Podchaser Logo
Home
More Top Tech Stories of 2019

More Top Tech Stories of 2019

Released Wednesday, 1st January 2020
 1 person rated this episode
More Top Tech Stories of 2019

More Top Tech Stories of 2019

More Top Tech Stories of 2019

More Top Tech Stories of 2019

Wednesday, 1st January 2020
 1 person rated this episode
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:04

Welcome to Tech Stuff, a production of

0:06

I Heart Radios How Stuff Works. Hey

0:12

there, and welcome to Tech Stuff. I'm your host,

0:14

Jonathan Strickland. I'm an executive producer

0:16

with I Heart Radio and I love all things

0:19

tech. And we are continuing

0:21

on our look back on the big text

0:23

stories of twenty nineteen. Now,

0:25

the last episode was all about bummers.

0:28

This one is only mostly about

0:31

bummers. But don't blame me. I

0:33

didn't make the news. Also,

0:36

I should point out that, of course I'm

0:38

just giving kind of a high level overview

0:40

of stuff that happened in twenty nineteen, because

0:42

to cover everything that happened in tech would

0:45

be beyond even my impressive capabilities.

0:48

And I should also add that I've

0:50

got some updates to stuff what happened

0:53

in the last episode, because, as

0:55

it turns out, when I recorded part one and

0:58

when I'm recording part two, time

1:00

past and stuff continue to

1:02

develop. That's how news works, and

1:04

I resent it. But one story I do

1:07

need to follow up on broke between

1:09

that time and that was that Dennis

1:12

Muhlenberg, the CEO of Boeing,

1:15

resigned from Boeing as

1:17

the company was dealing with the consequences of

1:19

the seven thirty seven max fleet being

1:21

grounded, among other problems

1:24

at the company. Generally speaking, analyst

1:26

said that his stepping down was sort of a necessary

1:28

part of Boweing regaining confidence

1:31

among customers and shareholders. Not

1:33

that all blame should be put on the CEOs

1:35

shoulders, but that this was one

1:37

of those steps a company has to take in

1:40

order to convince people, hey, we

1:42

are really taking this seriously and

1:44

we need to make some changes. Now.

1:47

The next two stories that I want

1:49

to talk about are related, and they

1:51

are both extremely dark and

1:54

upsetting, but I also feel they

1:56

are important to acknowledge and consider.

1:59

And for some of you you might feel as though

2:01

I'm going to get really preachy

2:03

about this. I am not going to apologize

2:06

for that in this case. Now,

2:08

the first dark story is about March

2:10

fifteen, two thousand nineteen. That

2:13

was when a gunman carried out attacks on

2:15

two different mosques in christ Church,

2:17

New Zealand, killing fifty one

2:19

people and injuring another forty

2:21

nine. Now, the reason the story gets

2:24

included in tech news is

2:26

that the gunman streamed the attack

2:28

on the first mosque over on

2:30

Facebook Live. Other people

2:33

grabbed the video feed, and then they began to

2:35

post it elsewhere, which ensured that

2:37

even as platforms were removing it, others

2:40

were hosting it. The New

2:42

Zealand government classified the video as objectionable,

2:45

which is a legal classification

2:47

in New Zealand. It meant that distributing, copying,

2:50

or exhibiting the video would be against the law,

2:53

but the video was already out on the internet. Now

2:55

most platforms have created digital fingerprints

2:58

of the video in order to detect future uploads,

3:01

thus blocking it automatically and then

3:03

removing them very quickly. The gunman,

3:05

identified as Britain Tarrant, had

3:08

been active in far right organizations

3:10

and white supremacy groups online

3:13

and off, and there's been a rise

3:15

in activity in online communities of

3:17

such radical groups, raising

3:19

warnings of extremists using the Internet

3:22

to recruit others and reinforce some

3:24

truly awful beliefs. And

3:26

this brings me to story number two,

3:29

which is that these groups have made use of

3:31

some notable online communities to

3:33

encourage one another and create a space

3:36

for extremism. One of those

3:38

online communities, and perhaps the

3:40

most infamous, is eight kun formerly

3:43

known as eight chan. The history

3:45

of eight chan dates back to when

3:48

Frederick Brennan created it, as an alternative

3:51

to an earlier online message board

3:53

community called four chan. Now,

3:56

Brennan felt four chan was becoming too

3:58

restrictive, which is a sentence

4:00

that's hard to even believe if you're at

4:02

all familiar with four chan. The

4:04

only rule on a chan was

4:07

that you weren't supposed to post or link

4:09

to any content that would be illegal

4:11

in the United States. Brennan

4:14

ended his association with the site in

4:16

two thousand eighteen. In two thousand

4:18

nineteen, in the wake of shootings in christ

4:20

Church, New Zealand, also in Poway,

4:22

California, and El Paso, Texas, and

4:26

also links back to eight chan showing

4:28

how the perpetrators of those three different

4:30

shootings had used eight chan to publish their

4:32

own manifestos. Brennan,

4:34

the founder of the site, was one of the voices

4:36

calling for the site to get shut down.

4:39

That actually did happen in August two

4:42

thousand nineteen, but the site since

4:44

returned as a con as of November

4:46

two thousand nineteen. And there is a pretty

4:49

complicated situation going on here.

