by President LBJ, opening the floodgates and allowing for massive unchecked immigration, especially from the global south.
<br />
<br />Immediately, income growth and wage growth for the bottom 90% of earners came to an abrupt halt.
<br />
<br />Soon after, the incomes for the top 1% of earners skyrocketed, leading to the massive wealth inequality in America we see today.
<br />
<br />The political left attributes this to simply a lack of proper taxation and regulation, but that’s mainly not the case.
<br />
<br />Mass immigration has allowed for modern scab labor to become the norm, allowing large companies to pay lower wages for foreign migrants who demand less.
<br />
<br />The loser? America’s middle class, which has been deteriorating for more than half a century now.
<br />
<br />When you see wealthy technocrats argue in favor of mass “skilled” immigration, keep this in mind.
</blockquote>
Who is GabeGuidarini?<br />
<blockquote>
Ohio Field Rep @TPAction_. Comms @OhioCRs. President @UDRepublicans. Fmr Acting President @uscollegegop.
</blockquote>
He is a Republican operative. His chain of causation sounds convincing, doesn't it?<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiy0dfNt11OYkcm-pvxQDby-x3C8tMs17WcWzXNIGYS6RRrQffhyZaagetmnXOEL38691U725nVs7fonsezywwRhl3yGxDAl_kyTAEqnl9hWuPK8jAy2SwVws2bRDpudADbhRw8dgLTC1c8Krag15g2f8h81022GkjjxfevOt6lxsPUHMlH4J-xRmdzcKBc/s800/Gf6jZO4XAAE9wVR.jpeg" style="display: block; padding: 1em 0px; text-align: center;"><img alt="" border="0" data-original-height="600" data-original-width="800" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiy0dfNt11OYkcm-pvxQDby-x3C8tMs17WcWzXNIGYS6RRrQffhyZaagetmnXOEL38691U725nVs7fonsezywwRhl3yGxDAl_kyTAEqnl9hWuPK8jAy2SwVws2bRDpudADbhRw8dgLTC1c8Krag15g2f8h81022GkjjxfevOt6lxsPUHMlH4J-xRmdzcKBc/s400/Gf6jZO4XAAE9wVR.jpeg" width="400" /></a>
But he made the bullshitter's fatal mistake. He included this graph. Lets annotate it. First we have Guidarini's claim that:<br />
<blockquote>
In 1924, President Calvin Coolidge signed the Johnson-Reed Immigration Act, which halted mass immigration into the United States.<br />
<br />
The act completely stopped immigration from Asia, and set strict quotas on immigration from other places including Europe.<br />
<br />
Wages began to dramatically increase.
</blockquote>
Lets put 1924 on the graph.<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikd8J7AyvDOZOtvnfFLQERwqap0dIfbUTakL9_lCKfrg-FhB2LUtUNKNIVQSL5Jf8BmGX6TWApYmyKbhKQkKZV3E1L5H1iIzMctsfNdyGMtdWtgEO4OMcHEqD561Kaji1DvXuwkrPJO0ZudBEkHVxFD-wqkgLxX21xJxqdYrhZ4JwdIpxL8T6L9yoLG1CZ/s2048/1924.jpeg" style="display: block; padding: 1em 0px; text-align: center;"><img alt="" border="0" data-original-height="1536" data-original-width="2048" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikd8J7AyvDOZOtvnfFLQERwqap0dIfbUTakL9_lCKfrg-FhB2LUtUNKNIVQSL5Jf8BmGX6TWApYmyKbhKQkKZV3E1L5H1iIzMctsfNdyGMtdWtgEO4OMcHEqD561Kaji1DvXuwkrPJO0ZudBEkHVxFD-wqkgLxX21xJxqdYrhZ4JwdIpxL8T6L9yoLG1CZ/s400/1924.jpeg" width="400" /></a>
Whose wages had the dramatic increase in 1924? Right, the 1%. Whose wages were flat from 1924 until the Great Depression? Right, the bottom 90%. Guidarini is just wrong. The dramatic increase in the wages of the bottom 90% happened in 1940, 16 years later. Can you think of a cause for the dramatic increase in 1940? It surely wasn't the <a href="https://dh-wordpress.ramapo.edu/discovering1920s/blog/2021/02/24/the-immigration-act-of-1924the-johnson-reed-act/">Johnson-Reed Immigration Act</a> of 1924.<br />
<br />
Second, we have Guidarini's claim that:<br />
<blockquote>
By the 1950s, America reached the peak of its economic and industrial might.
</blockquote>
If America's "economic and industrial might" peaked in the 50s, why did the incomes of the bottom 90% continue rising until 1973?<br />
<br />
Third we have Guidarini's claim that:<br />
<blockquote>
Then, in 1965 the Hart-Cellar Immigration Act was signed by President LBJ, opening the floodgates and allowing for massive unchecked immigration, especially from the global south.<br />
<br />
Immediately, income growth and wage growth for the bottom 90% of earners came to an abrupt halt.
</blockquote>
Lets put 1965 on the graph.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCOavgGBKYYXHimT0G9EvOVEEgeLSQcRS8qnpqgwOwShyjeLt44j4rdd3-lVKc6BKn96Om6hGHzfBQl8jqjiojb9h2D2MMMNsP5MS7fcFGiNzhiW9jKWNYt6vXTYcsvApCUZFZk6X_20kDyoOgrbQJ4ldzPsHyQ43MqfRKYQmn_sahHV4hn_Pb32GSRCk7/s400/1965.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="300" data-original-width="400" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCOavgGBKYYXHimT0G9EvOVEEgeLSQcRS8qnpqgwOwShyjeLt44j4rdd3-lVKc6BKn96Om6hGHzfBQl8jqjiojb9h2D2MMMNsP5MS7fcFGiNzhiW9jKWNYt6vXTYcsvApCUZFZk6X_20kDyoOgrbQJ4ldzPsHyQ43MqfRKYQmn_sahHV4hn_Pb32GSRCk7/w400-h300/1965.jpeg" width="400" /></a></div><br />Can you see the income growth for the bottom 90% come to an immediate halt? No, wages continued rising as they had been since 1940 until 1973, another 8 years. Did the <a href="https://en.wikipedia.org/wiki/Immigration_and_Nationality_Act_of_1965">Hart-Cellar Immigration Act</a> of 1965 cause wages to flatten in 1973? Whose income flat-lined after 1965 for a decade and a half? Right, the 1%.<br />
<br />
Lastly, we have Guidarini's claim that soon after 1965:<br />
<blockquote>
the incomes for the top 1% of earners skyrocketed, leading to the massive wealth inequality in America we see today.
</blockquote>
Can you see when the "incomes for the top 1% of earners skyrocketed"? That's right, it was in 1985, so "soon" means 20 years! And can you guess who was President of the US, and from what party, then? Right, it was a certain <a href="https://en.wikipedia.org/wiki/Ronald_Reagan">Ronald Reagan</a>, a Republican.<br />
<br />
David.http://www.blogger.com/profile/14498131502038331594[email protected]2tag:blogger.com,1999:blog-4503292949532760618.post-56963550966799893962024-12-17T08:00:00.000-08:002024-12-17T08:00:00.232-08:00Cherry-picking<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp4AYMyGDmf_kJD3Oroml_OX5vrv0VaGLnx3TcvOKISjrZPsxaDCZAr4sei3DC6rPm86vWfH4NOy0nHUq-4BwRvJhYYSBomKoRCyG6X-zfk8FMcdOAcuCKeX6VDniMZHZeoV8cshpM8IBrqB_7bv5rYs1gd83qGlebHRuL7zkpGlDuSSzGacGvvfGHcDFs/s1200/topstocks.jpg" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="1200" data-original-width="865" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp4AYMyGDmf_kJD3Oroml_OX5vrv0VaGLnx3TcvOKISjrZPsxaDCZAr4sei3DC6rPm86vWfH4NOy0nHUq-4BwRvJhYYSBomKoRCyG6X-zfk8FMcdOAcuCKeX6VDniMZHZeoV8cshpM8IBrqB_7bv5rYs1gd83qGlebHRuL7zkpGlDuSSzGacGvvfGHcDFs/w144-h200/topstocks.jpg" width="144" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">Source</td></tr></tbody></table>
Via <a href="https://ritholtz.com/2024/12/weekend-reads-642/">Barry Ritholtz</a> we find this infographic entitled <i>Top Performing S&P 500 Stocks</i> showing the best total return over the past 5, 10, 15 and 20 years. Ritholtz sourced it from <a href="https://www.visualcapitalist.com/ranked-the-top-performing-sp-500-stocks-in-the-last-two-decades/"><i>Ranked: The Top Performing S&P 500 Stocks in the Last Two Decades</i></a> By Marcus Lu with graphic design by Miranda Smith.<br />
<br />
In each case, Nvidia is the best performing stock, and it is the only stock to appear in all four periods. Sounds great, doesn't it? Why wouldn't you just hold NVDA all the time and be guaranteed to beat the market?<br />
<br />
But follow me below the fold for more detail from someone who has been long NVDA for more than three decades..<br />
<span><a name='more'></a></span>
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEignU3O5Nn1u4YzLI5obU8SScmUlpe4jXILiDJ9EL2tLEOXqJo0pN5pp13gl7PLORvzr4zSwr1IBhXTHjVsSvcTB_wHOCp6QnzaHzKY3OOrV-DQ5iYmsoyAFtbutByq7RwDaDSsyVOSAB5LXWh4NrIDQ2KfQMVPCQMPhSJrYMKdmMqXY1HK5RSCquHuUlk_/s2636/NVDA-LogPlot.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="1386" data-original-width="2636" height="210" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEignU3O5Nn1u4YzLI5obU8SScmUlpe4jXILiDJ9EL2tLEOXqJo0pN5pp13gl7PLORvzr4zSwr1IBhXTHjVsSvcTB_wHOCp6QnzaHzKY3OOrV-DQ5iYmsoyAFtbutByq7RwDaDSsyVOSAB5LXWh4NrIDQ2KfQMVPCQMPhSJrYMKdmMqXY1HK5RSCquHuUlk_/w400-h210/NVDA-LogPlot.png" width="400" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://yhoo.it/37Y7noI">Source</a></td></tr></tbody></table>
Alas, this infographic is deeply misleading because they cherry-picked their data. Nvidia's stock price is extraordinarily volatile. The log plot of NVDA shows that on average over its history every three years it suffers a drop of between 45% and 80%. Fortunately, over the same time it has had much larger rises. Thus when discussing the return for being long NVDA for a period the start and end dates matter a lot.<br />
<br />
<table border="1" cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right; margin-left: 1em; text-align: right;"><tbody>
<tr>
<th>Dec</th><th>Close</th><th>Dec</th><th>Close</th><th>NVDA</th><th>S&P</th>
</tr>
<tr><td>2004</td><td>0.19</td><td>2009</td><td>0.38</td><td>+100%</td><td>-9.1%</td></tr>
<tr><td>2009</td><td>0.38</td><td>2014</td><td>0.48</td><td>+26%</td><td>+85.8%</td></tr>
<tr><td>2014</td><td>0.48</td><td>2019</td><td>5.91</td><td>+1131%</td><td>+61.7%</td></tr>
<tr><td>2019</td><td>5.91</td><td>2024</td><td>134.25</td><td>+22715%</td><td>+87.6%</td></tr>
</tbody>
</table>
This table shows the performance of NVDA and the S&P 500 over each of the 5-year periods in the infographic. Over three of the 5-year periods NVDA out-performed the S&P 500, and over the remaining one it under-performed. By choosing appropriate starting points it is easy to find other 5-year periods when NVDA under-performed the S&P 500. For example, from 8/2007 to 8/2012 NVDA returned -63.7% but the S&P returned -5.6%. Or from 11/2001 to 11/2006 NVDA returned +10.7% but the S&P returned +23.5%.<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLrEqV0nU9l1nNaZObbhjj2DMvR3tKozrH4Saa0aaHGGZPvAvjj4LWRO8uPc5j0OosBQWUjU1mGMgGgctPi6twSGJi2cKOi4FhOothmwosuF9c8qNRnDMhe8S52qQx2FjUuSV7nYd2ao3kWTNQHQzNlWS1VCR9fqyR305IpIqXhPVcd6ROHrjG5bj-tDiI/s1972/NVDA.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="1130" data-original-width="1972" height="114" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLrEqV0nU9l1nNaZObbhjj2DMvR3tKozrH4Saa0aaHGGZPvAvjj4LWRO8uPc5j0OosBQWUjU1mGMgGgctPi6twSGJi2cKOi4FhOothmwosuF9c8qNRnDMhe8S52qQx2FjUuSV7nYd2ao3kWTNQHQzNlWS1VCR9fqyR305IpIqXhPVcd6ROHrjG5bj-tDiI/w200-h114/NVDA.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.nasdaq.com/market-activity/stocks/nvda/advanced-charting">Source</a></td></tr></tbody></table>
Although the infographic suggests that the huge out-performance started 20 years ago and has been decreasing, this is misleading for two reasons. First, the infographic's numbers are for the whole 20-year period, not for each 5-year period. Second, they are dominated by the rise in the most recent 5-year period. The linear plot of NVDA makes it clear that, had the most recent 5-year period been like any of the others, Nvidia would not have been in the infographic at all.<br />
<br />
None of this is financial advice. Nevertheless, Nvidia is a great company, and it is possible to make money in its stock. There are two ways to do it, trading on the stock's volatility, or buying low and being prepared to hold it for many years.<br />
<br />
Remember, past performance is no guarantee of future performance. If NVDA were to repeat the past 5-year return over the next 5 years, it would be around $3,100. To maintain its current P/E of 52.85 it would need annual revenue of around $2.6T.<br />
<br />
David.http://www.blogger.com/profile/14498131502038331594[email protected]0tag:blogger.com,1999:blog-4503292949532760618.post-5996908829857513772024-12-03T08:00:00.035-08:002024-12-03T08:00:00.224-08:00Drones<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://en.wikipedia.org/wiki/File:[email protected]#/media/File:[email protected]" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img alt="Fictional CEO demonstrates microdrone" height="106" src="https://upload.wikimedia.org/wikipedia/en/f/f3/Slaughterbots_low-quality_cropped_screen_capture_%4000.01.05.jpg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.youtube.com/watch?v=9CO6M2HsoIA&t=2s">Source</a></td></tr></tbody></table>
In 2017 the <a href="http://futureoflife.org/">Future of Life Institute</a> released a video entitled <a href="https://www.youtube.com/watch?v=HipTO_7mUOw"><i>Slaughterbots</i></a>. Wikipedia describes it <a href="https://en.wikipedia.org/wiki/Slaughterbots">as an</a>:<br />
<blockquote>
arms-control advocacy video presenting a dramatized near-future scenario where swarms of inexpensive <a href="https://en.wikipedia.org/wiki/Micro_air_vehicle">microdrones</a> use <a href="https://en.wikipedia.org/wiki/Artificial_intelligence">artificial intelligence</a> and <a href="https://en.wikipedia.org/wiki/Facial_recognition_software">facial recognition software</a> to assassinate political opponents based on preprogrammed criteria.
</blockquote>
War accelerates technological progress. The war in Ukraine has not yet produced "slaughterbots" but it has greatly accelerated drone technology and taken some giant steps toward them. The most important of these steps is that the cost of precision strike has been reduced by 1-2 orders of magnitude, making it affordable for "non-state actors" and even individuals.<br />
<br />
Below the fold I look at drone developments in the war in Ukraine, what is happening with drones and drone defense in the West, and sketch some implications for the future.<br />
<span><a name='more'></a></span>
<br />
In parallel with the military developments I discuss here, there is rapid evolution in civilian drone systems, especially in China, which can be expected to feed into the military space. For example, Arnaud Bertrand describes Pingyin County's <a href="https://x.com/RnaudBertrand/status/1862726569040781505">low-altitude economy</a>:<br />
<blockquote>
The "low-altitude economy" is a big trend in China at the moment. XPeng, one of China's leading EV manufacturers, recently released a low-altitude flying car for instance. Drone deliveries are becoming increasingly common in Chinese cities, and various regions are actively developing low-altitude transportation networks. Shanghai, for instance, plans to establish 400 low-altitude flight routes by 2027.<br />
...<br />
this experiment in Pingyin County might seem small, but it could be the beginning of something truly revolutionary. This is China effectively experimenting around becoming the world's first truly three-dimensional economy, with low-altitude transportation and logistics networks. In a decade or two Chinese cities might have as much activity happening in the sky as on the ground.
</blockquote>
<h2>Ukraine</h2>
The drone systems I am discussing here fall into two classes:<br />
<ul>
<li>Small systems such as First Person View (FPV) quadcopters, with a range of a few tens of kilometers.</li>
<li>Larger systems navigating autonomously by GPS or other means with a range of hundreds of kilometers but relatively slow speeds of up to 200Kph.</li>
</ul>
I am excluding faster systems such as short-range missiles like HIMARS and cruise missiles such as Storm Shadow.<br />
<h3>Short Range Drones</h3>
The battlefield use of small fixed-wing and FPV quadcopter drones in the class of DJI's <a href="https://store.dji.com/product/dji-mavic-3-pro">Mavic</a> and <a href="https://store.dji.com/product/m350-rtk-and-dji-care-enterprise-basic">Matrice</a> has transformed both reconnaissance and strike. They cost a few hundred to a few thousand dollars; for comparison a <a href="https://www.defenseone.com/business/2024/04/goal-100k-artillery-shells-month-sight-army-says/396047/">155mm shell is around $3K</a>.<br />
<h4>Reconnaissance</h4>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjG4XHxtvuDG0IyMuTwLrStz8kyfVA_On4VUmsST_N6R_EmxDfjL_KlTTyAPDqHManUZ2F2EJXMmAJh58aehmYJkvxesqO14yB034-7y4gd5hDJGKtGG8gQmpsGVVKMqDM3cgnwpJoA1SYajVtlxFGSnoSBFGrI8Zj_ORxgtlSwWxE_oD97w8MxgaGcXAH1/s1200/Orlan-10.jpg" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="800" data-original-width="1200" height="133" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjG4XHxtvuDG0IyMuTwLrStz8kyfVA_On4VUmsST_N6R_EmxDfjL_KlTTyAPDqHManUZ2F2EJXMmAJh58aehmYJkvxesqO14yB034-7y4gd5hDJGKtGG8gQmpsGVVKMqDM3cgnwpJoA1SYajVtlxFGSnoSBFGrI8Zj_ORxgtlSwWxE_oD97w8MxgaGcXAH1/w200-h133/Orlan-10.jpg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">By Mil.ru, <a href="https://creativecommons.org/licenses/by/4.0" title="Creative Commons Attribution 4.0">CC BY 4.0</a>, <a href="https://commons.wikimedia.org/w/index.php?curid=93867440">Link</a></td></tr></tbody></table>
Small drones, such as the Russian <a href="https://en.wikipedia.org/wiki/Orlan-10">Orlan-10</a>, provide an eagle's-eye view of the battlefield with real-time video. They have greatly extended the range of battle field surveillance. With zoom lenses they can provide detail at these longer ranges. With GPS they can provide precise target locations. With thermal cameras they can do all this at night.<br />
<br />
These changes have had significant tactical effects:<br />
<ul>
<li>Movement within about 20Km of the front line has become much more dangerous. Night is no longer a good cover for movement. This has made logistical support for positions close to the front more difficult. <a href="https://www.economist.com/europe/2024/12/02/how-ukraine-uses-cheap-ai-guided-drones-to-deadly-effect-against-russia">For example</a>:<br />
<blockquote>
That has made some sections of the front lines, for example around Siversk in Luhansk province, practically no-go areas for humans. Drones are now responsible for a majority of battlefield losses, overtaking artillery, according to Ukrainian sources.
</blockquote>
</li>
<li>Damage assessment has become much easier. Real-time video of strikes can estimate their effects accurately, avoiding wasting ammunition by repeated strikes on targets that have been sufficiently disabled.</li>
<li>The vast amount of video generated, much of it from drones and the rest from cellphones allows selected clips to be posted to social media used for propaganda and for units to fund-raise. Donations are significant, especially on the Russian side for vehicles, and on the Ukrainian side to <a href="https://www.economist.com/europe/2024/12/02/how-ukraine-uses-cheap-ai-guided-drones-to-deadly-effect-against-russia">support drone manufacture</a>:<br />
<blockquote>
The Ukrainian state is buying more than it once was, but voluntary foundations still provide at least a third of all drones used by the army.
</blockquote>
</li>
<li>This cornucopia of video fuels an active <a href="https://en.wikipedia.org/wiki/Open-source_intelligence">open source intelligence</a> community and especially their impressive ability to geolocate. It has become much harder for combatants to hide events from the public.</li>
</ul>
<h4>Strike</h4>
Kamikaze FPV drones provide sniper-like precision strike, but at vastly longer range, with much heavier warheads, and the ability to access <a href="https://x.com/Osint613/status/1852045500519981272">targets that snipers cannot</a>. For example, social media videos routinely show FPV drones striking targets inside buildings or infantry fighting vehicles (IFVs) after entering through open doors. The warheads in common use include anti-armor explosively formed projectiles — here is a <a href="https://twitter.com/mouw5284/status/1859996364563939769">small FPV drone</a> costing a few thousand dollars demolishing a <a href="https://en.wikipedia.org/wiki/T-90">T-90</a>, the most advanced tank Russia has deployed costing perhaps $3-5M. Note the precision with which the FPV drone strikes the joint between the turret and the hull. And <a href="https://twitter.com/PStyle0ne1/status/1862419476454535531">here</a> four FPV drones totaling around $10K destroy a $24M Zoopark radar.<br />
<br />
<a href="https://commons.wikimedia.org/wiki/File:Javelin_Fire!_(48638261261).jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;" title="The U.S. Army,
Sgt. Liane Hatch/3rd Brigade Combat Team, 4th Inf, Public domain, via Wikimedia Commons"><img alt="Javelin Fire! (48638261261)" height="133" src="https://upload.wikimedia.org/wikipedia/commons/thumb/3/35/Javelin_Fire%21_%2848638261261%29.jpg/512px-Javelin_Fire%21_%2848638261261%29.jpg?20190831161453" width="200" /></a>
Compare this to the US <a href="https://en.wikipedia.org/wiki/FGM-148_Javelin">FGM-148 Javelin</a> with a unit cost of around $250K, a range of less than 5Km and weighing 22Kg. Is one Javelin as effective as 50 FPV drones delivering perhaps six times the weight of warhead at more than twice the range?<br />
<br />
There are also many FPV strike drones that are not kamikaze. There are "<a href="https://en.wikipedia.org/wiki/Dragon_drone">Dragon drones</a>" that drop burning thermite on <a href="https://arstechnica.com/culture/2024/09/ukrainian-drones-now-spray-2500-c-thermite-streams-right-into-russian-trenches/">trenches</a> or <a href="https://twitter.com/bayraktar_1love/status/1860401081949306998">disabled armor</a>. The <a href="https://dykishershni.com/en.html">Wild Hornets drone manufacturer</a> claims their <a href="https://twitter.com/wilendhornets/status/1861477843622101197">Queen Hornets product</a>:<br />
<blockquote>
is a versatile platform capable of mining, bombing enemy positions, delivering supplies, transporting drones, firing an assault rifle or grenade launcher, and relaying communications
</blockquote>
Then there is the night bomber drone the Ukrainians call "Vampire" and the Russians <a href="https://en.wikipedia.org/wiki/Baba_Yaga_(aircraft)">Baba Yaga</a>:<br />
<blockquote>
The drone is a large hexacopter (6-rotor) drone. It is equipped with an infrared (thermal imaging) camera and able to carry up to a 33-pound (15kg) rocket warhead.<br />
...<br />
Baba Yaga was used both as a bomber deploying "mortar-sized munitions" and also as a "mother-ship" drone equipped with a signal repeater, anti-jamming equipment, batteries, and directional antennas. Its ability to function as a signal repeater extended the battery life and range of secondary drones. During the Russian invasion of Ukraine, the drones have been used primarily at night.
</blockquote>
<a href="https://twitter.com/PStyle0ne1">@PStyle0ne1</a> tweeted video of a Baba Yaga destroying a Russian BUK-M1 air defense system hidden in a forest at night with a <a href="https://twitter.com/PStyle0ne1/status/1857753071108948057">precise bomb drop</a>. Drones in this class are also highly effective at <a href="https://twitter.com/casualdiot/status/1860744358858826010">laying minefields</a>.<br />
<br />
Although Baba Yaga carries the same size warhead as a <a href="https://en.wikipedia.org/wiki/Shahed_131">Shahed 131</a>, there is a huge gap in range and speed. But systems are emerging to fill it, such as one in the video tweeted by <a href="https://x.com/Bricktop_NAFO">@Bricktop_NAFO</a> that <a href="https://x.com/Bricktop_NAFO/status/1858215277663842801">converts between fixed-wing and quadcopter</a> in flight.<br />
<br />
There are now also specialized <a href="https://twitter.com/bayraktar_1love/status/1858994042509684840">drone motherships</a> that carry 4-6 FPV drones and relay their communications, greatly extending their range of action.<br />
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right; margin-left: 1em; text-align: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIsj1C3Z1DcGVmQ5Tq8rn0DSeTgACeiiP1u9Hv-ZE0LGIzACUXB8UlBJpZ9cm98153Xgs8uVENCkmcksBZi0-yrZnECTQl7mmRn1LBUFMa0OLkbRq0pLGPqqXohG2_I2XNH188i2rhSgrcAqeSPY_uHF_lNv6iqcV9_RilQDOkl5v8eA0HfYsmMuMmTzp-/s3456/Lancet.jpeg" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="2304" data-original-width="3456" height="133" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIsj1C3Z1DcGVmQ5Tq8rn0DSeTgACeiiP1u9Hv-ZE0LGIzACUXB8UlBJpZ9cm98153Xgs8uVENCkmcksBZi0-yrZnECTQl7mmRn1LBUFMa0OLkbRq0pLGPqqXohG2_I2XNH188i2rhSgrcAqeSPY_uHF_lNv6iqcV9_RilQDOkl5v8eA0HfYsmMuMmTzp-/w200-h133/Lancet.jpeg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">ZALA Lancet<br /><a href="https://en.wikipedia.org/wiki/ZALA_Lancet#/media/File:Army-2020-314.JPG">Nickel nitride</a>, CC0<br /></td></tr></tbody></table>
On the Russian side the predominant strike drone is the <a href="https://en.wikipedia.org/wiki/ZALA_Lancet">Lancet</a>, a propeller-driven fixed-wing drone costing around $20K with a range up to 40Km. It has been fairly effective until recently (see Defense below), but probably less cost-effective than the much cheaper quadcopter FPV drones.<br />
<br />
The Achilles heel of all these drones is their dependence upon radio communication for command and control, which can be both detected and jammed. Worse, the command and control transmitter can be located and attacked; drone pilots are a high-priority target for both sides. <a href="https://x.com/GrandpaRoy2/status/1798050100633366633">This tweet</a> shows the Ukrainians using remotely-controlled directional antennas so to minimize the risk of detection, and the loss if attacked.<br />
<br />
Thus both sides have started to deploy drones controlled via a fiber optic cable. David Hambling reports on a Ukrainian version in <a href="https://www.forbes.com/sites/davidhambling/2024/11/07/ukraine-fields-reboff-unjammable-fiber-optic-fpv-attack-drone/"><i>Ukraine Fields Unjammable Fiber Optic FPV Attack Drone</i></a>:<br />
<blockquote>
Khyzak REBOFF is a new Ukrainian FPV kamikaze drone with fiber optic cable for communication instead of radio. This makes it immune to jamming , the most effective protection against small drones.<br />
<br />
Russia has deployed similar technology with the Prince Vandal FPV used in action since August, and which has been lethally effective. However, Ukrainian expert Serhii Flash believes this is a Chinese model which the Russian suppliers rebranded and sold to the military (at a 750% markup), and which was not designed for military use.
</blockquote>
The <a href="https://x.com/GrandpaRoy2/status/1855078938164482502">video in this tweet</a> shows that the fiber doesn't impair the FPV drone's remarkable agility. And <a href="https://x.com/GrandpaRoy2/status/1853504089734451210">this tweet</a> from the Russian side highlights the high-definition video characteristic of fiber optic drones. This thread discusses the <a href="https://twitter.com/GrandpaRoy2/status/1862908038149194028">many advantages fiber optics have over radio</a> in drone warfare. However, replacing radio with fiber adds cost and weight, and reduces range.<br />
<br />
The other way to prevent detection and neutralize jamming is to remove the need for a remote pilot by having the drone detect potential targets and select the most valuable autonomously, as implemented for example in the UK's "fire-and-forget" <a href="https://en.wikipedia.org/wiki/Brimstone_(missile)#Targeting_and_sensors">Brimstone</a> missile. Brimstone costs around $130K, over an order of magnitude more than these Ukrainian autonomous drones. They are cheap enough to be used in swarms, as shown in <a href="https://x.com/banderafella/status/1851657984377598327">this tweet's video</a>.<br />
<br />
The US military <a href="https://www.armyupress.army.mil/Portals/7/military-review/Archives/English/Online-Exclusive/2024/Multidomain-Battlefield-AI/Multidomain-Battlefield-AI-UA.pdf">reports that</a>:<br />
<blockquote>
Attaching infrared and visible light sensors to unmanned systems with onboard object detection and tracking will also increase model performance and targeting effects regardless of illumination conditions. The Ukrainian army is already deploying semiautonomous multirotor drones with onboard edge devices to fly munitions into Russian tanks autonomously.
</blockquote>
Max Hunter's <a href="https://www.reuters.com/world/europe/ukraine-rolls-out-dozens-ai-systems-help-its-drones-hit-targets-2024-10-31/"><i>Ukraine rolls out dozens of AI systems to help its drones hit targets</i></a> provides more detail:<br />
<blockquote>
Ukraine is using dozens of domestically made AI-augmented systems for its drones to reach targets on the battlefield without being piloted, a senior official said, disclosing new details about the race against Russia to harness automation.<br /><br />
Systems that use artificial intelligence allow cheap drones carrying explosives to spot or fly to their targets in areas protected by extensive signal jamming, which has reduced the effectiveness of manually piloted drones.<br />
...<br />
A Ukrainian official told Reuters in July that most first person view units' target strike rate had fallen to 30%-50%, while for new pilots that can be as low as 10%, and that signal jamming was the main problem.<br /><br />
The official predicted that AI-operated first person view drones could achieve hit rates of around 80%.
</blockquote>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrFfSmUv1EGSITJ7xs9Tvy1ShxrE2vJS6p8sw1SCvYmMeF5kupFZ3YlD3eLtg6npwW8kvT82-kTpXSpaVOXyDC6iJdi0-50ecflzd1BIeZv8Oyvqtk0X0eTbKMoep4quQoyHalqKOTmAV5yLDoU0mvlYjlhtgUfXk2pV3QXynxV56b9KcLv6DS65q1cdCe/s956/CoralDrone.jpeg" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="720" data-original-width="956" height="151" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrFfSmUv1EGSITJ7xs9Tvy1ShxrE2vJS6p8sw1SCvYmMeF5kupFZ3YlD3eLtg6npwW8kvT82-kTpXSpaVOXyDC6iJdi0-50ecflzd1BIeZv8Oyvqtk0X0eTbKMoep4quQoyHalqKOTmAV5yLDoU0mvlYjlhtgUfXk2pV3QXynxV56b9KcLv6DS65q1cdCe/w200-h151/CoralDrone.jpeg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://x.com/GrandpaRoy2/status/1856029465408876822">Source</a></td></tr></tbody></table>
These systems are already in action. <a href="https://x.com/GrandpaRoy2">@GrandpaRoy2</a> <a href="https://x.com/GrandpaRoy2/status/1856029465408876822">tweeted</a>:<br />
<blockquote>
The Russians claim they have recovered a Ukrainian FPV with AI target acquisition and terminal guidance.<br />
...<br />
The FPV has a ‘Google Coral AI’ single board computer for machine language development.
</blockquote>
That is a <a href="https://www.coral.ai/products/dev-board">$130 add-on</a>. <a href="https://x.com/bayraktar_1love">Special Kherson Cat</a> tweeted <a href="https://twitter.com/bayraktar_1love/status/1858864436863279492">video of an attack</a>:<br />
<blockquote>
The 129th TD Brigade stopped a Russian BTR-82 in Kursk region, and finished it off with FPV with an automatic targeting system
</blockquote>
<i>The Odessa Journal</i>'s <a href="https://odessa-journal.com/ukrainians-have-created-an-ai-for-drones-that-automatically-identifies-and-strikes-targets"><i>Ukrainians have created an AI for drones that automatically identifies and strikes targets</i></a> provides more detail:<br />
<blockquote>
Our AI system not only recognizes static targets but also performs precise targeting of moving objects at speeds of up to 60 km/h. It can simultaneously track multiple targets and prioritize one for strike<br />
...<br />
Unlike traditional computer vision technologies, this system was trained on a specially created database and can recognize seven types of targets: infantry, cars, minivans, trucks, air defense systems, artillery, tanks, and armored vehicles.<br />
...<br />
The automatic target recognition range varies from 150 to 800 meters depending on the object type, with the maximum targeting range being up to 1000 meters. The system can be installed on any type of FPV kamikaze drones, including multicopters, wings, and airplanes. It is equipped with its own camera, connects to the flight controller and standard VTX, and drone control is done via a standard remote.<br />
<br />
According to the interview, the system costs about $50 more than traditional targeting systems.
</blockquote>
<i>The Economist</i>'s <a href="https://www.economist.com/europe/2024/12/02/how-ukraine-uses-cheap-ai-guided-drones-to-deadly-effect-against-russia"><i>How Ukraine uses cheap AI-guided drones to deadly effect against Russia</i></a> agrees with this cost estimate:<br />
<blockquote>
Yaroslav Azhnyuk, the founder of The Fourth Law, says that his own “autonomy module” is around $50 to $100 per unit for Ukrainian customers buying thousands of units.
</blockquote>
The cost-benefit ratio of adding AI is reportedly <a href="https://www.economist.com/europe/2024/12/02/how-ukraine-uses-cheap-ai-guided-drones-to-deadly-effect-against-russia">considerable</a>:<br />
<blockquote>
Data from the battlefield suggest that the hit rate for these AI-guided drones is currently above 80%. That is higher than the rate of manually piloted drones. As important, the training burden declines dramatically. Mr Liscovich notes that, although there are now more highly experienced drone pilots, some with thousands of hours of flying time, the average quality of Ukrainian personnel has fallen over time as less motivated people are conscripted. “We can train an operator within 30 minutes and the quality of the engagement doesn’t depend on their piloting skills,”
</blockquote>
With feedback from use in combat, the performance of these systems is <a href="https://www.economist.com/europe/2024/12/02/how-ukraine-uses-cheap-ai-guided-drones-to-deadly-effect-against-russia">improving rapidly</a>:<br />
<blockquote>
Rudimentary object-recognition software has been in use, on both sides, for over a year. But it is getting better. Lorenz Meier of Auterion, a Switzerland-based firm, says that between spring and summer his firm’s software, known as Skynode, managed to double the range at which a drone could engage a target, from 500 metres to 1km or so. He says that improvements in the resolution of images captured by drones have since increased that further. <i>The Economist</i> understands that AI systems are sometimes locking onto targets at perhaps double that distance, far beyond the range at which basic jammers could take out the drone.
</blockquote>
The innovation cycle is <a href="https://www.economist.com/europe/2024/12/02/how-ukraine-uses-cheap-ai-guided-drones-to-deadly-effect-against-russia">accelerating</a>:<br />
<blockquote>
Mr Meier reckons that fewer than a tenth of drones are AI-guided at present. But that number is rising. Ukraine’s innovation cycles are relentless, with feedback loops in some cases down to a few days. The simplicity of FPV drones, which Ukraine builds from off-the-shelf components, can also act as a hindrance: it makes them easy to replicate. One manufacturer says Russian reverse engineering can be as quick as three weeks, but encryption means that the software can be protected from copying.
</blockquote>
These autonomous systems are still vulnerable to jamming before they get close enough for the AI to recognize the target. Some idea of the intensity of the electronic warfare in Ukraine can be gained from Charlie Metcalfe's <a href="https://www.technologyreview.com/2024/09/12/1103833/ukraine-russia-drone-war-flash-radio-serhii-beskrestnov-social-media/"><i>Meet the radio-obsessed civilian shaping Ukraine’s drone defense</i></a>:<br />
<blockquote>
Serhii “Flash” Beskrestnov hates going to the front line. The risks terrify him. “I’m really not happy to do it at all,” he says. But to perform his particular self-appointed role in the Russia-Ukraine war, he believes it’s critical to exchange the relative safety of his suburban home north of the capital for places where the prospect of death is much more immediate. “From Kyiv,” he says, “nobody sees the real situation.”<br />
<br />
So about once a month, he drives hundreds of kilometers east in a homemade mobile intelligence center: a black VW van in which stacks of radio hardware connect to an array of antennas on the roof that stand like porcupine quills when in use. Two small devices on the dash monitor for nearby drones. Over several days at a time, Flash studies the skies for Russian radio transmissions and tries to learn about the problems facing troops in the fields and in the trenches.<br />
<br />
He is, at least in an unofficial capacity, a spy. But unlike other spies, Flash does not keep his work secret. In fact, he shares the results of these missions with more than 127,000 followers—including many soldiers and government officials—on several public social media channels. Earlier this year, for instance, he described how he had recorded five different Russian reconnaissance drones in a single night—one of which was flying directly above his van.
</blockquote>
@GrandpaRoy2 reports <a href="https://twitter.com/GrandpaRoy2/status/1851698560133402899">that</a>:<br />
<blockquote>
Both sides in Ukraine are developing video frequency channels lower than the standard 5.8GHz.<br />
<br />
The Russians are using technology from satellite TV dishes to make a 3.3GHz video channel for their fixed-wing reconnaissance drones.<br />
<br />
Ukrainian drone units have developed an analog video board for their FPVs at 1.2GHz, to escape interception and monitoring by the Russians.
</blockquote>
Here is a thread discussing the <a href="https://x.com/GrandpaRoy2/status/1861124730461528282">hand-held drone detectors</a> snooping on the drones' video channels.<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiF1CJ9DVwJAA-iJngD_8Uu7tTb-a9CAXgveoqGvoWzd62lRPLBx_3m-r49_ZWtzyhPWgJvjOt4n58LTUGz1xUv7PG0J70I1lsEl6crhRLMTYGg5hVZwHlCujUPXGEHTTMHcRxctu722OLwOhyphenhyphen0DsTpGz4UNh3LjO2n1sq-jGVR420X_B_8YNa0cpDhtc-Q/s1152/CRPA=graphic.jpeg" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="862" data-original-width="1152" height="149" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiF1CJ9DVwJAA-iJngD_8Uu7tTb-a9CAXgveoqGvoWzd62lRPLBx_3m-r49_ZWtzyhPWgJvjOt4n58LTUGz1xUv7PG0J70I1lsEl6crhRLMTYGg5hVZwHlCujUPXGEHTTMHcRxctu722OLwOhyphenhyphen0DsTpGz4UNh3LjO2n1sq-jGVR420X_B_8YNa0cpDhtc-Q/w200-h149/CRPA=graphic.jpeg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://x.com/GrandpaRoy2/status/1831722520485171228">How CRPA works</a><br /></td></tr></tbody></table>
Since the longer-range drones navigate using GPS or the Russian <a href="https://en.wikipedia.org/wiki/GLONASS">GLONASS</a>, they are vulnerable to jamming and spoofing. Sophisticated Controlled Reception Pattern Antennas (CRPA) can <a href="https://x.com/GrandpaRoy2/status/1831722520485171228">filter out the jamming signal</a>:<br />
<blockquote>
The CRPA antenna exploits the fact that a GPS satellite signal and a ground based jamming signal arrive from different directions. It consists of an array of antennas that measure the direction and time of arrival of different signals
</blockquote>
CRPAs can be enhanced with algorithms to defend against spoofing, but they are only <a href="https://x.com/GrandpaRoy2/status/1862188125382222037">partly effective</a>:<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjDxTBNQ-6Xh4h6SmFJ6tale89ar9nXFKrX6mxrzMqQw29_Y2-r6L1nDc_0d2dFb0LSVHNh18KDSa_M-js15rroLz7P544cjeXag2DSZIuZSKocM8B8fCLi7ZtpOCRjCD7mvmPuuoJSAbqcmK0TRCumjw4Mzg-9pQ2w_gqyoi0W-HoT6Ucxmgj_xMBlFGv/s762/CRPA.jpeg" style="clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="762" data-original-width="572" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjDxTBNQ-6Xh4h6SmFJ6tale89ar9nXFKrX6mxrzMqQw29_Y2-r6L1nDc_0d2dFb0LSVHNh18KDSa_M-js15rroLz7P544cjeXag2DSZIuZSKocM8B8fCLi7ZtpOCRjCD7mvmPuuoJSAbqcmK0TRCumjw4Mzg-9pQ2w_gqyoi0W-HoT6Ucxmgj_xMBlFGv/w150-h200/CRPA.jpeg" width="150" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://x.com/GrandpaRoy2/status/1862188132554482073">Cometa CRPA</a><br /></td></tr></tbody></table>
<blockquote>
Recently Russian Shahed drones have been ‘spoofed’ when their global navigation satellite systems (GNSS) received Ukrainian false coordinates that resulted in them flying back to Russia and Belarus .
The “Cometa” GNSS is resistant to jamming, but vulnerable to spoofing.<br />
<br />
The Cometa CRPA (Controlled Reception Pattern Antenna) GNSS was upgraded this year to a jam-resistant 8 antenna array, but is obviously still vulnerable to spoofing.
</blockquote>
Because both reconnaissance and strike drones are expendable, mass production is critical. The <a href="https://x.com/UkrReview/status/1851557769477800136">Ukrainian Review</a> reports that:<br />
<blockquote>
For 2024-2025, MoD have already contracted 1.8 million drones for almost UAH 147 billion. <br />
<br />
Long-range drones, FPV, reconnaissance copters, aircraft-type UAVs, attack copters. <br />
<br />
Another 366,940 drones are planned to be delivered by the end of 2024.
</blockquote>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuLOCYABaHIToqc8-7suRmivNANfnkRT5kF5DlDSkBnyt-kECRgz4dPYaliQVFJce5Ey1zRqOqNi7xZs_4sdIW6WMMcw9yXBgtAilqSHFF5o2YzsHurRDod4Pl-4cmFrCHbYE4Ax0DzI3Ejq2iPsqAiGuMlQe78sbG3dOzgW8Nx5Gxm4ww3N1huQcJ83Vw/s959/DroneBatteries.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="712" data-original-width="959" height="149" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuLOCYABaHIToqc8-7suRmivNANfnkRT5kF5DlDSkBnyt-kECRgz4dPYaliQVFJce5Ey1zRqOqNi7xZs_4sdIW6WMMcw9yXBgtAilqSHFF5o2YzsHurRDod4Pl-4cmFrCHbYE4Ax0DzI3Ejq2iPsqAiGuMlQe78sbG3dOzgW8Nx5Gxm4ww3N1huQcJ83Vw/w200-h149/DroneBatteries.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.forbes.com/sites/davidhambling/2024/11/14/ukraine-shows-us-how-to-beat-china-in-drone-battery-wars/">Source</a></td></tr></tbody></table>
One essential component of the short-range drones is their battery. David Hambling reports that <a href="https://www.forbes.com/sites/davidhambling/2024/11/14/ukraine-shows-us-how-to-beat-china-in-drone-battery-wars/"><i>Ukraine Shows U.S. How To Beat China In Drone Battery Wars</i></a>:<br />
<blockquote>
Most drone batteries are made in China, which is why the Chinese government was able to <a href="https://www.forbes.com/sites/siladityaray/2024/10/31/largest-us-drone-manufacturer-says-it-will-need-to-ration-batteries-for-customers-after-sanctions-by-china/">pull the plug on battery supplies to U.S. military drone maker Skydio</a> last month.<br />
<br />
Skydio CEO Adam Bry <a href="https://www.skydio.com/blog/chinas-sanctions-on-skydio">reassured customers that they would quickly find an alternate source</a>, but warned that for the next few months Skydio X10 batteries would be rationed — one per drone.<br />
...<br />
While not all cells are created equal, they are essentially commodity products manufactured by the billion. They’re made mainly by big players in the Far East; China dominates but it does not have a monopoly. Other sources are readily available.<br />
...<br />
To build your own drone batteries, you have to source quality cells from a reliable supplier and assemble them into battery packs. And that is exactly what Ukrainian drone maker Wild Hornets has been doing for some time.<br />
<br />
A <a href="https://x.com/wilendhornets/status/1806061954903285775">video on social media explains Wild Hornets' process</a>. The building blocks for its battery packs are Samsung 50S, which are optimized for high-power applications and have a respectable 5000 mAH capacity.
</blockquote>
FPV drones may be relatively cheap, but a war consumes them at an enormous rate. The technical problems can be solved but the <a href="https://www.bloomberg.com/news/articles/2024-11-15/above-ukraine-a-sky-full-of-drones-is-changing-the-war">financial ones are harder</a>:<br />
<blockquote>
Last month, President Volodymyr Zelenskiy said in a speech his country had produced 1.5 million drones so far this year, far short of an annual manufacturing capacity of over 4 million. All that was lacking is the money to buy them all.
</blockquote>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUl8NtJMAca5vBZKBaPaWZPWAKZlpVddNhFXsXaHWRHyFZU-X3nW-rbRNg3wrBGY_GVlyexctIGGbLInAdiP11t3UMfT8GsfpCZtVgvGy3esMyrMHMCS-fZFKTCb3Tu0cYRvcqb2uGliiebuWnXFzp4c18vb4x2hvnE47dG0IVGyULsjy2jAUitZTq7nwU/s720/RocketDrone.jpeg" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="433" data-original-width="720" height="120" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUl8NtJMAca5vBZKBaPaWZPWAKZlpVddNhFXsXaHWRHyFZU-X3nW-rbRNg3wrBGY_GVlyexctIGGbLInAdiP11t3UMfT8GsfpCZtVgvGy3esMyrMHMCS-fZFKTCb3Tu0cYRvcqb2uGliiebuWnXFzp4c18vb4x2hvnE47dG0IVGyULsjy2jAUitZTq7nwU/w200-h120/RocketDrone.jpeg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://x.com/CalibreObscura/status/1724387873305014698">Source</a></td></tr></tbody></table>
Lessons from Ukraine are being learned world-wide, and innovation proceeds elsewhere. For example, <a href="https://x.com/clashreport/status/1862598710451941511">here</a> is video of the Syrian rebels using a rocket-powered fixed-wing FPV drone, or rather a ground-launched FPV glide bomb. The picture is of one downed in action a year ago. Note that the <a href="https://en.wikipedia.org/wiki/Main_Directorate_of_Intelligence_(Ukraine)">Ukrainian HUR</a> was known to be active in Syria before that.<br />
<br />
<h3>Longer Range Drones</h3>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right; margin-left: 1em; text-align: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQnCOmEj2XM12s4yx7e1jCmAw4qOnQ7Loya-1ZxsXXBBsHW_teldCVvKFt8H9bqYhat4_p2umsICnQZlpGR8DspXjZ6wzWqaSbAxMwTrJEZnqxPIQNhZKCMy0dXU7wz02onOsbc34QFHkzkueVmvNSjVyITIweAmw8J19uEo4SAYfUoRdnP-b8CE2b2eyx/s2049/Shahed-136.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="2049" data-original-width="1662" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQnCOmEj2XM12s4yx7e1jCmAw4qOnQ7Loya-1ZxsXXBBsHW_teldCVvKFt8H9bqYhat4_p2umsICnQZlpGR8DspXjZ6wzWqaSbAxMwTrJEZnqxPIQNhZKCMy0dXU7wz02onOsbc34QFHkzkueVmvNSjVyITIweAmw8J19uEo4SAYfUoRdnP-b8CE2b2eyx/w261-h320/Shahed-136.png" width="261" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://en.wikipedia.org/wiki/HESA_Shahed_136">Shahed 136</a><br /><a href="https://commons.wikimedia.org/wiki/User:Alexpl">Alexpl</a> <a href="https://creativecommons.org/licenses/by/4.0">CC BY 4.0</a></td></tr></tbody></table>
The typical longer-range drone in Ukraine is a small, propeller-driven fixed-wing aircraft, such as the Iranian Shahed, used by the Russians in large numbers:<br />
<ul>
<li>The <a href="https://en.wikipedia.org/wiki/Shahed_131">Shahed 131</a> is 2.6m long, spans 2.2m and has a range of 900Km with a 15Kg warhead.</li>
<li>The <a href="https://en.wikipedia.org/wiki/HESA_Shahed_136">Shahed 136</a> is 3.5m long, spans 3.5m and has a range of 2500Km at 185Kph with a 50Kg warhead.</li>
</ul>
There are also larger drones up to the size of small light aircraft, which the Ukrainians have used for raids such as the recent <a href="https://www.reuters.com/world/europe/ukraines-drone-attack-forces-closure-two-moscow-airports-2024-11-10/">34-drone attack on Moscow</a>.<br />
<br />
Marc Champion's <a href="https://www.bloomberg.com/news/articles/2024-11-15/above-ukraine-a-sky-full-of-drones-is-changing-the-war"><i>Above Ukraine, a Sky Full of Drones Is Changing the War</i></a> describes one of these larger drones:<br />
<blockquote>
In Ukraine, <a href="https://www.npr.org/2024/10/13/nx-s1-5147284/ukraine-drones-russia-war#:~:text=Meanwhile%2C%20more%20than%20200%20drone,Literally%20made%20in%20the%20kitchen.%E2%80%9D">hundreds of new drone manufacturers sprung up</a> to meet demand. One of them, FP (formerly named Fire Point), was founded by a group of Ukrainian movie producers and businessmen and released an unmanned mini plane in the summer of 2023. FP’s drone can fly 1,000 kilometers at up to 205 km per hour, carrying 60 to 100 kilograms (130 to 220 pounds) of explosives. Ukrainian forces have so far used them to strike six airfields, two arms depots and a naval base in Russia, according to the company.
</blockquote>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQzHE88VhK1Efd4J1b7e59sfR587Wv1mIdZWzBMC54sSAlUeVR6wwEZPdKozbR2Bhj_Ux0hmFXKMwPByIy0mImDX__xjDe5cv4JKXdoVf7E5JoUdeYoFKJaEMcX7Mo5QuCF2emFeITOb6shI5pEK_DUhCsm6jn31w_C5hHAdifHcPGfa0OAUVnQn36x5wp/s1920/HX-2.jpeg" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="1080" data-original-width="1920" height="113" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQzHE88VhK1Efd4J1b7e59sfR587Wv1mIdZWzBMC54sSAlUeVR6wwEZPdKozbR2Bhj_Ux0hmFXKMwPByIy0mImDX__xjDe5cv4JKXdoVf7E5JoUdeYoFKJaEMcX7Mo5QuCF2emFeITOb6shI5pEK_DUhCsm6jn31w_C5hHAdifHcPGfa0OAUVnQn36x5wp/w200-h113/HX-2.jpeg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://x.com/front_ukrainian/status/1863695390622863856">HX-2</a></td></tr></tbody></table>
As with FPV drones, AI is being applied to longer-range drones. For example, the German company Helsing is apparently planning to ship Ukraine 4000 of its new <a href="https://x.com/front_ukrainian/status/1863695390622863856">HX-2 drone</a>:<br />
<blockquote>
This kamikaze drone has a range of up to 100 km and weighs about 12 kg and a speed of up to 220 km/h<br />
<br />
The main feature of the HX-2 is its integration with advanced machine vision algorithms, which provide autonomous target recognition and their destruction even with active electronic warfare.
</blockquote>
This is similar to <a href="https://en.wikipedia.org/wiki/Brimstone_(missile)#Targeting_and_sensors">Brimstone's capabilities</a> but slower, smaller, longer-ranged and much cheaper.<br />
<br />
Again, the most important aspect of these developments is that they greatly reduce the <a href="https://www.bloomberg.com/news/articles/2024-11-15/above-ukraine-a-sky-full-of-drones-is-changing-the-war">cost of precision strike </a>:<br />
<blockquote>
Ukraine’s new drones are also cheap. A kit of 10 Fire Point drones plus a control station and transport, including three mobile trailers, costs $580,000. That’s a fraction of the cost of military drones produced by western arms manufacturers, though it’s still a stretch for Ukraine’s military budget. FP says it can produce at least 500 drones per month, but that Ukraine’s defense ministry struggles to buy a fifth of that.
</blockquote>
<h3>Drone Defense</h3>
The essential feature of a successful defense against either the short- or the longer-range drones is that it be cheaper than the attack. This is rapidly decreasing, making cost-effective defense challenging.<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXSBXwI3_z5QAKjX6dgHbM3H13qWtwlPYw_UcyDJ2A-Z-WmIDW5zLOkZmUc9SKrbVlZa65jEOib1QskIz5u89b97eZDV_qTTCi1b_JeSGoM3XJH-P0Kpe8mu8ccgEqWcBJ4MGA3vLQU9_M_diQDtJ2n_FY7tx1PXgFJsZqZNYpnJ5pz7LgucJKdwDPfSSr/s960/Technicals.jpeg" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="693" data-original-width="960" height="144" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXSBXwI3_z5QAKjX6dgHbM3H13qWtwlPYw_UcyDJ2A-Z-WmIDW5zLOkZmUc9SKrbVlZa65jEOib1QskIz5u89b97eZDV_qTTCi1b_JeSGoM3XJH-P0Kpe8mu8ccgEqWcBJ4MGA3vLQU9_M_diQDtJ2n_FY7tx1PXgFJsZqZNYpnJ5pz7LgucJKdwDPfSSr/w200-h144/Technicals.jpeg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://x.com/Osinttechnical/status/1861833019457216593">Source</a></td></tr></tbody></table>
One of the effective anti-Shahed systems in Ukraine is <a href="https://kyivindependent.com/one-night-with-ukrainian-drone-hunters-near-russia/">pickup trucks mounted with machine guns such as the Browning M2 and improvised thermal sights</a>. The <a href="https://en.wikipedia.org/wiki/M2_Browning">Browning M2</a> is a remarkable weapon. It dates from World War 1 <a href="https://en.wikipedia.org/wiki/M2_Browning">and</a>:<br />
<blockquote>
"It is the primary heavy machine gun of NATO countries and has been used by many other countries as well. U.S. forces have used the M2 longer than any other firearm except the <a href="https://en.wikipedia.org/wiki/.45_ACP">.45 ACP</a> <a href="https://en.wikipedia.org/wiki/M1911_pistol">M1911 pistol</a>, which was also designed by John Browning.
</blockquote>
<a href="https://twitter.com/Osinttechnical/status/1858620100666159466">This tweet</a> has video of one of them downing a Shahed 136.<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyMDWyIGENHO-P5wgQ44qdI5RgE-cG9XmBamhCmY6XjpFaU0MQDh48rv00Hx0jAaffCe6cYHRA9_4cML5-lYISXMErlug19mbczUjEHcfOOcJyuf0BbnCv9lrjDrNCbufLngjT2-P3jaiFjH43C365tv2HxC4EgBYoJlYC6y445szvOn0Mtk2TTheti8vL/s1046/yak-52.jpg" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="762" data-original-width="1046" height="146" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyMDWyIGENHO-P5wgQ44qdI5RgE-cG9XmBamhCmY6XjpFaU0MQDh48rv00Hx0jAaffCe6cYHRA9_4cML5-lYISXMErlug19mbczUjEHcfOOcJyuf0BbnCv9lrjDrNCbufLngjT2-P3jaiFjH43C365tv2HxC4EgBYoJlYC6y445szvOn0Mtk2TTheti8vL/w200-h146/yak-52.jpg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://euromaidanpress.com/2024/11/29/vintage-drone-hunting-yak-52-plane-returns-to-odesa-skies/">Yak-52 and kill</a><br /></td></tr></tbody></table>
Along similar lines is the 1970s <a href="https://en.wikipedia.org/wiki/Yakovlev_Yak-52">Yak-52</a> armed with a shotgun which <a href="https://euromaidanpress.com/2024/11/29/vintage-drone-hunting-yak-52-plane-returns-to-odesa-skies/">defends Odesa</a>:<br />
<blockquote>
The Yak-52, which costs mere hundreds of dollars per flight hour, presents a cost-effective solution against drones valued around $100,000. In a remarkable three-month period starting May, the aircraft reportedly shot down at least a dozen Russian drones, with increasing kill markings documenting its effectiveness,
</blockquote>
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimUN0rO2hGnJgXJD7ncvssxhP87f5h01RXJqATh-EJLu36eUpXSoLLXksIq0FUGdBR3I2RcXG8zKTlc2HEXX0q_RscS8bduPGKGkbcpFYybBDc0Wzs1ewLI16MsV-qVH2Z6qvH2r15xsdlAWKQFXs7IpIUi_OKTyqGPVR2Dd2ereC-7bP5HKenCEcF7YBG/s1240/PickupBrowning.jpeg" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="827" data-original-width="1240" height="133" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimUN0rO2hGnJgXJD7ncvssxhP87f5h01RXJqATh-EJLu36eUpXSoLLXksIq0FUGdBR3I2RcXG8zKTlc2HEXX0q_RscS8bduPGKGkbcpFYybBDc0Wzs1ewLI16MsV-qVH2Z6qvH2r15xsdlAWKQFXs7IpIUi_OKTyqGPVR2Dd2ereC-7bP5HKenCEcF7YBG/w200-h133/PickupBrowning.jpeg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://kyivindependent.com/one-night-with-ukrainian-drone-hunters-near-russia/">Source</a></td></tr></tbody></table>
All drones emit heat, and the sky is generally a fairly even temperature looking up at it so the passive thermal sights are effective. The pickups and the Yak-52 rely on a nationwide passive <a href="https://www.twz.com/air/ukraines-acoustic-drone-detection-network-eyed-by-u-s-as-low-cost-air-defense-option">acoustic sensor system built from cell-phones</a>, using machine learning to identify drones acoustic signatures. It is called <a href="https://www.dvidshub.net/publication/issues/72169">Sky Fortress</a>:<br />
<blockquote>
Over a field east of Poltava, the sound of a 4-cylinder piston engine rumbles through the quiet of the night. A small electronic box attached to a cell tower records the sound, identifying the audio profile of a Geran-2 loitering munition, and transmits the data for processing. Responding to an alert, two soldiers fire up the engine on their Nissan pickup truck and go speeding down the road to the grid coordinates provided. In position, they scan the horizon in the direction of the attack. They have only a narrow window of opportunity. Tracers arc into the sky from their old but reliable DShK, their efforts rewarded as the drone disappears in a fireball.
</blockquote>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYKwmQHj1_SVfKg6F9mRiVKFsZmlH0ZH011iRllkGD4FCMk1z06g64KcZwpmT8qXGqEL94GPRn0L30sTW1U6_wDPIvfxDezjAXUfKu7kAM18dP3494VW8k_XU6NWgwue8v2WGTlk7eVc4oVwegIobJc3mEnkfyEJ8A45lS0FkBTYYNzEbXHJy5SpYkhtiw/s786/Zipline.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="664" data-original-width="786" height="169" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYKwmQHj1_SVfKg6F9mRiVKFsZmlH0ZH011iRllkGD4FCMk1z06g64KcZwpmT8qXGqEL94GPRn0L30sTW1U6_wDPIvfxDezjAXUfKu7kAM18dP3494VW8k_XU6NWgwue8v2WGTlk7eVc4oVwegIobJc3mEnkfyEJ8A45lS0FkBTYYNzEbXHJy5SpYkhtiw/w200-h169/Zipline.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://scholarmedia.africa/wp-content/uploads/2023/03/zipline-drone-dropping-droid.webp">Zipline drone</a></td></tr></tbody></table>
Shaheds and quadcopters are quite noisy, but <a href="https://www.flyzipline.com/">Zipline</a>, the South San Francisco autonomous drone delivery company, has made remarkable progress in rotor design to reduce the noise signature, as Mark Rober demonstrates in <a href="https://youtu.be/DOWDNBu9DkU?feature=shared&t=832">this video</a>.<br />
<br />
Inevitably, FPV drones started to be used to counter FPV drones. Here, for example, a kamikaze FPV drone intercepts an <a href="https://bsky.app/profile/specialkhersoncat.bsky.social/post/3lbk6fogzg22o">enemy FPV drone</a>.<br />
<br />
Ukrainian FPV drones have been extremely effective against Russian reconnaissance drones. The video in <a href="https://x.com/DanielR33187703/status/1861111759089827938">this tweet</a> documents the loss of 406 assorted Russian reconnaissance drones.<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtXzVRqNAPhUzGDu9-1RTgPr69kWIM5DwbkS_olIbsDjQ0JKLjLZNLUVC6sbCmSLfzHuAYs6WQ_PPsKw0H_Qy0oE-Ji9LiSVgPprXZBrcf5Crv7ZUZ5m0rRI1ujEnuAEWj2tPi_WujCNIgRddu-pAYYXxhAz48KAVEffdkrsFiGEtpXjwgTj2Yhp486Vbh/s711/DroneVsLancet.jpeg" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="475" data-original-width="711" height="134" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtXzVRqNAPhUzGDu9-1RTgPr69kWIM5DwbkS_olIbsDjQ0JKLjLZNLUVC6sbCmSLfzHuAYs6WQ_PPsKw0H_Qy0oE-Ji9LiSVgPprXZBrcf5Crv7ZUZ5m0rRI1ujEnuAEWj2tPi_WujCNIgRddu-pAYYXxhAz48KAVEffdkrsFiGEtpXjwgTj2Yhp486Vbh/w200-h134/DroneVsLancet.jpeg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.forbes.com/sites/davidhambling/2024/11/16/interceptors-blunt-russian-lancet-drone-attacks/">Source</a></td></tr></tbody></table>
This summer the Ukrainians launched a campaign to use FPV drones to intercept Lancets. As the graph shows, this has caused a remarkable reduction in the number of Lancet strikes.<br />
<br />
It isn't necessary to use kamikaze drones in the fighter role. Both sides are now using FPV drones as <a href="https://twitter.com/bayraktar_1love/status/18575257734077606">net launchers</a>, entangling rotors or propellers to bring their targets down.<br />
<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioto5mf8TQEafCuR2P1ptO-oUtfTOUwQL_TTG37WVLxU53gCAZHu-QqqUOMb9fW_2CGaubswoTuBBDSRYzs-SWA579uiBKMOjdUTxDR30ywWlPPX6zyFY8hA7YgWpF9vYNqKsWSGAnpGh8Cfl4f0EYds9-WUojYGeSD6i9-B51OMitYb35JMrRFTN5gbMI/s2048/DroneInterceptionAnalysis.jpg" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="1152" data-original-width="2048" height="113" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioto5mf8TQEafCuR2P1ptO-oUtfTOUwQL_TTG37WVLxU53gCAZHu-QqqUOMb9fW_2CGaubswoTuBBDSRYzs-SWA579uiBKMOjdUTxDR30ywWlPPX6zyFY8hA7YgWpF9vYNqKsWSGAnpGh8Cfl4f0EYds9-WUojYGeSD6i9-B51OMitYb35JMrRFTN5gbMI/w200-h113/DroneInterceptionAnalysis.jpg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://tochnyi.info/2024/11/fpv-interceptors-2024/">Source</a></td></tr></tbody></table>
Artem's <a href="https://tochnyi.info/2024/11/fpv-interceptors-2024/"><i>The Ukrainian Defense Forces intercepted more than 850 drones of the “fixed-wing” type</i></a> is a painstaking analysis from open sources:<br />
<blockquote>
these models can be further categorized into either ‘reconnaissance’ or ‘strike’, with 11 reconnaissance models and 3 strike models, of which 850 and 20 were intercepted,<br />
...<br />
It should be noted that this study does not include examples and video footage of Russian FPV interceptions; we note that the presently recorded ratio is 870:8 in this regard.
</blockquote>
Note that this analysis confirms the effectiveness of the drone interception campaign but shows it started in late August.<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEid-HKSzbjlKAyJDKZ8DjsyGGXHlqXFSAmKxUi2IbRgMzRoRTTcZOisv1uuI0o9DZCO3a9AL1AscVbieVf21A11l4KgiABpC8_rNPif2bVgEq45nATBEq6dilhCT2pxLldyqWQyCGx1T7B5dcHK1uT5an7CoTA4DZsDyq6KRYD2U9sVqqRoLSKIbIIu-Icx/s1136/TurtleTank.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="760" data-original-width="1136" height="134" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEid-HKSzbjlKAyJDKZ8DjsyGGXHlqXFSAmKxUi2IbRgMzRoRTTcZOisv1uuI0o9DZCO3a9AL1AscVbieVf21A11l4KgiABpC8_rNPif2bVgEq45nATBEq6dilhCT2pxLldyqWQyCGx1T7B5dcHK1uT5an7CoTA4DZsDyq6KRYD2U9sVqqRoLSKIbIIu-Icx/w200-h134/TurtleTank.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.kyivpost.com/post/37897">Source</a></td></tr></tbody></table>
When all else fails, the one remaining option is to accept that the drone will reach the target but armor it so that it, or at least the crew, survives to fight on. The <i>Kyiv Post</i> describes the evolution of armored vehicles to counter the drone threat in <a href="https://www.kyivpost.com/post/37897"><i>From Sublime to Ridiculous – Russia’s T-80 ‘Super Turtle Tank’</i></a>:<br />
<blockquote>
In mid-2023, faced with the ever-growing threat from Ukraine’s first-person view (FPV) kamikaze <a href="https://www.kyivpost.com/topic/drones">drones</a>, Russian <a href="https://www.kyivpost.com/topic/tanks">tanks</a> and armored personal carriers (APCs) began being fitted with so-called “cope cages” aimed at limiting the impact of attack.<br />
<br />
Initially these took the form of improvised crude grills, frames and screens to protect their turrets and other vulnerable parts. Over time, the cages became bigger, eventually covering most of the vehicle, with reports that anti-drone grills were being fitted to newly built tanks and APCs in the factory. They also started to appear on Israeli tanks moving against Hamas in Gaza.<br />
<br />
In early April this year, Russian troops, seemingly concerned that their improvised and even factory-fitted grills weren’t providing adequate protection, began supplementing their cages with armored boxes covering the whole tank
</blockquote>
<h2>The West</h2>
The rapid evolution of drone technology is posing significant problems for Western nations. Drones are already being used to surveil defense assets with impunity, because neither suitable defense systems nor appropriate policies for their use are in place.<br />
<h3>Drone Incursions</h3>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYRbvE089JrBL_XCtNOjmpoKGkF9hykmV3lLcLHUui35ERDqGDu24Nf1lfu2QX8k5OMSglH2YY4XVyMM3ShWL9Y0qirIuGL0IwRKr1E536-y30D1i4OZkbNq58zV-MRH0Jt6Qr-JFUewUWasQOT4gsegpI9uS1XSAw5lryXgh7XGQZTc9Huf5qpXdao6Nz/s830/ShahedInFlight.jpeg" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="579" data-original-width="830" height="139" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYRbvE089JrBL_XCtNOjmpoKGkF9hykmV3lLcLHUui35ERDqGDu24Nf1lfu2QX8k5OMSglH2YY4XVyMM3ShWL9Y0qirIuGL0IwRKr1E536-y30D1i4OZkbNq58zV-MRH0Jt6Qr-JFUewUWasQOT4gsegpI9uS1XSAw5lryXgh7XGQZTc9Huf5qpXdao6Nz/w200-h139/ShahedInFlight.jpeg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://x.com/GrandpaRoy2/status/1862188125382222037">Shahed drone</a></td></tr></tbody></table>
Three weeks ago Gordon Lubold, Lara Seligman and Aruna Viswanatha of the <i>Wall Street Journal</i> reported that the <a href="https://www.msn.com/en-us/news/us/mystery-drones-swarmed-a-u-s-military-base-for-17-days-the-pentagon-is-stumped/ar-AA1saqAu">Mystery Drones Swarmed a U.S. Military Base for 17 Days. Pentagon Is Stumped</a>:<br />
<blockquote>
U.S. Air Force Gen. Mark Kelly wasn’t sure what to make of reports that a suspicious fleet of unidentified aircraft had been flying over Langley Air Force Base on Virginia’s shoreline.<br />
<br />
Kelly, a decorated senior commander at the base, got on a squadron rooftop to see for himself. He joined a handful of other officers responsible for a clutch of the nation’s most advanced jet fighters, including F-22 Raptors.<br />
<br />
For several nights, military personnel had reported a mysterious breach of restricted airspace over a stretch of land that has one of the largest concentrations of national-security facilities in the U.S. The show usually starts 45 minutes to an hour after sunset, another senior leader told Kelly.<br />
<br />
The first drone arrived shortly. Kelly, a career fighter pilot, estimated it was roughly 20 feet long and flying at more than 100 miles an hour, at an altitude of roughly 3,000 to 4,000 feet. Other drones followed, one by one, sounding in the distance like a parade of lawn mowers.<br />
<br />
The drones headed south, across Chesapeake Bay, toward Norfolk, Va., and over an area that includes the home base for the Navy’s SEAL Team Six and Naval Station Norfolk, the world’s largest naval port.
</blockquote>
Given the incredible lethality of drones in Ukraine, this seems like a problem. The <i>WSJ</i> story provided <a href="https://www.msn.com/en-us/news/us/mystery-drones-swarmed-a-u-s-military-base-for-17-days-the-pentagon-is-stumped/ar-AA1saqAu">more details</a>:<br />
<blockquote>
Over 17 days, the drones arrived at dusk, flew off and circled back. Some shone small lights, making them look like a constellation moving in the night sky—or a science-fiction movie, Kelly said, “‘Close Encounters at Langley.’” They also were nearly impossible to track, vanishing each night despite a wealth of resources deployed to catch them.<br />
<br />
Gen. Glen VanHerck, at the time commander of the U.S. Northern Command and the North American Aerospace Defense Command, said drones had for years been spotted flying around defense installations. But the nightly drone swarms over Langley, he said, were unlike any past incursion.
</blockquote>
The swarms were clearly a <a href="https://www.msn.com/en-us/news/us/mystery-drones-swarmed-a-u-s-military-base-for-17-days-the-pentagon-is-stumped/ar-AA1saqAu">sophisticated operation</a>:<br />
<blockquote>
U.S. officials didn’t believe hobbyists were flying the drones, given the complexity of the operation. The drones flew in a pattern: one or two fixed-wing drones positioned more than 100 feet in the air and smaller quadcopters, the size of 20-pound commercial drones, often below and flying slower. Occasionally, they hovered.<br />
<br />
They came from the north around 6 p.m. to traverse the base, which sits on a peninsula at the mouth of Chesapeake Bay, and continued south, beyond the reach of radar. They repeated the pattern and then disappeared, typically by midnight.
</blockquote>
Shaheds do sound like lawn movers, fly around 100mph, and have the endurance to fly several circuits of Langley between 6pm and midnight. General Kelly might have over-estimated the length; the fixed-wing drones may have been Shahed 136 equivalents. The map shows the vast area from which a Shahed 136-class drone attack on Langley could be launched.<br />
<br />
In <a href="https://www.twz.com/air/heres-what-norads-commander-just-told-us-about-the-langley-afb-drone-incursions"><i>Here’s What NORAD’s Commander Just Told Us About The Langley AFB Drone Incursions</i></a> Howard Altman reports that General Guillot:<br />
<blockquote>
offered few specifics about the incursions but talked about some of the steps NORTHCOM is taking in the wake of those incidents.<br />
...<br />
Replying to our question, Guillot told us he did not know if they were tracked back to their recovery point or whether they could have been launched by a vessel off the coast.<br />
<br />
The Langley incursions were among more than 600 reported over U.S. military installations since 2022, NORAD stated Tuesday. In the wake of the rash of drone activity over Langley AFB, NORTHCOM was tasked by the Joint Chiefs of Staff to look at drone incursions across the U.S., Guillot said.
</blockquote>
But these drones <a href="https://www.twz.com/air/heres-what-norads-commander-just-told-us-about-the-langley-afb-drone-incursions">weren't their problem</a>:<br />
<blockquote>
“I saw that NORAD’s responsibility for countering UAS was very limited to something that would be an attack of national consequence,” he explained not the small drones as seen over Langley and elsewhere. NORTHCOM, meanwhile, has no responsibility or authority to take action, because the services are charged with securing their facilities.
</blockquote>
Altman explains that the Dept. of Defense has had their head in the sand about the threat <a href="https://www.twz.com/air/heres-what-norads-commander-just-told-us-about-the-langley-afb-drone-incursions">for years</a>:<br />
<blockquote>
<a href="https://www.twz.com/drone-swarms-that-harassed-navy-ships-demystified-in-new-documents">As we have frequently reported</a>, there have been unidentified drone incursions for years over U.S. military installations, warning areas, and critical government facilities. Among them were a very similar repeated rashes of claimed <a href="https://www.twz.com/34662/faa-documents-offer-unprecedented-look-into-colorado-drone-mystery">drone sightings in Colorado in 2020</a> in an area where many of America’s ICBMs are based. Another took place at <a href="https://www.twz.com/34800/the-night-a-drone-swarm-descended-on-palo-verde-nuclear-power-plant">the Palo Verde nuclear facility</a> in Arizona in 2019.<br />
<br />
Also in 2019, <a href="https://www.twz.com/navy-ships-swarmed-by-drones-not-ufos-defense-officials-confirm">drones swarmed over a U.S. Navy exercise</a> taking place 100 miles off the coast of California, raising concerns that an adversary <a href="https://www.twz.com/drone-swarms-that-harassed-navy-ships-demystified-in-new-documents">was trying to suck up</a> critical intelligence, including very sensitive electronic and signals emissions of America’s most advanced air defense and command and control systems.<br />
<br />
More recently, <a href="https://www.twz.com/air/palmdale-ufo-scare-leads-to-revelations-about-mystery-drone-incursions-over-secretive-plant-42">we were the first to write about</a> drone flights over the highly-secure Plant 42 in Palmdale California that were so concerning a temporary flight restriction was issued for the airspace over the facility.
</blockquote>
Using FOIA requests, <i>The War Zone</i>'s Jospeh Trevithick, Adam Kehoe and MARC Cecotti have revealed <a href="https://www.twz.com/mystery-drones-swarming-navy-destroyer-shined-lights-on-its-bridge">similar reports dating back to 2016</a>. The Press Association's <a href="https://www.theguardian.com/uk-news/2024/nov/23/unidentified-drones-spotted-over-three-uk-airbases-us-air-force-confirms"><i>Unidentified drones spotted over three UK airbases, US air force confirms</i></a> makes it clear this isn't just a US problem:<br />
<blockquote>
Unidentified drones were spotted over three airbases in Britain used by the US air force (USAF)<br />
<br />
“Small unmanned aerial systems” were seen between 20 and 22 November over RAF Lakenheath and RAF Mildenhall in Suffolk, and RAF Feltwell in Norfolk.
</blockquote>
<a href="https://www.telegraph.co.uk/news/2024/11/26/more-unidentified-drones-three-us-air-bases-in-uk/">And also</a>:<br />
<blockquote>
A mystery drone was seen trailing HMS Queen Elizabeth, the British aircraft carrier, as it entered the port of Hamburg, in Germany, on Friday
</blockquote>
These incursions are <a href="https://twitter.com/haynesdeborah/status/1861732495806386483">continuing</a>.<br />
<br />
In some cases the source of the drone incursions is obvious. <a href="https://doi.org/10.1080/09592318.2023.2226382">Since at least 2017</a> non-state armed groups (NSAGs), such as <a href="https://warontherocks.com/2021/11/mexican-cartels-are-embracing-aerial-drones-and-theyre-spreading/">Mexican</a> <a href="https://apnews.com/article/mexico-cartel-attack-guerrero-drones-helidoro-castillo-ed795770ce9a09b1c063d91913268b99">drug</a> <a href="https://warontherocks.com/2021/11/mexican-cartels-are-embracing-aerial-drones-and-theyre-spreading/">cartels</a>, have acquired greatly enhanced <a href="https://apnews.com/article/mexico-drug-cartel-drone-attacks-soldiers-killed-572b39c73c030bef20257517d1c4a91d">strike</a> and <a href="https://www.newsnationnow.com/us-news/immigration/border-coverage/border-agent-cartels-using-drones/">reconissance</a> capabilities. For example, <a href="https://www.newsnationnow.com/us-news/immigration/border-coverage/border-agent-cartels-using-drones/">Rio Grande Valley Sector Chief Patrol Agent Gloria Chavez testified that</a>:<br />
<blockquote>
in the Rio Grande Valley sector of Texas alone, Border Patrol has faced over 10,000 drone incursions and 25,000 drone sightings in just one year.
</blockquote>
An academic study of this problem is <a href="https://doi.org/10.1080/09592318.2023.2226382"><i>Narco drones: tracing the evolution of cartel aerial tactics in Mexico’s low-intensity conflicts</i></a> by Ghaleb Krame, Vlado Vivoda and Amanda Davies,which:<br />
<blockquote>
examines the evolution of drone tactics employed by drug cartels in Mexico from 2017 to 2022. The research traces the increasing sophistication of drone technology, payload capacities, and adaptability of cartels in employing airborne drones in low-intensity conflicts.
</blockquote>
Note that this research does not include developments driven by the Ukraine war. The rapid cost reductions in drone technology since likely mean much greater use of drones by criminal organizations.<br />
<h3>Drone Defense: Systems</h3>
General Guillot <a href="https://www.twz.com/air/heres-what-norads-commander-just-told-us-about-the-langley-afb-drone-incursions">outlined his approach</a> to drone defense:<br />
<blockquote>
“I think there’s certainly a role for fighters. There’s a role for non-kinetic or low-collateral kinetic capabilities that would be at the smaller end. And then I’m a big proponent for advances in directed energy, laser and high power microwave. So those non-kinetic capabilities that bring a kinetic result of bringing down the systems, and I think it has to be layered in today’s today’s threat.”