4:51

On the one hand, the founders of the Internet

4:54

and of the Worldwide Web envisioned a

4:56

platform that would support freedom of speech

4:58

and the exchange of ideas. On the

5:00

other hand, many people, particularly

5:03

those from already vulnerable communities,

5:05

are put in danger as extremism

5:08

is on the rise. The safe haven

5:10

for those who espouse these extremist,

5:14

radical, racist, and misogynist

5:17

and violent beliefs as

5:19

contributing to an increasingly toxic

5:21

subculture. In addition, several

5:24

tech companies have enabled this

5:27

subculture. It hasn't necessarily

5:29

been a conscious decision, but

5:32

the principles of running a business in which

5:34

your goal is to return value to shareholders

5:37

isn't always in alignment with doing

5:39

what's actually best for the general

5:42

population. In fact, those two things

5:44

can often come into conflict with

5:46

one another. In some cases, like

5:48

eight Kun, this is far more apparent,

5:51

but it's also the case with stuff like more

5:53

public platforms such as Twitter and

5:55

Facebook. Those companies struggle

5:58

with how to deal with a particularly thorny

6:00

subject to varying degrees of success,

6:03

most of which satisfy very few

6:05

people. I wish I had

6:07

a solution to this very large problem,

6:10

but I believe such a solution has to

6:12

go much deeper than taking a

6:15

website offline or removing

6:17

an option for people to voice these hateful

6:19

philosophies. That's part of it, but

6:21

it doesn't address the deeper underlying

6:24

problems that feed into that toxicity

6:26

to begin with. So all I can really

6:28

do is appeal to you guys

6:31

to exercise compassion and critical

6:34

thinking. Those two things are absolutely

6:36

necessary in my view. All

6:38

Right, the darkest of

6:41

the dark stuff in this episode is over,

6:43

so let's move on. One

6:45

thing that happened in twenty nineteen might

6:47

set us on a path for widespread

6:49

use of drones to deliver packages.

6:52

In the spring of twenty nineteen, the Federal

6:55

Aviation Administration or f A a certified

6:58

Wing that's the drone delivery

7:00

startup company that's owned by the Google

7:02

parent company alphabet UH.

7:05

They certified them to operate as an

7:07

air carrier. This regulatory

7:09

step allows Wing to make commercial deliveries

7:12

in the United States. The company had

7:14

already been conducting tests in Australia

7:16

in anticipation of receiving government approval

7:18

in the United States. And there's still many

7:21

questions that need to be answered, and we're likely

7:23

to see very limited roll out of drone

7:25

delivery services in specific

7:27

regions as companies and local governments

7:30

kind of hash out the best way to move

7:32

forward now. Personally, I'm

7:35

curious to see if drone delivery

7:37

will prove to be a more efficient means of

7:39

delivering packages on a large enough

7:41

scale to make sense. I

7:43

mean, I can see how it could be incredibly useful in

7:46

scenarios where getting to a

7:48

location is challenging and the need

7:50

to deliver something important like medication

7:53

is really urgent, but I'm not entirely

7:55

convinced yet that it would make sense from

7:57

a more general use standpoint.

8:00

However, I also haven't run the figures, nor

8:03

do I know how much it costs to operate

8:05

delivery services as they stand right

8:07

now, So it's entirely possible

8:10

that this is a viable alternative to more traditional

8:12

delivery services. I just don't know

8:14

enough to comment on it firmly, But

8:17

it's hard for me to believe that, on the face

8:19

of it, that it would be more cost

8:21

effective and efficient unless

8:24

you just had truly enormous fleets, in which case

8:26

then you have the technological and

8:28

administrative difficulties that come with managing

8:31

that large of a fleet. So

8:33

I just don't know. Sticking with government

8:35

approval, because there are a lot of stories that fall

8:38

into that category this year, the

8:40

Federal Communications Commission in the United

8:42

States, or the FCC, approved

8:45

the merger of telecommunications companies

8:47

T Mobile and Sprint. Now.

8:50

According to analysts, the chief purpose of

8:52

this merger is to enhance T mobiles

8:54

five G technology rollout to

8:56

give it a stronger position in the United States

8:58

as a As you know, five G networks are starting

9:01

to come online. Just a few years ago,

9:03

according to reports from a consulting firm called

9:05

McKenzie, T Mobile was eyeing a

9:07

merger was Sprint, but for a different

9:10

reason. It was in an effort to become

9:12

more competitive against A T and T and

9:14

Verizon, which are the other two major

9:16

cellular phone carriers in the United

9:19

States. While the FCC has

9:21

given its approval, that's just one

9:23

regulatory hurdle that telecommunications

9:26

companies have to overcome before they can merge.

9:28

Regulatory agencies at both the state

9:31

and federal levels are still considering

9:33

this plan, and they may place restrictions

9:35

or limitations on any merger, or they might

9:38

deny it outright. T Mobile

9:40

has reportedly been renegotiating the deal

9:42

in the meantime, and the old reports

9:45

from two thousand and fifteen, the ones that stated

9:47

tea Mobile was first looking at Sprint

9:49

for a possible merger, said that t

9:52

Mobile also entertain the notion of

9:54

allowing Comcast, the mega

9:57

cable corporation, to acquire

9:59

Team Bowl. There may well be

10:01

some serious offers for acquisitions

10:04

like that in the near future of

10:06

either te Mobile or Sprint, or emerged

10:09

version of the two from such a

10:11

cable company, whether it's Comcast or a

10:13

different one. Speaking of corporate

10:16

maneuvers, one drama that finally

10:19

finished playing out in nineteen

10:22

really kind of fizzled out and sputtered

10:24

a bit was the tale of Amazon's

10:27

HQ two in New York City.

10:30

So let's backtrack a bit. The company

10:32

initially announced it was looking into expanding

10:34

its corporate headquarters, which are based

10:36

out of Seattle, Washington, into a

10:39

different city. In two thousand

10:41

eighteen. They famously held

10:43

a Request for Proposals in asking

10:46

for cities that were eager to host

10:49

this new headquarters to present

10:52

their their proposals their deals. That

10:54

in turn prompted a series of stories about

10:56

incredibly generous tax

10:59

breaks and other incentives, as well as

11:01

some fairly absurd publicity

11:03

stunts that stretched throughout most

11:05

of until in November

11:08

of that year, Amazon announced it had settled

11:10

on two locations that would share

11:13

the duty of being HQ two. One

11:16

is in Arlington, Virginia, and the other

11:18

was in New York City, New York. Now,

11:20

there was some pretty hefty criticism

11:23

early on from various sources

11:25

that alleged Amazon had

11:28

chosen these two locations from the beginning,

11:30

that had these in mind when

11:33

they even asked for the proposals in the first place.

11:36

One of the pieces of supposed evidence

11:38

that they used to support this claim

11:41

is that Amazon CEO

11:43

Jeff Bezos apparently had homes near

11:45

those two proposed locations, and

11:48

that the whole selection process was therefore nothing

11:51

more than an effort to create

11:53

a competitive environment so that

11:55

both New York and Arlington would

11:58

continuously improve their deals

12:00

so Amazon we get the sweetest tax break,

12:03

but that presumably the plan

12:06

all along was to move into those two locations.

12:08

Whether that's true or not, we get to

12:11

two thousand nineteen, and early in

12:13

twenty nineteen, New York City residents

12:15

voiced some rather critical opinions about

12:18

their new proposed neighbor. Journalists

12:21

reported that the proposed HQ

12:23

two site in New York City would take

12:25

up land that had previously been intended

12:27

for the use of six thousand homes,

12:30

including a significant number of low

12:32

income homes. Alexandria

12:34

Accacio Cortez, a US representative

12:37

from New York, voiced concern that the

12:39

incentives offered to Amazon would

12:41

hurt the city both in the near and the

12:44

long term, that it would undermine efforts

12:46

to fund government improvements

12:48

to critical infrastructure in the city

12:51

because of these enormous tax breaks. You know, if Amazon

12:53

is not paying taxes, that revenue is not coming

12:56

from them, the financial burden falls on everyone

12:58

else in New York and frequently that means

13:00

that programs have to get reduced

13:03

or cut so that you can, you

13:05

know, make your money stretch out further. In

13:07

February two thou nineteen, Amazon announced

13:10

it was canceling its plan to build

13:12

out its location in New York City. Amazon

13:14

does lease out some office

13:17

space, a significant amount of office space

13:19

in New York, but it no longer plans to

13:21

have a second corporate headquarters there. And

13:24

since we're talking about Amazon, let's

13:26

move on to one of the properties that Amazon

13:28

owns, and that would be the Ring Company.

13:31

That's the company that produces surveillance

13:33

cameras and and surveillance doorbells,

13:36

you know doorbells that have the cameras and communication

13:38

systems. Well, in twenty nineteen, there

13:40

were a few stories of hackers who had

13:42

gained access to users Ring

13:45

equipment, whether it was the surveillance

13:47

cameras or the Ring doorbells.

13:50

Some hackers did this in an effort to expose

13:52

vulnerability, so they were doing it to say,

13:54

hey, we need to fix this because it's

13:56

a problem. But others did it specifically

13:59

to her asks or exploit people,

14:02

and those stories were alarming

14:05

and continue to be alarming. Some of them involve

14:07

kids, and it's incredibly disturbing, and

14:10

they've led to at least one class action

14:12

lawsuit against Amazon. The

14:15

allegation is that Ring isn't

14:17

doing enough to ensure customers privacy

14:19

and security are maintained, which is particularly

14:22

a problem for a company that markets

14:24

equipment that's meant to enhance security,

14:27

not exploit vulnerabilities. Now

14:30

I haven't seen all the details about

14:33

how the Ring systems were actually hacked.

14:35

There are different ways to gain access to connected

14:38

systems on a network. Sometimes

14:40

you can find a vulnerability in an endpoint,

14:43

such as an actual device connected to the network.

14:46

So in those cases you would say, all right, the hacker managed

14:48

to hack into the network via

14:51

this RING device. That

14:54

very well maybe the case maybe they were able

14:56

to brute force a password through

14:58

that and the got access that way. But

15:01

other times hackers might find a way to compromise

15:03

the network itself and then they can access

15:06

the various components connected to that network

15:08

as if they were, in fact the legitimate

15:10

administrator of the network. In

15:13

the case of Ring, it sounds to me as though

15:15

they found it through password vulnerabilities.

15:19

The lawsuit states that Ring should have required

15:21

users to create more robust passwords

15:23

and to require two factor authentication

15:26

to prevent abuse. And just in case you're

15:28

not familiar with the concept, two factor

15:30

authentication is a subset of what

15:33

is called multi factor authentication,

15:35

which just means that you're using two or

15:38

more factors, which really just means two

15:40

to three factors to authenticate

15:42

your identity. And those factors

15:45

are categories of stuff, right.

15:47

Those categories are what you know.

15:50

This would be something like a password or a pin,

15:52

so it would be something that you have knowledge of and you

15:55

provide when you're accessing a

15:57

system. The second factor is

16:00

what you have, like what you physically

16:02

have on you that could be a mobile device, So

16:05

it could be that you provide your password

16:07

or pen and then it sends a code to your

16:09

mobile device, which you also have to enter, or

16:11

you might have a token that you have to use

16:14

in some way to access the system. And then

16:16

the third factor is what you are, and

16:19

this would refer to things like biometric data.

16:21

Maybe it's a retinal scan or

16:24

fingerprint scan or voice scan. Multi

16:26

factor authentication requires you present at least

16:29

two of those three factors, possibly one

16:31

of all three. It all depends on the implementation.

16:34

So you might enter a password, then you receive your

16:36

code, you enter the code, and then you get access.

16:39

But that proves you both know the password

16:42

and you also have possession of an authorized

16:44

mobile device, which limits the possibility

16:47

that an unauthorized person is going

16:49

to gain access to that system.

16:51

Now, this touches on an issue that I think

16:54

is really important and is growing more important

16:56

as the Internet of Things gets bigger.

16:59

And I'm sure you've heard the saying that a chain

17:01

is only as strong as its weakest link.

17:04

In network security, there are many potential

17:07

weak links. You could have a badly

17:10

designed piece of hardware or software

17:12

that has vulnerabilities in it, and that

17:15

offers an in road for an intrusion

17:17

into a network. You can also have users

17:19

who practice really poor security habits,

17:22

like they choose common passwords

17:24

like a common dictionary word as a password. That's

17:26

a terrible, terrible habit and no one should

17:28

do it. Or they're using the same password

17:30

for multiple services, also a

17:32

terrible idea. But this raises a

17:35

question who should be accountable for

17:37

data security? After all, users

17:40

should be employing strong, unique

17:42

passwords as a matter of habit. And if

17:44

you heard about someone's house being robbed because

17:46

they forgot to lock the door, I

17:49

don't think your first instinct would be to sue

17:51

the lock company for letting it happen.