</blockquote>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLPwSkZas0Z5flH9qjet4yjwm5yZyHx7em5FsxleRqMxpDy85HmRA1sKY8ickhpz97T8pDHHrmdx5wKs6Uai3L36-8YOxslc-N7LYUecfDZuGnn_RllVgbY7gM1IjbK5k0b0zL8xVgkDYZLdqdXlCwIdUwNew_-BdhdjBVY6VdOqVkgNVKIvhhSLn7NJbc/s1465/LOCUST.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="801" data-original-width="1465" height="109" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLPwSkZas0Z5flH9qjet4yjwm5yZyHx7em5FsxleRqMxpDy85HmRA1sKY8ickhpz97T8pDHHrmdx5wKs6Uai3L36-8YOxslc-N7LYUecfDZuGnn_RllVgbY7gM1IjbK5k0b0zL8xVgkDYZLdqdXlCwIdUwNew_-BdhdjBVY6VdOqVkgNVKIvhhSLn7NJbc/w200-h109/LOCUST.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.youtube.com/watch?v=eFiDYFnlp7s">Source</a></td></tr></tbody></table>
Indeed, the DoD's Palletized High Energy Laser Program has produced a laser counter-drone system, the <a href="https://bluehalo.com/bluehalo-locust-laser-weapon-system-delivered-to-the-palletized-high-energy-laser-p-hel-program/">BlueHalo LOCUST Laser Weapon System</a>. The <i>WSJ</i> reported on it in <a href="https://www.youtube.com/watch?v=eFiDYFnlp7s">this video</a>.<br />
<br />
One of the big problems with cheap drones is that you need to shoot them down even more cheaply. LOCUST touts a per-shot cost of just $3, but that isn't the end of the story. Each LOCUST costs $10M. "fewer than a dozen are deployed", all overseas. Each requires a dedicated team from BlueHalo to maintain it because there are no stocks of spare parts. And "the Pentagon has not confirmed that a laser has taken down a drone in combat". It weighs 3400lb and fits in a 7' cube. It takes "as many as 15 seconds to melt a target".<br />
<br />
Despite the low per-shot cost, LOCUST isn't a solution to the rash of drone swarms. First, at a unit price of $10M plus a dedicated support team defending the vast number of US defense assets isn't affordable. Second, the problem isn't defending against a single drone, it is defending against a swarm of cheap drones. For example, Ukraine used at least 34 drones in their November 10<sup>th</sup> <a href="https://www.reuters.com/world/europe/ukraines-drone-attack-forces-closure-two-moscow-airports-2024-11-10/">attack on Moscow</a>. Lets guess that Locust can switch targets in 5 seconds, and is 100% lethal in 15 seconds, it would take 11:20 to defeat the swarm. It isn't going to have that long, because at 100mph that is 19 miles. So even if 34 was the biggest feasible swarm (hint: it isn't) defending a high-value asset would need say 5 LOCUST systems at $50M capex plus opex.<br />
<br />
<h3>Drone Defense: Policy</h3>
Neither the pickups with the Brownings nor the cellphones are systems the DoD's supply chain is interested in building. But even if systems like LOCUST could be afforded and deployed, policies need to be established for their use. Joseph Trevithick, Howard Altman and Tyler Rogoway's <a href="https://www.twz.com/news-features/lasers-microwaves-missiles-guns-not-on-the-table-for-domestic-drone-defense"><i>Lasers, Microwaves, Missiles, Guns Not On The Table For Domestic Drone Defense </i></a> is a deep dive into the policy issues:<br />
<blockquote>
Even if counter-drone policies are clarified and solidified, and authorities get expanded, there are still other concerns at play, especially when it comes to collateral damage. Shooting something down with a gun-based system or a surface-to-air missile carries inherent dangers of projectiles or interceptors, or debris from them, falling onto innocent bystanders below. The aforementioned Centurion C-RAM <a href="https://www.twz.com/36412/centurions-roaring-whips-of-exploding-shells-are-still-engaging-rockets-over-iraqs-green-zone">fires specialized self-destructing ammunition</a> to reduce these risks.
</blockquote>
Here, for example, is an <a href="https://x.com/Trotes936897/status/1851738072779501911">Oerlikon Revolver</a> in Ukraine firing <a href="https://x.com/Trotes936897/status/1851738118396801392">air-burst ammunition</a>. But the ammunition isn't the only problem:<br />
<blockquote>
The drone, or what is left of it, which could include undetonated explosive warheads or <a href="https://www.twz.com/air/poop-filled-north-korean-balloons-descend-on-the-south-stoking-fears-of-deadlier-payloads">other potentially hazardous payloads</a>, would also fall to Earth in an uncontrolled manner after any such engagement.<br />
</blockquote>
The Russians frequently explain burning oil refineries and similar mishaps on debris from successful interceptions of drones. Someone whose house was destroyed by the 50Kg warhead of a shot-down Shahed 136 would have reason to be upset. Deciding on a suitable counter-drone policy is <a href="https://www.twz.com/news-features/lasers-microwaves-missiles-guns-not-on-the-table-for-domestic-drone-defense">complex</a>:<br />
<blockquote>
Maybe even more importantly is that these weapons do fail and they are packed with high explosives and traveling at high speed, which could cause very unpredictable harm to people and property in a large potential impact area. Then there is the idea that you have to know exactly what you are shooting at, and that can be harder than it sounds when dealing with strange objects in the sky, especially in populated areas where civilian air traffic is dense. Making the call to shoot down an object over the U.S. is an incredibly complex task that never actually occurred until recently.
</blockquote>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://assets1.cbsnewsstatic.com/hub/i/r/2024/01/29/bd04f379-a043-4424-9557-d6f01662b177/thumbnail/620x418/badec9f03d112f0c9fdea6ee432a0cf9/ap24028646156498.jpg?v=6125856b135c6847bbc622c9704e0334" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="418" data-original-width="620" height="135" src="https://assets1.cbsnewsstatic.com/hub/i/r/2024/01/29/bd04f379-a043-4424-9557-d6f01662b177/thumbnail/620x418/badec9f03d112f0c9fdea6ee432a0cf9/ap24028646156498.jpg?v=6125856b135c6847bbc622c9704e0334" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.cbsnews.com/news/us-troops-killed-jordan-american-service-members-syria/">Tower 22</a><br /></td></tr></tbody></table>
But even in war zones where the US policy is clear and permissive, it isn't foolproof. Stefan Becket and Kaia Hubbard reported on a January incident at Tower 22 on the border with Syria in <a href="https://www.cbsnews.com/news/us-troops-killed-jordan-american-service-members-syria/"><i>3 American service members killed and dozens injured in drone attack on base in Jordan, U.S. says</i></a>:<br />
<blockquote>
Three American service members were killed and dozens more were injured in an unmanned aerial drone attack on a base in Jordan on Sunday, President Biden and the U.S. military said.<br />
...<br />
Mr. Biden said the attack happened at a base in northeast Jordan, a U.S. ally, close to the border with Syria. A U.S. official said the attack occurred at an outpost known as Tower 22, where roughly 350 U.S. Army and Air Force personnel are deployed, according to the Department of Defense.<br />
<br />
U.S. Central Command, which oversees forces in the Middle East, initially put the number of injured at 25, but two U.S. officials soon said that figure had risen to more than 30. CENTCOM confirmed later Sunday night that at least 34 had been injured. Eight of the wounded service members had to be evacuated — some were in critical condition but all were stable, a defense official told CBS News.
</blockquote>
How was the drone able to penetrate US defenses and kill or injure more than 10% of the base occupants? <a href="https://www.cnn.com/2024/01/29/politics/us-soldiers-deaths-jordan/index.html"><i>Drone that killed US soldiers in Jordan followed American drone onto base, causing confusion</i></a> by Natasha Bertrand, Oren Liebermann and Haley Britzky explains:<br />
<blockquote>
The drone that killed three US Army soldiers and wounded dozens more in Jordan on Sunday approached the US military outpost, Tower 22, around the same time an American drone was returning to the base, which led to uncertainty over whether it was hostile and caused a delay to the US response, two US officials told CNN.<br />
<br />
The enemy drone followed the American drone as it approached, but it is not clear whether the enemy drone intentionally followed the American one or if it was a coincidence, one of the officials said.
</blockquote>
These problems don't go away if the counter-drone technology is electronic. Confusing the drone's navigation with GPS spoofing or detaching an FPV drone from its pilot using a jammer may prevent it reaching its target but it doesn't render it harmless to innocent bystanders.<br />
<h3>The Threat</h3>
One notable feature of the war in Ukraine is Russia's sustained campaign against Ukraine's electric grid, which has caused major difficulties especially in the winter. On November 26<sup>th</sup> <a href="https://twitter.com/ZelenskyyUa/status/1861396932658115043">Volodymyr Zelenskyy tweeted</a>:<br />
<blockquote>
Last night, Russia attacked Ukraine, launching a record number of strike drones—188—against our people. I want to thank our defenders of the sky for repelling the attack. Around 80 drones were shot down, and more than 90 were lost due to location disruption.<br />
<br />
Unfortunately, there has been damage to our critical infrastructure, and the situation in Ternopil remains challenging. All services and repair crews are on-site, doing everything to assist people and restore electricity as quickly as possible.
</blockquote>
A mysterious feature has been Ukraine's reluctance to attack Russia's electric grid, especially since their economy and military are completely dependent upon freight trains hauled by electric locomotives. This may have been part of the US' "escalation management".<br />
<br />
If whoever is behind the drone incursions in the West decides to switch from reconnaissance to strike, they are likely to follow the Russian example and strike the grid by attacking the transformers. <a href="https://en.wikipedia.org/wiki/Metcalf_sniper_attack">US transformers have already been shot</a> and damaged by unknown attackers, presumably right-wing militia. FPV drones would cause far more than the $15M damage in that attack. Large grid transformers are expensive, long lead-time items, completely defenseless against drone attack. A coordinated attack on a number of them would have a major, long-lasting impact on the US grid, similar to a major <a href="https://blog.dshr.org/2014/07/coronal-mass-ejections.html">coronal mass ejection</a>.<br />
<h2>The Future</h2>
The cost of precision strike, both at short and longer ranges, has been reduced by at least an order of magnitude and likely much more. Further reductions are very likely. Typically, when the cost of something is greatly reduced, you get a lot more of it. What is likely to be the effect of greatly increasing the supply of precision strike?<br />
<br />
<a href="https://doi.org/10.1080/09592318.2024.2319216"><i>The impact of precision strike technology on the warfare of non-state armed groups: case studies on Daesh and the Houthis</i></a> by Max Mutschler, Marius Bales and Esther Meininghaus examines one effect that has already happened:<br />
<blockquote>
Precision strikes from a distance are a common practice of state warfare. However, the global proliferation of precision strike technologies, like missiles and armed drones, makes such weapons progressively available to non-state armed groups (NSAGs). We look at Daesh in Syria and Iraq and at the Houthis in Yemen as two case studies to analyse the consequences of this proliferation for non-state warfare.
</blockquote>
The Houthis, with help from Iran, have used precision strike systems much more sophisticated than the ones I deal with here to cause a <a href="https://en.wikipedia.org/wiki/Red_Sea_crisis">major disruption to world trade</a>, and to cause Western nations to expend vastly more expensive systems in a futile attempt to stop them.<br />
<br />
The war in Ukraine spawned <a href="https://www.npr.org/2024/10/13/nx-s1-5147284/ukraine-drones-russia-war#:~:text=Meanwhile%2C%20more%20than%20200%20drone,Literally%20made%20in%20the%20kitchen.%E2%80%9D">hundreds of new drone manufacturers</a>. This incredibly competitive market has driven costs down to a point where groups with far less funding than the drug cartels, and even individuals, can acquire precision strike capabilities. In the US civilian use of drones is currently regulated by the FAA. Drones are required to be registered and the areas where they are permitted to fly are restricted. They are not regarded as weapons, but what does the 2<sup>nd</sup> Amendment say about drones if they are regarded as weapons?<br />
<br />
Many of the same policy issues arise when it comes to individuals defending themselves against drone attacks. Electronic defenses such as jamming and GPS spoofing are illegal. "Kinetic" defenses such as shotguns are legal in some cases, but restricted by the risks to bystanders. Passive defenses such as "cope cages" on vehicles would be illegal under safety regulations, and on houses by planning regulations.<br />
<br />
Potential future technological developments may greatly increase the difficulty of defending against drone attacks by making it impossible to interfere with their navigation. Current high-end cruise missiles such as Ukraine's <a href="https://en.wikipedia.org/wiki/R-360_Neptune">R360-Neptune</a> use inertial navigation, but because it drifts over time it requires regular updates from GPS to maintain accuracy. This is similar to the navigation systems in commercial aircraft. These systems are too large and expensive for drones.<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4NjSV_9pZfb8adKGwPp4G6cL4TrztMhFHzwl8lgJC7OoKZUrF25Lax4gPNrW1YcTgI4caDJJqXoznac_GHTlR5sYdaHk5_vHSMXzsTZNlxuSq-tb_r6iTQunNECjNhxXOr6l4XBzEjdvRmyDorF7vYelcm5kjBnge0vqbXe_BUhjsImcZRzH8Yfpy3Hil/s807/SandiaChip.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="807" data-original-width="607" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4NjSV_9pZfb8adKGwPp4G6cL4TrztMhFHzwl8lgJC7OoKZUrF25Lax4gPNrW1YcTgI4caDJJqXoznac_GHTlR5sYdaHk5_vHSMXzsTZNlxuSq-tb_r6iTQunNECjNhxXOr6l4XBzEjdvRmyDorF7vYelcm5kjBnge0vqbXe_BUhjsImcZRzH8Yfpy3Hil/w151-h200/SandiaChip.png" width="151" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://scitechdaily.com/revolutionary-quantum-compass-could-soon-make-gps-free-navigation-a-reality/">Source</a></td></tr></tbody></table>
But, as Sandia Labs announced in <a href="https://scitechdaily.com/revolutionary-quantum-compass-could-soon-make-gps-free-navigation-a-reality/"><i>Revolutionary Quantum Compass Could Soon Make GPS-Free Navigation a Reality</i></a> dramatic increases in accuracy and reductions in cost and size for inertial navigation are on the way:<br />
<blockquote>
Now, scientists are attempting to make a motion sensor so precise it could minimize the nation’s reliance on global positioning satellites. Until recently, such a sensor — a thousand times more sensitive than today’s navigation-grade devices — would have filled a moving truck. But advancements are dramatically shrinking the size and cost of this technology.<br />
<br />
For the first time, researchers from Sandia National Laboratories have used silicon photonic microchip components to perform a quantum sensing technique called atom interferometry, an ultra-precise way of measuring acceleration.<br />
...<br />
Besides size, cost has been a major obstacle to deploying quantum navigation devices. Every atom interferometer needs a laser system, and laser systems need modulators.<br />
<br />
“Just one full-size single-sideband modulator, a commercially available one, is more than $10,000,” Lee said.<br />
<br />
Miniaturizing bulky, expensive components into silicon photonic chips helps drive down these costs.<br />
<br />
“We can make hundreds of modulators on a single 8-inch wafer and even more on a 12-inch wafer,” Kodigala said.
</blockquote>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjELrawB2DCP60WjXDOszb3YUlEoi2TwCokjcYV3qvgbIJA6YCog0wevnIlYPae0Mxm4ZS0v-bh1nNjFpkIa_BODpIbGFsdDybcMgvBxOn9Yu-T0eaX8h5dYvOcn9ZkMkbKq9fRC-WuL6aNuW3uVGyv_YX9OMI1UDGdxsDVjiR9gAcC7_JUSD_iH9fcD79i/s1278/AOSense.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="720" data-original-width="1278" height="113" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjELrawB2DCP60WjXDOszb3YUlEoi2TwCokjcYV3qvgbIJA6YCog0wevnIlYPae0Mxm4ZS0v-bh1nNjFpkIa_BODpIbGFsdDybcMgvBxOn9Yu-T0eaX8h5dYvOcn9ZkMkbKq9fRC-WuL6aNuW3uVGyv_YX9OMI1UDGdxsDVjiR9gAcC7_JUSD_iH9fcD79i/w200-h113/AOSense.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://onfirstup.com/boeing/BNN/articles/boeing-completes-worlds-1st-quantum-navigation-flight-test?bypass_deeplink=true">Source</a></td></tr></tbody></table>
Quantum inertial systems for commercial aircraft are undergoing flight tests in <a href="https://thequantuminsider.com/2024/05/13/uk-reports-successful-test-of-un-jammable-quantum-navigation-system/">the UK</a> and <a href="https://thequantuminsider.com/2024/08/09/boeings-quantum-based-navigation-system-takes-flight-in-historic-test/">the US</a>. The image shows the unit Boeing is testing. <a href="https://www.youtube.com/watch?v=_UNeYZEEOyo">Mentour Pilot's video</a> provides an accessible introduction to the <a href="https://en.wikipedia.org/wiki/Atom_interferometer">technology</a>.<br />
<br />
Even with Sandia's progress in reducing the size and cost of quantum intertial navigation, the technology is currently far out of reach for low-cost drones. But if progress were to continue it would mean that a drone, or more likely a drone swarm, could navigate to any target whose coordinates were known without using any external assistance that could be jammed or spoofed. Electrical grid transformers would be one such target.<br />
<br />
David.http://www.blogger.com/profile/14498131502038331594[email protected]39tag:blogger.com,1999:blog-4503292949532760618.post-65272677448648716542024-11-19T08:00:00.004-08:002024-11-19T08:00:00.114-08:00Driver Distraction Technology<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7Rf1fWGn3XzcspM9hygLHjU_r4dK73JBropAE_edKvEAtSsuHqrD585IUJikvamv2qaYOmsoTpxdaqc8k_gDs2_8UAj8a9UbVYFTgzwhyanMhP0gD95bywXcK6fOurNDfO7_rlzP1_uzLrXk3LOnbzMg6yFjvf1qhquU1d7pbDLxOKyqCxOgz2pj71Wz-/s831/LookMaNoHands.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="672" data-original-width="831" height="162" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7Rf1fWGn3XzcspM9hygLHjU_r4dK73JBropAE_edKvEAtSsuHqrD585IUJikvamv2qaYOmsoTpxdaqc8k_gDs2_8UAj8a9UbVYFTgzwhyanMhP0gD95bywXcK6fOurNDfO7_rlzP1_uzLrXk3LOnbzMg6yFjvf1qhquU1d7pbDLxOKyqCxOgz2pj71Wz-/w200-h162/LookMaNoHands.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://doi.org/10.1016/j.trip.2020.100113">Not this hand-off</a><br /></td></tr></tbody></table>
In the aftermath of the 737 MAX crashes, I wrote <a href="https://blog.dshr.org/2019/04/first-we-change-how-people-behave.html"><i>First We Change How People Behave</i></a>.:<br />
<blockquote>
The fundamental problem of autonomous vehicles sharing roads is that until you get to Level 5, you have a hand-off problem. The closer you get to Level 5, the worse the hand-off problem.
</blockquote>
Three years earlier, Paul Vixie was more specific in <a href="https://www.linkedin.com/pulse/disciplining-unoccupied-mind-paul-vixie/"><i>Disciplining the Unoccupied Mind</i></a>:<br />
<blockquote>
Simply put, if you give a human brain the option to perform other tasks than the one at hand, it will do so. No law, no amount of training, and no insistence by the manufacturer of an automobile will alter this fact. It's human nature, immalleable. So until and unless Tesla can robustly and credibly promise an autopilot that will imagine every threat a human could imagine, and can use the same level of caution as the best human driver would use, then the world will be better off without this feature.
</blockquote>
Follow me below the fold for an update on the hand-off problem.<br />
<span><a name='more'></a></span>
<br />
The 737 MAX crashes were a specific, especially difficult, case of the hand-off problem. It wasn't that the automation recognized a situation it couldn't cope with and initiated a hand-off to the humans. It was that the automation was wrong about the situation and the pilots had to decide to <a href="https://arstechnica.com/information-technology/2019/03/simulations-show-lion-air-737-crew-had-little-time-to-prevent-disaster/">override it</a>:<br />
<blockquote>
In testing performed in a simulator, Boeing test pilots recreated the conditions aboard Lion Air Flight 610 when it went down in the Java Sea in October, killing 189 people. The tests showed that the crew of the 737 MAX 8 would have only had 40 seconds to respond to the Maneuvering Characteristics Augmentation System’s (MCAS’s) attempts to correct a stall that wasn’t happening before the aircraft went into an unrecoverable dive, according to a <a href="https://www.nytimes.com/2019/03/25/business/boeing-simulation-error.html">report by The New York Times</a>.<br />
<br />
While the test pilots were able to correct the issue with the flip of three switches, their training on the systems far exceeded that of the Lion Air crew—and that of the similarly doomed Ethiopian Airlines Flight 302, which crashed earlier this month. The Lion Air crew was heard on cockpit voice recorders checking flight manuals in an attempt to diagnose what was going on moments before they died.
</blockquote>
Christine Negroni's <a href="https://www.vox.com/first-person/2019/4/22/18511069/boeing-737-max-crash-plane"><i>What people don’t get about why planes crash</i></a> stresses the hand-off problem:
<blockquote>
"In the crash of an Asiana Airlines Boeing 777 landing in San Francisco in 2013, investigators determined that a contributing factor was the pilots’ over-reliance on automated systems which led to an erosion in their flying skills. The investigation of the fatal flight of an Air France Airbus A330 from Rio de Janeiro to Paris in 2009 led to the conclusion that the complexity of the fly-by-wire airplane befuddled the pilots.<br />
<br />
The 737 Max probes suggest another variation on the conundrum: Technology intended to protect against pilot error trapped the pilots. Helpless in the cockpit, they were unable to do as Captain Sully did and save the day."
</blockquote>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQmeLMjAwC5YpFKAZlsWMpFKOod1uy52iyG94zv0UEG09Fgutc40FSeIZ7XNHPm6jycIUFyLGvXXhpvNlvqTkAjHfA28iPWfPib03Wc9io3_3wz0_OAR9fnBa32sfXiIp77HI_gd72fPITJTmisBEYFKt20uf5bZYNXkg_Zrc_UFKCfZRTBjN-RFyyFAMa/s611/Remains.png" style="clear: right; display: block; margin-left: auto; margin-right: auto; padding: 1em 0px; text-align: center;"><img alt="" border="0" data-original-height="445" data-original-width="611" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQmeLMjAwC5YpFKAZlsWMpFKOod1uy52iyG94zv0UEG09Fgutc40FSeIZ7XNHPm6jycIUFyLGvXXhpvNlvqTkAjHfA28iPWfPib03Wc9io3_3wz0_OAR9fnBa32sfXiIp77HI_gd72fPITJTmisBEYFKt20uf5bZYNXkg_Zrc_UFKCfZRTBjN-RFyyFAMa/s200/Remains.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.washingtonpost.com/technology/interactive/2023/tesla-autopilot-crash-analysis/">Source</a></td></tr></tbody></table>
Now, <i>Road and Track</i>'s Joe Kucinski reports that <a href="https://www.roadandtrack.com/news/a62919131/tesla-has-highest-fatal-accident-rate-of-all-auto-brands-study/"><i>Tesla Has the Highest Fatal Accident Rate of All Auto Brands, Study Finds</i></a>:<br />
<blockquote>
The study was conducted on model year 2018–2022 vehicles, and focused on crashes between 2017 and 2022 that resulted in occupant fatalities. Tesla vehicles have a fatal crash rate of 5.6 per billion miles driven, according to the study; Kia is second with a rate of 5.5, and Buick rounds out the top three with a 4.8 rate. The average fatal crash rate for all cars in the United States is 2.8 per billion vehicle miles driven.
</blockquote>
How is this possible when "Autopilot" is standard on Teslas? The analyst behind the study <a href="https://www.roadandtrack.com/news/a62919131/tesla-has-highest-fatal-accident-rate-of-all-auto-brands-study/">explains</a>:<br />
<blockquote>
So, why are Teslas — and many other ostensibly safe cars on the list — involved in so many fatal crashes? “The models on this list likely reflect a combination of driver behavior and driving conditions, leading to increased crashes and fatalities,” iSeeCars executive analyst Karl Brauer said in the report. “A focused, alert driver, traveling at a legal or prudent speed, without being under the influence of drugs or alcohol, is the most likely to arrive safely regardless of the vehicle they’re driving.”
</blockquote>
Precisely. It seems very likely that, lulled by the experience of being cocooned in high-tech safety systems, the drivers were not focused or alert, ready to take over from the automation in a split second when danger threatened.<br />David.http://www.blogger.com/profile/14498131502038331594[email protected]4tag:blogger.com,1999:blog-4503292949532760618.post-65540907026607489572024-11-08T08:00:00.004-08:002024-11-08T08:21:27.823-08:00Nvidia vs. Intel<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMPqstsWtfLASYMqdm9Zx18OV8zMInvJl3axT4qASYmp6A72o14Usk_GKXclyD0fUBGZXpQCakkOiEC-kcggp2YPdcHRPBgOuup17UoCJ84lIk_enUh0GeF1XGpyKQMkuALHWeEQnZJdQ3KK9OIAMDjUp3tjCe7eCRmIRArEY3iw6wu5qRIAEdCgkFpFQq/s1160/Dedge3d.jpg" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="729" data-original-width="1160" height="126" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMPqstsWtfLASYMqdm9Zx18OV8zMInvJl3axT4qASYmp6A72o14Usk_GKXclyD0fUBGZXpQCakkOiEC-kcggp2YPdcHRPBgOuup17UoCJ84lIk_enUh0GeF1XGpyKQMkuALHWeEQnZJdQ3KK9OIAMDjUp3tjCe7eCRmIRArEY3iw6wu5qRIAEdCgkFpFQq/w200-h126/Dedge3d.jpg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://en.wikipedia.org/wiki/NV1">NV1-based Diamond Edge</a><br /> <a href="https://en.wikipedia.org/wiki/User:Swaaye">Swaaye</a>, <a href="http://creativecommons.org/licenses/by-sa/3.0/">CC-By-SA 3.0</a></td></tr></tbody></table>
Today <a href="https://www.bloomberg.com/news/articles/2024-11-01/nvidia-set-to-replace-intel-in-the-dow-jones-industrial-average">Nvidia replaced Intel</a> in the Dow Jones Industrial Average with a market cap of about $3.6T, about the same as Apple, as against Intel's market cap about 33 times less.<br />
<br />
That is a long way from Curtis Priem's kitchen table, a $2.5M A-round from Sutter Hill and Sequoia, and the NV1.<br />David.http://www.blogger.com/profile/14498131502038331594[email protected]0tag:blogger.com,1999:blog-4503292949532760618.post-36559870286770594262024-10-29T08:00:00.072-07:002024-10-30T13:57:19.268-07:001.5C Here We Come<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3Pd1dJTe5ZHLKgXrPUJ8LPlJ6Qz6o8wmgNy9bJ5u6JpYOqvNxhhOUFUMcPFx9gYacQrbz_wmHnQaqkQ8-i8JGlAnatA7ASOxUs44RZWpPKDIZXo1mtup-jBLh8g9gcbIDZWKR6xkanL2POBn3kez5paivIWykHgT36rBrjWvink4l1h5qZucP9Sd8d3S_/s842/EGR%202024%20Cover-thumbnail.png" style="clear: right; display: block; margin-left: auto; margin-right: auto; padding: 1em 0px; text-align: center;"><img alt="" border="0" data-original-height="842" data-original-width="595" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3Pd1dJTe5ZHLKgXrPUJ8LPlJ6Qz6o8wmgNy9bJ5u6JpYOqvNxhhOUFUMcPFx9gYacQrbz_wmHnQaqkQ8-i8JGlAnatA7ASOxUs44RZWpPKDIZXo1mtup-jBLh8g9gcbIDZWKR6xkanL2POBn3kez5paivIWykHgT36rBrjWvink4l1h5qZucP9Sd8d3S_/s200/EGR%202024%20Cover-thumbnail.png" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.unep.org/resources/emissions-gap-report-2024">Source</a></td></tr></tbody></table>
John Timmer's <a href="https://arstechnica.com/science/2024/10/with-four-more-years-like-2023-carbon-emissions-will-blow-past-1-5-limit/"><i>With four more years like 2023, carbon emissions will blow past 1.5° limit</i></a> is based on the United Nations' Environmental Programme's report <a href="https://www.carbonbrief.org/unep-new-climate-pledges-need-quantum-leap-in-ambition-to-deliver-paris-goals/"><i>Emissions Gap Report 2024</i></a>. The <a href="https://arstechnica.com/science/2024/10/with-four-more-years-like-2023-carbon-emissions-will-blow-past-1-5-limit/">"emissions gap" is</a>:<br />
<blockquote>
the difference between where we're heading and where we'd need to be to achieve the goals set out in the Paris Agreement. It makes for some pretty grim reading. Given last year's greenhouse gas emissions, we can afford fewer than four similar years before we would exceed the total emissions compatible with limiting the planet's warming to 1.5° C above pre-industrial conditions.<br />
...<br />
The report ascribes this situation to two distinct emissions gaps: between the goals of the Paris Agreement and what countries have pledged to do and between their pledges and the policies they've actually put in place.
</blockquote>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1DeKlJ3M0uqxbSQUpaJeNfJbP9Ub8-RpFufYQ7YSCAww-EKBZRcTfHjp7WSkdCYhT50g9Iep7xTot5vmTix-aXhTp4e-qdLbjYmwANnVqFVnUlDMrq4R1VWFsy7To2ORI8Eg1ZYRkqZ1a/s884/CBECI-111220.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="596" data-original-width="884" height="135" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1DeKlJ3M0uqxbSQUpaJeNfJbP9Ub8-RpFufYQ7YSCAww-EKBZRcTfHjp7WSkdCYhT50g9Iep7xTot5vmTix-aXhTp4e-qdLbjYmwANnVqFVnUlDMrq4R1VWFsy7To2ORI8Eg1ZYRkqZ1a/w200-h135/CBECI-111220.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">Source</td></tr></tbody></table>
Back in 2021 in my <a href="https://blog.dshr.org/2021/12/talk-at-ttivanguard-conference.html">TTI/Vanguard talk</a> I examined one of these gaps, the one between the crypto-bros' energy consumption:<br />
<blockquote>
The leading source for estimating Bitcoin's electricity consumption is the <a href="https://cbeci.org/index/">Cambridge Bitcoin Energy Consumption Index</a>, whose current central estimate is 117TWh/year.<br />
<br />
Adjusting <a href="http://ceepr.mit.edu/files/papers/2018-018.pdf">Christian Stoll et al's 2018 estimate</a> of Bitcoin's carbon footprint to the current CBECI estimate gives a range of about 50.4 to 125.7 MtCO2/yr for Bitcoin's opex emissions, or between <a href="https://en.wikipedia.org/wiki/List_of_countries_by_carbon_dioxide_emissions">Portugal and Myanmar</a>.
</blockquote>
and their <a href="https://blog.dshr.org/2022/02/ee380-talk.html">rhetoric</a>:<br />
<blockquote>
Cryptocurrencies assume that society is committed to this waste of energy and hardware <i>forever</i>. Their response is frantic greenwashing, such as claiming that because Bitcoin mining allows an obsolete, uncompetitive coal-burning plant near St. Louis to <i>continue burning coal</i> it is somehow <a href="https://arstechnica.com/tech-policy/2021/09/old-coal-plant-is-now-mining-bitcoin-for-a-utility-company/">good for the environment</a>.<br />
<br />
But, they argue, mining can use renewable energy. First, at present it doesn't. For example, Luxxfolio implemented their commitment to 100% renewable energy by buying 15 megawatts of coal-fired power from the Navajo Nation!.<br />
<br />
Second, even if it were true that cryptocurrencies ran on renewable power, the idea that it is OK for speculation to waste vast amounts of renewable power assumes that doing so doesn't compete with more socially valuable uses for renewables, or indeed for power in general.
</blockquote>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFXcV86c0wnOESJFgdPo0PfyYgauiEMfq3pFuJTke2OY6J-5PLWxaMgcGEfYgvjGH-9ZUyaFNDNmhMBbRbjkNz5NxFTmvXcUYdTzApYHzwAaNSiUUBt4v64oI9DMit0e0wxuk0SLi6BoPxLIwdjTYHHq-8ExccCJx8kYmECxK7L9NrvwHA1UFwXabqYH_z/s855/BitcoinEnergy102524.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="538" data-original-width="855" height="126" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFXcV86c0wnOESJFgdPo0PfyYgauiEMfq3pFuJTke2OY6J-5PLWxaMgcGEfYgvjGH-9ZUyaFNDNmhMBbRbjkNz5NxFTmvXcUYdTzApYHzwAaNSiUUBt4v64oI9DMit0e0wxuk0SLi6BoPxLIwdjTYHHq-8ExccCJx8kYmECxK7L9NrvwHA1UFwXabqYH_z/w200-h126/BitcoinEnergy102524.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">Source</td></tr></tbody></table>
Note that the <a href="https://cbeci.org/index/">current CBECI estimate</a> shows that Bitcoin's energy consumption has increased 43% since 2021, a 12.7%/yr increase.<br />
<br />
Follow me below the fold for more details of the frantic greenwashing, not just from the crypto-bros but from the giants of the tech industry that <a href="https://www.carbonbrief.org/unep-new-climate-pledges-need-quantum-leap-in-ambition-to-deliver-paris-goals/">aims to ensure that</a>:<br />
<blockquote>
Following existing policies out to the turn of the century would leave us facing over 3° C of warming.
</blockquote>
<span><a name='more'></a></span>
Luxxfolio wasn't an exception. The latest example of Bitcoin greenwashing comes from <a href="https://hntrbrk.com/terawulf/">Hunterbrook Media</a>:<br />
<blockquote>
<ul>
<li>TeraWulf Inc. (NASDAQ: $WULF) brands itself as a “zero-carbon Bitcoin miner” — and claims its commitment to renewable energy will help it land AI data center contracts. But the New York Power Authority, which supplies 45% of the facility’s energy, told Hunterbrook Media: “None of the power that NYPA provides the firm can be claimed as renewable power.”</li>
<li>The rest of TeraWulf’s power is sourced from the New York grid, which is less than half zero-carbon, according to the New York Independent System Operator, the organization responsible for managing the state’s wholesale electric marketplace.</li>
<li>The only way TeraWulf can legally substantiate its zero-carbon claims is by purchasing renewable energy credits (RECs), according to New York and federal regulators, but a TeraWulf spokesperson confirmed that the company has not done so. “Without the REC, there is no legal claim to the renewable attributes of electricity,” a spokesperson for the New York State Energy Research and Development Authority confirmed in an email to Hunterbrook.</li>
</ul>
</blockquote>
These lies were just the start, Hunterbrook documents <a href="https://blog.dshr.org/2024/08/greenwashing.html">lies about most aspects</a> of their business. Note TeraWulf's <a href="https://pivot-to-ai.com/">pivot to AI</a>. In <a href="https://www.bloomberg.com/news/articles/2024-10-19/bitcoin-miners-pivoting-to-ai-outperform-hodlers-six-months-after-halving"><i>Bitcoin Miners Take Divergent Paths Six Months After Revenue ‘Halving’</i></a>, David Pan explains that TeraWulf is part of a trend:<br />
<blockquote>
Six months after rewards for validating transactions on the Bitcoin network were reduced by half, crypto mining companies are choosing between two divergent paths to remain viable.<br />
<br />
Public miners including MARA Holdings, Riot Platforms and CleanSpark are keeping the Bitcoin they produce with the expectation that the digital asset will rise in value. At the same time, an increasing number of companies are spending more on developing data centers that power artificial intelligence applications.
</blockquote>
It isn't just the crypto-bros who are apperently lying about using renewables. Back in July Adele Peters revealed that <a href="https://www.fastcompany.com/91153918/amazon-says-it-now-runs-on-100-clean-power-employees-say-its-more-like-22"><i>Amazon says it hit a goal of 100% clean power. Employees say it’s more like 22%</i></a>:<br />
<blockquote>
Today, Amazon announced that it hit its 100% renewable electricity goal seven years early. But a group of Amazon employees argues that the company’s math is misleading.<br />
<br />
A <a href="https://static1.squarespace.com/static/65681f099d7c3d48feb86a5f/t/668ebf702516716ca72bbf98/1720631157044/unsustainability-report.pdf">report</a> from the group, <a href="https://www.amazonclimatejustice.org/">Amazon Employees for Climate Justice</a>, argues that only 22% of the company’s data centers in the U.S. actually run on clean power. The employees looked at where each data center was located and the mix of power on the regional grids—how much was coming from coal, gas, or oil versus solar or wind.<br />
<br />
Amazon, like many other companies, buys renewable energy credits (RECs) for a certain amount of clean power that’s produced by a solar plant or wind farm. In theory, RECs are supposed to push new renewable energy to get built. In reality, that doesn’t always happen. The employee research found that 68% of Amazon’s RECs are unbundled, meaning that they didn’t fund new renewable infrastructure, but gave credit for renewables that already existed or were already going to be built.
</blockquote>
And in August Amy Castor and David Gerard posted <a href="https://pivot-to-ai.com/2024/08/17/how-to-fix-ais-ghastly-power-consumption-fake-the-numbers/"><i>How to fix AI’s ghastly power consumption? Fake the numbers!</i></a>:<br />
<blockquote>
Big tech uses a stupendous amount of power, so it generates a stupendous amount of CO2. The numbers are not looking so great, especially with the ever-increasing power use of AI.<br />
<br />
So the large techs want to fiddle how the numbers are calculated!<br />
<br />
Companies already have a vast gap between “market-calculated” CO2 and actual real-world CO2 production. The scam works a lot like carbon credits. Companies cancel out power used on the coal/gas-heavy grid in northern Virginia by buying renewable energy credits for solar energy in Nevada.<br />
<br />
So in 2023, Facebook listed just 273 tonnes of “net” CO2 and claimed it had hit “net zero” — but it actually generated 3.9 million tonnes.<br />
<br />
In practice, RECs don’t drive new clean energy or any drop in emissions — they only exist for greenwashing.<br />
<br />
It gets worse. Large techs are already the largest buyers of RECs. So they’re lobbying the Greenhouse Gas Protocol organization to let them report even more ludicrously unrealistic numbers.<br />
<br />
RECs currently have to be on the same continent at the same time of day. Amazon and Facebook propose a completely free system with no geographical constraints. They could offset coal power in Virginia with wind power from Norway or India.<br />
<br />
This will make RECs work even more like the carbon credit market — where companies can claim hypothetical “avoided” CO2 against actual, real-world CO2.
</blockquote>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsgO5ZiIKn2Go4Peuqg9DeM86vG0pnW2I_G3idrrWbAT0Y1qNaq9qeUsO1T4h9Fm805S0zDRHBZykuDm2Kgx-1pwhtQfJTjw6PK8WyzJepS5es0Is0uU2Q5Hnb_0T9PiY2MZzPokS08gvWSdVVIfZXNMzBv1wfUnXnYPzOyjhn9qU_-TUkyP22KBaKFg1X/s803/CreativeAccounting.png" imageanchor="1" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="677" data-original-width="803" height="169" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsgO5ZiIKn2Go4Peuqg9DeM86vG0pnW2I_G3idrrWbAT0Y1qNaq9qeUsO1T4h9Fm805S0zDRHBZykuDm2Kgx-1pwhtQfJTjw6PK8WyzJepS5es0Is0uU2Q5Hnb_0T9PiY2MZzPokS08gvWSdVVIfZXNMzBv1wfUnXnYPzOyjhn9qU_-TUkyP22KBaKFg1X/w200-h169/CreativeAccounting.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.theguardian.com/technology/2024/sep/15/data-center-gas-emissions-tech">Source</a></td></tr></tbody></table>
In <a href="https://www.theguardian.com/technology/2024/sep/15/data-center-gas-emissions-tech"><i>Data center emissions probably 662% higher than big tech claims. Can it keep up the ruse?</i></a> Isabel O'Brien reinforced the message:<br />
<blockquote>
<a href="https://www.theguardian.com/technology/amazon">Amazon</a> is the largest emitter of the big five tech companies by a mile – the emissions of the second-largest emitter, Apple, were less than half of Amazon’s in 2022. However, Amazon has been kept out of the calculation above because its differing business model makes it difficult to isolate data center-specific emissions figures for the company.<br />
<br />
As energy demands for these <a href="https://www.theguardian.com/technology/2023/jun/08/artificial-intelligence-industry-boom-environment-toll">data centers grow</a>, many are worried that carbon emissions will, too. The International Energy Agency stated that data centers already accounted for 1% to 1.5% of global electricity consumption in 2022 – and that was before the AI boom began with ChatGPT’s launch at the end of that year.<br />
<br />
AI is far more energy-intensive on data centers than typical cloud-based applications. According to <a href="https://www.goldmansachs.com/insights/articles/AI-poised-to-drive-160-increase-in-power-demand">Goldman Sachs</a>, a ChatGPT query needs nearly 10 times as much electricity to process as a Google search, and data center power demand will grow 160% by 2030. Goldman competitor <a href="https://www.reuters.com/markets/carbon/global-data-center-industry-emit-25-billion-tons-co2-through-2030-morgan-stanley-2024-09-03/">Morgan Stanley</a>’s research has made similar findings, projecting data center emissions globally to accumulate to 2.5bn metric tons of CO2 equivalent by 2030.<br />
<br />
In the meantime, all five tech companies have claimed carbon neutrality, though Google dropped the label last year as it stepped up its carbon accounting standards. Amazon is the most recent company to do so, claiming in July that it met its goal <a href="https://www.aboutamazon.com/news/sustainability/amazon-renewable-energy-goal">seven years early</a>, and that it had implemented a gross emissions cut of <a href="https://www.greenbiz.com/article/amazon-cut-emissions-3-2023-enabled-renewable-energy-purchases">3%</a>.