17:53

I think end users are at least partly

17:56

accountable for good data security.

17:58

However, that being said, I also think

18:01

that companies have a responsibility.

18:04

They need to create rules that require

18:06

strong passwords and multi factor

18:08

authentication by default. They

18:10

need to essentially force users to

18:13

be more careful. They enable users

18:15

to practice good security, and

18:17

by enable users, I really mean limit

18:20

the options that users have that

18:22

that result in poor security. I

18:25

think it's the user's responsibility to be

18:27

more secure and the company's responsibility

18:29

to enable it. But that's just me.

18:32

Now, when we come back, we'll look at some more

18:34

stories from twenty nineteen. Here's

18:44

a story that started making the news

18:46

just before twenty nineteen wrapped up. I mean I

18:49

learned about it shortly before

18:51

coming into the studio. So Devin

18:53

Wilson, or at Atomic

18:56

Thumbs on Twitter, criticize

18:58

the company so Nos for what he

19:00

saw as a particularly egregious example

19:03

of trying to control the aftermarket on

19:05

electronics now. Sons is primarily

19:08

known for making speaker systems, particularly

19:11

smart speakers, and like a lot

19:13

of tech companies, it depends heavily

19:15

on creating incentives for established

19:18

Sons customers to upgrade

19:20

and update their equipment. You know, if

19:22

everyone just went out and bought the latest Sons

19:25

speaker and they thought,

19:28

oh, this works great and had no reason

19:30

to upgrade, the company would

19:32

have a very rough year. So they have

19:34

to create incentives for people to keep buying

19:37

their stuff. In that way. Sonas

19:39

is strategy is really similar to that of things

19:41

like smartphone handset manufacturers. It's

19:44

the Apple iPhone model. In other words,

19:46

each subsequent generation of devices

19:49

incorporates features that older devices

19:51

cannot support, whether that lack

19:53

of support comes from technical limitations

19:55

of the hardware or managerial

19:58

decisions. Is a moot point as a pose,

20:00

I mean it could come down to executives say, just

20:02

don't let this run on older stuff,

20:05

not that the older stuff is inherently

20:08

incapable of running. It doesn't

20:10

matter. The end result is the same. So

20:12

NOS has a trade up program

20:15

that gives existing so nos users a

20:17

thirty credit toward a new

20:19

so nos device if those

20:21

users activate what is called recycle

20:24

mode on their older so nos device.

20:27

Now, recycle mode starts

20:29

a countdown clock. It's a twenty

20:32

one day countdown, and at

20:34

the end of that SONS puts the device

20:36

on a blacklist so that it is bricked,

20:39

meaning you can't use it at all.

20:42

It will not work, it is ineffective,

20:45

and it also means that you can't give it away

20:47

or sell it, or at least you can't do so ethically

20:50

because you'd just be handing over what amounts to

20:53

being a giant paperweight with a lot

20:55

of circuit boards and wires in it. So

20:57

really the only options are to try

21:00

and hack the speakers, which isn't

21:02

really an option most people would feel comfortable

21:04

trying to tackle and would probably have limited

21:07

use anyway, or you could send

21:09

the speaker to an e waste recycling facility,

21:12

or you just throw the darn thing away. That's

21:15

not a great option. It adds e waste.

21:17

E waste is bad stuff, and recycling,

21:19

while better than throwing stuff out, isn't

21:22

as environmentally friendly as reusing

21:24

stuff. If you've ever heard reduce, reuse,

21:27

recycle, well it's in that order

21:29

of preference. You want to reduce the

21:31

amount of waste you generate. You want

21:33

to reuse stuff as much as you can. The

21:36

stuff you can't reuse, you recycle.

21:38

The stuff you can't reuse or

21:40

recycle, then you can throw away. But

21:43

even that is, you know, not great.

21:46

So Wilson's point was that so

21:49

NOSES program actually incentivizes

21:52

creating e waste. It encourages

21:54

people to break their old device in

21:56

order to get this thirty percent credit

21:58

towards their next purchase, and it

22:01

makes those old devices useless to

22:03

anyone. And sure, they

22:05

these people might go and recycle their

22:08

old Sons speakers, but

22:10

it's not as good an option as to keep the equipment

22:13

in working order so that someone else

22:15

can actually make use of it, rather than for it

22:17

to just go to waste. Critics

22:19

have said, this really isn't about

22:22

reducing waste, it's about so Nos

22:24

limiting the viability of a secondary

22:27

market. Because Sonas doesn't make

22:29

money off of someone selling off an

22:31

old pair of speakers or anything like

22:33

that. The company has a financial incentive

22:36

to discourage aftermarket resales

22:38

and to create pathways for people to buy directly

22:41

from Sons or or from retailers

22:43

who are carrying so Nos speakers.

22:46

So the criticism states that this is

22:48

a devious way for Sons to play

22:50

the environmentally conscious card,

22:52

you know, to make it look like they're being eco

22:55

friendly, while actually they're taking

22:57

aim at a market that can undercut

22:59

their own and revenues, that being the resale

23:02

market. You know, we've seen this with other

23:04

properties as well, other types of gadgets

23:06

and electronics as well as video games. This

23:09

idea of getting rid of that resale

23:11

market in order to create the incentive

23:13

for people to go out and buy new copies

23:16

as opposed to used copies or used

23:19

devices in this case. All

23:21

right, well, how about we do some Apple news.

23:24

A big piece of news regarding Apple broke

23:26

in late June two thousand nineteen, when

23:28

Jonathan I've, better known as Sir Johnny

23:31

I've announced he was leaving

23:33

the company. He had been with Apple for

23:35

nearly three decades, working primarily

23:38

in design. He joined the company back in nineteen

23:40

nine six when it wasn't a bit of a pickle. That

23:42

was a year before the ousted Steve Jobs

23:45

would return to the company. He was

23:47

one of the influential designers who defined

23:49

Apple's iPhone approach, setting

23:51

the stage for the company's meteoric rise

23:54

in success. He announced

23:56

he would be heading up a new design company

23:58

called Love From and that he

24:00

would still work with Apple on projects,

24:03

just from an independent business owner

24:05

standpoint as opposed to an Apple

24:07

executive. I've played an

24:09

intrinsic role in designing some of Apple's

24:11

defining products over the last twenty years,

24:14

so it will be interesting to see how the company moves

24:16

forward. I've and Jobs together

24:19

were often cited as the visionaries

24:22

who kind of set Apple on its course,

24:25

and people have been asking what

24:27

Apple's up to ever since Jobs passed

24:29

away. So with Ive's departure, I'm

24:31

wondering how that's going to affect the company as

24:33

well. Apple wasn't just dealing with

24:36

the departure of one of its more famous

24:38

employees. However, the company also had

24:40

some other snags in twenty nineteen due

24:42

to product issues. At the beginning

24:44

of the year, Benjamin Mayo of the Apple

24:47

news and rumors site nine to

24:49

five Mac broke a big

24:51

story about a vulnerability in the company's

24:54

FaceTime app. So, for those who aren't

24:56

familiar, FaceTime is a video chat

24:58

app. It's so you can video calls

25:01

on iOS devices. Uh

25:03

though I should add that at least one Apple

25:05

user had tried to warn the company

25:07

more than a week before the story broke.

25:10

They had found this independently, so

25:13

it was a known issue, arguably

25:15

not just to the Apple community but to Apple

25:17

itself before the story broke

25:20

in nine to five Mac. Anyway, Mayo

25:22

found that if you used FaceTime to

25:25

make a call between any devices running

25:27

iOS version twelve point one or later, and

25:30

then you added your own number into the

25:32

call, as if you were conferencing in yourself

25:35

the person making the call, you would

25:38

be able to hear the audio from the receiver's

25:40

phone before the receiver had

25:42

chosen to accept the call in the first place. So

25:45

all you would have to do is put in someone's number,

25:48

have it start to dial a FaceTime call

25:51

conference in yourself, and you could listen

25:54

in on the other phones

25:56

microphone. You could even

25:58

use some options to act debate the camera

26:01

on the phone. And it wasn't just phones,

26:03

it was also you know, other mobile

26:05

devices, but also max because the mac os

26:08

supported FaceTime as well, so if

26:10

you did this, you could presumably

26:12

use someone's Mac computer to spy

26:15

on their home. Uh And because

26:18

this would only work as long as the other device

26:20

was ringing, and FaceTime times out after

26:22

a certain amount of ringing, that

26:25

ringing actually lasts a lot longer on

26:28

mac Os. A call can

26:30

end up going much longer in

26:33

the in the calling phase for mac Os

26:35

because the thought is not everyone is at

26:37

their computer all the time, so you

26:39

might be across the house when the call

26:41

comes in, you might not hear it at first, so they

26:44

have a longer calling session

26:48

that will last until there's an automatic

26:50

cut off, which means you could

26:52

presumably spy longer until

26:55

someone noticed that there was a FaceTime

26:57

call coming in. So this was a huge

27:00

law on the software and the vulnerability

27:03

would be patched. But initially Apple's

27:05

response was just to suspend the group FaceTime

27:08

feature so that you couldn't conference anyone

27:10

in at all. You could only do person to person calls,

27:12

you couldn't do conference calls. And

27:14

then in February twenty nineteen, the

27:17

company pushed out the patch that sealed up those vulnerabilities

27:19

and re enabled group FaceTime features.

27:22

Another problem Apple faced was the release

27:24

of iOS version thirteen and

27:27

the release of Mac OS ten point

27:29

one five a k A. Catalina.

27:32

Critics found problems with both, identifying

27:35

numerous bugs that prompted some tech

27:37

reporters to advise people, especially

27:40

for people looking at buying a new iPhone, to

27:42

wait for patches before updating

27:45

to the latest OS version or buying a new

27:47

phone. Even Apple announced

27:49

iOS thirteen point one a

27:52

patch to thirteen point oh before

27:55

thirteen point oh had even shut,

27:58

which indicated that the initial rule east

28:00

wasn't really ready for implementation. So

28:02

why was iOS thirteen so

28:05

buggy? Or maybe I should say why is it because

28:07

not all those bugs have been fixed? Well? Some

28:10

people have suggested that Apple was being overly

28:12

aggressive when adding in new features

28:15

to the operating system, and that feature

28:17

creep might have been an issue. David

28:20

Shaer, and Apple software engineer

28:22

theorized that perhaps teams working

28:24

on certain features, were reluctant

28:26

to admit when they were falling behind

28:29

on deadlines, and that rather than

28:31

cutting back on features, rather than saying let's

28:34

not do this because it's taking too much time

28:36

and we need to ship, things were

28:38

kept in the mix far longer than they needed

28:41

to be, and Share also listed

28:43

several other possible contributing factors. It's

28:46

all in the post on tidbits dot

28:48

Com. I recommend checking that out if

28:50

you want to learn more. The piece is titled six

28:53

reasons why iOS thirteen and

28:55

Catalina are so Buggy, and

28:58

he goes into much greater detail there now.

29:01

In late December, Apple pushed out

29:03

an update for its mobile operating

29:05

system, and this one's called iOS thirteen

29:08

point three, which might make you think

29:10

it's the third update to iOS

29:14

to this version, but it's not the third

29:16

update. It's actually the eighth update

29:19

since iOS thirteen was first

29:21

announced. Many of the updates

29:24

were in the iOS thirteen point one

29:26

and iOS thirteen point two designations.

29:29

Oh and by the time you hear this, iOS

29:31

thirteen point three point one might

29:34

be available. It's currently in beta.

29:36

As a record this episode. Gordon

29:38

Kelly of Forbes suggests that

29:40

if you have a device running an earlier version

29:43

of iOS thirteen, you should absolutely update

29:45

to thirteen point three, but

29:47

if you're still running iOS twelve,

29:50

you might actually still want to wait a

29:52

little bit longer before you upgrade.