</blockquote>
Because the tech giants are funnelling vast amounts of cash to Nvidia for hardware to train AIs to, for example, tell people to eat at <a href="https://arstechnica.com/gadgets/2024/10/fake-restaurant-tips-on-reddit-a-reminder-of-google-ai-overviews-inherent-flaws/">Angus Steakhouse</a>, or <a href="https://www.theverge.com/2024/6/11/24176490/mm-delicious-glue">put glue on pizza</a>, convince them that <a href="https://arstechnica.com/ai/2024/10/google-microsoft-and-perplexity-promote-scientific-racism-in-ai-search-results/">black people's IQ is inferior to whites</a>, <a href="https://apnews.com/article/ai-artificial-intelligence-health-business-90020cdf5fa16c79ca2e5b6c4c9bbb14">hallucinate patient's responses to doctors</a>, persuade teens to <a href="https://www.theguardian.com/technology/2024/oct/23/character-ai-chatbot-sewell-setzer-death">commit suicide</a>, and so on they will need lots of power. The smart miners have figured out that their access to lots of power is worth more to the AI bubble than the Bitcoin it could mine. Especially since the <a href="https://blog.dshr.org/2024/07/more-on-halvening.html">halvening</a>. The market has <a href="https://www.bloomberg.com/news/articles/2024-10-19/bitcoin-miners-pivoting-to-ai-outperform-hodlers-six-months-after-halving">figured this out too</a>:<br />
<blockquote>
while the shares of the majority of the companies have underperformed Bitcoin’s more than 60% rally this year with future mining revenue constrained, traders appear to be voting which strategy will succeed, with those embracing AI posing the largest gains.<br />
<br />
MARA and Riot, two of the largest publicly traded Bitcoin miners and both “hodlers,” have seen their shares slump 20% and 36%, respectively, this year.
</blockquote>
On the <a href="https://www.bloomberg.com/news/articles/2024-10-21/tether-backed-northern-data-plans-sale-of-crypto-mining-unit">other hand</a>:<br />
<blockquote>
Northern Data AG is examining a possible sale of its crypto mining business to free up funds for expanding its artificial-intelligence operations.<br />
<br />
The Frankfurt-listed company, whose main shareholder is stablecoin issuer Tether Holdings Ltd., would use proceeds from the sale of Peak Mining to focus on its AI solutions unit, it said in a statement Monday. Shares of Northern Data jumped as much as 12% on the news, and were up 9.8% as of 12:06 p.m. in Frankfurt.
</blockquote>
The big tech companies are desperate for power:<br />
<ul>
<li>They are continuing to burn coal at plants that were due to shut down in <a href="https://hntrbrk.com/terawulf/">Montana</a>, <a href="https://pivot-to-ai.com/2024/10/14/ai-really-is-the-new-bitcoin-google-and-facebook-extend-coal-burning-in-omaha/">Omaha (Google & Facebook)</a>, <a href="https://www.washingtonpost.com/business/2024/06/21/artificial-intelligence-nuclear-fusion-climate/">Utah, Georgia and Wisconsin</a>:<br />
<blockquote>
“This is very quickly becoming an issue of, don’t get left behind locking down the power you need, and you can figure out the climate issues later,” said Aaron Zubaty, CEO of California-based Eolian, a major developer of clean energy projects. “Ability to find power right now will determine the winners and losers in the AI arms race. It has left us with a map bleeding with places where the retirement of fossil plants are being delayed.”
</blockquote></li>
<li><a href="https://www.theregister.com/2024/09/06/datacenters_set_to_emit_3x/">Morgan Stanley estimates</a> that:<br />
<blockquote>
The datacenter industry is set to emit 2.5 billion tonnes of greenhouse gas (GHG) emissions worldwide between now and the end of the decade, three times more than if generative AI had not been developed.
</blockquote></li>
<li><a href="https://www.theregister.com/2024/05/31/datacenter_power_crunch/">S&P Global Commodity Insights</a>:<br />
<blockquote>
<a href="https://www.ft.com/content/ddaac44b-e245-4c8a-bf68-c773cc8f4e63">noted</a> that only 54 gigawatts of the US coal industry is projected to be powered off by 2030 – down 40 percent from a prediction made in July last year. The total number of coal plants retired by 2050 is still expected to be roughly the same, but the pace of retirement from now to the end of the decade will be significantly slower compared to last year's estimates.<br />
...<br />
Coal plants can credit their new lease on life to the datacenter industry, which is expanding and upgrading existing bit barns as well as building new facilities. The age of AI requires lots of energy – <a href="https://www.theregister.com/2024/01/24/iea_report/">Google search powered by AI</a> alone is expected to use ten times the power of a more traditional information request, according to the International Energy Agency's (IEA) January report.
</blockquote></li>
<li>Microsoft signed a 20-year contract to restart <a href="https://pivot-to-ai.com/2024/09/21/three-mile-island-nuclear-plant-is-restarting-to-power-ai-for-microsoft/">Three Mile Island</a>:<br />
<blockquote>
Constellation Energy shut down the Unit 1 reactor in 2019 — not the one that melted down in 1979, the other one — because it wasn’t economical. Inflation Reduction Act tax breaks made it viable again, so Constellation went looking for a customer. Microsoft has signed up for 835 megawatts for the next 20 years.<br />
...<br />
Other mothballed nuclear reactors want to restart for data centers, including Palisades in Michigan and Duane Arnold in Iowa. These both shut down because renewables and natural gas were cheaper — but the data centers need feeding.<br />
<br />
TMI Unit 1 should be back online in 2028, going into the strained local grid — so when the AI bubble pops, the clean-ish power will still be there.
</blockquote></li>
<li>Google and Amazon have signed deals for <a href="https://pivot-to-ai.com/2024/10/17/google-amazon-buy-nonexistent-mini-nuclear-reactors-for-ai-data-centers/">Small Modular Reactors (SMRs)</a>, and so has <a href="https://www.theregister.com/2024/10/14/ai_datacenters_coal/">Oracle</a>, but:<br />
<blockquote>
Google has signed a deal with California startup Kairos Power for six or seven small modular reactors. The first is due in 2030 and the rest by 2035, for a total of 500 megawatts.<br />
<br />
Amazon has also done three deals to fund SMR development.<br />
...<br />
Only three experimental SMRs exist in the entire world — in Russia, China, and Japan. The Russian and Chinese reactors claim to be in “commercial operation” — though with their intermittent and occasional hours and disconcertingly low load factors, they certainly look experimental.<br />
<br />
Like general AI, SMRs are a technology that exists in the fabulous future. SMR advocates will talk all day about the potential of SMRs and gloss over the issues — particularly that SMRs are not yet economically viable.<br />
<br />
Kairos doesn’t have an SMR. They have permission to start a non-powered tech demo site in 2027. Will they have an approved and economically viable design by 2030?
</blockquote></li>
</ul>
Of course, the nuclear options won't add CO2 to the atmosphere, but <i>they won't come on line until after we've breached 1.5C</i>. The result is the rapidly increasing "emssions gap" of the large tech companies. But the problem is even worse than it appears. In my <a href="https://blog.dshr.org/2022/02/ee380-talk.html">EE380 talk</a> I discussed the carbon emmissions from Bitcoin's hardware:<br />
<blockquote>
<a href="https://doi.org/10.1016/j.resconrec.2021.105901"><i>Bitcoin's growing e-waste problem</i></a> by Alex de Vries and Christian Stoll concludes that:<br />
<blockquote>
Bitcoin's annual e-waste generation adds up to 30.7 metric kilotons as of May 2021. This level is comparable to the small IT equipment waste produced by a country such as the Netherlands.
</blockquote>
That's an average of one whole MacBook Air of e-waste <i>per "economically meaningful" transaction</i>.
</blockquote>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNWVq57jQ0zfUyZMspJH1geYhRGXctAjulzgQPFpCRhdgc2wTIW4aHd4vBur9SyRt38P5z7ij2-m4tuk4jE_h8qisrQtfG9adfQbIKb16AnFtN0eb8zaBsSajpi5c97MyTpQ3-AGvMHX0T/s767/FacebookGoogleFootprint.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="762" data-original-width="767" height="199" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNWVq57jQ0zfUyZMspJH1geYhRGXctAjulzgQPFpCRhdgc2wTIW4aHd4vBur9SyRt38P5z7ij2-m4tuk4jE_h8qisrQtfG9adfQbIKb16AnFtN0eb8zaBsSajpi5c97MyTpQ3-AGvMHX0T/w200-h199/FacebookGoogleFootprint.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://arxiv.org/pdf/2011.02839.pdf">Source</a></td></tr></tbody></table>
Why does Bitcoin generate <a href="https://blog.dshr.org/2022/02/ee380-talk.html">so much e-waste</a>?:<br />
<blockquote>
The reason for this extraordinary waste is that the profitability of mining depends on the energy consumed per hash, and the rapid development of mining ASICs means that they rapidly become uncompetitive. de Vries and Stoll estimate that the average service life is less than 16 months. This mountain of e-waste contains embedded carbon emissions from its manufacture, transport and disposal. These graphs show that for Facebook and Google data centers, capex emissions are <a href="https://blog.dshr.org/2021/10/cryptocurrencys-carbon-footprint.html">at least as great as the opex emissions</a>.
</blockquote>
Lindsay Clark's <a href="https://www.theregister.com/2024/10/28/genai_dirty_secret/"><i>GenAI's dirty secret: It's set to create a mountainous increase in e-waste</i></a> points out that AI has the same problem:<br />
<blockquote>
Computational boffins' research claims GenAI is set to create nearly 1,000 times more e-waste than exists currently by 2030, unless the tech industry employs mitigating strategies.<br />
<br />
The study, which looks at the rate AI servers are being introduced to datacenters, claims that a realistic scenario indicates potential for rapid growth of e-waste from 2.6 kilotons each year in 2023 to between 400 kilotons and 2.5 million tons each year in 2030, when no waste reduction measures are considered.
</blockquote>
Assuming that the tech giants eventually succeed in generating profits from their massive investments in AI data centers, it is likely that the economic life of Nvidia's hardware is longer than that of Bitmain's mining rigs. But the investment is much bigger, so it is likely that the capex emissions from AI data centers add greatly to the overall climate impact of AI. Even if they never make profits, the capex emissions from the current build-out will still be in the atmosphere.<br />
<br />
Interestingly, the mainstream media has started to pay attention. Back in June
the <i>Washington Post</i>'s Evan Halper and Caroline O'Donovan's <a href="https://www.washingtonpost.com/business/2024/06/21/artificial-intelligence-nuclear-fusion-climate/"><i>AI is exhausting the power grid. Tech firms are seeking a miracle solution</i></a> reported on the latest shiny object:<br />
<blockquote>
So near the river’s banks in central Washington, Microsoft is betting on an effort to generate power from atomic fusion — the collision of atoms that powers the sun — a breakthrough that has eluded scientists for the past century. Physicists predict it will elude Microsoft, too.<br />
<br />
The tech giant and its partners say they expect to harness fusion by 2028, an audacious claim that bolsters their promises to transition to green energy but distracts from current reality.
</blockquote>
Even if they could "harness fusion by 2028", it would be too late to avoid 1.5C. But no-one has yet built a fusion reactor with a positive power output, so the 2028 claim is obvious BS. Pay attention to their <a href="https://www.washingtonpost.com/business/2024/06/21/artificial-intelligence-nuclear-fusion-climate/">actions not words</a>:<br />
<blockquote>
In fact, the voracious electricity consumption of artificial intelligence is driving an expansion of fossil fuel use — including delaying the retirement of some coal-fired plants.<br />
...<br />
The data-center-driven resurgence in fossil fuel power contrasts starkly with the sustainability commitments of tech giants Microsoft, Google, Amazon and Meta, all of which say they will erase their emissions entirely as soon as 2030. The companies are the most prominent players in a constellation of <a href="https://www.datacentermap.com/usa/i">more than 2,700 data centers</a> nationwide, many of them run by more obscure firms that rent out computing power to the tech giants.<br />
<br />
“They are starting to think like cement and chemical plants. The ones who have approached us are agnostic as to where the power is coming from,” said Ganesh Sakshi, chief financial officer of Mountain V Oil & Gas, which provides natural gas to industrial customers in Eastern states.
</blockquote>
And this month the <i>New York Times</i>' David Gelles' <a href="https://www.nytimes.com/2024/10/22/climate/ai-big-tech-emissions.html"><i>The A.I. Power Grab</i></a> reported that Nvidia was also pushing the "AI will solve the climate" fantasy:<br />
<blockquote>
Nvidia’s chips are incredibly power-hungry. As the company rolls out new products, analysts have taken to measuring the amount of electricity needed to power them in terms of <a href="https://www.tomshardware.com/tech-industry/nvidias-h100-gpus-will-consume-more-power-than-some-countries-each-gpu-consumes-700w-of-power-35-million-are-expected-to-be-sold-in-the-coming-year">cities, or even countries</a>.<br />
<br />
There are already more than 5,000 data centers in the U.S., and the industry is expected to grow nearly 10 percent annually. Goldman Sachs estimates that A.I. will <a href="https://www.goldmansachs.com/insights/articles/AI-poised-to-drive-160-increase-in-power-demand">drive a 160 percent increase</a> in data center power demand by 2030.<br />
<br />
Dion Harris, Nvidia’s head of data center product marketing, acknowledged that A.I. was creating a huge spike in power usage. But he said that over time, that demand would be offset as A.I. made other industries more efficient.<br />
<br />
“There is sort of a myopic view on the data center,” he said, “but not really an understanding that a lot of those technologies are going to be the main way that we’re going to innovate our way to a net-zero future.”
</blockquote>
Apart from continuing to burn fossil fuels as fast as they can and signing deals that won't make a difference until after the world has committed to 1.5C, what are the tech giants doing? Just like the crypto-bros, they are <a href="https://blog.dshr.org/2024/08/greenwashing.html">greenwashing</a>, and spinning ludicrous futures to prevent current action. Here, for example, is <a href="https://www.nytimes.com/2024/10/22/climate/ai-big-tech-emissions.html">Eric Schmidt</a>:<br />
<blockquote>
Eric Schmidt, the former chief executive of Google, recently said that the artificial intelligence boom was too powerful, and had too much potential, to let concerns about climate change get in the way.<br />
<br />
Schmidt, somewhat fatalistically, <a href="https://disconnect.blog/silicon-valley-is-sacrificing-the-climate-for-ai/">said that</a> “we’re not going to hit the climate goals anyway,” and argued that rather than focus on reducing emissions, “I’d rather bet on A.I. solving the problem.”
</blockquote>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUNi5yvRm24M7XXajo_rSdvGtRbl1OVAm2KRFOOUrs5-_v7bH46jYrzB_tp2VpJK5GOFGEFy53YPZb-6tawPSyTGQNreBxpKSDjeK79U8UCC9_VdEwNNlYUWnqQagcx-Xv_kdcEfs1Y2d5/s1711/TimesTrib.jpeg" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="1655" data-original-width="1711" height="194" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUNi5yvRm24M7XXajo_rSdvGtRbl1OVAm2KRFOOUrs5-_v7bH46jYrzB_tp2VpJK5GOFGEFy53YPZb-6tawPSyTGQNreBxpKSDjeK79U8UCC9_VdEwNNlYUWnqQagcx-Xv_kdcEfs1Y2d5/w200-h194/TimesTrib.jpeg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">Schmidt at Sun<br /></td></tr></tbody></table>
Full disclosure: I reported to Schmidt at Sun Microsystems, and my opinion of him is less negative than most of my then peer engineers. But I would not expect him to sacrifice immediate profits for the health of the planet. He is right that “we’re not going to hit the climate goals anyway", but that is partly his fault. Even assuming that he's right and AI is capable of magically "solving the problem", the magic solution <i>won't be in place until long after 2027</i>, which is when at the current rate we will pass 1.5C. And everything that the tech giants are doing <i>right now</i> is moving the 1.5C date closer.<br />
<br />
David.http://www.blogger.com/profile/14498131502038331594[email protected]16tag:blogger.com,1999:blog-4503292949532760618.post-83274877449284211242024-10-07T08:00:00.006-07:002024-10-07T08:00:00.119-07:00It Was Ten Years Ago TodayTen years ago today I posted <a href="https://blog.dshr.org/2014/10/economies-of-scale-in-peer-to-peer.html"><i> Economies of Scale in Peer-to-Peer Networks </i></a>. My fundamental insight was:<br />
<blockquote>
<ul>
<li>The income to a participant in a P2P network of this kind should be linear in their contribution of resources to the network.</li>
<li>The costs a participant incurs by contributing resources to the network will be less than linear in their resource contribution, because of the economies of scale.</li>
<li>Thus the proportional profit margin a participant obtains will increase with increasing resource contribution.</li>
<li>Thus the effects described in Brian Arthur's <a href="http://www.amazon.com/Increasing-Returns-Dependence-Economics-Cognition/dp/0472064967"><i>Increasing Returns and Path Dependence in the Economy</i></a> will apply, and the network will be dominated by a few, perhaps just one, large participant.</li>
</ul>
</blockquote>
In the name of blatant self-promotion, below the fold I look at how this insight has held up since.<br />
<span><a name='more'></a></span>
<br />
Experience in the decade since has shown that this insight was correct.<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNcixci4qAWDOvTMVdnHyxj7Pcg7Bmhkb355JFHr5DLKn9YDvK34Q6z8zkTtjdLqcJsO5LLA7nRMxobJVpXP2trhPW4iC0AmGNIHnyCIQBg_BBP2Azlwl9-37jnGRYMSHVsMVioXdph4GBD6nNcI2YUWQpAJxjlBQ8giXueXyFyZzOgDQCXwN-qDNLyBGq/s712/BitcoinPools092924.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="506" data-original-width="712" height="142" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNcixci4qAWDOvTMVdnHyxj7Pcg7Bmhkb355JFHr5DLKn9YDvK34Q6z8zkTtjdLqcJsO5LLA7nRMxobJVpXP2trhPW4iC0AmGNIHnyCIQBg_BBP2Azlwl9-37jnGRYMSHVsMVioXdph4GBD6nNcI2YUWQpAJxjlBQ8giXueXyFyZzOgDQCXwN-qDNLyBGq/w200-h142/BitcoinPools092924.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.blockchain.com/explorer/charts/pools">Source</a></td></tr></tbody></table>
The insight applies to Proof Of Work networks; for the entire decade Bitcoin mining has always been dominated by five or fewer mining pools. As I write this AntPool, ViaBTC and F2Pool have had more than 50% of the hashrate over the last week. Even within those pools, the vast expense of mining rigs, the data centers to put them in, and the power to feed them make economies of scale essential.<br />
<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIRVsRoUITuHKoz9cuvRGnah02f-0lsdd0skZxWuvupcKZe1mvUTHNBlqyOFSJXza1AtWRbXnYCs8yncvXYpexfeQsKAC_cwKJ88eaWJTqmcvG09tSgzZAEHhe7p5_V3xbNAPbQsVDDCJ6dVagx4R0t4RXToBpDrPCnetmD49geHbwog_rs2G1pQQN_c6s/s921/ETH-Producers.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="393" data-original-width="921" height="86" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIRVsRoUITuHKoz9cuvRGnah02f-0lsdd0skZxWuvupcKZe1mvUTHNBlqyOFSJXza1AtWRbXnYCs8yncvXYpexfeQsKAC_cwKJ88eaWJTqmcvG09tSgzZAEHhe7p5_V3xbNAPbQsVDDCJ6dVagx4R0t4RXToBpDrPCnetmD49geHbwog_rs2G1pQQN_c6s/w200-h86/ETH-Producers.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://etherscan.io/dashboards/block-producers">Source</a></td></tr></tbody></table>
The insight applies to Proof Of Stake networks at two levels:<br />
<ul>
<li>Block production: over the last month almost half of all blocks have been produced by beaverbuild.</li>
<li>Staking: <a href="https://www.bloomberg.com/news/articles/2024-02-21/ether-etf-applications-spur-s-p-warning-on-concentration-risks">Yueqi Yang noted that</a>:<br />
<blockquote>
Coinbase Global Inc. is already the second-largest validator ... controlling about 14% of staked Ether. The top provider, Lido, controls 31.7% of the staked tokens,
</blockquote>
That is 45.7% of the total staked controlled by the top two.</li>
</ul>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrzySsk6XlryVzt_u0z-jqvlmM4qPcdC2R_bdzV3b4jlmHoD6Zsj7cncEh4BLqJSzW9r0Xw_iVSOS0egqsWKEcBqc01gLzmElDlwAK6EQHSe93cIBi2Pv0FWzdzfDyOwcMFTI3YCeZxGNu3Dl8W-obMbPxeUjXZt2YHVo7bPhbDwWJTWYefeHA9MerIF1y/s1109/EthereumSoftware.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="519" data-original-width="1109" height="94" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrzySsk6XlryVzt_u0z-jqvlmM4qPcdC2R_bdzV3b4jlmHoD6Zsj7cncEh4BLqJSzW9r0Xw_iVSOS0egqsWKEcBqc01gLzmElDlwAK6EQHSe93cIBi2Pv0FWzdzfDyOwcMFTI3YCeZxGNu3Dl8W-obMbPxeUjXZt2YHVo7bPhbDwWJTWYefeHA9MerIF1y/w200-h94/EthereumSoftware.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://clientdiversity.org/#distribution">Source</a></td></tr></tbody></table>
In addition all these networks lack software diversity. For example, as I write the top two Ethereum consensus clients have nearly 70% market share, and the top two execution clients have 82% market share.<br />
<br />
Economies of scale and network effects mean that liquidity in cryptocurrencies is also highly concentrated. In <a href="https://blog.dshr.org/2024/04/decentralized-systems-arent.html"><i>Decentralized Systems Aren't</i></a> I wrote:<br />
<blockquote>
There have been many attempts to create alternatives to Bitcoin, but of the current total "market cap" of around $2.5T Bitcoin and Ethereum represent $1.75T or 70%. The top 10 "decentralized" coins represent $1.92T, or 77%, so you can see that the coin market is dominated by just two coins. Adding in the top 5 coins that don't even claim to be decentralized gets you to 87% of the total "market cap".<br />
<br />
The fact that the coins ranked 3, 6 and 7 by "market cap" don't even claim to be decentralized shows that decentralization is irrelevant to cryptocurrency users. Numbers 3 and 7 are stablecoins with a combined "market cap" of $134B. The largest stablecoin that claims to be decentralized is DAI, ranked at 24 with a "market cap" of $5B.
</blockquote>
<table align="right" border="3" cols="3">
<thead>
<tr bgcolor="lightgray"><th>Protocol</th><th>Revenue</th><th>Market</th></tr>
<tr bgcolor="lightgray"><th> </th><th>$M</th><th>Share %</th></tr>
</thead><tbody>
<tr><td>Lido</td><td>304</td><td>55.2</td></tr>
<tr><td>Uniswap V3</td><td>55</td><td>10.0</td></tr>
<tr><td>Maker DAO</td><td>48</td><td>8.7</td></tr>
<tr><td>AAVE V3</td><td>24</td><td>4.4</td></tr>
<tr bgcolor="lightgray"><td><b>Top 4</b></td><td> </td><td>78.2</td></tr>
<tr><td>Venus</td><td>18</td><td>3.3</td></tr>
<tr><td>GMX</td><td>14</td><td>2.5</td></tr>
<tr><td>Rari Fuse</td><td>14</td><td>2.5</td></tr>
<tr><td>Rocket Pool</td><td>14</td><td>2.5</td></tr>
<tr><td>Pancake Swap AMM V3</td><td>13</td><td>2.4</td></tr>
<tr><td>Compound V2</td><td>13</td><td>2.4</td></tr>
<tr><td>Morpho Aave V2</td><td>10</td><td>1.8</td></tr>
<tr><td>Goldfinch</td><td>9</td><td>1.6</td></tr>
<tr><td>Aura Finance</td><td>8</td><td>1.5</td></tr>
<tr><td>Yearn Finance</td><td>7</td><td>1.3</td></tr>
<tr><td>Stargate</td><td>5</td><td>0.9 </td></tr>
<tr bgcolor="lightgray"><td><b>Total</b></td><td>551</td><td> </td></tr>
</tbody>
</table>
Similar effects apply to "Decentralized Finance". In <a href="https://www.bloomberg.com/news/articles/2023-11-16/defi-is-becoming-less-competitive-a-year-after-ftx-s-collapse-battered-crypto"><i>DeFi Is Becoming Less Competitive a Year After FTX’s Collapse Battered Crypto</i></a> Muyao Shen wrote:<br />
<blockquote>
Based on the [Herfindahl-Hirschman Index], the most competition exists between decentralized finance exchanges, with the top four venues holding about 54% of total market share. Other categories including decentralized derivatives exchanges, DeFi lenders, and liquid staking, are much less competitive. For example, the top four liquid staking projects hold about 90% of total market share in that category,
</blockquote>
Based on data on 180 days of revenue of DeFi projects from Shen's article, I compiled this table, showing that the top project, Lido, had 55% of the revenue, the top two had 2/3, and the top four projects had 78%.<br />
<br />
Because these systems, if successful, cannot be decentralized, the cryptosphere doesn't care about the fact that they aren't. In <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3326244"><i>Deconstructing ‘Decentralization’: Exploring the Core Claim of Crypto Systems</i></a> Prof. Angela Walch explains what the label "decentralized" is actually used for:<br />
<blockquote>
the common meaning of ‘decentralized’ as applied to blockchain systems functions as a veil that covers over and prevents many from seeing the actions of key actors within the system. Hence, Hinman’s (and others’) inability to see the small groups of people who wield concentrated power in operating the blockchain protocol. In essence, if it’s decentralized, well, no particular people are doing things of consequence.<br />
<br />
Going further, if one believes that no particular people are doing things of consequence, and power is diffuse, then there is effectively no human agency within the system to hold accountable for anything.
</blockquote>
In other words, it is a means for the system's insiders to evade responsibility for their actions.<br />
<br />
David.http://www.blogger.com/profile/14498131502038331594[email protected]1tag:blogger.com,1999:blog-4503292949532760618.post-43935570018429547352024-10-03T08:00:00.000-07:002024-10-03T08:00:00.117-07:00Warning: Slow Blogging AheadVicky & I have recently acquired two major joint writing assignments with effective deadlines in the next couple of months. And I am still on the hook for a Wikipedia page about the late <a href="https://blog.dshr.org/2024/09/dewayne-hendricks-rip.html">Dewayne Hendricks</a>. This is all likely to reduce the flow of posts on this blog for a while, for which I apologize.David.http://www.blogger.com/profile/14498131502038331594[email protected]0tag:blogger.com,1999:blog-4503292949532760618.post-3607989037931351272024-09-23T14:30:00.000-07:002024-09-24T14:35:38.566-07:00Dewayne Hendricks RIP<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi75OpvYqA0ZrtZEjdZzkGxRNWiZttumgU2nUO0G2rEiZVCZwwBBevzVGFylqlP6y32I_EV72Wp7W55jKNNoq2PACsbJPrzWSF1dSmktkGxkZ0gJCllSrPosaTfJ2648YYKCL4d1GGWZWCAgEGHD-JJ-8NvjLo3BcK3OUnWVzIWrHO-gHwJjlsJsFmz56lY/s540/140305-DLHbyGwennSeemel.jpg" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="540" data-original-width="360" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi75OpvYqA0ZrtZEjdZzkGxRNWiZttumgU2nUO0G2rEiZVCZwwBBevzVGFylqlP6y32I_EV72Wp7W55jKNNoq2PACsbJPrzWSF1dSmktkGxkZ0gJCllSrPosaTfJ2648YYKCL4d1GGWZWCAgEGHD-JJ-8NvjLo3BcK3OUnWVzIWrHO-gHwJjlsJsFmz56lY/w133-h200/140305-DLHbyGwennSeemel.jpg" width="133" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://web.stanford.edu/class/ee380/Abstracts/140305.html">Source</a></td></tr></tbody></table>
Dewayne Hendricks, my friend of nearly four decades, passed away last Friday at age 74. His <a href="https://ee380.stanford.edu/Abstracts/140305-slides.pdf">mentors</a> were <a href="https://en.wikipedia.org/wiki/Buckminster_Fuller">Buckminster Fuller</a> and <a href="https://en.wikipedia.org/wiki/Paul_Baran">Paul Baran</a>. He was a pioneer of wireless Internet connectivity, a serial entrepreneur, curator of an influential e-mail list, and for the last 30 years on the organizing committee of the <a href="https://amw.org">Asilomar Microcomputer Workshop</a>.<br />
<br />
For someone of his remarkable achievements he has left very little impression on the Web. An example is his <a href="https://www.linkedin.com/in/dewayne-hendricks-b118">Linkedin profile</a>. Below the fold I collect the pieces of his story that I know or have been able to find from his other friends. If I can find more I will update this post. Please feel free to add information in the comments.<br />
<span><a name='more'></a></span>
<h3>Wayne State University</h3>
Dewayne was a student at <a href="https://en.wikipedia.org/wiki/Wayne_State_University">Wayne State</a>, where he got into systems programming for the IBM 370. They ran the <a href="https://en.wikipedia.org/wiki/Michigan_Terminal_System">Michigan Terminal System</a> on a 512K 370/155. He tried to run the <a href="https://en.wikipedia.org/wiki/University_of_Newcastle_upon_Tyne">University of Newcastle</a>'s CMTS, an experimental version of MTS that didn't use dynamic address translation, and ran into performance problems. He worked with Larry Chace at the University of Illinois to get it running on their 1+2M 360/75. After Chace rewrote it to swap pages to their 2301 drum storage it ran well.<br />
<h3>Southern Illinois University</h3>
While at <a href="https://en.wikipedia.org/wiki/Southern_Illinois_University">Southern Illinois Univerity</a> in the '70s he worked for <a href="https://en.wikipedia.org/wiki/Buckminster_Fuller">Buckminster Fuller</a> and continued his involvement in IBM systems programming, now for <a href="https://en.wikipedia.org/wiki/VM_(operating_system)">VM/370</a>. Melinda Varian, historian of that era of IBM's groundbreaking <a href="https://en.wikipedia.org/wiki/SHARE_(computing)">SHARE</a> user group, wrote in <a href="https://www.leeandmelindavarian.com/Melinda/25paper.pdf"><i>VM and the VM Community: Past, Present, and Future</i></a>:<br />
<blockquote>
Dewayne Hendricks reported at SHARE XLII, in March, 1974, that he had successfully implemented MVT-CP handshaking for page faulting, so that when MVT running under VM took a page fault, CP would allow MVT to dispatch another task while CP brought in the page. At the following SHARE, Dewayne did a presentation on further modifications, including support for SIOF and a memory-mapped job queue. With these changes, his system would allow multi-tasking guests actually to multi-task when running in a virtual machine. Significantly, his modifications were available on the Waterloo Tape.<br />
<br />
Dewayne became the chairman of the Operating Systems Committee of the SHARE VM Project. Under his guidance, the Committee prepared several detailed requirements for improvements to allow guest systems to perform better. At SHARE XLV, in 1975, the Committee presented IBM with a White Paper entitled Operating Systems Under VM/370, which discussed the performance problems of guests under VM and the solutions that customers had found for these problems. Many of the solutions that Dewayne and others had found, such as PAGEX, made their way into VM fairly quickly, apparently as the result of customers’ persistence in documenting them. By SHARE 49, Dewayne was able to state that, “It is now generally understood that either MFT or MVT can run under VM/370 with relative batch throughput greater than 1.” That is to say, they had both been made to run significantly faster under VM than on the bare hardware. Dewayne and others did similar work to improve the performance of DOS under VM.
</blockquote>
<h3>Amateur Radio</h3>
Dewayne was a major figure in developing and sustaining the use of <a href="http://www.warpspeed.com/Public/DLH_Bio.html">amateur packet radio</a>:<br />
<blockquote>
He has been involved with radio since receiving his amateur radio operator's license as a teen. He currently holds official positions in several national non-profit amateur radio organizations and is a director of the Wireless Communications Alliance, an industry group representing manufacturers in the unlicensed radio industry.
</blockquote>
In <a href="http://www.warpspeed.com/Public/DLH_Bio.html">particular</a>:<br />
<blockquote>
Back in 1986, he ported the popular KA9Q Internet Protocol package to the Macintosh, allowing the Macintosh platform to be used in packet radio networks. Today, thousands of amateur radio operators worldwide use the NET/Mac system he developed to participate in the global packet radio Internet. This system continues to be developed and deployed by the amateur radio service.
</blockquote>
Dewayne was a member of the <a href="https://www.ardc.net/about/who-we-are/">Amateur Radio Digital Communications Grants Evaluation Team</a> from 2021 to his death. ARDC grants around <a href="https://www.ardc.net/about/">$5M/year</a>:<br />
<blockquote>
ARDC makes grants to projects and organizations that are experimenting with new ways to advance both amateur radio and digital communication science. Experimentation by amateur radio operators has benefited society in many ways, including the development of the mobile phone and wireless internet technology. ARDC envisions a world where all such technology is available through open source hardware and software, and where anyone has the ability to innovate upon it. To see examples of the types of grants we make, go to <a href="https://www.ardc.net/grants/">https://www.ardc.net/grants/</a>.
</blockquote>
<h3>Tetherless Access</h3>
One of the many ahead-of-their-time companies Dewayne started was Tetherless Access. He co-founded it with Charlie Brown in 1990 to develop wireless Metropolitan Access Networks. It went public in 1996 on NASDAQ and folded two years later. The idea was to use the 900MHz unlicensed spectrum to distribute Internet connectivity from a base station via point-to-point links, in contrast to Metricom's <a href="https://en.wikipedia.org/wiki/Ricochet_(Internet_service)">Ricochet</a> service, started by Dewayne's mentor Paul Baran, which four years later used mesh network technology in the same spectrum.<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRv1AYAOTz2UTzygueI8OEF3qcqERaobAw_XpbgGXTaYBQ4XhQ3drlkIGK-E2B6E2kX3lWB6pRSaEPVNsx8sTXix9huXfTNXJ_gj7MgkdCZ2Y1GOPPOxD29OUNlsQB49zoe24Wy3CUptpB3r26IwHMH4k5vH_a8Mhyphenhyphen73kibomPEXjgnWSmE7Nwi_WIq40D/s1092/SouthBayTestBed.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="754" data-original-width="1092" height="138" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRv1AYAOTz2UTzygueI8OEF3qcqERaobAw_XpbgGXTaYBQ4XhQ3drlkIGK-E2B6E2kX3lWB6pRSaEPVNsx8sTXix9huXfTNXJ_gj7MgkdCZ2Y1GOPPOxD29OUNlsQB49zoe24Wy3CUptpB3r26IwHMH4k5vH_a8Mhyphenhyphen73kibomPEXjgnWSmE7Nwi_WIq40D/w200-h138/SouthBayTestBed.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="http://dandin.com/pdf/EE380.pdf">Source</a></td></tr></tbody></table>
Tetherless Access launched a testbed network <a href="http://dandin.com/pdf/EE380.pdf">which</a>:<br />
<blockquote>
<ul>
<li>Started in Fall ‘96</li>
<li>Covered 35 mi area in south bay</li>
<li>Delivered from ISDN to 30 Mbps bandwidth</li>
<li>Used both licensed and unlicensed equipment (Part 15 and 97)</li>
</ul>
</blockquote>
<h3>NSF Projects</h3>
Dewayne was involved in a number of NSF funded experiments in using wireless to <a href="http://www.warpspeed.com/Public/DLH_Bio.html">connect remote communities</a>:<br />
<blockquote>
Prior to forming Dandin Group, he was the General Manager of the Wireless Business Unit for Com21, Inc. He joined Com21 following an opportunity to participate as the Co-Principal Investigator in the National Science Foundation’s Wireless Field Tests for Education project. The project sucessfully connected remote educational institutions to the Internet. The test sites ranged from rural primary schools in Colorado, USA to a University in Ulaan Bataar, Mongolia.
</blockquote>
Com21 was founded by Dewayne's mentor Paul Baran.<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgchSXtNLI3n2T54tfG6clwQR3InEN3EbIR3-wNphnUnEKkTssAneT3VXHLZzjwMSTO1_BwraREiI3CWGUPjMsqh45Y1WJRKV0WWfDgAuTrUmO00hfwe1lXxZVjMh_rrgy3N6AldfCb20pWXudqV3NgOFjJ3-l58YWM3q_cckgkn0gGZ0e_hgN7UbhoBFC/s691/IMG_0895.jpeg" imageanchor="1" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="422" data-original-width="691" height="122" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgchSXtNLI3n2T54tfG6clwQR3InEN3EbIR3-wNphnUnEKkTssAneT3VXHLZzjwMSTO1_BwraREiI3CWGUPjMsqh45Y1WJRKV0WWfDgAuTrUmO00hfwe1lXxZVjMh_rrgy3N6AldfCb20pWXudqV3NgOFjJ3-l58YWM3q_cckgkn0gGZ0e_hgN7UbhoBFC/w200-h122/IMG_0895.jpeg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><small>Ulan Bator rooftop<br />Courtesy Glenn Tenny</small></td></tr></tbody></table>
The PI for connecting Mongolia to the Internet for the first time in 1996 was the "<a href="https://cyberplayground.org/2021/10/19/rip-rip-colonel-dave-hughes-aka-the-cursor-cowboy-has-passed-on/">Cursor Cowboy</a>" Colonel Dave Hughes, an equally remarkable character who was a pioneer of bulletin boards starting in 1981!. The NSF funded a 256Kbit/s satellite dish, the State Department shipped it to the US embassy in Ulan Bator via the "diplomatic pouch", and Dewayne and Glenn Tenney travelled via Beijing to deploy 900MHz links across the city.<br />
<br />
The Dandin Group, Dewayne's next company <a href="https://web.archive.org/web/20000301193938/http://www.dandin.com/projects.html">was</a>:<br />
<blockquote>
a partner in the Advanced Networking Project with Minority Serving Institutions (AN-MSI) an EDUCAUSE project funded by the National Science Foundation. The project's purpose is to provide improved communication services, including Internet access, to underserved minority and tribal-nation institutions. Because these institutions are frequently in remote locations which currently lack communication infrastructures, Internet-linked services delivered by wireless networks offer the most appropriate and cost-effective approach to connecting their communities to the world and to each other.
</blockquote>
The project description is <a href="https://web.archive.org/web/20000709165341/http://www.dandin.com/pdf/AN-MSI_Project_Description.pdf">here</a>. <a href="https://web.archive.org/web/20000711102526/http://www.dandin.com/pdf/EDUCAUSEPR110199.pdf"><i>NSF Awards $6 Million to Help Minority Schools Prepare for Advanced Computer Networks</i></a> is EDUCAUSE's press release:<br />
<blockquote>
National Science Foundation (NSF) Director Rita Colwell announced last week at EDUCAUSE '99 that the foundation has awarded almost $6 million over four years to help institutions of higher learning that traditionally serve minority communities prepare for the next generation of information technology and computer networks. The grant will be administered by EDUCAUSE.
</blockquote>
<h3>Developing Countries</h3>
Dewayne was not just active in getting Internet service to under-served communities with the NSF. The <a href="http://www.warpspeed.com/Public/DLH_Bio.html">bio on his website</a> states:<br />
<blockquote>
Tetherless Access was one of the first companies to develop and deploy Part 15 unlicensed wireless metropolitan area data networks using the TCP/IP protocols. He has participated in the installation of these networks in other parts of the world including: Kenya, Tonga, Mexico, Canada and Mongolia.