29:54

He does say that things are starting to

29:57

look promising, that the initial

29:59

months following the release of iOS thirteen

30:01

were pretty bad. He would give a categorical

30:04

skip this update until it's fixed

30:07

recommendation. That recommendation

30:09

is slowly starting to soften as

30:11

these numerous patches are

30:13

addressing some of the more serious bugs

30:16

and vulnerabilities that people have found

30:18

in iOS thirteen. But this has not been

30:20

an illustrious launch for Apple.

30:23

Bugs and operating system updates are really

30:26

nothing new. I mean, it happens all the time.

30:28

No one's perfect, and operating systems are large

30:30

and complicated pieces of software. But it

30:33

does create a bit of an image problem, particularly

30:36

if you're a company like Apple that has built

30:39

itself on a reputation that its devices

30:41

just work, and it also complicates

30:43

a discussion that relates back to data security.

30:47

Generally speaking, it's a good idea to

30:49

keep as up to date with operating

30:51

system and security patches as you

30:53

possibly can. So if there's an update,

30:56

generally speaking, it's good to install

30:59

right away. Now, eventually you

31:01

might find that your particular device

31:03

can't support whatever the latest and greatest

31:06

version of the operating system is. That

31:09

does happen where the hardware itself

31:11

cannot physically support the software, but

31:13

keeping up to date reduces the opportunities

31:15

that hackers can take to exploit vulnerabilities.

31:19

However, when the operating system itself is

31:21

a buggy mess and the updates

31:23

aren't much better, it's not as

31:25

clear cut a case that updating

31:28

is your best option. It may be that,

31:31

yeah, you can update, and that will technically

31:33

patch some things, but could open

31:35

up either brand new vulnerabilities or

31:37

might just make stuff not work anymore. That's

31:40

not great either. All right, let's pop

31:42

on over to Microsoft, Apple's old

31:44

rival and sometimes savior. If you've

31:46

listened to old episodes of tech Stuff, you know what I'm referring

31:49

to. Now. I don't have a whole lot to say

31:51

about Microsoft in twenty nineteen. The

31:53

company has moved much of its operations into

31:55

cloud based services, but it did

31:57

launch a product in late twenty nineteen

32:00

has folks like me a little excited.

32:02

It's the hollow lens too. Now,

32:04

the hollow lens is an augmented reality

32:07

platform, and augmented reality involves

32:10

overlaying digital information on top

32:12

of the real world around us in

32:14

some way. Now, you typically can achieve

32:17

this through one of several approaches.

32:19

You could have special glasses that

32:22

act as a projection screen to display

32:24

information in front of you as you look around,

32:26

so that you have digital information that you're looking

32:28

at, but you can also look through that

32:31

and see the real world beyond it. You

32:33

could even have headphones that feeds

32:35

you information by audio that enhance

32:37

your experience of moving through a physical environment.

32:39

That's the type of augmented reality. It's maybe

32:41

not as flashy as the first type,

32:44

but it's still very legitimate. You could

32:46

have an app on a smartphone that can recognize

32:48

certain images and display data on top of

32:50

a video view of the world. So in this case,

32:53

you're looking at the world through your smartphone

32:55

screen, which then can overlay digital

32:57

information on top of that video view. But

33:00

it's as if you're looking at the real world

33:02

around you if you just kind of ignore the fact that

33:04

you're really looking at a monitor. Alright,

33:07

So the hullo lens and its

33:10

sequel hollow Lens to the augment

33:13

in ing or if you prefer hollow lens

33:15

to electric boogaloo. It's

33:17

a head mounted display and the first

33:19

generation of the hollow lens received a very

33:21

limited release because it wasn't intended

33:24

as a consumer electronics product.

33:27

It wasn't meant to go to the average person. It

33:29

was more of a first step into a new market

33:32

for Microsoft. The company launched

33:34

the Hollow Lens two in November two thou nineteen

33:37

with a price tag of three thousand, five

33:39

hundred dollars. So it's still far from

33:41

being priced as a basic component

33:44

of home computing. Right. No one,

33:47

h not, not your average person is going to go out

33:49

and adopt the hollow lens too.

33:52

At I will not be buying

33:54

a hollow lens too. I just can't justify

33:56

that expense for something you

33:59

know that would interesting but have

34:01

limited utility in my life. However,

34:04

you could say that this is slowly moving

34:07

this technology into the consumer

34:09

space. Now, the new version of

34:11

the hollow lens has an improved field of view,

34:13

so users will have a less restricted view

34:15

of the world around them. To me, the

34:18

headset looks kind of like imagine you've

34:20

got a pair of safety goggles. And

34:22

then above the safety goggles

34:24

that you look through, so those are clear, you're looking at

34:26

the world around you. Above that, you've

34:28

got a device that has a camera

34:30

system mounted inside of it, and

34:34

that part is actually attached to like a headband,

34:36

so you're wearing that on your forehead. And

34:39

then below that is where the safety

34:41

goggles are. That's kind of what it looks like. I'm

34:43

doing a poor job describing it, but it's hard to

34:46

do in an audio format. But

34:48

the cameras that face out from

34:50

this device capture the

34:52

scene around you, right. It takes in

34:54

that information and interprets it through the

34:56

computational system inside the device,

34:59

which the determines what data

35:02

to display on your

35:04

your lenses when you're looking at

35:06

something in particular. So as

35:08

an example, let's say you're looking at

35:10

an electrical panel, then the data

35:13

that pops up might tell you what each

35:15

element on that electrical panel relates back

35:18

to, So it's kind of like a labeling system

35:20

in that case. That's just one use case for

35:22

this kind of technology. The

35:24

company also tweaked the gesture control

35:27

interface that the hollow lens uses.

35:30

UH. This was to improve on responsiveness

35:32

and to cut down on false positives. So

35:34

gestures obviously would be an important

35:37

way to control this kind of technology. You might

35:39

use voice control as well. Google Glass

35:41

did that, but it seems weird because that

35:43

sounds like you're talking to yourself. I can

35:45

see that from personal experience, because I got to play with Google

35:47

Glass for a while. But the

35:50

gesture controls, they did something that I thought was pretty clever.