</blockquote>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg08A_9p5KyiF-f3ahT9dgBOhaynnvorrXR1AKIEAddJQLNxHg8z21fzPy_AxXzBCwn8YMvaAJZH73E-KyTyIf_BKgklOcxeu-78u-VJ2ZyiuuGrtdIREHYDGF2G3zRBFcINBQv3uP86KeLOvXqriU-ZDZLyT3zwuzZYIovvLyjOPgxhw6rkD0R01Yti21Z/s1151/TongaNetwork.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="690" data-original-width="1151" height="120" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg08A_9p5KyiF-f3ahT9dgBOhaynnvorrXR1AKIEAddJQLNxHg8z21fzPy_AxXzBCwn8YMvaAJZH73E-KyTyIf_BKgklOcxeu-78u-VJ2ZyiuuGrtdIREHYDGF2G3zRBFcINBQv3uP86KeLOvXqriU-ZDZLyT3zwuzZYIovvLyjOPgxhw6rkD0R01Yti21Z/w200-h120/TongaNetwork.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="http://dandin.com/pdf/EE380.pdf">Source</a></td></tr></tbody></table>
Amara Angelica reported that <a href="https://web.archive.org/web/20000307045638/http://www.techweek.com/articles/8-23-99/wireless.htm"><i>Tonga first to go wireless for telecommunications</i></a>:<br />
<blockquote>
"We’re replacing the entire existing telecom infrastructure with a wireless IP [Internet protocol] network," says Dewayne Hendricks, CEO of Fremont-based Dandin Group and former general manager of Com21’s wireless business unit. "Since the country is a monarchy, there was only one guy to convince, Crown Prince Tupouto’a, and then we just went for it."<br />
<br />
Hendricks’ firm plans to replace Tonga Telecom’s aging landline system—which still uses mechanical relays—with a broadband wireless network for data, video and telephony (using voice over IP). It will run at 30Mbps with user access at 2Mbps and 10Mbps by the end of next year. "We can get all the spectrum we want," Hendricks says.<br />
<br />
The prince’s objective, Hendricks says, is to convert the country’s largely agricultural workforce, which has an astonishing 95 percent literacy rate, into knowledge workers, such as programmers. The government launched the Royal School of Science for Distance Learning last year, using Internet connections to allow students to take courses at international universities. There are just fewer than 100,000 people in Tonga scattered across 170 islands.<br />
<br />
"We’re going to an Internet-style mesh network," says Hendricks. MMDS, which some carriers are using to deliver broadband services, won’t scale well for an IP network, he says. Hendricks, a technical advisor to the FCC on ultrawideband (UWB) technology, is considering UWB for the network.
</blockquote>
<a href="http://dandin.com/pdf/EE380.pdf">Tonga had</a> about 11,000 households and 6,500 phone customers, with an 8-year wait to get a phone. The goals of the project were to deliver 30Mbit/s IP to each home for a customer end budget of $450.<br />
<br />
<h3>FCC Technological Advisory Council</h3>
Dewayne was one of the inaugural members of the <a href="https://web.archive.org/web/20000818002106/http://www.fcc.gov/oet/tac/members.html">Federal Communications Commission's Technological Advisory Council</a>, launched on April 30<sup>th</sup> 1999, together with luminaries such as <a href="https://en.wikipedia.org/wiki/Vint_Cerf">Vint Cerf</a>, AT&T CTO <a href="https://en.wikipedia.org/wiki/David_Nagel">David Nagel</a>, CERFnet founder <a href="https://en.wikipedia.org/wiki/Susan_Estrada">Susan Estrada</a> and many others. He remained a member through the <a href="https://web.archive.org/web/20070930050129/http://www.fcc.gov/oet/tac/Confirmed_Members_and_Affiliations_10.20.05.pdf">fourth TAC</a> formed in 2005.<br />
<h3>Wired Article</h3>
In the January 2002 edition of <i>Wired</i>, Brent Hurtig's <a href="https://www.wired.com/2002/01/hendricks/"><i>Digital Cowboy</i></a> focused on Dewayne's work on the reservation:<br />
<blockquote>
At Turtle Mountain Chippewa Reservation in North Dakota, he's installing a wireless network. In its initial form, the system will meet FCC requirements governing frequency, power, and transmission technology. But not for long. Hendricks' mission is to build the best system possible - even if it's illegal - and he intends to use every tool at his disposal. Should the FCC crack down, the tribal leaders will hoist the flag of Native American sovereignty, asserting that they can do whatever they want with the sky above their reservation.
</blockquote>
Dewayne's work on the reservation, in Tonga and elsewhere was an attempt to demonstrate the problems with the obsolete US <a href="https://www.wired.com/2002/01/hendricks/">spectrum allocation policy</a>:<br />
<blockquote>
There's no sensible reason why Americans shouldn't have inexpensive, ubiquitous, high-performance broadband access, Hendricks says. Using technologies that are already available or in fast-track development, everyone could enjoy reliable, fully symmetrical wireless at T1 speed or better. No more digital divide. No more last-mile problem. No more compromises. The only things standing in the way are the FCC, Congress, and "other people who just don't get it."
</blockquote>
<h3>EE380 Talks</h3>
Dewayne gave three talks to Stanford's EE380 symposium. The first one was apparently "in the ‘90s on wireless MANs" of which I have so far found no record.<br />
<br />
The second was on 3<sup>rd</sup> May 2000 entitled <a href="https://web.stanford.edu/class/ee380/Abstracts/000503.html"><i>Wiring Tonga: From the Ground Up and the Sky Down</i></a>. The abstract was:<br />
<blockquote>
One of the biggest barriers today standing in the way of deployment of advanced wireless communications systems turns out not to be the technology, but restrictions related to regulatory policies. This presentation will discuss the nature of these barriers and how they have affected the development of wireless data systems over the years.<br />
<br />
The speaker will also discuss on-going work in which he is involved to use advanced wireless technology to deploy multiservice IP systems as part of infrastructure-development projects in the Kingdom of Tonga and with Native American groups in the US, and how such projects are able to deal with the limitations imposed by conventional regulatory barriers.
</blockquote>
The slides are <a href="http://dandin.com/pdf/EE380.pdf">here</a>.<br />
<br />
The third was on 5<sup>th</sup> March 2014 and entitled <a href="https://web.stanford.edu/class/ee380/Abstracts/140305.html"><i>Inventing a New Internet: Learning from Icarus</i></a>. The abstract read:<br />
<blockquote>
From a future historical perspective, are we descendants of Icarus? Is our Internet like Icarus' wings? Are our protocols, ciphers and codes, brilliant capabilities built on immature engineering, which like Icarus' wax and feathers, are capable of taking us to great heights, but systematically flawed? For a brief historical moment, humanity has flown high like Icarus, on a vulnerable first generation Internet platform. Which as been used for securing and using distributed ideas, arts, media science, commerce, and machines. Promising brilliant futures with the arrival of networked things, autonomous personalized services and immersive media. But, now our first generation Internet , built on a fragile global network of vulnerable codes and protocols, is falling apart, like Icarus' wings, through a triple shock from:<br />
<ul>
<li>Massive dotcom data stalker economy built on mining of terabytes personal data.</li>
<li>Ubiquitous criminal penetration of financial and identity networks, on our devices, in the cloud.</li>
<li>Pervasive state intruders at all levels and every encrypted hardware and software node.</li>
</ul>
Humans eventually conquered the barriers to flight and learned to build durable and resilient aircraft. Similarly, humans must learn to build a more reliable, private and secure Internet for communications, innovation and commerce. We will share our thoughts on how we might go about the design of a more durable and resilient Internet:<br />
<ul>
<li>How prepared is the Internet for future human benefit?</li>
<li>What are the attributes of a future more durable internet?</li>
<li>What are the existing assets that could be harnessed?</li>
<li>What needs to be developed?</li>
</ul>
</blockquote>
Dewayne's slides for this talk are <a href="http://ee380.stanford.edu/Abstracts/140305-slides.pdf">here</a>. Video of the talk is on <a href="https://www.youtube.com/watch?v=yzUjFyQowT0">YouTube</a>
<h3>dewayne-net</h3>
For many years Dewayne with impeccable taste curated dewayne-net, an e-mail list to which he sent links, most he found but some contributed by his friends. A typical e-mail would have the title of the linked post, a link, and enough of the content to encourage recipients to read the whole thing. The last e-mails were two on 19<sup>th</sup> August, as it happens both links that I had sent him earlier. I have been one of the more frequent contributors, although only perhaps 20% of my contributions passed the curatorial filter. Prof. Dave Farber's <a href="https://ip.topicbox.com/groups/ip">IP list</a> is a similar and I believe even longer-standing list; he and Dewayne exchanged links fairly often.<br />
<br />
As an example of the list in full flow, lets take April 2022. That month he sent 66 e-mails, many about the COVID pandemic and the war in Ukraine, obviously both top of mind at the time. But they included topics including satellite tracking of commercial aircraft, the Kessler syndrome, the problems of the US patent system, cybercrime, microplastics, banned math textbooks in Florida, and Elon Musk's purchase of Twitter. I am already greatly missing this window into Dewayne's eclectic set of interests.<br />
<br />
<h3>Dewayne on YouTube</h3>
<ul>
<li><a href="https://www.youtube.com/watch?v=uDyIe0KQT94"><i>Towards Open Spectrum</i></a> was a keynote to ABC2 Conference at Cisco's EMEA HQ in January 2004.</li>
<li><a href="https://www.youtube.com/watch?v=7WiWmarKFAI"><i>Dewayne Hendricks on The Internet of Things: Extended Interview</i></a> 8<sup>th</sup> January, 2009.</li>
<li><a href="https://web.stanford.edu/class/ee380/Abstracts/140305.html"><i>Inventing a New Internet: Learning from Icarus</i></a> 5<sup>th</sup> March 2014.</li>
<li><a href="https://www.youtube.com/watch?v=bJNbgPHekAw"><i>Dewayne Hendricks (WA8DZP) on creating abundant bandwidth</i></a> 2012.</li>
<li><a href="https://www.youtube.com/watch?v=688VyvZJG88"><i>Second Curve Internet</i></a> 31<sup>st</sup> March, 2015.</li>
</ul>David.http://www.blogger.com/profile/14498131502038331594[email protected]6tag:blogger.com,1999:blog-4503292949532760618.post-17017240562482016952024-09-17T08:00:00.000-07:002024-09-17T08:00:00.349-07:00Lie Down WIth Dogs, Get Up WIth Fleas<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-fA_0aIgTpNwhzgSaHinusHG2yRUVeIIS99d88_OIOk_Y8ZkQ1JnzyGz796BngZMHyfNMO0InJPzftSyWLEmH1n9VroXVLtGIo8iQ0zsStsel1kQpPQUWDvSwTM8g5gUKXMnq2MkUrdd8-9Vng0muvYf-xXUKIyYjehebL7bGEviVyyIlVqzebMBv06Wr/s607/WorldLiberty.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="254" data-original-width="607" height="84" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-fA_0aIgTpNwhzgSaHinusHG2yRUVeIIS99d88_OIOk_Y8ZkQ1JnzyGz796BngZMHyfNMO0InJPzftSyWLEmH1n9VroXVLtGIo8iQ0zsStsel1kQpPQUWDvSwTM8g5gUKXMnq2MkUrdd8-9Vng0muvYf-xXUKIyYjehebL7bGEviVyyIlVqzebMBv06Wr/w200-h84/WorldLiberty.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.worldlibertyfinancial.com/">Source</a></td></tr></tbody></table>
It is generally quite difficult to upset the denizens of a <a href="https://www.quotes.net/mquote/90955">wretched hive of scum and villainy</a> by further besmirching their reputation, but recently the Trump family has succeeded.<br />
<br />
Below the fold I explain how they did it, and why the denizens of the wretched hive are not happy.<br />
<span><a name='more'></a></span>
<br />
Matt Levine identified the <a href="https://www.bloomberg.com/opinion/articles/2024-09-10/the-fastest-options-are-the-most-fun">fundamental mechanism</a> at play here:<br />
<blockquote>
But you don’t have to just take your counterparties as you find them; you can work to encourage and develop bad ones. This is often a matter of product development: If you build a product that does nothing for sophisticated professionals but that is really good for noisy addicted gamblers, you will attract exactly the right sort of counterparty. This arguably explains much of crypto.
</blockquote>
The additional point he omitted is that, in order to "attract exactly the right sort of counterparty" you have to advertise the product. This will bring it to the attention of others seeking the same kind of counterparty. They will seek to leverage your product design for their own ends.<br />
<br />
Trump has perfected the art of attracting "the right sort of counterparty". From <a href="https://en.wikipedia.org/wiki/Trump_University">Trump University</a> to the banks he stiffed in his <a href="https://www.thoughtco.com/donald-trump-business-bankruptcies-4152019">multiple bankruptcies</a>, to the stockholders of Truth Social his counterparties have always been the "<a href="https://quoteinvestigator.com/2011/07/09/poker-patsy/">sucker at the poker table</a>". Key to this success has always been moving on to the next scam as the previous one implodes.<br />
<br />
By the side of the road to <strike>Damascus</strike> the White House the former crypto-skeptic President encountered a small crowd of large cryptocurrency companies, including Coinbase, Ripple, Andreessen Horowitz and Jump Capital. They were waving <a href="https://followthecrypto.org/">immense sums of money</a>. Trump underwent an instant conversion to the cryptocurrency faith, announcing he would make the US the "<a href="https://coinaute.com/en/trump-harris-debate-the-ignored-cryptocurrencies/">Bitcoin capital of the world</a>".<br />
<br />
Apart from the general idea that "<a href="https://www.youtube.com/watch?v=2FSVSL6NZnU">more is better</a>", why would these immense sums of money be attractive to this alleged billionaire? Apart from the costs of running a Presidential campaign, some of which ends up in his own pocket, there is the need to pay his legions of lawyers, and the looming judgements that these lawyers failed to avert, including $88.3M before interest to E. Jean Carroll and $454M before interest in his New York fraud case.<br />
<br />
With <a href="https://apnews.com/article/trump-media-earnings-results-revenue-4f6701cbebcbc5c9ed5079ab096cb346">Truth Social's Q2 financials</a> reporting a loss of 1,911% of revenue, which was down 30% year-on-year, and with the stock down 80% from its peak, it was clearly time to move on.<br />
<br />
On 31<sup>st</sup> August Jasper Goodman posted <a href="https://www.politico.com/news/2024/08/31/trump-crypto-family-affair-00176764"><i>Crypto is the new Trump family business. Ethics watchdogs have concerns.</i></a> rating a well-deserved "Well Duh!":<br />
<blockquote>
Trump’s eldest sons are gearing up to launch a new cryptocurrency venture called <a href="https://www.worldlibertyfinancial.com/">World Liberty Financial</a>, which is already receiving a big social media boost from their father. Government ethics watchdogs say the project could create a conflict of interest if Trump returns to the White House next year.<br />
<br />
Trump has vowed to enact an array of pro-crypto policies in a bid to win votes — and campaign cash — from digital asset enthusiasts in recent months. Now, he’s <a href="https://x.com/realDonaldTrump/status/1829141447087648796">weaving the overtures</a> into his pitch for his sons’ forthcoming startup.<br />
<br />
While the details of Eric Trump and Donald Trump Jr.'s crypto endeavor haven’t yet been announced, it could stand to benefit from a second Trump administration’s approach to support the industry.<br />
...<br />
<a href="https://www.citizensforethics.org/reports-investigations/crew-reports/president-trump-legacy-corruption-3700-conflicts-interest/">CREW identified more than 3,700</a> conflicts of interest during Trump’s first term.<br />
<br />
But critics said the crypto project differs because it could align his family’s financial interest with policy changes that he would be poised to enact.<br />
<br />
“The prior conflicts and illegalities took advantage of preexisting loopholes,” said Norman Eisen, an ethics lawyer who served in the Obama White House and later helped build the first impeachment case against Trump. “Here, Trump appears to be promising to create the loopholes while his family is simultaneously designing a business venture to exploit them.”
</blockquote>
The headline on World Financial's "coming soon" web page is "World Liberty Financial - The Only Crypto DeFi Platform supported by Donald J. Trump". There are dozens of "DeFi Platforms", but the unique selling point of World Liberty is that it is "supported by Donald J. Trump". So the counterparties it is intended to attract are the gullible members of the Trump cult, the ones who have allegedly made him a billionaire.<br />
<br />
With this unique selling point the actual product doesn't need to be very good to compete with the market leader, <a href="https://www.coingecko.com/research/publications/decentralized-crypto-exchanges-market-share">Uniswap</a>, for its chosen counterparties. As Molly White reported, <a href="https://www.citationneeded.news/issue-65/">it wasn't</a>:<br />
<blockquote>
CoinDesk has gotten hold of a white paper for this supposed World Liberty Financial, which they note appears to be a clone of Dough Finance, a crypto lending platform that was hacked for around $2 million just a month and a half ago. The hack was not a sophisticated one, and instead exploited sloppiness on behalf of the development team.
</blockquote>
Of course, many people interested in gullible counterparties noticed all the hype, and they didn't have to wait to hack the actual product launch to <a href="https://www.citationneeded.news/issue-65/">get in on the action</a>:<br />
<blockquote>
The project hasn’t even launched yet, and it’s off to a bumpy start. First, Donald Trump Jr. had to issue a statement to try to stop people from buying up all the fake tokens purporting to be associated with their murky project. Then, Twitter accounts for Lara and Tiffany Trump were both compromised and used to send tweets announcing a supposed token launch. “This is a scam!!!” tweeted Eric, himself retweeting the tweet from his wife’s account containing the scam token address.
</blockquote>
Nic Carter tweeted:<br />
<blockquote class="twitter-tweet"><p dir="ltr" lang="en">can't secure twitter accounts but i'm sure they'll be able to protect an (already hacked) defi protocol from hacks</p>— nic carter (@nic__carter) <a href="https://twitter.com/nic__carter/status/1831148088125161477?ref_src=twsrc%5Etfw">September 4, 2024</a></blockquote> <script async="" charset="utf-8" src="https://platform.twitter.com/widgets.js"></script>
The reason for this fiasco was that, as usual, the Trumps hired "<a href="https://www.pbs.org/newshour/politics/trump-boasts-hiring-best-picks-haunt">only the best people</a>". Sam Kessler, Danny Nelson & Cheyenne Ligon dug into the project's white paper in <a href="https://www.coindesk.com/business/2024/09/03/inside-the-trump-crypto-project-linked-to-a-2m-defi-hack-and-former-pick-up-artist/"><i>Inside the Trump Crypto Project Linked to a $2M DeFi Hack and Former Pick-Up Artist</i></a>:<br />
<blockquote>
The document and other reporting describe a borrowing and lending service strikingly similar to <a href="https://www.certik.com/resources/blog/3SMOuGMCSttY4pQW6I49W2-dough-finance-incident-analysis">Dough Finance, a recently hacked blockchain app</a> built by four people listed as World Liberty Financial team members. Other participants include all three of Trump's sons (including 18-year-old Barron, who is identified as the project's "DeFi visionary"), financiers and e-commerce influencers.
</blockquote>
The leader of the Dough Finance team was Chase Herro. When it came time to move on, he obviously found in the Trumps the ignorant and greedy counterparty he needed. Zeke Faux and Muyao Shen also piled on with <a href="https://www.bloomberg.com/news/features/2024-09-13/behind-the-trump-crypto-project-is-a-self-described-dirtbag-of-the-internet"><i>Behind the Trump Crypto Project Is a Self-Described ‘Dirtbag of the Internet’</i></a>:<br />
<blockquote>
Herro, a fast-talking 39-year-old who shows off his fancy cars and private-jet rides on social media, is an unknown in the crypto world. More than a dozen prominent digital-asset investors said in interviews they had never heard of him. The only crypto project with which he was publicly affiliated attracted only a few million dollars and suffered a devastating hack. A token he promoted on influencer Logan Paul’s podcast dropped 96% afterward. In one speech in 2018, he called himself “the dirtbag of the internet” and said that regulators should “kick s---heads like me out.”<br />
<br />
“You can literally sell s--- in a can, wrapped in piss, covered in human skin, for a billion dollars if the story's right, because people will buy it,” Herro said about crypto in a 2018 YouTube video recorded as he drove in a Rolls-Royce. “I'm not going to question the right and wrong of all that.”
</blockquote>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOGpna5s9U9tisWTQubQ_GBjCn7PpHfSfWsxZrT69lYZd4zlkPywtweR-tPOd9KOUf7yzaegkE5_ossWhPugndHvndyNLgk8gBi8UQjBnc4iaPSrQFmesvrlRODwlSROdbYACLr_S98MsC3E4CIt_6zvkPJUp_tvGoz9jxZMtMST2DwhLIZ110zeIovFtG/s1172/NicCarterTweet.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="668" data-original-width="1172" height="114" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOGpna5s9U9tisWTQubQ_GBjCn7PpHfSfWsxZrT69lYZd4zlkPywtweR-tPOd9KOUf7yzaegkE5_ossWhPugndHvndyNLgk8gBi8UQjBnc4iaPSrQFmesvrlRODwlSROdbYACLr_S98MsC3E4CIt_6zvkPJUp_tvGoz9jxZMtMST2DwhLIZ110zeIovFtG/w200-h114/NicCarterTweet.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.citationneeded.news/issue-65/">Source</a></td></tr></tbody></table>
Jasper Goodman reported on the cryptosphere's reaction to this incompetent blatant grift in <a href="https://www.politico.com/news/2024/09/06/trump-family-crypto-startup-00177566"><i>‘A huge mistake’: Trump’s crypto allies cringe over family’s startup</i></a>:<br />
<blockquote>
“This is a huge mistake,” said Nic Carter, a Trump supporter who is a founding partner at the crypto-focused venture capital firm Castle Island Ventures. “It looks like Trump’s inner circle is just cashing in on his recent embrace of crypto in a kind of naive way, and frankly it looks like they’re burning a lot of the good will that’s been built with the industry so far.”<br />
...<br />
“It’s a very typical playbook of smaller operators or more amateur operations in the crypto space to try to generate a lot of hype before revealing the details,” said Austin Campbell, an adjunct professor at NYU’s Stern School of Business who previously led the risk and portfolio management operation at the crypto firm Paxos. “That makes them susceptible to all sorts of nonsense.”<br />
...<br />
One crypto industry representative in Washington, granted anonymity because of sensitivities around criticizing Trump, described having “a laundry list of concerns.” A big worry is that that it could reflect poorly on the industry as it pushes for policy changes that would help legitimize the sector.<br />
<br />
“Maybe it doesn’t move the needle for most people, but if this thing is hacked or regular folks lose money on it or it opens up the door for the SEC to investigate the team, it only looks like it has downside risk,” Carter said. “It looks to have very little upside risk.”
</blockquote>
As with Trump University and Truth Social, the whole point is for "regular folks" to lose money. But, if you're a candidate positioning yourself as pro-crypto in the hope of getting large checks from the cryptosphere, making this obvious to everyone but the cult members is a bad idea.<br />
<br />
PS: Wikipedia explains the title of this post <a href="https://en.wikipedia.org/wiki/Wikipedia:If_you_lie_down_with_dogs,_you_get_up_with_fleas">here</a>.<br />
<br />David.http://www.blogger.com/profile/14498131502038331594[email protected]4tag:blogger.com,1999:blog-4503292949532760618.post-42114708166676917902024-09-03T08:00:00.000-07:002024-09-03T08:00:00.115-07:00"Owning" e-books<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsW7x_4i-TUwFG6xNVH2q_nk5jXabNhRGxUbnEeDV6vKapZoAmu9eDP1JY4Oavw508eDSbFy734Gxb2crvCI-eAQVjL-3LjYp0olWhqIR4OM6AhehgFJTKFxrKEdrLJHUOdsrPCeODqpu4dVDUT2sggb73rBj_EomjFI1YirWH2THzPUgP4_KwTIDX1Q/s151/LOCKSS.logo.png" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" data-original-height="151" data-original-width="151" height="151" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsW7x_4i-TUwFG6xNVH2q_nk5jXabNhRGxUbnEeDV6vKapZoAmu9eDP1JY4Oavw508eDSbFy734Gxb2crvCI-eAQVjL-3LjYp0olWhqIR4OM6AhehgFJTKFxrKEdrLJHUOdsrPCeODqpu4dVDUT2sggb73rBj_EomjFI1YirWH2THzPUgP4_KwTIDX1Q/s1600/LOCKSS.logo.png" width="151" /></a></div>
The basic aspiration of the <a href="https://lockss.org/">LOCKSS Program</a> when we <a href="http://blog.dshr.org/2013/10/it-was-fifteen-years-ago-today.html">started a quarter century ago</a> was to enable libraries to continue their historical mission of collecting, preserving, and providing readers with access to academic journals. In the paper world libraries which subscribed to a journal <i>owned</i> a copy; in the digital world they could only <i>rent</i> access to the publisher's copy. This allowed the oligoply academic publishers to increase their rent extraction from research and education budgets.<br />
<br />
LOCKSS provided a cheap way for libraries to collect, preserve and provide access to their own copy of journals. The competing e-journal preservation systems accepted the idea of rental; they provided an alternate place from which access could be rented if it were denied by the publisher.<br />
<br />
Similarly, libraries that purchased a paper book <i>owned</i> a copy that they could loan to readers. The transition to e-books meant that they were only able to <i>rent</i> access to the publisher's copy, and over time the terms of this rental grew more and more onerous.<br />
<br />
Below the fold I look into a recent effort to mitigate this problem.<br />
<span><a name='more'></a></span>
<br />
Gennie Gebhart's 2019 <a href="https://www.eff.org/deeplinks/2019/11/publishers-should-be-making-e-book-licensing-better-not-worse"><i>Publishers Should be Making E-Book Licensing Better, Not Worse</i></a> reports on another turn of the e-book rental screw:<br />
<blockquote>
When Macmillan releases a new book, library systems will be able to purchase only one digital copy for the first eight weeks after it’s published. Macmillan is offering this initial copy for half-price ($30), but that has not taken away the sting for librarians who will need to answer to frustrated users. In large library systems in particular, readers are likely to experience even longer hold queues for new Macmillan e-book releases. For example, under the new Macmillan embargo, the 27 branches of the San Francisco Public Library system, serving a city of nearly 900,000 people, will have to share one single copy right when the demand for the new title is the greatest.<br />
...<br />
After the two-month embargo period ends, libraries will be welcome to purchase additional copies of the e-book under normal terms, which aren’t great to begin with: typically, a $60 price tag for an e-book that can only be lent out to one user at a time for two years or 52 lends, whichever comes first. After that, the library has to license another e-book.
</blockquote>
Gebhart's use of "purchase" here is misleading, they are signing a two-year lease. Macmillian can make life miserable for libraries and their readers because they are "<a href="https://pluralistic.net/2024/04/04/teach-me-how-to-shruggie/">too big to care</a>". Gebhart <a href="https://www.eff.org/deeplinks/2019/11/publishers-should-be-making-e-book-licensing-better-not-worse">explains</a>:<br />
<blockquote>
In a July <a href="https://www.publishersweekly.com/binary-data/ARTICLE_ATTACHMENT/file/000/004/4222-1.pdf">memo</a>, CEO John Sargent says the publisher’s move is motivated by “growing fears that library lending was cannibalizing sales” of new e-books and a need to “protect the value of your books during their first format publication,” but fails to present any evidence to back up his claims. (He also ignores existing, consistent <a href="https://www.theguardian.com/books/2015/jul/06/ebook-lending-wont-put-big-dent-book-sales">evidence</a> <a href="https://www.publishersweekly.com/pw/by-topic/industry-news/libraries/article/66106-the-case-for-libraries.html">to</a> <a href="https://www.forbes.com/sites/rachelkramerbussel/2019/04/12/how-libraries-boost-book-sales/#25e618334d76">the</a> <a href="https://www.publishersweekly.com/pw/by-topic/industry-news/publishing-and-marketing/article/49316-survey-says-library-users-are-your-best-customers.html">contrary</a>.)
</blockquote>
On 13<sup>the</sup> August, the Independent Publishers Group and the Digital Public Library of America <a href="https://dp.la/news/groundbreaking-ebook-agreement?mc_cid=b690d51703">announced a deal</a>:<br />
<blockquote>
Through this landmark collaboration between IPG and DPLA, libraries around the country will now have the power to purchase and own in perpetuity, rather than merely license, tens of thousands of ebook and audiobook titles from dozens of independent publishers. The agreement will empower libraries to fulfill their mission to provide access to books for readers nationwide. Publishers such as Austin Macauley, Arcadia Publishing, Dynamite Entertainment, Dover Publications and JMS Books, alongside dozens of other renowned indie publishers, are participating in the deal.
</blockquote>
Of course, none of the major publishers would agree to this. The <a href="https://dp.la/news/groundbreaking-ebook-agreement?mc_cid=b690d51703">press release</a> explains:<br />
<blockquote>
Now, libraries will be able to purchase books through the Palace Marketplace, a non-profit ebook and audiobook platform developed by The Palace Project in consultation with libraries, for libraries. The Palace Project provides libraries with tools and resources that allows patrons to access the broadest possible range of ebooks and audiobooks sourced from the widest variety of sources. Among the tens of thousands of books that are now available for libraries to own and lend out digitally are contemporary award-winning titles, like Leticia Aguilar’s spellbinding memoir <i>Leaving Patriarchy Behind</i>, Michael Nicholson’s <i>The Mosaic Escalator</i>, a mind-bending adventure story nominated for the Best Fiction Book Award by the Golden Book Awards 2024, as well as classics like Elizabeth Bowen’s debut novel <i>The Hotel</i>.<br />
...<br />
“After more than 12 years explaining to policy makers and publishers why existing license models for ebooks prevent libraries from fulfilling their mandates, this agreement is a win that libraries, publishers and authors should celebrate together,” said <b>Christina de Castell, Chief Librarian & CEO of the Vancouver Public Library</b>. “Now, libraries will be able to take steps to share and preserve authors’ ebooks as we have always shared and preserved their print books. I hope this agreement is a model that leads other publishers towards more flexible licensing terms, so libraries can continue to be the home for our collective knowledge in our increasingly digital world.”
</blockquote>
Details of how the technology works are scarce, although the Palace code is on <a href="https://github.com/ThePalaceProject">github</a>. The DPLA's <a href="https://ebooks.dp.la/"><i>Everyone should have access to knowledge</i></a> claims:<br />
<blockquote>
<a href="http://exchange.dp.la/">Palace Marketplace</a>, formerly DPLA Exchange, is an e-content acquisitions platform that works seamlessly with the <a href="http://thepalaceproject.org/">Palace app</a>. With Palace Marketplace, libraries can customize diverse collections beyond the bestsellers, including non-English titles. Member libraries benefit from DPLA’s ongoing publisher negotiations for new, more favorable licensing terms, and have access to our collection of more than 11,000 open access ebooks.
</blockquote>
So it appears that "members" have access to books they "purchased" hosted at DPLA. Once again, as with e-journal preservation systems such as Portico, this is a welcome development but it isn't a solution to the underlying problem. It is in fact another instance of the same problem, because the member libraries are renting access to DPLA's copy. As I understand it, these libraries would be able to download a copy, and preserve it themselves outside the Palace ecosystem, but it isn't clear whether the terms of use would allow them to provide their readers access to the preserved copy.<br />
<br />
The key barrier to implementing true "purchase" rather than "rental" is the <a href="https://en.wikipedia.org/wiki/First-sale_doctrine">First-sale Doctrine</a>:<br />
<blockquote>
The first-sale doctrine (also sometimes referred to as the "right of first sale" or the "first sale rule") is an American legal concept that limits the rights of an intellectual property owner to control resale of products embodying its intellectual property. The doctrine enables the distribution chain of copyrighted products, library lending, giving, video rentals and secondary markets for copyrighted works (for example, enabling individuals to sell their legally purchased books or CDs to others).
</blockquote>
But it doesn't apply to <a href="https://en.wikipedia.org/wiki/First-sale_doctrine#Application_to_digital_copies">digital copies</a>:<br />
<blockquote>
The first-sale doctrine does not neatly fit transfers of copies of digital works because an actual transfer does not actually happen—instead, the recipient receives a new copy of the work while, at the same time, the sender has the original copy (unless that copy is deleted, either automatically or manually). ...<br />
<br />
E-books have the same issue. Because the first sale doctrine does not apply to electronic books, libraries cannot freely lend e-books indefinitely after purchase. Instead, electronic book publishers came up with business models to sell the subscriptions to the license of the text.
</blockquote>
Mary Minow's 2017 <a href="https://fairuse.stanford.edu/2017/02/19/future-libraries-need-first-sale-ebooks/"><i>Future of Libraries – Need First Sale for ebooks</i></a> explains the importance of first sale for libraries:<br />
<blockquote>
It is essential to libraries, and the term existential would not be too great a term to use, to be able to own digital files, and care for them via preservation and library lends (e.g. to one person at a time) just as they do with print. Can readers count on books being available a year or two or five after publication? The existence of libraries has made this possible from their inception until now.
</blockquote>
The <a href="https://dp.la/news/groundbreaking-ebook-agreement?mc_cid=b690d51703">DPLA echoes this</a>:<br />
<blockquote>
“Copyright’s ‘first sale doctrine’ is important to readers and libraries for a number of reasons, not least of which is the way that it facilitates long-term preservation and access,” noted <b>Lyrasis CEO John Wilkin</b>. “Licensing models have threatened this critical underpinning, which is needed for preservation of the cultural record. Lyrasis is excited to collaborate with DPLA and IPG in the creation of a model that will make preservation and access of digital content possible.”
</blockquote>
Alas, even if the first-sale barrier were removed, the experience of the LOCKSS program shows that the problem would remain. In the paper world building a local collection was essential for libraries to provide service to their <i>current</i> readers. The costs and effort involved in doing so were inescapable. The fact that doing so safeguarded access for <i>future</i> readers was a no-cost, no-effort side-effect. But in the digital world building a local collection is irrelevant to providing service to <i>current</i> readers. They get access from the publisher. The costs and effort devoted to building a local collection are only in the interest of <i>future</i> readers. Thus, given strained budgets, these costs must be minimized. The choice between maintaining a local collection, and simply outsourcing the task of supporting future readers to a service by signing a small check is a no-brainer.<br />
<br />
Worse, three other considerations weigh in the balance:<br />
<ul>
<li>The publishers are highly motivated to ensure that current readers access their copy, because this provides them data they can sell to advertisers.</li>
<li>The publishers view many local collections as a bigger risk of their content leaking than a small number of concentrated archives, which they expect will be better secured.</li>
<li>Economies of scale mean a centralized archive is likely to have a lower cost per unit content than a distributed one.</li>
</ul>
The LOCKSS Program devoted a great deal of engineering effort to reducing the capital and operational cost, and increasing the security of, two generations of an <a href="https://www.usenix.org/legacy/events/bsdcon03/tech/full_papers/rosenthal/rosenthal_html/index.html">appliance</a> that libraries could use to build a local collection of the e-journals to which they subscribed. But in the end most libraries that cared about protecting access for future readers to this content chose to sign checks to centralized archives. Of course, it didn't help that the publishers of the most expensive content would not allow libraries to use the appliance to collect it.<br />
<br />
David.http://www.blogger.com/profile/14498131502038331594[email protected]3tag:blogger.com,1999:blog-4503292949532760618.post-77411446773206666212024-08-27T08:00:00.000-07:002024-08-27T08:00:00.116-07:002024 Optical Media Durability UpdateSix years ago I posted <a href="https://blog.dshr.org/2018/08/optical-media-durability.html"><i>Optical Media Durability</i></a> and discovered:<br />
<blockquote class="tr_bq">
Surprisingly, I'm getting good data from CD-Rs more than 14 years old, and from DVD-Rs nearly 12 years old. Your mileage may vary.</blockquote>
Here are the subsequent annual updates:<br />
<ul>
<li><a href="https://blog.dshr.org/2019/08/optical-media-durability-update.html">2019</a></li>
<li><a href="https://blog.dshr.org/2020/08/optical-media-durability-update.html">2020</a></li>
<li><a href="https://blog.dshr.org/2021/08/optical-media-durability-update.html">2021</a></li>
<li><a href="https://blog.dshr.org/2022/08/optical-media-durability-update.html">2022</a></li>
<li><a href="https://blog.dshr.org/2023/08/optical-media-durability-update.html">2023</a></li>
</ul>
It is time once again for the mind-numbing process of feeding 45 disks through the readers to verify their checksums, and yet again this year every single MD5 was successfully verified. Below the fold, the details.<br />
<a name='more'></a><br />
<br />
<table align="right" border="3" cols="5">
<thead>
<tr><td>Month</td><td>Media</td><td>Good</td><td>Bad</td><td>Vendor</td>
</tr>
</thead>
<tbody>
<tr><td>01/04</td><td>CD-R</td><td align="right">5x</td><td align="right">0</td><td>GQ</td></tr>
<tr><td>05/04</td><td>CD-R</td><td align="right">5x</td><td align="right">0</td><td>Memorex</td></tr>
<tr><td>02/06</td><td>CD-R</td><td align="right">5x</td><td align="right">0</td><td>GQ</td></tr>
<tr><td>11/06</td><td>DVD-R</td><td align="right">5x</td><td align="right">0</td><td>GQ</td></tr>
<tr><td>12/06</td><td>DVD-R</td><td align="right">1x</td><td align="right">0</td><td>GQ</td></tr>
<tr><td>01/07</td><td>DVD-R</td><td align="right">4x</td><td align="right">0</td><td>GQ</td></tr>
<tr><td>04/07</td><td>DVD-R</td><td align="right">3x</td><td align="right">0</td><td>GQ</td></tr>
<tr><td>05/07</td><td>DVD-R</td><td align="right">2x</td><td align="right">0</td><td>GQ</td></tr>
<tr><td>07/11</td><td>DVD-R</td><td align="right">4x</td><td align="right">0</td><td>Verbatim</td></tr>
<tr><td>08/11</td><td>DVD-R</td><td align="right">1x</td><td align="right">0</td><td>Verbatim</td></tr>
<tr><td>05/12</td><td>DVD+R</td><td align="right">2x</td><td align="right">0</td><td>Verbatim</td></tr>
<tr><td>06/12</td><td>DVD+R</td><td align="right">3x</td><td align="right">0</td><td>Verbatim</td></tr>
<tr><td>04/13</td><td>DVD+R</td><td align="right">2x</td><td align="right">0</td><td>Optimum</td></tr>
<tr><td>05/13</td><td>DVD+R</td><td align="right">3x</td><td align="right">0</td><td>Optimum</td></tr>
</tbody>
</table>
The fields in the table are as follows:<br />
<ul>
<li><i>Month</i>: The date marked on the media in Sharpie, and verified via the on-disk metadata.</li>
<li><i>Media</i>: The type of media.</li>
<li><i>Good</i>: The number of media with this type and date for which all MD5 checksums were correctly verified.</li>
<li><i>Bad</i>: The number of media with this type and date for which any file failed MD5 verification.</li>
<li><i>Vendor</i>: the vendor name on the media</li>
</ul>
The drives I use from ASUS and LG report significant numbers of read errors from the CDs but verify the MD5s correctly. I didn't notice them reporting any read errors from the DVDs. An off-brand drive fails to read the CDs, but read one of the older DVDs with no read errors.<br />
<br />
Surprisingly, with no special storage precautions, generic low-cost media, and consumer drives, I'm getting good data from CD-Rs more than 20 years old, and from DVD-Rs nearly 18 years old. Your mileage may
vary. Tune in again next year for another episode.<br />
<br />
I also checked my Memorex <a href="https://blog.dshr.org/2021/08/optical-media-durability-update.html?showComment=1632161672704#c889599305877938325">NetBSD1.2 CD</a> written in October 1996. It has checksums generated by <tt>cksum(1)</tt>, all of which verified correctly despite a number of read errors. So that CD-R is delivering good data after nearly 28 years.<br />
<br />
David.http://www.blogger.com/profile/14498131502038331594[email protected]0tag:blogger.com,1999:blog-4503292949532760618.post-35993718770073607722024-08-20T08:00:00.001-07:002024-08-23T16:38:26.084-07:00AstroturfingI seem to be stuck on the theme of cryptocurrency gaslighting with two weeks ago <a href="https://blog.dshr.org/2024/08/more-cryptocurrency-gaslighting.html"><i>More Cryptocurrency Gaslighting </i></a> and one week ago <a href="https://blog.dshr.org/2024/08/greenwashing.html"><i>Greenwashing</i></a>. Now I look at cryptocurrency gaslighting in the political arena, where it is termed <a href="https://en.wikipedia.org/wiki/Astroturfing">astroturfing</a>:<br />
<blockquote>
it is defined as the process of seeking electoral victory or legislative relief for grievances by helping political actors find and mobilize a sympathetic public, and is designed to create the image of public consensus where there is none. Astroturfing is the use of fake <a href="https://en.wikipedia.org/wiki/Grassroots">grassroots</a> efforts that primarily focus on influencing public opinion and typically are funded by corporations and political entities to form opinions.
</blockquote>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIue1ZMRfr9odeWLG7HUbFVuhAS6lHAmAOv4NAnjtRilhsC_fwM964LlqhYuUYUvxd6No4fvn_aNOFTzW9lwVT3k-qUt-iFJYxBQvynJrlDpkrpX4YELq7hLnhP_oOGnu55RwH1PoeQ8AoPwo1y5rlWNZpLiq_JHkD1F5ogSBR95KpZtVhAahHi9P26CPL/s640/trumptweets-546x640.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="640" data-original-width="546" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIue1ZMRfr9odeWLG7HUbFVuhAS6lHAmAOv4NAnjtRilhsC_fwM964LlqhYuUYUvxd6No4fvn_aNOFTzW9lwVT3k-qUt-iFJYxBQvynJrlDpkrpX4YELq7hLnhP_oOGnu55RwH1PoeQ8AoPwo1y5rlWNZpLiq_JHkD1F5ogSBR95KpZtVhAahHi9P26CPL/w171-h200/trumptweets-546x640.png" width="171" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://corpgov.law.harvard.edu/2019/08/06/a-roadmap-for-president-trumps-crypto-crackdown/">Donald Trump, 2019</a><br /></td></tr></tbody></table>
Currently, the crypto-bros have poured money into primaries, defeated several incumbents deemed to be insufficiently crypto-friendly, and have accumulated an immense war-chest for November's general election. This pot of gold was enough to turn Trump from <a href="https://www.bbc.com/news/business-57392734">crypto-skeptic</a> to <a href="https://finance.yahoo.com/news/trump-proposes-bitcoin-solution-35-061830288.html">telling Maria Bartiromo</a>:<br />
<blockquote>
Who knows, maybe we’ll pay off our $35 trillion dollar [national debt], hand them a little crypto check, right? We’ll hand them a little Bitcoin and wipe away our $35 trillion
</blockquote>
Below the fold I discuss the gaslighting the cryptosphere is using in their massive attempt to purchase "regulatory clarity", and what the scale of this investment suggests about the profits they expect to garner if it succeeds.<br />
<span><a name='more'></a></span>
<br />
Why does astroturfing exist? Lobbyists going to politicians and saying "I know your constituents don't want you to vote X, but if you do I'll give you a boiat-load of money" make the politicians uncomfortable. The lobbyists need to cover this unpleasant reality with a fig-leaf. So on 10<sup>th</sup> May <a href="https://theblockchainassociation.org/wp-content/uploads/2024/05/DCG_HarrisPoll-Research-Report.pdf"><i>Crypto Attitudes in Swing States</i></a>, a poll by Harris for the Digital Currency Group appeared. It polled 1201 registered voters in April. Jasper Goodman's <a href="https://www.politico.com/news/2024/05/10/trump-crypto-biden-00157051"><i>Crypto is Trump’s new weapon against Biden</i></a> reported that:<br />
<blockquote>
A <a href="https://theblockchainassociation.org/swingstatevoter/">poll released by crypto industry groups</a> this week showed that more than 20 percent of voters in six key swing states identify crypto as a major issue. <a href="https://policy.paradigm.xyz/writing/March-2024-Polling">A separate nationwide survey</a> of registered voters commissioned by the crypto firm Paradigm found that crypto ownership is higher among communities of color and young people — key constituencies that helped boost Biden in 2020 but are now proving to be challenging for him to win over.<br />
<br />
Crypto has gained support from politicians on the right who tout it as an alternative to the mainstream financial system. The Paradigm poll found earlier this year that crypto owners favor Trump over Biden, 48 percent to 39 percent, with 13 percent undecided.
</blockquote>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdHnRIJ5PUpsk50nzlfAa03eyZCtKXl0K9oLcbnt5ps4cLgmEzy2KljSi2dx5lDNmCdECIjlW7RDuVrMbEYUlZIM6q_PHLRheOojmXj1LRSJfEwY1rvKUs2mVlEPMrUwH__8iS0TTfDIvjD8KJc1dqO7wPw3A33859uSOl58RKq5PvBZZx2wVtR0Q2Dt-o/s1600/HarrisPoll.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="961" data-original-width="1600" height="120" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdHnRIJ5PUpsk50nzlfAa03eyZCtKXl0K9oLcbnt5ps4cLgmEzy2KljSi2dx5lDNmCdECIjlW7RDuVrMbEYUlZIM6q_PHLRheOojmXj1LRSJfEwY1rvKUs2mVlEPMrUwH__8iS0TTfDIvjD8KJc1dqO7wPw3A33859uSOl58RKq5PvBZZx2wVtR0Q2Dt-o/w200-h120/HarrisPoll.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://docs.google.com/spreadsheets/d/e/2PACX-1vTneK908W4OULYDgYZ4yzIGumvAXbjHQPAzbOUpyHQo-dxw5u717ZSV30MArRlI-QbWEzZucbuRJzMF/pubchart?oid=1919594482&format=interactive">Source</a></td></tr></tbody></table>
Three weeks later Molly White had had time to analyze the poll and in <a href="https://www.citationneeded.news/2024-cryptocurrency-election-spending/"><i>Cryptocurrency companies have raised over $135 million to influence US elections this cycle, and they’re just getting started</i></a> she wrote:<br />
<blockquote>
In reality, their poll of 1,201 American voters in six swing states is a masterclass in spin. 69% of the people surveyed had “very” or “somewhat” negative opinions towards crypto, but DCG is crowing that “Among a sizeable contingent of voters, crypto attracts a level of interest that translates into pro-crypto sentiments across the board” and advising political candidates to adopt pro-crypto stances to attract voters. Many of the questions were framed ambiguously — such as the “Crypto is a major issue I’m considering during the next election” one — which allowed DCG to put “21% agree” in big letters while obfuscating the fact that those who agreed were not necessarily crypto supporters. In fact, if you do the math, more than 100 of the 252 people (~40%) who said they felt crypto was a major issue in upcoming elections do not feel positively towards crypto — in other words, there's a contingent of fellow skeptics among that 21%, who are likely hoping for candidates who might support more aggressive approaches against the industry.<br />
</blockquote>
White extracted the agree/disagree data from the Harris poll and generated a useful chart. From it I extracted the questions that two out of three respondents somewhat or strongly disagreed with in this table.<br />
<table align="center" border="1" cellpadding="3" cellspacing="5" cols="2" rules="groups">
<thead>
<tr><th>Disagreement</th><th>Question</th></tr>
</thead>
<tbody>
<tr><td>80%</td><td><small>Crypto is a major issue I'm considering in the next election</small></td></tr>
<tr><td>74%</td><td><small>Crypto is more equitable than the traditional financial system</small></td></tr>
<tr><td>73%</td><td><small>Crypto is meant for people like me</small></td></tr>
<tr><td>73%</td><td><small>I pay attention to political candidates positions on crypto</small></td></tr>
<tr><td>71%</td><td>I<small>t is easier for people to be financially successful with crypto ...</small></td></tr>
<tr><td>65%</td><td><small>Crypto is the future of transacting</small></td></tr>
<tr><td>65%</td><td><small>I'm concerned about legislation that would interfere with crypto</small></td></tr>
</tbody></table>
This is not a pro-crypto sample. I have to agree with White that DGC is gaslighting the results. She <a href="https://www.citationneeded.news/2024-cryptocurrency-election-spending/">concluded</a>:<br />
<blockquote>
Frankly, it just doesn't seem likely to me that a substantial number of people are single-issue crypto voters and would be swayed to vote for a candidate they might not otherwise support because of it. Many of the people celebrating Trump's recent crypto U-turn were probably already planning to vote for him, and I doubt there were many crypto-skeptical people out there previously who didn't otherwise support Trump, but who intended to vote for him because of his former position on the industry.
</blockquote>
The most worrying answer is that 73% of the sample are not paying attention to candidates' positions on cryptocurrencies; this gives the candidates license to ignore their constituents' anti-crypto views.<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYFGamMWX7BnSigmAo0qN6P25PQ0XlWXLfWMZ3cju_Z9GsZ2ZEIWYXopXAo6mnkQJu-0VqHvFPY3UAGxHkScdcMaPN77nsgCVWHOQG7VRlJcW4Me6dByDYwi_nqKMYtTBRiTD432251SZp-r-tPGKQroEdNTV46oXxT9xKWHg06veQZiNxaeusTx-CeMK_/s926/FollowTheCrypto.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="300" data-original-width="926" height="65" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYFGamMWX7BnSigmAo0qN6P25PQ0XlWXLfWMZ3cju_Z9GsZ2ZEIWYXopXAo6mnkQJu-0VqHvFPY3UAGxHkScdcMaPN77nsgCVWHOQG7VRlJcW4Me6dByDYwi_nqKMYtTBRiTD432251SZp-r-tPGKQroEdNTV46oXxT9xKWHg06veQZiNxaeusTx-CeMK_/w200-h65/FollowTheCrypto.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.followthecrypto.org/">Source</a></td></tr></tbody></table>
Covered by this bogus fig-leaf, the tsunami of money started flowing. May 30<sup>th</sup> saw some of the first reports of money with Hannah Miller and Olga Kharif's <a href="https://www.bloomberg.com/news/articles/2024-05-30/andreessen-horowitz-a16z-donates-25-million-to-crypto-pac-fairshake"><i>Andreessen Horowitz Donates $25 Million to Fairshake PAC</i></a> and Molly White's <a href="https://www.citationneeded.news/2024-cryptocurrency-election-spending/"><i>Cryptocurrency companies have raised over $135 million to influence US elections this cycle, and they’re just getting started</i></a>.
White went on to start <a href="https://www.followthecrypto.org/"><i>Follow the crypto</i></a>, a site devoted to tracking the cryptosphere's political fundraising and donations. Much of this post is based on White's research.<br />
<br />
Initially, the crypto-bros had consideable success by pouring money into defeating crypto-skeptics in primaries, as the Emily Wilkins' <a href="https://www.cnbc.com/2024/06/26/crypto-pac-house-senate-elections.html"><i>Crypto industry super PAC is 33-2 in primaries, with $100 million for House, Senate races</i></a> reported on 26<sup>th</sup> June:<br />
<blockquote>
A super PAC bankrolled by a small group of crypto companies has backed the winning candidate in 33 of the 35 House and Senate primary races it entered.<br />
<br />
Fairshake PAC kicks off the general election season with a strong track record and at least $100 million to spend on crypto-friendly candidates for Congress.
</blockquote>
Wilkins made two important <a href="https://www.cnbc.com/2024/06/26/crypto-pac-house-senate-elections.html">observations</a>:<br />
<blockquote>
The PAC has spent tens of millions already on ads that rarely mention crypto. Instead, the messages they deliver are about “fairness” and “integrity.”
</blockquote>
Note that the crypto-bros aren't fooled by their gaslighting; they know that the vast majority of the voters are anti-crypto.
Molly White's <a href="https://www.citationneeded.news/issue-64/"><i>Pointing its arsenal at our friends</i></a> makes the point:<br />
<blockquote>
I’ve noted before that, despite the industry’s attempts to convince incumbent politicians, candidates, campaign managers, and anyone else who will listen that there is a major bloc of single-issue voters who will vote for people with pro-crypto policy stances, the people in charge of actually running strategy don’t seem to truly believe it. Ads run by the Fairshake PAC and related crypto-focused super PACs make no mention of cryptocurrency, for example, suggesting that those behind them understand that it’s not an issue that’s likely to sway voters.
</blockquote>
Wilkins' second <a href="https://www.cnbc.com/2024/06/26/crypto-pac-house-senate-elections.html">observation is</a>:<br />
<blockquote>
Of the $160 million in total contributions Fairshake has raised since it was founded, around $155 million — or 94% — can be traced back to just four companies: Ripple, Andreesen Horowitz, Coinbase and Jump Crypto.
</blockquote>
And note the classic astroturfing; a PAC funded by a few huge companies claiming to represent the "<a href="https://www.security.org/digital-security/cryptocurrency-annual-consumer-report/">40% of American adults now own crypto</a>". This is more gaslighting. Other crypto-friendly sites claim "<a href="https://coinweb.com/trends/how-many-americans-own-crypto/">14% of US adults own cryptocurrencies</a>".<br />
<br />
Grifters like Trump know which side their bread is buttered. Already by 7<sup>th</sup> June Alexandra Ulmer was writing <a href="https://www.reuters.com/world/us/trump-pitches-himself-crypto-president-san-francisco-tech-fundraiser-2024-06-07/"><i>Trump pitches himself as 'crypto president' at San Francisco tech fundraiser</i></a>:<br />
<blockquote>
Republican presidential candidate Donald Trump presented himself as a champion for cryptocurrency and slammed Democrats' attempts to regulate the sector during a San Francisco fundraiser on Thursday, three sources present told Reuters.<br />
<br />
Trump raised $12 million from the fundraiser hosted by tech venture capitalists David Sacks and Chamath Palihapitiya at Sacks' home in the swanky Pacific Heights neighborhood.
</blockquote>
Four days later David Pan reported <a href="https://www.bloomberg.com/news/articles/2024-06-12/trump-meets-bitcoin-btc-miners-in-his-latest-pro-crypto-overture"><i>Trump Meets Bitcoin Miners in His Latest Pro-Crypto Overture</i></a>:<br />
<blockquote>
Several Bitcoin miners met with former president Donald Trump at Mar-a-Lago on Tuesday night, according to Matthew Schultz, executive chairman at crypto mining company CleanSpark Inc.<br />
<br />
Trump told attendees that he loves and understands cryptocurrency, adding that Bitcoin miners help to stabilize energy supply from the grid, according to Schultz. Trump said he’d be an advocate for miners in the White House, Schultz added.
</blockquote>
This culminated on 27<sup>th</sup> July at the recent <a href="https://bitcoin2024.b.tc/">Bitcoin2024</a> gathering of the faithful with a bizarre <a href="https://www.youtube.com/watch?v=EiEIfBatnH8">48-minute rambling monologue</a> that was mostly a rehash of his stump speech.<br />
<br />
Six days earlier, Joe Biden had dropped out of the race, disrupting the crypto-bros plans.
Molly White <a href="https://www.citationneeded.news/issue-64/">observes</a>:<br />
<blockquote>
But it does seem that some of the more gullible executives and figureheads within the crypto world have themselves been bamboozled by the <a href="https://www.citationneeded.news/2024-cryptocurrency-election-spending/">questionable numbers and creatively interpreted polls</a>. The feeling among that group is not that they need to pursue a positive relationship with a possible future Harris administration, but rather that this supposed crypto vote will decide the election, and that they are its gatekeepers.
</blockquote>
Like me, Cory Doctorow leverages White's research in <a href="https://pluralistic.net/2024/07/31/greater-fools/#coinbased"><i>The largest campaign finance violation in US history</i></a>:<br />
<blockquote>
<tt>
But the real whale that's backstopping the crypto campaign spending is Coinbase, through its Fairshake crypto PAC. Coinbase has donated $45,500,000 to Fairshake, which is a lot:<br />
<br />
<a href="https://www.coinbase.com/blog/how-to-get-regulatory-clarity-for-crypto<">https://www.coinbase.com/blog/how-to-get-regulatory-clarity-for-crypto</a><br />
<br />
But $45.5m isn't merely a large campaign contribution: it appears that $25m of that is the largest illegal campaign contribution by a federal contractor in history, "by far," a fact that was sleuthed out by Molly White:<br />
<br />
<a href="https://www.citationneeded.news/coinbase-campaign-finance-violation/">https://www.citationneeded.news/coinbase-campaign-finance-violation/</a><br />
<br />
At issue is the fact that Coinbase is bidding to be a US federal contractor: specifically, they want to manage the crypto wallets that US federal cops keep seizing from crime kingpins. Once Coinbase threw its hat into the federal contracting ring, it disqualified itself from donating to politicians or funding PACs:
</tt>
</blockquote>
How wonderful is it that this great country enjoys the blessings of democracy? Just imagine how much money the companies donating to these PACs stand to make from obtaining "regulatory clarity" if they are "investing" close to $200M in a <i>chance</i> to get it.<br />
<br />
<b>Update 23<sup>rd</sup> August</b><br />
<br />
I posted this too soon. Enough has happened in the last few days to justify an update:<br />
<ul>
<li>Will a Harris administration provide "regulatory clarity"? I commented on
Hadriana Lowenkron's <a href="https://www.bloomberg.com/news/articles/2024-08-21/harris-supports-policies-to-expand-crypto-industry-aide-says"><i>Harris Supports Policies to Expand Crypto Industry, Aide Says</i></a>:<br />
<blockquote>
"Vice President Kamala Harris will back measures to help grow digital assets, a policy adviser to her campaign said, highlighting efforts to court an emerging cryptocurrency industry expanding its political influence.
</blockquote>
But Protos had a skeptical take in <a href="ttps://protos.com/kamala-harris-pro-crypto-policy-is-yet-more-fake-news/"><i>Kamala Harris ‘pro-crypto policy’ is yet more fake news</i></a>:<br />
<blockquote>
Another day, another fake Kamala Harris headline. Already <a href="https://x.com/i/trending/1826630020162273675">this week</a>, we’ve heard all about her <a href="https://protos.com/crypto-runs-with-fake-kamala-harris-gary-gensler-news/">non-appointment of Gary Gensler</a> and her non-existent <a href="https://protos.com/fake-news-again-this-time-its-kamala-harris-and-unrealized-crypto-gains/">unrealized crypto gains tax</a>, and today we have to point out that the 2024 White House hopeful hasn’t adopted a ‘pro-crypto policy.’<br />
...<br />
Well, rather than Harris suddenly adopting a pro-crypto platform to boost her presidential campaign, Bloomberg published an <a href="https://www.bloomberg.com/news/articles/2024-08-21/harris-supports-policies-to-expand-crypto-industry-aide-says">article</a>.<br />
<br />
Specifically, behind its paywall, it ran the quote, “She’s going to support policies that ensure that emerging technologies and that sort of industry can continue to grow.”<br />
<br />
That quote related only broadly to the ‘crypto community’ and didn’t come from Harris or her spokesperson. It was actually said by Brian Nelson, <b>a mere campaign advisor</b>.
</blockquote>
</li>
<li>
Exercising traditional bothsiderism, Bloomberg's Editorial Board weighed in with <a href="https://www.bloomberg.com/opinion/articles/2024-08-23/kamala-harris-and-donald-trump-shouldn-t-pander-to-crypto-people"><i>Harris and Trump Shouldn't Pander to the Crypto Crowd</i></a>:<br />
<blockquote>
Just <a href="https://www.federalreserve.gov/publications/files/2023-supplement-economic-well-being-us-households-202405.pdf">1% of Americans</a> say they used them for a payment or money transfer last year. More often crypto is used to move money outside of government oversight. That’s helpful for criminals, terrorists and anyone under sanctions. But these are hardly the constituencies that a presidential candidate should be soliciting. Nor should policymakers be encouraging people to park their savings in digital wallets instead of stocks, bonds and other assets that support the real economy.<br />
<br />
Instead, candidates should promise to work with Congress and regulators to ensure that the rules applied to cryptocurrencies are consistent with existing laws on fraud, money laundering and sanctions enforcement.
</blockquote>
What is the chance that this would happen in a Trump administration?</li>
<li>
The answer had come the day before the Editorial Board's vain hand-waving.
MacKenzie Sigalos' <a href="https://www.cnbc.com/2024/08/22/trump-crypto-defi-protocol-launch.html"><i>Trump promotes family’s new crypto platform, ‘The Defiant Ones’</i></a> made it crystal clear:<br />
<blockquote>
Former President Donald Trump on Thursday promoted a soon-to-launch, Trump Organization crypto platform, “The DeFiant Ones” to his 7.5 million followers on Truth Social<br />
...<br />
“For too long, the average American has been squeezed by the big banks and financial elites,” Trump wrote. “It’s time we take a stand — together.”<br />
<br />
The post marks the first time the Republican nominee for president has used his personal platform to promote the as yet unactivated digital bank. Within minutes, his son Donald Trump Jr., shared the post with his 12 million X followers.
</blockquote>
Trump's floundering Truth Social posted a <a href="https://apnews.com/article/trump-media-earnings-results-revenue-4f6701cbebcbc5c9ed5079ab096cb346">$16.4M loss</a> on revenue of $837K (down 30% year-on-year). The stock is currently down 75% from the peak and Trump is widely expected to pull the rug out from holders by dumping his stock in the next few weeks. Thus he needs to find a new grift to replace DJT, and this is clearly it. The probability that "The Defiant Ones" will be rug-pulled is close to 100%.
</li>
</ul>
I should expand on the last point in the original post. Corporations making large political contributions are making a similar calculation to VCs investing in startups. The return on investment each time is likely to be negative, but the return on the occasional winner is enough to wipe out the losses and leave a healthy profit. This leaves two questions that are rarely asked:<br />
<ul>
<li>How much profit will the contributors garner if their wishes are granted?</li>
<li>Where will this profit come from? In other words, if the contributors are the winners, who are the losers?</li>
</ul>
The history of cryptocurrencies suggests that the profit will be large and the losers will be the retail "investors".<br />David.http://www.blogger.com/profile/14498131502038331594[email protected]5tag:blogger.com,1999:blog-4503292949532760618.post-37686127673610369162024-08-08T08:00:00.000-07:002024-08-08T08:00:00.237-07:00Greenwashing<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNw44mW0LLZbkmI6PPvDKnpLWve_g_Zmbc_8N4jPX80RaL80g6oWM05vhagWeDl1u7VuRW51cPieOynKXe8MYCnt7G5hzaeZr5Fk17FRuE0lChavi8SZlMy1yQjrAFCRXFrQoTfhxKk43d0EF83s1tMSWoyug6HGmU_bP9SyF8oIDbrjFs-Mei5EKwxKk5/s897/Greenwashing.png" imageanchor="1" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="504" data-original-width="897" height="113" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNw44mW0LLZbkmI6PPvDKnpLWve_g_Zmbc_8N4jPX80RaL80g6oWM05vhagWeDl1u7VuRW51cPieOynKXe8MYCnt7G5hzaeZr5Fk17FRuE0lChavi8SZlMy1yQjrAFCRXFrQoTfhxKk43d0EF83s1tMSWoyug6HGmU_bP9SyF8oIDbrjFs-Mei5EKwxKk5/w200-h113/Greenwashing.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://hntrbrk.com/terawulf/">Source</a></td></tr></tbody></table>
You have only to scan Molly White's <a href="https://www.web3isgoinggreat.com/"><i>Web3 is Going Just Great</i></a> to realize that <a href="https://www.quotes.net/mquote/90955">you will never find a more wretched hive of scum and villainy</a> than the cryptosphere. Everywhere you look you find lies, grift, fraud, and theft. Below the fold I discuss the latest example, in which a coal company marketing itself as "zero-carbon Bitcoin mining" is just the start.<br />
<span><a name='more'></a></span>
<br />
The legal way to make money from the wretched hives of scum and villainy in the markets is selling short. Recently, a startup called <a href="https://hntrbrk.com">Hunterbrook</a> has developed an innovative business model for doing so. Matt Levine <a href="https://www.bloomberg.com/opinion/articles/2024-04-02/a-hedge-fund-that-s-also-a-newspaper">explains</a>:<br />
<blockquote>
Hunterbrook hit upon a differentiated media business model:<br />
<ol>
<li>They would start a newsroom (Hunterbrook Media) to publish general news and investigative journalism.</li>
<li>There’s no paywall and no advertising.</li>
<li>But before each investigative piece is published, the newsroom would send it to Hunterbrook’s affiliated hedge fund (Hunterbrook Capital), which could trade on the news.</li>
<li>The hedge fund’s trading profits can — they hope! — pay the journalists’ salaries.</li>
</ol>
One way to think of this business model is that Hunterbrook is essentially an activist short-selling hedge fund, like Hindenburg Research: It investigates companies, finds problems, shorts the companies, and then noisily publishes its investigation to draw attention to the problems. But whereas Hindenburg is straightforwardly a short-selling firm, Hunterbrook’s news site is at least theoretically independent of its hedge fund, and if it publishes enough good general news then perhaps it can become more widely read and trusted — and have more stock-price impact — than a pure hedge fund.
</blockquote>
Hunterbrook's latest investigation is entitled <a href="https://hntrbrk.com/terawulf/"><i>COAL, CRYPTO, AND FALSE BRANDING: INSIDE TERAWULF’S GREENWASHING MACHINE</i></a>. Here is Terawulf's pitch:<br />
<br />
<blockquote class="twitter-tweet"><p lang="en" dir="ltr">The future is <a href="https://twitter.com/hashtag/ZeroCarbon?src=hash&ref_src=twsrc%5Etfw">#ZeroCarbon</a> ♻️⚡️ and <a href="https://twitter.com/search?q=%24WULF&src=ctag&ref_src=twsrc%5Etfw">$WULF</a> is ahead of the curve.<a href="https://twitter.com/hashtag/Bitcoin?src=hash&ref_src=twsrc%5Etfw">#Bitcoin</a> <a href="https://twitter.com/hashtag/BitcoinMining?src=hash&ref_src=twsrc%5Etfw">#BitcoinMining</a> <a href="https://twitter.com/hashtag/SustainableMining?src=hash&ref_src=twsrc%5Etfw">#SustainableMining</a> <a href="https://t.co/3aq4OipWld">pic.twitter.com/3aq4OipWld</a></p>— TeraWulf (@TeraWulfInc) <a href="https://twitter.com/TeraWulfInc/status/1762840210684223922?ref_src=twsrc%5Etfw">February 28, 2024</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
Hunterbrook reveals that Terawulf's claim to run on renewable power <a href="https://hntrbrk.com/terawulf/">is false</a>:<br />
<blockquote>
<ul>
<li>TeraWulf Inc. (NASDAQ: $WULF) brands itself as a “zero-carbon Bitcoin miner” — and claims its commitment to renewable energy will help it land AI data center contracts. But the New York Power Authority, which supplies 45% of the facility’s energy, told Hunterbrook Media: “None of the power that NYPA provides the firm can be claimed as renewable power.”</li>
<li>The rest of TeraWulf’s power is sourced from the New York grid, which is less than half zero-carbon, according to the New York Independent System Operator, the organization responsible for managing the state’s wholesale electric marketplace.</li>
<li>The only way TeraWulf can legally substantiate its zero-carbon claims is by purchasing renewable energy credits (RECs), according to New York and federal regulators, but a TeraWulf spokesperson confirmed that the company has not done so. “Without the REC, there is no legal claim to the renewable attributes of electricity,” a spokesperson for the New York State Energy Research and Development Authority confirmed in an email to Hunterbrook.</li>
</ul>
</blockquote>
But lying about renewables is just the tip of the iceberg. Hunterbrook reports that they <a href="https://hntrbrk.com/terawulf/">lied to get permits</a>:<br />
<blockquote>
The team behind TeraWulf promised New York State that it was “not targeting bitcoin or any other cyber currency” in a 2019 application for its facilities seen by Hunterbrook, despite seizing on the idea of bitcoin mining as a strategy as early as 2018.
</blockquote>
Hunterbrook is skeptical about Terawulf's commitment to zero-carbon mining <a href="https://hntrbrk.com/terawulf/">because</a>:<br />
<blockquote>
The company’s management team, including CEO Paul Prager, trace their roots to Beowulf Energy LLC, an operator of fossil fuel plants that previously revived a struggling coal plant to mine bitcoin. The same TeraWulf executives who claim TeraWulf’s mining is zero-carbon likely continue to manage this coal plant.
</blockquote>
Prager apparently has a <a href="https://hntrbrk.com/terawulf/">lavish lifestyle</a>:<br />
<blockquote>
Prager has been known to split his time between a “five-bedroom Fifth Avenue co-op” in Manhattan and a sprawling 250-acre estate on Maryland’s Eastern Shore, according to a 2021 profile in Washingtonian. This estate, called Maiden Point Farm, is described as “more like a small village with 20 structures,” including a “main house, English-style gardens, a pool, a tennis pavilion, a squash court,” and even a private gas station for his car collection, which includes multiple Ferraris.
</blockquote>
How is this <a href="https://hntrbrk.com/terawulf/">funded?</a>:<br />
<blockquote>
Hunterbrook’s analysis of the company’s SEC filings shows TeraWulf’s operations are deeply entwined with a constellation of entities under Prager’s control, making it difficult to discern where TeraWulf ends and Prager’s other interests begin. <br />
<br />
Beowulf Electricity & Data, a company owned and controlled by Prager, provides TeraWulf with “infrastructure, construction, operations and maintenance and administrative services necessary to build out and operate certain Bitcoin mining centers” — functions that TeraWulf claims are “readily available from independent entities.” <br />
<br />
In 2023, TeraWulf paid $20.3 million to Beowulf for these services, representing 38% of TeraWulf’s combined operating and administrative expenses. It also accounted for more than half of the company’s $29.4 million operating loss for the year. The trend continued into 2024, with TeraWulf recognizing $3.5 million in related party expenses in the first quarter alone, amounting to 21% of its operating and administrative expenses for the quarter.
</blockquote>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn6yRTuz8mAbVNa807Lj4r1qhPPwf0zQmJ7EpmWdinGsj7L0FOBq20m7-eo7UdMGsziFLdvC4cc08a8GRnmkjORyZWhxAX7cmHP-eon7GOwwLqVJ0ZirOU522g_SrD4zoXuQPdkRVtzGtZ3kNiOYwBQYlHoPIsamfK4ZnlMEaFN06bX01S_pNdOaDDx9et/s775/PragerStock.png" imageanchor="1" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="576" data-original-width="775" height="149" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn6yRTuz8mAbVNa807Lj4r1qhPPwf0zQmJ7EpmWdinGsj7L0FOBq20m7-eo7UdMGsziFLdvC4cc08a8GRnmkjORyZWhxAX7cmHP-eon7GOwwLqVJ0ZirOU522g_SrD4zoXuQPdkRVtzGtZ3kNiOYwBQYlHoPIsamfK4ZnlMEaFN06bX01S_pNdOaDDx9et/w200-h149/PragerStock.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://hntrbrk.com/terawulf/">Source</a></td></tr></tbody></table>
Prager apears to have another way to <a href="https://hntrbrk.com/terawulf/">fund his lifestyle</a>:<br />
<blockquote>
In recent years, Prager has received a significant quantity of TeraWulf shares — through both the related party transactions and financial activities. And in an open letter published early in 2023, he shared that he hadn’t “sold a share” as “evidence of my conviction.” But since mid-2023, Prager has significantly reduced his claimed ownership of the company through a series of stock disposals.<br />
<br />
His reported ownership has dwindled, with his holdings falling to around 10 million shares compared to more than 30 million shares in 2023.
</blockquote>
Executives of Bitcoin miners have a history of looting their companies. Two years ago Paul Butler wrote in <a href="https://paulbutler.org/2022/the-problem-with-bitcoin-miners/"><i>The problem with bitcoin miners</i></a>:<br />
<blockquote>
There’s one group of people for whom bitcoin mining is an extremely lucrative business: executives. Last year, one MARA executive <a href="https://www.sec.gov/Archives/edgar/data/0001507605/000149315222011630/formdef14a.htm">earned over $220 million</a> in cash and stock-based compensation, in a year when the company’s total revenue was $150 million. RIOT’s top five executives collectively took home a more modest <a href="https://www.sec.gov/ix?doc=/Archives/edgar/data/1167419/000107997322000531/riot_10ka-123121.htm#item11">$90 million</a> in a year with a net loss.
</blockquote>
How was this <a href="https://paulbutler.org/2022/the-problem-with-bitcoin-miners/">possible?</a>::<br />
<blockquote>
This, I think, points to the crux of the problem. Investors have been happy to provide capital to these companies, looking for anything in the public markets that provides some exposure to bitcoin, without paying much attention to what the companies are doing.<br />
<br />
I don’t think it ends well.
</blockquote>
It certianly looks like everyone except Hunterbrook wasn't "paying much attention to what the companies are doing".<br />
<br />
Like many miners in the wake of <a href="https://blog.dshr.org/2024/05/one-heck-of-halvening.html"><i>One Heck Of A Halvening</i></a>, Terawulf is trying to <a href="https://pivot-to-ai">pivot to AI</a>. Hunterbrook notes <a href="https://hntrbrk.com/terawulf/">that</a>:<br />
<blockquote>
TeraWulf has not resisted the hype, with the management team <a href="https://www.investing.com/news/company-news/cantor-fitzgerald-lifts-terawulf-stock-price-target-highlights-robust-demand-93CH-3497574">suggesting</a> it could land a similar deal. CFO Fleury specified in an <a href="https://www.alphaspread.com/security/nasdaq/wulf/earnings-calls/q1-2024">earnings call</a> earlier this year that, by leasing out all of the 300 available megawatts at Lake Mariner, the company could bring in $300 million to $450 million in hosting revenues a year. TeraWulf’s revenue last year was $69 million.
</blockquote>
But this won't happen <a href="https://hntrbrk.com/terawulf/">any time soon</a>:<br />
<blockquote>
TeraWulf doesn’t yet have AI-ready facilities, unlike competitors who made the switch to HPC data center hosting years ago. But TeraWulf announced it is on track to build a 2 MW experimental AI data center by the third quarter of this year and plans to build another 20 MW data center with a target completion date of the end of 2024.
</blockquote>
I have only hit the highlights of Hunterbrook's work, you should go <a href="https://hntrbrk.com/terawulf/">read the whole thing</a>.<br />
David.http://www.blogger.com/profile/14498131502038331594[email protected]3tag:blogger.com,1999:blog-4503292949532760618.post-90878493393941576432024-08-01T08:00:00.000-07:002024-08-04T16:54:32.516-07:00More Cryptocurrency Gaslighting<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh67iJWVHSz2GpxGj6Q_LDXjFhZqN_JulBcw3GElinXsDaWLPiEtziOLr_B7OX_gRzgySkLy6lwLiBVZ_j45VUH9cyw18g7rfuOiQ7-XISn4cs9TmkdwqgCUNn2t9sXHcgtPq8XDZE9tFfcK5mpnCRhnheE0_O5jgSu1XTLWkwtWpAmZTYvjQGBTt0b6MhG/s1470/Complaint.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="788" data-original-width="1470" height="108" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh67iJWVHSz2GpxGj6Q_LDXjFhZqN_JulBcw3GElinXsDaWLPiEtziOLr_B7OX_gRzgySkLy6lwLiBVZ_j45VUH9cyw18g7rfuOiQ7-XISn4cs9TmkdwqgCUNn2t9sXHcgtPq8XDZE9tFfcK5mpnCRhnheE0_O5jgSu1XTLWkwtWpAmZTYvjQGBTt0b6MhG/w200-h108/Complaint.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">SEC vs. Consensys<br /></td></tr></tbody></table>
On 30<sup>th</sup> June Amy Castor and David Gerard reported that <a href="https://davidgerard.co.uk/blockchain/2024/06/30/sec-sues-consensys-over-metamask-swaps-and-staking/"><i>SEC sues Consensys over MetaMask Swaps and Staking</i></a>:<br />
<blockquote>
The SEC is charging Consensys for unauthorized sales of securities through MetaMask Staking and for failure to register as a broker and a dealer while offering crypto trades and staking services through MetaMask Staking and Swaps. The SEC says that Consensys took $250 million in fees as an unregistered broker.<br />
<br />
MetaMask is Consensys’ main money maker — a popular browser-based wallet that also lets you stake ETH and buy and sell crypto via decentralized exchanges with “swaps.”
</blockquote>
Consensys' defense strategy poses potentially serious problems for the concept of open source, because they are gaslighting about the software that is the basis for the SEC's complaint being open source. Were the court to (a) fall for their gaslighting but (b) agree with the SEC's complaint it could provide a basis for imposing liability on open source developers.<br />
<br />
I am afraid that the explanation for why this is so is necessarily rather long but I and others think that it needs to be understood. So stock up with supplies for the journey and follow me below the fold.<br />
<span><a name='more'></a></span>
<br />
Before the House of Representatives Committee on House Financial Services Subcommittee on Digital Assets, Financial Technology, and Inclusion, William C. Hughes, Senior Counsel & Director of Global Regulatory Matters for Consensys <a href="https://docs.house.gov/meetings/BA/BA21/20231115/116579/HHRG-118-BA21-Wstate-HughesB-20231115.pdf">testified thus</a>:<br />
<blockquote>
Our firm develops and offers the most popular unhosted wallet software in digital assets, the MetaMask wallet. This offering is open source software that can be downloaded for free from the Apple app or Google extension store, and installed on any Google Chrome browser, iPhone, or Apple desktop computer. The wallet is an interface that allows the user to read and write to the blockchain without any intermediary’s help, akin to how a web browser is a consumer’s direct connection to the open web.
</blockquote>
Why was Hughes stressing that the MetaMask wallet was open-source? Consensys responded to the suit by claiming that MetaMask was <a href="https://consensys.io/blog/company-statement-on-the-sec-action-against-consensys">just software that they wrote</a>:<br />
<blockquote>
We are confident in our position that the SEC has not been granted authority to regulate software interfaces like MetaMask.
</blockquote>
Consensys claims that their <a href="https://consensys.io/blog/consensys-launches-metamask-learn-the-next-step-in-democratizing-web3">software is open source</a>:<br />
<blockquote>
Consensys is a leading Ethereum and decentralized protocols software company. We enable developers, enterprises, and people worldwide to build next-generation applications, launch modern financial infrastructure, and access the decentralized web.
...
On this trusted, open source foundation, we are building the digital economy of tomorrow.
</blockquote>
Specifically including <a href="https://metamask.io/developer/">MetaMask</a>:<br />
<blockquote>
Build your dapp using the same infrastructure and APIs powering web3's most popular open-source wallet.