35:53

So for example, they built in a system

35:55

where you would hold out your hand and

35:58

you would look down at your hand and

36:00

you and by moving your head a little bit, you could

36:02

position an icon so that

36:04

it appears to be projected onto

36:06

the palm of your hand. Then you could touch

36:09

that icon with the fingers of your other

36:11

hand to activate it and launch

36:13

whatever the app is. And that's kind of

36:15

neat. It adds a sort of tactle response

36:18

to the gesture control that otherwise

36:20

was lacking. Now I haven't been able to try

36:22

a hollow lens of either generation

36:25

yet, but I hope I can at

36:27

some point. I love the potential of augmented

36:29

reality, and I think really clever

36:32

implementations have enormous possibilities

36:34

in the future. But I think it was probably

36:36

gonna be several more years before we see

36:39

this as a common technology for the everyday

36:41

person. However, for certain industries

36:44

I suspect it will play a much larger role

36:46

moving forward. We've already seen it being used

36:48

in the medical field, and engineering

36:51

will probably see it move beyond that slowly,

36:54

and then gradually we'll see it possibly

36:56

enter into the mainstream market if

36:59

there's a compelling enough use case. If it's

37:01

more of a curiosity, I would argue Google

37:03

Glass kind of fell into that category, then

37:05

it probably won't receive much traction, kind

37:07

of like how virtual reality has

37:09

been struggling again. All

37:12

right, when we come back, we'll talk about

37:14

some more stories, including touching on what

37:16

a little company that rhymes with Schmoogle

37:19

has been up to. Okay,

37:28

let's talk Google. So, like Facebook,

37:31

Google came under intense scrutiny

37:33

throughout two thousand nineteen, whether

37:36

it was about user privacy or

37:38

allegations that the company was covering

37:41

up really terrible behavior

37:44

and turning a blind eye despite employee

37:46

protests, or allegations that

37:48

the company's search results were purposefully

37:51

promoting certain material, specifically

37:54

sites that were in alignment with Google's

37:57

own perceived agenda perceived

37:59

by the public guy should say at the

38:01

expense of other materials. So, in other words,

38:04

that Google was promoting things

38:06

that fell in line

38:08

with what Google wanted and suppressing

38:11

anything that Google didn't like. That was the

38:13

charge. The company had to weather a lot

38:15

of strife in twenty nineteen, and to be clear, at

38:17

least some of that strife was brought on by

38:19

the company itself. One big

38:22

change for the company actually requires us to take

38:24

a step back and look up a level

38:26

higher than Google itself. At Google's

38:29

parent company, which I mentioned earlier, is

38:31

Alphabet Now. In early December

38:34

nineteen, Larry Page, a co founder

38:37

of Google, announced that he was stepping down

38:39

as the CEO of Alphabet.

38:42

Sunday, the CEO of Google itself,

38:44

would become the new CEO of Alphabet,

38:47

while simultaneously remaining CEO

38:49

of Google. Sarah A. Brenn, another

38:52

co founder, had stepped down as Alphabet's

38:54

president, but both Page and

38:57

Brand said they were going to remain on the board of directors

38:59

for or the company. Paige

39:01

and Brand said that their decisions reflected

39:03

a need for Google's management structure to streamline,

39:07

but it also came into time when the company was

39:09

dealing with big problems from within

39:11

and without. There was the scrutiny

39:13

that I mentioned earlier, in which government agencies

39:16

and advocacy groups were criticizing Google's

39:18

policies and talking about its

39:20

power in the marketplace, and there

39:23

were also allegations that the company

39:25

had engaged in some retaliation against

39:27

a few employees. Now to understand

39:30

that last bit, we have to look back a little

39:32

further than the beginning of twenty nineteen. So

39:34

in twenty eighteen, internal issues

39:36

within Google became big news as

39:38

thousands of employees protested issues

39:41

ranging from sexual harassment problems

39:43

in the workplace to quote, unethical

39:46

business decisions that create a workplace

39:48

that is harmful to us and our colleagues

39:51

end quote. Now, that last quote actually

39:53

comes from four former Google employees

39:56

who posted a piece on Medium after

39:58

they were fired. This was around

40:01

Thanksgiving twenty nineteen. The

40:03

four employees had been leading efforts to

40:06

unionize at Google to organize

40:08

employees, and it was a move that

40:10

did not look good on Google's

40:12

part, and it certainly appears at a

40:14

casual glance at least, that

40:17

Google executives were trying to squash

40:19

employees from being able to organize

40:21

in a union or other organizational

40:24

structure. The company's official

40:26

response to inquiries about the firing

40:29

was that the employees had allegedly violated

40:32

Google's security policies, an

40:34

allegation that the four former employees

40:37

deny. The story is still playing

40:39

out as I record this episode, and

40:41

it does tap into another upsetting

40:43

trend in business in general and the text

40:46

fear in particular. It has become

40:48

pretty common practice for a lot

40:50

of companies to require employees to sign

40:53

an agreement that limits the

40:55

rights an employee has when

40:57

they want to address problems in the workplace.

41:00

Companies enact these policies so that they

41:02

can limit their own liability and limit

41:04

the impact those types of problems can have on

41:06

business. The agreements typically force

41:09

employees to try and work through issues

41:11

through internal systems at the company,

41:14

like going through human resources, and

41:17

it really places restrictions on

41:19

other options, such as pursuing a legal

41:22

case against the company, like you could get severely

41:25

punished for going outside the

41:27

company and seeking outside help.