</blockquote>
It is true that MetaMask's wallet <i>was</i> originally truly open source, under the MIT license. But as of 4 years ago, the license <a href="https://medium.com/metamask/evolving-our-license-for-the-next-wave-of-metamask-users-81b0b494c09a">changed</a> to a Consensys-specific license that prevents commercial use if it serves more than 10K users/month. So in this post "open source" means readable, it does not mean the canonical definition of Free Open Source Software.<br />
<br />
But notice Consensys' focus on the wallet software. That is not what the SEC is suing them about. The SEC's complaint is about the services MetaMask provides customers who use the wallet. Consensys' strategy is to conflate the wallet and the services, and claim that all the wallet does is interface to the blockchain.<br />
<br />
Lets use an analogy to see why this distinction is important. When I use an open-source browser to access a financial institution's website, such as <a href="https://investor.vanguard.com/">Vanguard's</a> it receives a bunch of HTML and JavaScript. It isn't technically open source because it doesn't carry an open source copyright license, but I can read it. But it doesn't implement any of the services Vanguard offers me, such as trading mutual funds and transferring dollars to or from my bank account. These are implemented as closed-source, the browser under control of Vanguard's HTML and JavaScript is just a wrapper around them.<br />
<br />
Consensys seems to claim that because the "smart contracts" implementing these services are just open source software they do not control and in whose operations they are not involved, they are not acting as a broker because they don't take custody of the customer's tokens.<br />
<br />
I should pick a nit. I've written before, for example in <a href="https://blog.dshr.org/2022/01/blockchain-gaslighting.html"><i>Blockchain Gaslighting</i></a> and <a href="https://blog.dshr.org/2023/03/more-cryptocurrency-gaslighting.html"><i>More Cryptocurrency Gaslighting</i></a>, about the crypto-bros habit of loudly and repeatedly making provably false statements in the hope that no-one will bother to check them. This post is, strictly speaking, not about gaslighting because the repeated statements are technically true, but they are intended to be interpreted in a broader context in which they are false.<br />
<br />
The reason Consensys' statements are technically true is that the wallet functionality is open source, at least in the sense that it can be read. But, a couple of weeks ago, Jon Reiter and the team at Chainargos came out with a three-part series examining how MetaMask's services actually work that reveals the lie underlying Consensys' arguments:<br />
<ol>
<li><a href="https://medium.com/chainargos/how-metamask-swap-really-works-e2919c4ebd4a"><i>How MetaMask Swap Really Works</i></a> uses <a href="https://etherscan.io/tx/0x66faafe68a2bc3ab0bca75fa84a50dfeca263789ad176d8411c7ad6fa17039f9">Etherscan</a> and <a href="https://evm.storage/eth/0x66faafe68a2bc3ab0bca75fa84a50dfeca263789ad176d8411c7ad6fa17039f9">Sim explorer</a> to trace a single MetaMask swap transaction.</li>
<li><a href="https://medium.com/chainargos/how-metamask-staking-really-works-65c4e4ba5f9b"><i>How MetaMask Staking Really Works</i></a> examines four different staking staking contracts and uses the same techniques to follow a <a href="https://etherscan.io/tx/0x4b3b10bc1b5540ba7895cee7101ecbfb4cd6255a5d88165368789c366ddad305">transaction</a> from one of them. It also discusses how one part of MetaMask Bridge works.</li>
<li><a href="https://medium.com/chainargos/how-metamask-bridge-really-works-3a716db94c21"><i>How MetaMask Bridge Really Works</i></a> covers the rest of MetaMask Bridge's functionality, again including a <a href="https://bscscan.com/tx/0x06dc87b6344f161e7ee594cfda3cc8cecb43647a1882abadc38e3e8146c9f540">sample transaction</a>.</li>
</ol>
In each case the structure of the transaction is basically the same. For the details you should read the three posts, but to oversimplify:<br />
<ul>
<li>The customer's wallet invokes a function, for example <tt>MetaMask:Swap Router.swap()</tt>, on one of MetaMask's open source contracts. The call parameters identify a specific contract, which in the swap case MetaMask calls the "aggregator" and Chainargos calls the <a href="https://medium.com/chainargos/how-metamask-swap-really-works-e2919c4ebd4a">"execution strategy"</a>:<br />
<blockquote>
It is the algorithm that the user told their broker to use to execute this order
</blockquote>
These contracts are closed-source, owned and controlled by Consensys. Part of their function is to transfer the fees for executing the transaction to a Consensys wallet.</li>
<li>The open-source function validates inputs, identifies the "adapter" that implements the requested algorithm, and formats a block of parameters with which to invoke it.</li>
<li>The open-source function <i>transfers control of the customer's tokens to a MetaMask contract</i>. In the case of MetaMask Swap this is an open-source contract, in other cases it is an upgradeable or closed-source contract.</li>
<li>That contract invokes the <i>closed-source, MetaMask owned</i> adapter contract with the encoded parameters.</li>
<li>The adapter performs the transaction, returning the proceeds to the customer after subtracting the fee, which it sends to the Consensys wallet.</li>
</ul>
Note first that the actual algorithm performing the transaction is closed-source, MetaMask's open-source software simply provides the wrapper exposed to the customer. And second that in each case a closed-source MetaMask contract takes control of the customer's tokens in order to perform the requested transaction. In some cases even the open-source contract is upgradeable, meaning that MetaMask can change what it does on a whim. In some cases the contracts have functions such as <tt>pause()</tt> demonstrating MetaMask's control over their operation. At minimum, MetaMask needs this control to ensure that the fees for the transaction are routed to their wallet.<br />
<br />
Chainargos concludes that this workflow <a href="https://medium.com/chainargos/how-metamask-swap-really-works-e2919c4ebd4a">looks similar to the way a broker works</a>:<br />
<blockquote>
<ol>
<li>User enters order including an execution strategy.</li>
<li>This order is sent to an order router.</li>
<li>Router looks up the execution adapter for that strategy.</li>
<li>Router sends the tokens intended to be sold, the adapter address, and the incoming order details to a spender contract.</li>
<li>Spender delegates control over the received tokens as required for order execution.</li>
<li>Spender calls a closed-source contract which effects the execution strategy.</li>
<li>Fees are sent from Spender to the “MetaMask Fee Complex”.</li>
<li>Sale proceeds are returned to the user.</li>
</ol>
</blockquote>
And they <a href="https://medium.com/chainargos/how-metamask-swap-really-works-e2919c4ebd4a">point out that</a>:<br />
<blockquote>
that steps 4, 5, and 6 look an awful lot like the concepts of “transmittal order” and “transmittal of funds” from <a href="https://www.federalregister.gov/documents/2013/12/04/2013-28951/definitions-of-transmittal-of-funds-and-funds-transfer">here</a>.
</blockquote>
"Here" is the Financial Crimes Enforcement Network's <a href="https://www.federalregister.gov/documents/2013/12/04/2013-28951/definitions-of-transmittal-of-funds-and-funds-transfer"><i>Definitions of Transmittal of Funds and Funds Transfer</i></a>.<br />
<br />
The parts of MetaMask that provide services for which Consensys gets fees <i>cannot</i> be open source in the sense of readable. If they were, anyone could copy them, modify them to direct the fees to themselves, and deploy the result. This would kill off Consensys' $250M cash cow. Consensys has a belt-and-braces moat; if they did they would run into the 10K users/month limit of the license for the open source parts of the system. Note that the <a href="https://github.com/MetaMask/metamask-extension/blob/e4d4c9c45a134eace71d020ac0316deddc52213d/LICENSE">license</a> appears to relate only to the open source parts, it isn't clear under what terms the closed source parts are used.<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHkqJnihHRFx3aHt1NDVgM5Tk8a-fUbJ61_ybi1X57UWjix9jL2Cd6njbC1Lbi9XpWrcz0_suquJE9ZTF2n0iBxw2_yvu8gI7pGdZcFU5j7rtq9-TpsdkJ7WMqCQdXZhxSY3izgxMZILCvfvJs101LQkZ5gMf7CowIf-G3K4-rDamshK8wUv8P92P0jrgN/s824/NonCustodial.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="328" data-original-width="824" height="79" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHkqJnihHRFx3aHt1NDVgM5Tk8a-fUbJ61_ybi1X57UWjix9jL2Cd6njbC1Lbi9XpWrcz0_suquJE9ZTF2n0iBxw2_yvu8gI7pGdZcFU5j7rtq9-TpsdkJ7WMqCQdXZhxSY3izgxMZILCvfvJs101LQkZ5gMf7CowIf-G3K4-rDamshK8wUv8P92P0jrgN/w200-h79/NonCustodial.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://paragraph.xyz/@proofs-and-protocols/examining-sec-v-consensys">Source</a></td></tr></tbody></table>
The last of the three Chainargos posts was published July 15<sup>th</sup>, and on July 17<sup>th</sup> a brand-new blog appeared whose first post was <a href="https://paragraph.xyz/@proofs-and-protocols/examining-sec-v-consensys"><i>Examining SEC v. Consensys</i></a> by Daniel Barabander. He is Deputy General Counsel at the cryptocurrency VC Variant, so not an unbiased observer. Early in the post, in the table at the right, Barabander simply asserts that Consensys' technology is non-custodial, i.e. that MetaMask does not take custody of the customer's tokens.<br />
<br />
How can Barabander make this assertion when it is clear that MetaMask's Spender delegates control over the customer's tokens and then invokes MetaMask's closed-source execution strategy? He relies on the fact that the transaction is atomic, it either succeeds completely, or it fails completely.
<a href="https://paragraph.xyz/@proofs-and-protocols/examining-sec-v-consensys">He writes</a>:<br />
<blockquote>
Assuming the adapters are not malicious (which would be another issue entirely), their job is to enable a user to perform an atomic swap—in a single transaction take token A and exchange it for token B. This would mean that transactions are "all or nothing"—either the tokens are swapped or they are not, they cannot end up in possession of the Spender.sol contract or Consensys
</blockquote>
If the transaction succeeds, <i>some</i> of the tokens involved end up in possession of Consensys, because they get the fee. But that is not the big problem with this claim. It is true that the transaction either succeeds or fails completely, but what the transaction does with the control it is delegated over the customer's tokens is determined by MetaMask's closed-source adapters. The customer hands control to MetaMask's closed-source code and blindly trusts it will do what MetaMask claims. Barabander admits that this is the case when he assumes that "the adapters are not malicious".<br />
<br />
Chainargos <a href="https://medium.com/chainargos/how-metamask-swap-really-works-e2919c4ebd4a">points out that</a>:<br />
<blockquote>
If you can publish adapters, call setAdapter on the router and modify the input “data” blob you can do anything you like.<br />
<br />
Even if you only have some of that power you can do pretty much anything you like with the input tokens.
</blockquote>
As I understand it, only MetaMask can do these things. Barabander <a href="https://paragraph.xyz/@proofs-and-protocols/examining-sec-v-consensys">admits</a>:<br />
<blockquote>
While there is some admin functionality on the smart contract for a multi-sig that Consensys may control, there is no evidence to suggest the company actively operates the smart contract’s code.
</blockquote>
Chainargos posted a response to Barabander entitled <a href="https://medium.com/chainargos/in-re-examining-sec-v-consensys-1edfbfee6987"><i>In Re: Examining SEC v. Consensys</i></a>. They note that the contract has a <tt>renounceOwnership()</tt> function that Consensys has not called, there are <tt>pauseSwaps()</tt> and <tt>unpauseSwaps()</tt> for use when the contract gets hacked, and that the admin functionality has to be used to set up the adapter mapping.<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5_UD6mMcTE8BnySWaWoMcmgjWrb51_xvlCP5voVsZ-bfKwbxBZebG_YF1SL34OLhZ78jWy-sBtvR9buWxc7yHy26_HHRvngcytou8kwXqQN2M4B995CxwQK4OmWzcGQpCTrvoLbkTjTe2-VhPuFRzK9eVtXxycv4-b0t1hGX3_6lM8V8HwkkpV3-aAZxb/s1491/ConsensysVsSEC.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="858" data-original-width="1491" height="115" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5_UD6mMcTE8BnySWaWoMcmgjWrb51_xvlCP5voVsZ-bfKwbxBZebG_YF1SL34OLhZ78jWy-sBtvR9buWxc7yHy26_HHRvngcytou8kwXqQN2M4B995CxwQK4OmWzcGQpCTrvoLbkTjTe2-VhPuFRzK9eVtXxycv4-b0t1hGX3_6lM8V8HwkkpV3-aAZxb/w200-h115/ConsensysVsSEC.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">Consensys vs. SEC<br /></td></tr></tbody></table>
In an attempt to preempt the SEC's suit, Consensys had already <a href="https://amycastor.com/2024/04/27/consensys-gets-a-wells-notice-over-metamask-swaps-and-staking/">sued the SEC</a> in the Northern District of Texas. In their complaint they state (my emphasis):<br />
<blockquote>
MetaMask is simply an interface — like a web browser — that allows digital asset holders to seamlessly interact with the Ethereum network, including all other users and applications participating on the network. <i>MetaMask neither holds customers’ digital assets nor carries out any transaction functions</i>.
</blockquote>
It is a little strange to say that MetaMask the wallet doesn't hold customer's digital assets - what is a "wallet" for? But the MetaMask wallet is unhosted, <i>Consensys</i> doesn't hold customer's digital assets in MetaMask wallets. But Consensys' services accessed via the wallet do take control of them using closed-source "smart contracts" that they control.<br />
<br />
It is possible that the court will decide that Consensys is acting as a broker, but will accept their assertion that the software they use to do it is open source. This would be a problem, in that it could be a precedent for assigning liability to the developers of open source software.<br />
<br />David.http://www.blogger.com/profile/14498131502038331594[email protected]1tag:blogger.com,1999:blog-4503292949532760618.post-39530494039719469872024-07-25T08:00:00.000-07:002024-07-25T08:00:00.231-07:00Matt Levine Explains Cryptocurrency Markets<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiishaLOWlVs2KWrWXdP5uLq_y9IOZ8SlrzpnnnpCe88AtJy8lDZX6am9wu445SYA2gL6gvaPch-f-1GDy3iANX36Ha03IfldWVGg4cp-Uz9NhoPCJUg8aPXpIjf56oy361fn9qjpMyCBZR-dyxXr6zL8K5GKwhFo5dLFw6ui-LuBAjCDJrUdkS2rE_kWXk/s768/KanavKariya.jpg" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="768" data-original-width="768" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiishaLOWlVs2KWrWXdP5uLq_y9IOZ8SlrzpnnnpCe88AtJy8lDZX6am9wu445SYA2gL6gvaPch-f-1GDy3iANX36Ha03IfldWVGg4cp-Uz9NhoPCJUg8aPXpIjf56oy361fn9qjpMyCBZR-dyxXr6zL8K5GKwhFo5dLFw6ui-LuBAjCDJrUdkS2rE_kWXk/w200-h200/KanavKariya.jpg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.bloomberg.com/news/articles/2021-09-14/jump-trading-names-25-year-old-former-intern-as-crypto-unit-head">Kanav Kariya</a></td></tr></tbody></table>
Matt Levine's superpower is his ability to describe financial issues in wonderfully simple terms, and in a section of <a href="https://www.bloomberg.com/opinion/articles/2024-07-22/bad-trades-are-also-valuable">Monday's column</a> entitled <i>Crypto is for fun</i> he is on top form:<br />
<blockquote>
In many cases, the essential attribute of a crypto token is <i>liquidity</i>: What you want, often, is a token that trades a lot, because your goal for the token is to trade it a lot. Real-world utility, a sensible business model, acceptance in real transactions, etc., are all less important than just <i>trading</i> if you think of crypto as a toy market for traders to play with. If a token trades a lot at a high price, that in itself <i>justifies</i> the price, because that is all that is asked of a token: It doesn’t need to have a good underlying business or cash flows; it just has to trade a lot at a high price.
</blockquote>
Below the fold I discuss the astonishing story behind this explanation of why <a href="https://doi.org/10.1016/j.frl.2021.101982">wash</a> <a href="https://arxiv.org/abs/2108.10984">trading</a> is <a href="https://arxiv.org/abs/2102.07001">so rife</a> in cryptocurrencies.<br />
<span><a name='more'></a></span>
<br />
Levine is commenting on Leo Schwartz' <a href="https://fortune.com/2024/07/11/jump-trading-kanav-kariya-crypto-terra-do-kwon-disaster"><i>The rise and fall of a crypto whiz kid: How 25-year-old Kanav Kariya went from president of Jump Crypto to pleading the Fifth</i></a>. This tells how Jump Crypto got started as a way to evaluate interns, such as Kanav Kariya, as potential hires:<br />
<blockquote>
The firm needed to test the mettle of its would-be staffers—whether they could parse the nuances in financial markets and translate them into algorithmic trading models. But it couldn’t give the temporary hires the keys to the kingdom, with its proprietary strategies and billions of dollars in capital.<br />
<br />
Crypto offered a solution. The sector had its own tradable assets, exchanges, and quirks, but it was separated enough from Jump’s world of stocks and bonds that it wouldn’t pose a threat.
</blockquote>
Levine <a href="https://www.bloomberg.com/opinion/articles/2024-07-22/bad-trades-are-also-valuable">comments</a>:<br />
<blockquote>
It feels like a useful mental model for crypto: Crypto is what you get when you take the smart ambitious interns at traditional financial firms and put them in charge of their own play market. Only for real money.
</blockquote>
Jump Crypto made markets, and for many <a href="https://blog.dshr.org/2023/10/shitcoins.html">shitcoins</a> they were the dominant market maker, and thus the reason why the shitcoins traded a lot, and thus the source of their value. This was because they made <a href="https://fortune.com/2024/07/11/jump-trading-kanav-kariya-crypto-terra-do-kwon-disaster">deals with the shitcoin projects</a>:<br />
<blockquote>
Token projects will lend market makers a large supply of tokens so they can kickstart trading. Some firms also negotiate a call option, which gives the market makers the right to buy a chunk of the tokens for a steep discount if the project goes well. Selig says that the inverted structure in crypto—where market makers work with token projects, rather than exchanges—makes some sense, given projects’ need to spur trading activity. It also creates dynamics that would never be allowed in TradFi. While crypto market makers still make money off the trading spreads, the massive windfalls often come from those lucrative call options.
</blockquote>
If I'm a shitcoin promoter, I can sell Jump Crypto cheap call options for a bunch of my new shitcoin. They will pump the price by wash trading it. We'll, both get rich; me from selling some of my inflated tokens, and Jump Crypto by exercising the options and selling. Who are we selling to? The retail speculators sucked in by the spectacle of a new token with a rapidly rising "price". This is another version of the VC's <a href="https://blog.dshr.org/2022/02/list-and-dump-schemes.html"><i>List And Dump Schemes</i></a> described by Fais Khan in <a href="https://startupsandecon.substack.com/p/you-dont-own-web3-a-coinbase-curse"><i>"You Don't Own Web3": A Coinbase Curse and How VCs Sell Crypto to Retail</i></a>.<br />
<br />
Schwartz <a href="https://fortune.com/2024/07/11/jump-trading-kanav-kariya-crypto-terra-do-kwon-disaster">writes</a>:<br />
<blockquote>
For a firm like Jump, becoming the market maker for a token project meant unlimited upside with no real financial risk. “If you’re at Jump, you decide which one is going to win,” one crypto exchange founder tells Fortune, speaking on the condition of anonymity to discuss industry dynamics.
</blockquote>
And Levine <a href="https://www.bloomberg.com/opinion/articles/2024-07-22/bad-trades-are-also-valuable">comments</a>:<br />
<blockquote>
Man, what a crazy time the crypto boom was. It really did teach a generation of young financial traders that they could build perpetual motion machines: You make a token, you trade it, that makes it go up, the value comes from you trading it, you can do no wrong, you get rich, “unlimited upside with no real financial risk.”
</blockquote>
Like most financial schemes, this all worked great at first. Two of the shitcoins for which Jump Crypto made markets were Do Kwon's Terra/Luna pair. Schwartz' article starts by recounting a <a href="https://fortune.com/2024/07/11/jump-trading-kanav-kariya-crypto-terra-do-kwon-disaster">May 2021 crisis</a>:<br />
<blockquote>
[Jump Crypto] had become a kind of silent partner for one of the most high-profile projects in crypto, an algorithmic stablecoin called TerraUSD that was meant to maintain a $1 peg through a complex mechanism tied to a related cryptocurrency called Luna—a careful dance that Jump helped coordinate on the backend by fulfilling trades. But despite the bluster of Terra's swaggering founder, Do Kwon, the stablecoin was failing. It had lost its peg.
</blockquote>
Jump Crypto and Do Kwon <a href="https://fortune.com/2024/07/11/jump-trading-kanav-kariya-crypto-terra-do-kwon-disaster">averted the crisis</a>:<br />
<blockquote>
Over the next week, Jump secretly bought up huge tranches of TerraUSD to create the appearance of demand and restore the coin's value to $1, according to court documents. Meanwhile, Kwon "vested" Jump, meaning he agreed to deliver 65 million tokens of Luna to Jump at just $0.40, even though the coin would trade, at times, at more than $90 on exchanges.<br />
<br />
Jump ultimately made $1 billion from that agreement alone
</blockquote>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQCYA-I1GD2_87qcEm75jMuXNdj4aWqC-XpDCQ0_a_nSa1MDU7Ood0kN7tuKxnvjMA8Qpk6jEFT_jkNePo0OF4-WC_YkJQ5QI_6i0T4AhJSEmt0Ouw2QmhryV8AG-5ypiVMPkf08BouviEXodZrYwZenH1_OiaDwTaE-0i5ga7egb2efw3p7Wfn3PjzQ/s929/UST_ALL_graph_coinmarketcap.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="400" data-original-width="929" height="86" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQCYA-I1GD2_87qcEm75jMuXNdj4aWqC-XpDCQ0_a_nSa1MDU7Ood0kN7tuKxnvjMA8Qpk6jEFT_jkNePo0OF4-WC_YkJQ5QI_6i0T4AhJSEmt0Ouw2QmhryV8AG-5ypiVMPkf08BouviEXodZrYwZenH1_OiaDwTaE-0i5ga7egb2efw3p7Wfn3PjzQ/w200-h86/UST_ALL_graph_coinmarketcap.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://coinmarketcap.com/currencies/terrausd/">Terra loses peg</a><br /></td></tr></tbody></table>
Like most financial schemes it could not last, and the longer it lasted <a href="https://fortune.com/2024/07/11/jump-trading-kanav-kariya-crypto-terra-do-kwon-disaster">the bigger the crash</a>:<br />
<blockquote>
These dubious heroics succeeded only in staving off the inevitable: When TerraUSD lost its peg again a year later, there was nothing Jump could do. By May 2022, the cryptocurrency had grown in popularity, and its failure was catastrophic. Some $40 billion in investors' money evaporated into thin air in a matter of days.
</blockquote>
The details of Jump Crypto's involvement with Terra/Luna were revealed because the SEC's case against Terraform Labs and Kwon was based partly on a whistleblower from Jump Crypto. The testimony will probably feature in the criminal case against Kwon, currently awaiting extradition from Montenegro.<br />
David.http://www.blogger.com/profile/14498131502038331594[email protected]3tag:blogger.com,1999:blog-4503292949532760618.post-7690390732561015642024-07-16T08:00:00.000-07:002024-07-16T08:00:00.238-07:00Accelerated Computing<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://i0.wp.com/www.betweentworocks.com/wp-content/uploads/2016/03/oldman.jpg?ssl=1" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="270" data-original-width="480" height="113" src="https://i0.wp.com/www.betweentworocks.com/wp-content/uploads/2016/03/oldman.jpg?ssl=1" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://i0.wp.com/www.betweentworocks.com/wp-content/uploads/2016/03/oldman.jpg?ssl=1">Source</a></td></tr></tbody></table>
One big problem of the economies of the US and the UK is the cult of the CEO, and the resulting flood of CEO hagiographies that appear after a surge in their company's stock price. These aren't harmless fluff pieces, they contribute to a CEO mindset that is profoundly destructive — see <a href="https://blog.dshr.org/2024/05/elon-musk-threat-or-menace-part-5.html">Elon Musk</a> for one example. <a href="https://www.theguardian.com/commentisfree/article/2024/jul/14/the-rich-were-led-to-believe-they-were-different-those-days-are-numbered">Will Hutton writes</a>:<br />
<blockquote>
But decades of being congratulated and indulged for the relentless pursuit of their own self-interest has turned the heads of too many of our successful rich. They really believe that they are different: that they owe little to the society from which they have sprung and in which they trade, that taxes are for little people. We are lucky to have them, and, if anything, owe them a favour.
</blockquote>
Below the fold I continue the "Old man yells at cloud" theme of <a href="https://blog.dshr.org/2024/07/x-window-system-at-40.html">recent</a> <a href="https://blog.dshr.org/2024/07/engineering-for-long-term.html">posts</a> by trying to clarify an aspect of the current Jensen Huang hagiography.<br />
<span><a name='more'></a></span>
<br />
Ed Zitron's must-read <a href="https://www.wheresyoured.at/tss/"><i>The Shareholder Supremacy</i></a> traces the idea of the super-hero CEO revealed by a soaring stock price to:<br />
<blockquote>
the famous <a href="https://en.wikipedia.org/wiki/Dodge_v._Ford_Motor_Co.">Dodge vs. Ford Motor Co.</a> case that would define — and ultimately doom — modern capitalism, and in many ways birth the <a href="https://www.wheresyoured.at/the-rot-economy/">growth-at-all-costs Rot Economy</a>.<br />
<br />
<a href="https://casetext.com/case/dodge-v-ford-motor-co">The Michigan Supreme Court</a> found that "a business corporation is organized and carried on primarily for the profit of the stockholders [and that] the powers of the directors are to be employed for that end," and intimated that cash surpluses should not be saved to invest in upcoming projects, but distributed to shareholders, because Ford had shown that it was good at making money. Ford was directly forbidden from lowering prices and raising employee salaries, and forced to issue a dividend.<br />
<br />
To be clear, the statement around corporations’ duty toward shareholders was made “<a href="https://en.wikipedia.org/wiki/Obiter_dictum">obiter dicta</a>.” This means it was not actually legally binding, despite over a hundred years of people acting as if it was.
</blockquote>
Zitron goes on to detail how "Neutron" Jack Welch destroyed General Electric while being lionized as a super-star CEO. I can testify to his malign influence because, during my time at Sun Microsystems, Scott McNealy was seduced by it.<br />
<br />
Now on to the latest CEO whose soaring stock price has caught the attention of the CEO hagiographers, Jensen Huang. Don't get me wrong. I was there when he was a really good startup CEO, and unlike many others he has grown with the company in a very impressive way.<br />
<br />
In <a href="https://spyglass.org/the-envy-of-nvidia/"><i>The Envy of Everyone</i></a>, M. G. Siegler remarks on:<br />
<blockquote>
this <a href="https://x.com/mgsiegler/status/1803337041024823348">incredibly prescient profile</a> of co-founder and CEO Jensen Huang back in 2017 by Andrew Nusca (in naming him Fortune's 2017 'Businessperson of the Year').
</blockquote>
At the time Siegler <a href="https://x.com/mgsiegler/status/933775680093016064">tweeted</a>:<br />
<blockquote>
“Video games was our killer app — a flywheel to reach large markets funding huge R&D to solve massive computational problems.”<br />
<br />
Genius foresight. Sounds obvious now. Was not then.
</blockquote>
Siegler was commenting on Andrew Nusca's 2017 profile entitled <a href="https://fortune.com/2017/11/16/nvidia-ceo-jensen-huang/"><i>This Man Is Leading an AI Revolution in Silicon Valley—And He’s Just Getting Started</i></a>. As Huang hagiography goes, it was pretty good. The quote in the tweet is from Jensen Huang talking about the early days:<br />
<blockquote>
“We believed this model of computing could solve problems that general-purpose computing fundamentally couldn’t,” Huang says. “We also observed that video games were simultaneously one of the most computationally challenging problems and would have incredibly high sales volume. Those two conditions don’t happen very often. Video games was our killer app—a flywheel to reach large markets funding huge R&D to solve massive computational problems.”
</blockquote>
I don't disagree with what Huang said. Despite the need to focus on gaming, we did have a vague idea that in the future there would be other application areas in which custom accelerators could make an impact. And it is true that Nvidia's VCs, Sutter Hill and Sequoia, gave us the time to develop a multi-generation architecture rather than rushing out a "minimum viable product". I do quibble with the idea that this was "genius foresight".<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdEoBCcbQWpUVPJ6hy4pJ4R-UQ8W00UF0RCinSPks89bfqYZ3G6QByHv0VYnU2VclMzLdq76cS6Le0lJgb-n8IbrJVAfWZF_ABUudK3QkcmMqpH70Ekp8xqcK-O4Fj0np2veBBx8HrWIVRflXe6Q0w2WCeFHlZASvVlS_lWExhB3xHPMpxGFes9Ns8ki2s/s498/SystemDiagram.jpg" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="402" data-original-width="498" height="161" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdEoBCcbQWpUVPJ6hy4pJ4R-UQ8W00UF0RCinSPks89bfqYZ3G6QByHv0VYnU2VclMzLdq76cS6Le0lJgb-n8IbrJVAfWZF_ABUudK3QkcmMqpH70Ekp8xqcK-O4Fj0np2veBBx8HrWIVRflXe6Q0w2WCeFHlZASvVlS_lWExhB3xHPMpxGFes9Ns8ki2s/w200-h161/SystemDiagram.jpg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">90s System Diagram<br /></td></tr></tbody></table>
Even back when I was working with Curtis Priem and Chris Malachowsky on Sun's GX graphics chips the problem we were solving was that the CPU could not write pixels into the framebuffer fast enough for any kind of 3D application. So a chip, then called a graphics chip but now called a GPU, was needed between the CPU and the framebuffer capable of converting a small number of writes from the CPU into a large number of writes to the framebuffer. Designs faced three major performance constraints:<br />
<ul>
<li>The limited bandwidth of the bus carrying instructions from the CPU to the graphics chip. I wrote about how we addressed this constraint in <a href="https://blog.dshr.org/2024/07/engineering-for-long-term.html"><i>Engineering For The Long Term</i></a>.</li>
<li>The limited write bandwidth of the framebuffer.</li>
<li>The limited transistor budget imposed by the chip's cost target.</li>
</ul>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMPqstsWtfLASYMqdm9Zx18OV8zMInvJl3axT4qASYmp6A72o14Usk_GKXclyD0fUBGZXpQCakkOiEC-kcggp2YPdcHRPBgOuup17UoCJ84lIk_enUh0GeF1XGpyKQMkuALHWeEQnZJdQ3KK9OIAMDjUp3tjCe7eCRmIRArEY3iw6wu5qRIAEdCgkFpFQq/s1160/Dedge3d.jpg" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="729" data-original-width="1160" height="126" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMPqstsWtfLASYMqdm9Zx18OV8zMInvJl3axT4qASYmp6A72o14Usk_GKXclyD0fUBGZXpQCakkOiEC-kcggp2YPdcHRPBgOuup17UoCJ84lIk_enUh0GeF1XGpyKQMkuALHWeEQnZJdQ3KK9OIAMDjUp3tjCe7eCRmIRArEY3iw6wu5qRIAEdCgkFpFQq/w200-h126/Dedge3d.jpg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://en.wikipedia.org/wiki/NV1">NV1-based Diamond Edge</a><br /> <a href="https://en.wikipedia.org/wiki/User:Swaaye">Swaaye</a>, <a href="http://creativecommons.org/licenses/by-sa/3.0/">CC-By-SA 3.0</a></td></tr></tbody></table>
Six months after we started Nvidia, we knew of over 30 other companies all trying to build 3D graphics chips for the PC. They fell into two groups. Nvidia and a few others were making <i>fixed-function</i> accelerators, but most were trying to get faster time-to-market by making <i>programmable</i> accelerators in which the functions were implemented in software running on a CPU in the graphics chip.<br />
<br />
One problem for the programmable companies was that the transistors needed to implement the graphic chip's CPU's fetch, decode, execute system were not available to implement the actual graphics functions, such as matrix multiply. A second problem was that the CPU in the graphics chip needed to fetch its instructions forming the program that defined the functions from some memory:<br />
<ul>
<li>It could fetch them from the system memory that the CPU got its data and instructions from. That wasn't a good idea since (a) it required implementing a DMA engine in the graphics chip, and (b) the DMA engine's program fetches would compete for the limited bandwidth of the bus.</li>
<li>It could fetch them from a separate program memory private to the graphic chip. This wasn't a good idea since it added significant cost, both for the separate memory itself and also for the extra pins and complexity of the graphics chip's extra memory port.</li>
<li>It could fetch them from the framebuffer memory. This wasn't a good idea since the program fetches would compete with the limited bandwidth of the framebuffer RAM's random access port. </li>
</ul>
The result was that for many product generations from NV1 the winning graphics chips were all fixed-function. At the time Nvidia was started, a <a href="https://en.wikipedia.org/wiki/Person_having_ordinary_skill_in_the_art">person having ordinary skill in the art</a> should have understood that fixed-function accelerator hardware was the way to go. We were not geniuses.<br />
<br />
Over the years, Moore's Law gradually relaxed the constraints, forcing the design choices to be re-evaluated. As we had expected, the one that relaxed fastest was the transistor budget. The obvious way for the accelerator to exploit the extra transistors was to perform functions in parallel. For parallel applications such as graphics this increased the accelerator advantage over the CPU. But equally important in the competitive market for graphics chips, it sped up the design by making the chip an assembly of many identical units.<br />
<br />
The constraints continued to relax. In 2001 Nvidia had enough transistors and bandwidth to release the <a href="https://en.wikipedia.org/wiki/GeForce_3_series">GeForce 3 series</a> with programmable pixel and vertex shaders. Eventually, various non-graphics communities figured out how to use the increasing programmability of Nvidia's GPUs to accelerate their parallel applications, and Nvidia seized the opportunity to create a software platform with the 2007 release of <a href="https://en.wikipedia.org/wiki/CUDA">CUDA</a>. By greatly simplifying the development of massively parallel applications for Nvidia GPUs, CUDA drove their adoption in many fields, AI being just the latest.<br />
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAN7udL-9jYIISli8q3hHFwg-JvBNj6Wo1vMCI7L3ybLxXcyCvEZ5_JNIviT5ol_7ZUPF-_qYplmrjV5zUV3W4Tn7P_xBDIBCJ3d7bm11JCNrp9_8dwX8oj-JnUsD7qOWctr5GwrHukyAFa7VS-rMWTuCgLtQWdXEQp1Ml16vE5KPPnm1SXyCbo5EFAaw_/s1303/NVDA-LogPrice.png" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="687" data-original-width="1303" height="169" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAN7udL-9jYIISli8q3hHFwg-JvBNj6Wo1vMCI7L3ybLxXcyCvEZ5_JNIviT5ol_7ZUPF-_qYplmrjV5zUV3W4Tn7P_xBDIBCJ3d7bm11JCNrp9_8dwX8oj-JnUsD7qOWctr5GwrHukyAFa7VS-rMWTuCgLtQWdXEQp1Ml16vE5KPPnm1SXyCbo5EFAaw_/s320/NVDA-LogPrice.png" width="320" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://yhoo.it/37Y7noI">Source</a></td></tr></tbody></table>
The Huang hagiography's focus on Nvidia's current stock price is misplaced and ahistorical. It is notoriously volatile. Look at the log plot of the stock price since the IPO. I count eight drops of 45% or more in 25 years, that's average of about one every three years.
One of the questions I asked when interviewing Chris Malachowsky for the <a href="https://blog.dshr.org/2024/04/the-50th-asilomar-microcomputer-workshop.html">50<sup>th</sup> Asilomar Microcomputer Workshop</a> was approximately "how do you manage a company with this much volatility?" His answer was, in effect, "you learn to ignore it".<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiklbf-I2AjzMk51saI1za52NT4n3Os5MKixT8W9IE5zZHi_8KV4Yp4IzKpjm6yjcS6C8lTrubfDSu0KzM7qkcDNfhZ4oVBsGolp6fcRxzPoJLaJynFRieZ0of-Fqn0hZbMZG8wHpX4XHrBf_cA9-kHODpQKl7uW-3MQrXTEi7z9E_n9MmBTfzSzMq8YjSy/s898/SequoiaTablel.png" imageanchor="1" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="291" data-original-width="898" height="65" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiklbf-I2AjzMk51saI1za52NT4n3Os5MKixT8W9IE5zZHi_8KV4Yp4IzKpjm6yjcS6C8lTrubfDSu0KzM7qkcDNfhZ4oVBsGolp6fcRxzPoJLaJynFRieZ0of-Fqn0hZbMZG8wHpX4XHrBf_cA9-kHODpQKl7uW-3MQrXTEi7z9E_n9MmBTfzSzMq8YjSy/w200-h65/SequoiaTablel.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.sequoiacap.com/article/ais-600b-question/">Source</a></td></tr></tbody></table>
David Cahn of Sequoia, one of Nvidia's two VCs, writes in <a href="https://www.sequoiacap.com/article/ais-600b-question/"><i>AI’s $600B Question</i></a>:<br />
<blockquote>
In September 2023, I published <a href="https://www.sequoiacap.com/article/follow-the-gpus-perspective/">AI’s $200B Question</a>. The goal of the piece was to ask the question: “Where is all the revenue?” <br />
<br />
At that time, I noticed a big gap between the revenue expectations implied by the AI infrastructure build-out, and actual revenue growth in the AI ecosystem, which is also a proxy for end-user value. I described this as a <i>“$125B hole that needs to be filled for each year of CapEx at today’s levels.” </i><br />
...<br />
The $125B hole is now a $500B hole: In the last analysis, I generously assumed that each of Google, Microsoft, Apple and Meta will be able to generate $10B annually from new AI-related revenue. I also assumed $5B in new AI revenue for each of Oracle, ByteDance, Alibaba, Tencent, X, and Tesla. Even if this remains true and we add a few more companies to the list, the $125B hole is now going to become a $500B hole.
</blockquote>
Goldman Sachs' provides furtehr skepticism in <a href="https://www.goldmansachs.com/intelligence/pages/gs-research/gen-ai-too-much-spend-too-little-benefit/report.pdf"><i>Gen AI: Too Much Spend, Too Little Benefit?</i></a>:<br />
<blockquote>
Tech giants and beyond are set to spend over $1tn on AI capex in coming years, with so far little to show for it. So, will this large spend ever pay off? MIT’s Daron Acemoglu and GS’ Jim Covello are skeptical, with Acemoglu seeing only limited US economic upside from AI over the next decade and Covello arguing that the technology isn’t designed to solve the complex problems that would justify the costs, which may not decline as many expect.
</blockquote>
Another huge drop in the stock price is sure to be in the offing. How great will the hagiographers think Huang is then?<br />
<br />
<table align="center" border="1" cellpadding="3" cellspacing="5" cols="4" rules="groups">
<thead><tr><th>Company</th><th>Market</th><th>Quarterly</th><th>Employees</th><th>MktCap per</th><th>Income per</th></tr>
<tr><th> </th><th>Cap</th><th>Income</th><th> </th><th>Employee</th><th>Employee</th></tr>
</thead><tbody>
<tr><td align="left">NVDA</td><td align="right">$3T</td><td align="right">$26B</td><td align="right">30K</td><td align="right">$100M</td><td align="right">$867K</td></tr>
<tr><td align="left">GOOG</td><td align="right">$2.3T</td><td align="right">$25B</td><td align="right">185K</td><td align="right">$17M</td><td align="right">$140K</td></tr>
<tr><td align="left">AAPL</td><td align="right">$3.2T</td><td align="right">$28B</td><td align="right">160K</td><td align="right">$20M</td><td align="right">$170K</td></tr>
<tr><td align="left">MSFT</td><td align="right">$3.3T</td><td align="right">$22B</td><td align="right">221K</td><td align="right">$15M</td><td align="right">$100K</td></tr>
</tbody></table>
<br />
Mr. Market will do what Mr. Market does, the stock price isn't under Huang's control. The things that are under Huang's control are the operating profit margin (53%), revenues ($26B/quarter), and the company's incredible efficiency. Nvidia's peers in the $2-3T market cap range have between 5 and 7 times as many employees. As Huang says, Nvidia is the smallest big company.<br />
<br />David.http://www.blogger.com/profile/14498131502038331594[email protected]4tag:blogger.com,1999:blog-4503292949532760618.post-39109636760089526742024-07-11T08:00:00.006-07:002024-07-11T08:00:00.116-07:00More On The HalveningAt the end of May I wrote <a href="https://blog.dshr.org/2024/05/one-heck-of-halvening.html"><i>One Heck Of A Halvening</i></a> about the aftermath of the halving of Bitcoin's block reward on April 19<sup>th</sup>. Six weeks later it is time for a quick update, so follow me below the fold.<br />
<span><a name='more'></a></span>
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuT-2jCqGHt7qR_DkpKnZ9TYW_nuFzfW7EGIEl0s615phZAkVNeOouSXXavSXQC5Ii8zBVIgSqIXpJeDn-vyAGhAsyGx99O1FocG7uQZO8bu0WKx3qlqoMdLYaufkjAQoOss8uwkpoqbxc0emEImhcR3BLlGxDFiTuRYgS473d-nIW-NIkp8b0_na6dJAS/s1200/hash-rate.png" imageanchor="1" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="600" data-original-width="1200" height="100" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuT-2jCqGHt7qR_DkpKnZ9TYW_nuFzfW7EGIEl0s615phZAkVNeOouSXXavSXQC5Ii8zBVIgSqIXpJeDn-vyAGhAsyGx99O1FocG7uQZO8bu0WKx3qlqoMdLYaufkjAQoOss8uwkpoqbxc0emEImhcR3BLlGxDFiTuRYgS473d-nIW-NIkp8b0_na6dJAS/w200-h100/hash-rate.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.blockchain.com/explorer/charts/hash-rate">Source</a></td></tr></tbody></table>
All the graphs in this post are 7-day moving averages, to filter out some of the noise. The first shows what the halvening did to the hash rate. Before the halvening it was around 620EH/s. Except for a spike up to 657EH/s on 26<sup>th</sup> May, after the BTC "price" hit nearly $71.5K, it has hovered around 580EH/s. Since power is the biggest cost, the miners' costs have dropped up to 6.5% since the halvening.<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmsGbb2_nQwkqSYdNfwKVPvZIm1GaOXHWa3wC9Zj8M7TQv2rvt3TTG0ebrlykyzqny5_aFO2LU1xMlJdE5r8Hi383ttGaGD3mrEOXVaEr4ohiFdpLfcu9BCGCXTw9UExBElTVEMorlXG9Diea-U1Y13vuL1St_LDuPnfLsK_h-ImAI13aK7WUV6iJCVhyC/s1200/miners-revenue.png" imageanchor="1" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="600" data-original-width="1200" height="100" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmsGbb2_nQwkqSYdNfwKVPvZIm1GaOXHWa3wC9Zj8M7TQv2rvt3TTG0ebrlykyzqny5_aFO2LU1xMlJdE5r8Hi383ttGaGD3mrEOXVaEr4ohiFdpLfcu9BCGCXTw9UExBElTVEMorlXG9Diea-U1Y13vuL1St_LDuPnfLsK_h-ImAI13aK7WUV6iJCVhyC/w200-h100/miners-revenue.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.blockchain.com/explorer/charts/miners-revenue">Source</a></td></tr></tbody></table>
The second graph is much more dramatic. It shows miners' revenue dropping from around $70M/day before the the halvening to around $30M/day after, a drop of 57%. So with costs down 6.5% and revenue down 57% their margins have taken a huge hit.<br />
<br />
Back in May I <a href="https://blog.dshr.org/2024/05/one-heck-of-halvening.html">wrote</a>:<br />
<blockquote>
Lets start back in October when the Bitcoin "price" was in the high $20Ks. This was a problem, because only the most efficient miners could make a profit at that "price".
</blockquote>
Mysteriously, that was when Tether's money printer started running at full speed, and the "price" got pumped up to around $70K. If I'm right that only the most efficient miners could make money with the "price" in the high $20Ks, and if their (income - costs) has dropped 50%, the most efficient miners need the "price" to be in the mid-$50Ks. Mysteriously, the mid-$50Ks is where the "price" has dropped to, down 21% since its last peak on June 5<sup>th</sup>.<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLOlCwKKzFtPOF2-n9-jooIEWxCv9M8gyh_0Qs47LPmRVbAc7o6chzbm_dW-rNv4hRETS-WzdBHwPApZYIwMvpdrNiyDX_E7Y3H1Poq4kfkS5y8Tl_RJx3iK2-nToU8dT7bpP6PcyiHk3kDbMAaNxxYMjGsINrbU6CpaDthJFUp8Ww1bPdwYHmmApzxZwx/s800/HashRate-052724.png" imageanchor="1" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="400" data-original-width="800" height="100" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLOlCwKKzFtPOF2-n9-jooIEWxCv9M8gyh_0Qs47LPmRVbAc7o6chzbm_dW-rNv4hRETS-WzdBHwPApZYIwMvpdrNiyDX_E7Y3H1Poq4kfkS5y8Tl_RJx3iK2-nToU8dT7bpP6PcyiHk3kDbMAaNxxYMjGsINrbU6CpaDthJFUp8Ww1bPdwYHmmApzxZwx/w200-h100/HashRate-052724.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.blockchain.com/explorer/charts/hash-rate">Source</a></td></tr></tbody></table>
That the hash rate was broadly flat after the halvening is interesting. Before the pre-halvening pump started, with the BTC "price" roughly flat, there was a slow but steady increase in the hash rate reflecting Bitmain's shipments of new, efficient chips displacing a smaller contribution from older chips being turned off. Bitmain's shipments continued, but once the block reward was halved many more of the less efficient chips should have been turned off, and the hash rate reduced. This didn't happen, and I can see two possible explanations:<br />
<ul>
<li>It may be that mining power is highly skewed, with the vast majority coming from the latest chips running on low-cost power which are still profitable after the halvening. Then the shutdown of a huge number of older chips sucked in by the pre-halvening pump would have had only a small reduction in the total hash rate.</li>
<li>It may be that miners are burning their excess profit from the pre-halvening pump by staying in the market rather than <a href="https://pivot-to-ai.com/">pivoting to AI</a>, each hoping to be among the survivors from the eventual cull.</li>
</ul>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzdizVKn5gQOf0Sq4HkTPrW-FrkX_m1D_ald3Cdj7hb-BKNCB6h0l55rdxZ1dEHj2hvzfVoHssGAisa7yTFgKOdTNqCfrv-_e7aphSzGnnDogvB77MR5u7qiDUd3z5Bp71bBBSZkACNJIQ7Kk5Lm7XfJFObA2997PkgZRG7jXWsJQpzQjsXH2zbpvGOJDf/s1200/fees-usd-per-transaction.png" imageanchor="1" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="600" data-original-width="1200" height="100" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzdizVKn5gQOf0Sq4HkTPrW-FrkX_m1D_ald3Cdj7hb-BKNCB6h0l55rdxZ1dEHj2hvzfVoHssGAisa7yTFgKOdTNqCfrv-_e7aphSzGnnDogvB77MR5u7qiDUd3z5Bp71bBBSZkACNJIQ7Kk5Lm7XfJFObA2997PkgZRG7jXWsJQpzQjsXH2zbpvGOJDf/w200-h100/fees-usd-per-transaction.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.blockchain.com/explorer/charts/fees-usd-per-transaction">Source</a></td></tr></tbody></table>
Another feature of the halvening was a massive spike in transaction fees to over $40/transaction. The third graph shows this spike, and a smaller one around the peak in the BTIC "price". But it also shows that right now no-one wants to transact, because the average fee is now $1.72. So the miners are once again almost entirely dependent upon inflating the currency with block rewards.<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiW34vyiWP7De-oShlLa7QrMDLxCJRhyphenhyphenPt6PysCcW1M2orOB-2czL2hDdpPqB8rpkPE2GYs4Ev_OXDDp2fDeK-o5nhc8Vd_G3ea4WZK2-otWRb6EAzd-KjKMGfWwAnXWjRKQ9jvTCf7Zx3SpomeUnNUanviRuMyrw3xwj4VZ8XsAYni7vOsrxFfMqHxdil/s1200/cost-per-transaction.png" imageanchor="1" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="600" data-original-width="1200" height="100" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiW34vyiWP7De-oShlLa7QrMDLxCJRhyphenhyphenPt6PysCcW1M2orOB-2czL2hDdpPqB8rpkPE2GYs4Ev_OXDDp2fDeK-o5nhc8Vd_G3ea4WZK2-otWRb6EAzd-KjKMGfWwAnXWjRKQ9jvTCf7Zx3SpomeUnNUanviRuMyrw3xwj4VZ8XsAYni7vOsrxFfMqHxdil/w200-h100/cost-per-transaction.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.blockchain.com/explorer/charts/cost-per-transaction">Source</a></td></tr></tbody></table>
The last graph shows the total cost of a transaction. It shows that the fee spike around the "price" peak made little difference, The current average cost per transaction is $48.57, of which $1.72 is the fee. So the system is 96.5% supported by inflation; there is currently no risk of the dangers associated with <a href="https://blog.dshr.org/2024/05/fee-only-bitcoin.html"><i>Fee-Only Bitcoin</i></a>.<br />
<br />
David.http://www.blogger.com/profile/14498131502038331594[email protected]5tag:blogger.com,1999:blog-4503292949532760618.post-23338256682327611362024-07-09T08:00:00.000-07:002025-01-05T12:38:16.607-08:00Engineering For The Long Term<div style="text-align: center;"><b>Content Warning</b>: this post contains blatant self-promotion.<br /></div>
<br />
Contributions to engineering fields can only reasonably be assessed in hindsight, by looking at how they survived exposure to the real world over the long term.
Four of my contributions to various systems have stood the test of time.
Below the fold, I blow my own horn four times.<br />
<span><a name='more'></a></span>
<br />
<h3>Four Decades</h3>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiat-e511fHw4JxMILSMVfjS1u9j8jb0MFSPnAYxLdN0aWvUiBGFcnCtmRmoxhZztkH9fEG85LNRlObB3pXkSGKps1tIZbpfR_pJS9-_rQLEDGeXyjW9qP806Hs3dTGg7dbxHlThdqVH6myYQMmBdxcGSTRPXxWJk3-zyuOsgabtxpeRqwj-K2skxGvNt8Y/s2048/X11R1.jpg" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="1536" data-original-width="2048" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiat-e511fHw4JxMILSMVfjS1u9j8jb0MFSPnAYxLdN0aWvUiBGFcnCtmRmoxhZztkH9fEG85LNRlObB3pXkSGKps1tIZbpfR_pJS9-_rQLEDGeXyjW9qP806Hs3dTGg7dbxHlThdqVH6myYQMmBdxcGSTRPXxWJk3-zyuOsgabtxpeRqwj-K2skxGvNt8Y/w200-h150/X11R1.jpg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">X11R1 on a Sun/1<br /></td></tr></tbody></table>
Wikipedia has a pretty good history of the early days of the <a href="https://en.wikipedia.org/wiki/X_Window_System#Origin_and_early_development">X Window System</a>.
In <a href="https://blog.dshr.org/2024/07/x-window-system-at-40.html"><i>The X Window System At 40</i></a> I detailed my contributions to the early development of X. To my amazement 40 years after Bob Scheifler's initial release it is still valiantly resisting obsolescence. I contributed to the design, implementation, testing, release engineering and documentation of X11 starting a bit over 39 years ago. At least my design for how X handles keyboards is still the way it works.<br />
<br />
All this while I was also working on a competitor, Sun's NeWS — which didn't survive the test of time.<br />
<h3>Nearly Three-and-a-Half Decades</h3>
One of the things I really enjoyed about working on NeWS was that the PostScript environment it implemented was object-oriented, a legacy of PostScript's origins at Xerox PARC. Owen Densmore and I developed <a href="https://doi.org/10.1111/j.1467-8659.1987.tb00537.x"><i>A User‐Interface Toolkit in Object‐Oriented PostScript</i></a> that made developing NeWS applications very easy, provided you were comfortable with an object-oriented programming paradigm.<br />
<br />
I think it was sometime in 1988 while working on the SunOS 4.0 kernel that I realized that the BSD Vnode interface was in a loose sense object-oriented. It defines the interface between the file system and the rest of the kernel.
An instance of BSD's type <tt>vnode</tt> consisted of some instance data and a pointer to an "ops vector" that defined its class via an array of methods (function pointers). But it wasn't object-oriented enough to, for example, implement inheritance properly.<br />
<br />
This flaw had led to some inelegancies as the interface had evolved through time, but what interested me more was the potential applications that would be unleashed if the interface could be made properly object-oriented. Instead of being implemented from scratch, file systems could be implemented by sub-classing other file systems. For example, a read-only file system such as a CD-ROM could be made writable by "stacking" a cache file system on top, as shown in Figure 11. I immediately saw the possibility of significant improvements in system administration that could flow from stacking file systems.<br />
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgv4C-oX40JzuQgtm-YdWn7r_Gk3YMmp19r5PR83bKUkNeGg_rg8kcjhvi7iDwHQUy6prxpXjevsgsntp8rMWl8bmpToYCXEXjDQbht476zNMkB0Mxq8SIf0u8hIWhvadhip5tLVGGvvgZkMk0uBpBI995_niUFzWh0xOS8mGKVk_A992_MJGucUADXpGw/s767/Figure-11.png" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="767" data-original-width="615" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgv4C-oX40JzuQgtm-YdWn7r_Gk3YMmp19r5PR83bKUkNeGg_rg8kcjhvi7iDwHQUy6prxpXjevsgsntp8rMWl8bmpToYCXEXjDQbht476zNMkB0Mxq8SIf0u8hIWhvadhip5tLVGGvvgZkMk0uBpBI995_niUFzWh0xOS8mGKVk_A992_MJGucUADXpGw/s320/Figure-11.png" width="257" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.abitare.org/papers/StackingVnodes.pdf">Evolving the Vnode Interface: Fig. 11</a></td></tr></tbody></table>
I started building a prototype by performing major surgery on a copy of the code that would become SunOS 4.1. By late 1989 it worked well enough to demonstrate the potential of the idea, so I published 1990's <a href="https://www.abitare.org/papers/StackingVnodes.pdf"><i>Evolving the Vnode Interface</i></a>. The paper describes a number of Vnode modules that can be stacked together to implement interesting functions. Among them was cache-fs, which layered a writable local file system above a local or remote read-only file system:<br />
<blockquote>
This simple module can use any file system as a file-level cache for any other (read-only) file system. It has no knowledge of the file systems it is using; it sees them only via their opaque vnodes. Figure 11 shows it using a local writable ufs file system to cache a remote read-only NFS file system, thereby reducing the load on the server. Another possible configuration would be to use a local writable ufs file system to cache a CD-ROM, obscuring the speed penalty of CD.
</blockquote>
Over the next quarter-century the idea of stacking vnodes and the related idea of "union mounts" from <a href="https://www.usenix.org/legacy/publications/compsystems/1995/sum_pike.pdf">Rob Pike and Plan 9</a> churned around until, in October 2014, <a href="https://github.com/torvalds/linux/commit/e9be9d5e76e34872f0c37d72e25bc27fe9e2c54c">Linus Torvalds added overlayfs to the 3.18 kernel</a>. I covered the details of this history in 2015's <a href="https://blog.dshr.org/2015/02/it-takes-longer-than-it-takes.html"><i>It takes longer than it takes</i></a>. In it I quoted from Valerie Aurora's <a href="http://lwn.net/Articles/324291/">excellent</a> <a href="http://lwn.net/Articles/325369/">series</a> of <a href="http://lwn.net/Articles/327738/">articles</a> about the architectural and implementation difficulties involved in adding union mounts to the Linux kernel. I concurred with her statement that:<br />
<blockquote>
The consensus at the <a href="http://lwn.net/Articles/327601/">2009 Linux file systems workshop</a> was that stackable file systems are conceptually elegant, but difficult or impossible to implement in a maintainable manner with the current VFS structure. My own experience writing a stacked file system (an in-kernel chunkfs prototype) leads me to agree with these criticisms.
</blockquote>
I <a href="https://blog.dshr.org/2015/02/it-takes-longer-than-it-takes.html">wrote</a>:<br />
<blockquote>
Note that my original paper was only incidentally about union mounts, it was a critique of the then-current VFS structure, and a suggestion that stackable vnodes might be a better way to go. It was such a seductive suggestion that it took nearly two decades to refute it!
</blockquote>
Nevertheless, the example I used in <a href="https://www.abitare.org/papers/StackingVnodes.pdf"><i>Evolving the Vnode Interface</i></a> of a use for stacking vnodes was what persisted. It took a while for the fact that overlayfs was an official part of the Linux kernel to percolate through the ecosystem, but after six years I was able to write <a href="https://blog.dshr.org/2021/12/blatant-self-promotion.html#more"><i>Blatant Self-Promotion</i></a> about the transformation it wrought on Linux's packaging and software distribution, inspired by Liam Proven's <a href="https://www.theregister.com/2021/12/03/nixos_linux_os_design/"><i>NixOS and the changing face of Linux operating systems</i></a>. He writes about less radical ideas than NixOS:<br />
<blockquote>
So, instead of re-architecting the way distros are built, vendors are reimplementing similar functionality using simpler tools inherited from the server world: containers, squashfs filesystems inside single files, and, for distros that have them, copy-on-write filesystems to provide rollback functionality.<br />
<br />
The goal is to build operating systems as robust as mobile OSes: periodically, the vendor ships a thoroughly tested and integrated image which end users can't change and don't need to. In normal use, the root filesystem is mounted read-only, and there's no package manager.
</blockquote>
Since then this model has become universal. Distros ship as a bootable ISO image, which uses overlayfs to mount a writable temporary file system on top. This is precisely how my 1989 prototype was intended to ship SunOS 4.1. The technology has spread to individual applications with systems such as <a href="https://en.wikipedia.org/wiki/Snap_(software)">Snaps</a> and <a href="https://en.wikipedia.org/wiki/Flatpak">Flatpak</a>.<br />
<h3>Three Decades</h3>
The opportunity we saw when we started Nvidia was that the PC was transitioning from the <a href="https://en.wikipedia.org/wiki/Industry_Standard_Architecture">ISA bus</a> to version 1 of the <a href="https://en.wikipedia.org/wiki/Peripheral_Component_Interconnect">PCI bus</a>. The ISA bus' bandwidth was completely inadequate for 3D games, but the PCI bus had considerably more. Whether it was enough was an open question. We clearly needed to make the best possible use of the limited bandwidth we could get.<br />
<br />
Nvidia's first chip had three key innovations:<br />
<ol>
<li>Rendering objects with quadric patches not triangles. A realistic model using quadric patches needed perhaps a fifth of the data for an equivalent triangle model.</li>
<li>I/O virtualization with applications using a write-mostly, object-oriented interface. Read operations are neccessarily synchronous, whereas write operations are asynchronous. Thus the more writes per read across the bus, the better the utilization of the available bus bandwidth.</li>
<li>A modular internal architecture based on an on-chip token-ring network. Thie goal was that each functional unit be simple enough to be designed and tested by a three-person team.</li>
</ol>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUekTL7ri6B9cxWc-tqs20vIkYvuZFl_ypQsQFRr76bucjLxne1U6rIa2iUKc2j6tZYhHCi7y22GYQQEEz4_Z2DauOdsVDMVwYAEsvpJEDfGMUliWdsLi3xQUeYJ6sUc_ftJUbuWqQME_B/s526/NV1.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="356" data-original-width="526" height="136" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUekTL7ri6B9cxWc-tqs20vIkYvuZFl_ypQsQFRr76bucjLxne1U6rIa2iUKc2j6tZYhHCi7y22GYQQEEz4_Z2DauOdsVDMVwYAEsvpJEDfGMUliWdsLi3xQUeYJ6sUc_ftJUbuWqQME_B/w200-h136/NV1.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">SEGA's <i>Virtua Fighter</i> on NV1</td></tr></tbody></table>
The first two of these enabled us to get Sega's arcade games running at full frame rate on a PC. Curtis Priem and I designed the second of these, and it is the one that has lasted:<br />
<ul>
<li>I/O virtualization allowed multiple processes direct access to the graphics hardware, with no need to pass operations through the operating system. I explained the importance of this a decade ago in <a href="https://blog.dshr.org/2014/12/hardware-io-virtualization.html"><i>Hardware I/O Virtualization</i></a>, using the example of Amazon building their own network interface cards. Tne first chip appeared on the bus as having 128 wide FIFOs. The operating system could map one of them into each process wanting access to the chip, allowing applications direct access to the hardware but under the control of the operating system.</li>
<li>The interface was write-mostly because the application could read from the FIFO the number of free slots, that is the number of writes before the bus would stall.</li>
<li>The interface was object-oriented because the data and the offset in the FIFO formed an invocation of a method on an instance of a (virtual) class. Some classes were implemented in hardware, others trapped into the kernel and were implemented by the driver, but the application just created and used instances of the available classes without knowing which was which. The classes were arranged in a hierarchy starting with class CLASS. Enumerating the instances of class CLASS told the application which classes it could use. Enumerating the instances of each of those classes told the application how many of each type of resource it could use.</li>
</ul>
The importance of the last of these was that it decoupled the hardware and software release schedules. Drivers could emulate classes that had yet to appear in hardware, the applications would use the hardware once it was available. Old software would run on newer hardware, it would just see some classes it didn't know how to use. One of our frustrations with Sun was the way software and hardware release schedules were inextricably interlinked.<br />
<h3>Two-and-a-Half Decades</h3>
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsW7x_4i-TUwFG6xNVH2q_nk5jXabNhRGxUbnEeDV6vKapZoAmu9eDP1JY4Oavw508eDSbFy734Gxb2crvCI-eAQVjL-3LjYp0olWhqIR4OM6AhehgFJTKFxrKEdrLJHUOdsrPCeODqpu4dVDUT2sggb73rBj_EomjFI1YirWH2THzPUgP4_KwTIDX1Q/s151/LOCKSS.logo.png" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" data-original-height="151" data-original-width="151" height="151" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsW7x_4i-TUwFG6xNVH2q_nk5jXabNhRGxUbnEeDV6vKapZoAmu9eDP1JY4Oavw508eDSbFy734Gxb2crvCI-eAQVjL-3LjYp0olWhqIR4OM6AhehgFJTKFxrKEdrLJHUOdsrPCeODqpu4dVDUT2sggb73rBj_EomjFI1YirWH2THzPUgP4_KwTIDX1Q/s151/LOCKSS.logo.png" width="151" /></a></div>
Last October I celebrated the <a href="https://blog.dshr.org/2023/10/lockss-program-turns-25.html"><i>LOCKSS Program Turns 25</i></a>. Vicky Reich explained to me how libraries preserved paper academic journals and how their move to the Web was changing libraries role from purchasing a copy of the journal to renting access to the publisher's copy, and I came up with the overall peer-to-peer archtecture (and the acronym). With help from Mark Seiden I built the prototype, and after using it to demonstrate the feasibility of the concept, also used it to show vulnerabilities in the initial protocol. In 2003 I was part of the team that solved these problems, for which we were awarded the Best Paper award at the Symposium on Operating System Principles for <a href="http://dx.doi.org/10.1145/945445.945451"><i>Preserving peer replicas by rate-limited sampled voting</i></a>.<br />
<br />
David.http://www.blogger.com/profile/14498131502038331594[email protected]7tag:blogger.com,1999:blog-4503292949532760618.post-5081903415894675152024-07-02T08:00:00.000-07:002024-07-04T06:58:45.863-07:00X Window System At 40<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjugloP1HPLwtxYvoylM9isbZ44FMNJOxviLxZTji8sGYsOm1mWnlscBHWBWG0YPcfJdHxjdMUnHqe77GllQtr4qSKA1IH3M0UknGk3HuCgLrckoLtrsR7w25_xvbcBY4BIhpNNz-N2Aw8dS98pssJHBfSdkA0c-NNNSJMEfwzfpqPp5LJyfHzrZ5QwLPy4/s2048/X11R1.jpg" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="1536" data-original-width="2048" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjugloP1HPLwtxYvoylM9isbZ44FMNJOxviLxZTji8sGYsOm1mWnlscBHWBWG0YPcfJdHxjdMUnHqe77GllQtr4qSKA1IH3M0UknGk3HuCgLrckoLtrsR7w25_xvbcBY4BIhpNNz-N2Aw8dS98pssJHBfSdkA0c-NNNSJMEfwzfpqPp5LJyfHzrZ5QwLPy4/w200-h150/X11R1.jpg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">X11R1 on Sun<br /><a href="https://en.wikipedia.org/wiki/X_Window_System#/media/File:X11R1.jpg">Techfury90 CC0</a></td></tr></tbody></table>
I apologize that this post is a little late. On 19<sup>th</sup> June the X Window System celebrated its 40th birthday. Wikipedia has a comprehensive <a href="https://en.wikipedia.org/wiki/X_Window_System#History">history of the system</a> including the e-mail Bob Scheifler sent announcing the first release:<br />
<small>
<pre>From: rws@mit-bold (Robert W. Scheifler)
To: window@athena
Subject: window system X
Date: 19 June 1984 0907-EDT (Tuesday)
I've spent the last couple weeks writing a window
system for the VS100. I stole a fair amount of code
from W, surrounded it with an asynchronous rather
than a synchronous interface, and called it X. Overall
performance appears to be about twice that of W. The
code seems fairly solid at this point, although there are
still some deficiencies to be fixed up.
We at LCS have stopped using W, and are now
actively building applications on X. Anyone else using
W should seriously consider switching. This is not the
ultimate window system, but I believe it is a good
starting point for experimentation. Right at the moment
there is a CLU (and an Argus) interface to X; a C
interface is in the works. The three existing
applications are a text editor (TED), an Argus I/O
interface, and a primitive window manager. There is
no documentation yet; anyone crazy enough to
volunteer? I may get around to it eventually.
Anyone interested in seeing a demo can drop by
NE43-531, although you may want to call 3-1945
first. Anyone who wants the code can come by with a
tape. Anyone interested in hacking deficiencies, feel
free to get in touch.
</pre>
</small>
Scheifler was right that it was a "good starting point for experimentation", but it wasn't really a usable window system until version 11 was released on 15<sup>th</sup> September 1987. I was part of the team that burned the midnight oil at MIT to get that release out, but my involvement started in late 1985.<br />
<br />
Below the fold are some reflections on my contributions, some thoughts on the astonishing fact that the code is still widely deployed after 40 years, and some ideas on why it has been so hard to replace.<br />
<span><a name='more'></a></span>
<br />
<h3>Involvement</h3>
I arrived at Sun in September 1985 to work with James Gosling on a window system for Sun's workstations. We had worked together developing the window system for Carnegie-Mellon's <a href="https://dl.acm.org/doi/10.1145/5666.5671">Andrew</a> project. We both realized that, if Unix and Unix workstations like Sun's were to succeed, they had to have a widely adopted window system. Ideally, we thought, it would have three key attributes:<br />
<ul>
<li>An <b>imaging model</b> at a higher level than simply a grid of pixels, so that applications didn't have to adapt to varying screen resolutions. The clear favorite was <a href="https://en.wikipedia.org/wiki/PostScript">Adobe PostScript</a>'s, which had appeared on the Apple LaserWriter in <a href="https://en.wikipedia.org/wiki/PostScript#History">January 1985</a>.</li>
<li><b>Networking</b>, so that applications could run wherever it made sense with their user interface where the user was. In the mid-80s both workstations and networks were slow, running a window system was a big load on a Motorola 68000. Having two CPUs working on an application, the client-server model, helped.</li>
<li><b>Programmability</b>, because it was hard to provide a good user experience if there was a slow network round-trip required for each response to a user action. If the window system were programmable, the code that responded to the user's actions could run on the user's workstation, eliminating the network round-trip.</li>
</ul>
Gosling had left C-MU some months earlier. He was adamant that it was possible to implement PostScript on a 68000 fast enough to be a window system. Adding networking, mouse and keyboard extensions to PostScript would satisfy all three of our requirements. Because Adobe's PostScript in the 68000-based LaserWriter was notoriously slow I was skeptical, but I should have known better than to doubt his coding skills. A couple of months later when Gosling showed me a prototype PostScript interpreter running incredibly fast on a <a href="https://en.wikipedia.org/wiki/Sun-1">Sun/1</a>, I was convinced to join him on what became the <a href="https://en.wikipedia.org/wiki/NeWS">NeWS project</a>.<br />
<br />
Once at Sun I realized that it was more important for the company that the Unix world standardized on a single window system than that the standard be Sun's NeWS system. At C-MU I had already looked into X as an alternative to the Andrew window system, so I knew it was the obvious alternative to NeWS. Although most of my time was spent developing NeWS, I rapidly ported X version 10 to the Sun/1, likely the second port to non-DEC hardware. It worked, but I had to kludge several areas that depended on DEC-specific hardware. The worst was the completely DEC-specific keyboard support.<br />
<br />
Because it was clear that a major redesign of X was needed to make it portable and in particular to make it work well on Sun hardware, Gosling and I worked with the teams at DEC SRC and WRL on the design of X version 11. Gosling provided significant input on the imaging model, and I designed the keyboard support. As the implementation evolved I maintained the Sun port and did a lot of testing and bug fixing. All of which led to my trip to Boston to pull all-nighters at MIT finalizing the release.<br />
<br />
My involvement continued after the first release. I was the editor and main author of the X Inter-Client Communications Conventions Manual (ICCCM) that forms Part III of Robert Scheifler and Jim Gettys' <a href="https://search.worldcat.org/title/29985888"><i>X Window System</i></a>. A user's X environment consists of a set of client applications, an X server managing displays and input devices, and a <b>window manager</b> application implementing a user interface that allows the user to allocate the server's resources such as windows to the clients. The window manager needs to communicate the resource allocations to the clients, and the clients need to communicate between themselves to support, for example, cut-and-paste. The <a href="https://search.worldcat.org/title/29985888">ICCCM explains its scope thus</a>:<br />
<blockquote>
Being a good citizen in the X Version 11 world involves adhering to conventions that govern inter-client communications in the following ares:<br />
<ul>
<li>Selection mechanism</li>
<li>Cut buffers</li>
<li>Window manager</li>
<li>Session manager</li>
<li>Manipulation of shared resources</li>
<li>Device color characterization</li>
</ul>
This part of the book proposes suitable conventions without attempting to enforce any particular user interface.
</blockquote>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://imgs.xkcd.com/comics/code_lifespan.png" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="307" data-original-width="377" height="163" src="https://imgs.xkcd.com/comics/code_lifespan.png" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://xkcd.com/2730">xkcd 2730</a><br /></td></tr></tbody></table>
There is a certain justice in <a href="https://web.mit.edu/~simsong/www/ugh.pdf">The UNIX-HATERS Handbook</a>'s description of my efforts:<br />
<blockquote>
one of the most amazing pieces of literature to come out of the X Consortium is the “Inter Client Communication Conventions Manual,” ... It describes protocols that X clients must use to communicate with each other via the X server, including diverse topics like window management, selections, keyboard and colormap focus, and session management. In short, it tries to cover everything the X designers forgot and tries to fix everything they got wrong. But it was too late—by the time ICCCM was published, people were already writing window managers and toolkits, so each new version of the ICCCM was forced to bend over backwards to be backward compatible with the mistakes of the past.
</blockquote>
<a href="https://en.wikipedia.org/wiki/James_H._Morris">Jim Morris</a>, who ran the <a href="http://www.cmu.edu/corporate/news/2007/features/andrew/index.shtml">Andrew project at C-MU</a>,
was very wise about what we were getting into: "We're either going to have a disaster, or a success disaster". He often added: "And I know which I prefer!". Jim was exaggerating to make two points:<br />
<ul>
<li>Being a success didn't mean the problems were over, it meant a different set of problems.</li>
<li>Ignoring the problems of success was a good way of preventing it.</li>
</ul>
X11 was definitely a "success disaster".<br />
<h3>Why X not NeWS?</h3>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUwPK1UJfagQeXNTr2AO-VJ8lrgCDca3mNsUigCXEHVePFdW3O6R420R55rng4of42q2v7hjb0PMikk5DvUHTCHdFLd6yYMLwn2U7oOAslEEIsZwAR4EM3RSx-E6Q_kq0SsYAJDl4VZgg7jC4xYZJEZo07KIqbnksk9sI_WuM1bZp-_zrutJQyEWMCLoYY/s790/HyperTIESAuthoring.jpeg" style="clear: right; display: block; margin-left: auto; margin-right: auto; padding: 1em 0px; text-align: center;"><img alt="" border="0" data-original-height="644" data-original-width="790" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUwPK1UJfagQeXNTr2AO-VJ8lrgCDca3mNsUigCXEHVePFdW3O6R420R55rng4of42q2v7hjb0PMikk5DvUHTCHdFLd6yYMLwn2U7oOAslEEIsZwAR4EM3RSx-E6Q_kq0SsYAJDl4VZgg7jC4xYZJEZo07KIqbnksk9sI_WuM1bZp-_zrutJQyEWMCLoYY/s200/HyperTIESAuthoring.jpeg" width="200" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">NeWS <a href="https://en.wikipedia.org/wiki/NeWS#/media/File:HyperTIESAuthoring.jpg">Xardox<br />Public Domain</a></td></tr></tbody></table>
NeWS was amazing technology, providing each of our requirements with usable performance on a 68000. Its interpreter was a clean-room implementation of PostScript from the "<strike>Blue</strike>Red Book", with extensions that provided cooperative multi-threading, networking, arbitrary-shaped translucent windows, and a fully object-oriented toolkit. Steve Jobs agreed with us that PostScript was the right imaging model, although the <a href="https://en.wikipedia.org/wiki/Display_PostScript">Display PostScript</a> interpreter he licensed from Adobe for the <a href="https://en.wikipedia.org/wiki/NeXTSTEP">NextSTEP</a> window system was far more restricted. The overwhelming success of <a href="https://en.wikipedia.org/wiki/JavaScript">JavaScript</a> has validated our argument for programmability. So why did X11 take over the world? My view is that there are three main arguments, any one of which would have been decisive:<br />
<ul>
<li>We and Jobs were wrong about the imaging model, for at least two reasons. First, early on pixels were in short supply and applications needed to make the best use of the few they were assigned. They didn't want to delegate control to the PostScript interpreter. Second, later on came GPUs with 3D imaging models. The idea of a one-size-fits-all model became obsolete. The reason that Wayland should replace X11 is that it is agnostic to the application's choice of imaging model.</li>
<li>Although we were right about the need for programmability, PostScript was the wrong language. Even back in 1985 Gosling and I were veteran programmers, with experience in many languages including not just C and Assembler, but also <a href="https://en.wikipedia.org/wiki/Lisp_(programming_language)">LISP</a>, <a href="https://en.wikipedia.org/wiki/Prolog">Prolog</a> and <a href="https://en.wikipedia.org/wiki/Smalltalk">Smalltalk</a>. We didn't find PostScript's <a href="https://en.wikipedia.org/wiki/Stack-oriented_programming">stack-based</a> language intimidating. But already by that time Darwinian evolution had focused CS education on C-like languages, so the majority of application programmers were intimidated. And NeWS wasn't just <i>stack-oriented</i>, it was also <i>object-oriented</i> and <i>multi-threaded</i>, and none of these were optional, making it even more intimidating. In a sense NeWS was an echo of the success of Sun in the early days — a bunch of really good engineers building the system <i>they</i> wanted to use, not one for the mass market.</li>
<li>A major reason for Sun's early success was that they in effect open-sourced the <a href="https://en.wikipedia.org/wiki/Network_File_System">Network File System</a>. X11 was open source under the MIT license. I, and some of the other Sun engineers, understood that NeWS could not displace X11 as the Unix standard window system without being equally open source. But Sun's management looked at NeWS and saw superior technology, an extension of the PostScript that Adobe was selling, and couldn't bring themselves to give it away. But they also couldn't ignore the fact that X11 was popular with their customer base, who could run the MIT X11 environment any time they wanted. The result was the ghastly kludge called the <a href="https://en.wikipedia.org/wiki/Xnews_(X11_server)">Xnews server</a>, a monument to the inability of Sun to follow McNealy's "all the wood behind one arrow" dictum. Wikipedia <a href="https://en.wikipedia.org/wiki/Xnews_(X11_server)">correctly notes that</a>:<br />
<blockquote>
This seriously degraded the NeWS interpreter performance and was not considered a very good X11 server either.
</blockquote></li>
</ul>
<h3>Longevity</h3>
The anniversary bought forth several commentaries on its extraordinary longevity, including:<br />
<ul>
<li>Richard Speed's <a href="https://www.theregister.com/2024/06/21/x_window_system_is_40/"><i>The X Window System is still hanging on at 40</i></a> is aptly subtitled "Never underestimate the stickiness of legacy technology" and concludes:<br /> <blockquote> <a href="https://www.theregister.com/2022/06/22/the_x_window_system_just/">In 2022, we wondered</a> if "Wayland has what it takes to replace X." Two years later, the question is still open, although the direction of travel is clear. Yet the stickiness of "it just works" is not to be underestimated, and we would not be surprised if the 50th anniversary rolls around and there is still someone clinging to X11 for that one old app that won't run properly on anything else.
</blockquote>
This is very likely. In order to displace X11, Wayland had to be <a href="https://en.wikipedia.org/wiki/Wayland_(protocol)#Compatibility_with_X">compatible with it</a> via the <a href="https://en.wikipedia.org/wiki/XWayland">XWayland</a> server. So there is little motivation to rewrite existing applications to use Wayland directly.</li>
<li>Kevin Purdy's <a href="https://arstechnica.com/gadgets/2024/06/the-x-window-system-is-40-archaic-as-heck-and-still-relevant/"><i>40 years later, X Window System is far more relevant than anyone could guess</i></a> starts:<br />
<blockquote>
Often times, when I am researching something about computers or coding that has been around a very long while, I will come across a document on a university website that tells me more about that thing than any Wikipedia page or archive ever could.<br />
<br />
It's usually a PDF, though sometimes a plaintext file, on a .edu subdirectory that starts with a username preceded by a tilde (~) character. This is typically a document that a professor, faced with the same questions semester after semester, has put together to save the most time possible and get back to their work. I recently found such a document inside Princeton University's astrophysics department: "<a href="https://www.astro.princeton.edu/~strauss/AST303/Xintro.pdf">An Introduction to the X Window System</a>," written by <a href="https://web.astro.princeton.edu/people/robert-lupton">Robert Lupton</a>.<br />
<br />
X Window System, which <a href="https://www.talisman.org/x-debut.shtml">turned 40 years old earlier this week</a>, was something you had to know how to use to work with space-facing instruments back in the early 1980s, when <a href="https://en.wikipedia.org/wiki/VT100">VT100s</a>, <a href="https://en.wikipedia.org/wiki/VAX-11">VAX-11/750s</a>, and Sun Microsystems boxes would share space at college computer labs. As the member of the AstroPhysical Sciences Department at Princeton who knew the most about computers back then, it fell to Lupton to fix things and take questions.
</blockquote>
I really like <a href="https://arstechnica.com/gadgets/2024/06/the-x-window-system-is-40-archaic-as-heck-and-still-relevant/">Lupton's assessment</a>:<br />
<blockquote>
"It worked, at least relative to the other options we had," Lupton said. He noted that Princeton's systems were not "heavily networked in those days," such that the network traffic issues some had with X weren't an issue then. "People weren't expecting a lot of GUIs, either; they were expecting command lines, maybe a few buttons... it was the most portable version of a window system, running on both a VAX and the Suns at the time... it wasn't bad."
</blockquote>
Purdy quotes Evan Jenkins from <a href="https://arstechnica.com/information-technology/2011/03/the-linux-graphics-stack-from-x-to-wayland/"><i>thirteen years ago</i></a>:<br />
<blockquote>
X is the oldest lady at the dance, and she insists on dancing with everyone. X has millions of lines of source, but most of it was written long ago, when there were no GPUs, and no specialized transistors to do programmable shading or rotation and translation of vertexes. The hardware had no notion of oversampling and interpolation to reduce aliasing, nor was it capable of producing extremely precise color spaces. The time has come for the old lady to take a chair.
</blockquote></li>
</ul>
There hasn't been an official release of X11 for <i>twelve years</i>, but it is proving very hard to kill off.<br />David.http://www.blogger.com/profile/14498131502038331594[email protected]13