41:30

Now, assuming the HR department is on the

41:32

side of the employees, you

41:34

could maybe argue that this policy isn't

41:37

too restrictive. It might be you might not feel

41:39

great about it. But if you think, oh, well, HR

41:41

is gonna be on the employees side, maybe

41:44

you're going to say, well, I'm willing to endure

41:46

it. But at least in some cases, particularly

41:49

with Google, it's appeared that the HR department

41:52

was really more on the side of the corporation on

41:54

the employees. That they had

41:57

a tendency to shut down complaints

41:59

or to try to mitigate the fallout of complaints

42:01

by kind of shifting people around

42:04

without removing or punishing anyone

42:06

who was the focal point

42:08

of an allegation, and so they weren't

42:10

really addressing the underlying issues,

42:13

which left the affected employees with very

42:15

few options. And it's pretty ugly

42:17

stuff. So that's one of the things that I think

42:19

a lot of employees around the

42:22

world really, but particularly in the tech

42:24

space, have started to kind

42:27

of act out against. And we're

42:29

not done with Google yet. The company launched

42:31

its gaming service, Google Stadia

42:33

in two thousand nineteen. That service

42:36

allows users to access games via streaming,

42:38

so you're actually running

42:41

the game on one of Google's servers

42:44

and you're playing it via

42:46

your local connection. According

42:48

to Google, you can stream games up to

42:50

four K resolution and sixty frames per

42:52

second, assuming that your Internet

42:55

connection and your hardware can support

42:57

that. The service launched with some

42:59

stupality problems and with a pretty

43:01

limited library of games, and so far

43:04

it hasn't really taken off, despite

43:07

the fact that it removes the need for buying

43:09

a high end gaming rig or even

43:12

a gaming console to access current

43:14

generation games. Now. To be fair, Google

43:16

is not the only company that has tried this model

43:19

with only limited success. There

43:21

are lots of companies that have tried a similar

43:23

approach and also have had some issues

43:26

getting anywhere with it. Meanwhile,

43:29

over at YouTube, which again is part of Google,

43:31

it's part of that alphabet company, other

43:33

problems were plaguing Googlers.

43:36

So in September of twenty nineteen,

43:38

YouTube changed its policy for verified

43:41

creators. Verified

43:43

creators are an interesting thing. So these are

43:45

creators who had earned a verified

43:47

check mark and that indicated

43:50

that essentially up until recently,

43:53

that they had attracted at least one

43:55

hundred thousand subscribers. I

43:57

happen to be one of these verified

44:00

uh creators, but more

44:03

on that in the minute, because it's an interesting case.

44:06

So in the past, YouTube

44:08

had issued verified check marks two accounts

44:10

that had reached that one hundred thousand subscriber

44:12

mark or more. That's all you really had

44:14

to do in order to get the verified check Now

44:19

they decided to change that so that

44:22

not only would you need the one hundred thousand

44:24

subscribers, you also need to

44:26

have your account be active, meaning you have to

44:28

be uploading content on a semi regular

44:30

basis, and it doesn't need to be you know,

44:33

had had been quiet without an upload

44:35

for ages. Also, the accounts needed

44:37

to be authentic. In other words, the

44:40

account need to be linked back to a real

44:42

creator, brand, or entity that YouTube

44:44

could verify was in charge of creating

44:46

that content. This meant

44:49

that a lot of the people

44:51

who had the little check mark didn't

44:53

necessarily meet those requirements. So

44:56

then YouTube revoked the

44:58

verified badge for thousands

45:00

of creators, and that created an uproar.

45:03

I happened to be one of the creators who lost my badge

45:06

I lost. I got an email it said you're verified

45:08

badges going away. Now. In my case,

45:11

I wasn't fussed about it. I'll explain that again

45:13

in just a minute. So YouTube's motivation

45:16

was to clarify what a verification

45:18

check mark actually meant, because

45:22

one confusion was that people thought that a check

45:24

mark meant that YouTube was

45:26

endorsing the content of that creator,

45:29

that somehow YouTube was saying, yes, we approve

45:31

of this. This is what that check mark means. But

45:34

it wasn't meant to be that. It was meant to be an indicator

45:37

that the associated account was authentic

45:40

and not some sort of impersonation

45:42

account. And this is a legit issue

45:44

over on YouTube because a lot of creators,

45:47

really popular creators, see their

45:49

work get lifted and

45:52

reposted under other accounts.

45:54

So you might create a really awesome

45:57

video and maybe it gets a little bit of notice,

46:00

so somebody else captures that video,

46:02

they use a program to download it, then they

46:04

re upload it under their own account, and

46:06

they try to get that one to take off. It's

46:09

even possible for a copy

46:12

to outperform the original, and

46:14

that means that the person who originally put in the work

46:16

to making that thing be what it

46:19

is doesn't get the benefit

46:21

of it. They aren't able to monetize the

46:24

appearance on the other channel. You

46:26

can put down takedown strikes and stuff

46:29

like that, but it means having to constantly, you

46:31

know, search the internet, search YouTube

46:34

for copies of your work. So

46:37

YouTube wanted to create a system

46:40

that would make a more straightforward

46:43

approach to verification, in the sense

46:45

that if you saw the check mark, you knew

46:48

this person was a legit, that the

46:50

content coming from that person's channel

46:53

was in fact coming from that creator.

46:56

And uh so they

46:59

put that change and they revoked all those

47:01

check marks. People went

47:03

nuts, and so YouTube

47:05

walked it back a week later, and a week later

47:08

it gave everybody their verified check marks

47:10

back, including me, which again

47:12

in my case, I don't think it was necessary.

47:15

So let me explain about

47:17

my check mark. So a few years

47:19

ago, I was hosting a video

47:22

series called forward Thinking

47:24

This is for Work, and the channel

47:26

for forward Thinking was linked to my

47:29

personal YouTube channel for reasons

47:31

I don't remember at this point. I think it was so

47:33

that I could go in and make changes

47:36

if I needed to, even though

47:38

typically we would have other people handle all

47:40

of that. For some reason, they trusted me and

47:42

they linked the channel to my personal

47:45

YouTube account. The result was

47:47

I got a check mark because the Forward

47:49

Thinking series had a

47:52

pretty good subscriber base, like two

47:54

fifty thousand subscribers, so it

47:57

met the criteria and it got the

47:59

check mark. King to me, now, this is

48:01

despite the fact that on my channel,

48:04

I very rarely post anything.

48:07

I've only got a few videos up on my personal

48:09

channel, and when I do put a video up,

48:12

I get only a few views. You know, it's typically

48:14

like, hey, my mom watches my stuff, which

48:16

is totally fine. I'm I was doing it for

48:18

fun. I wasn't trying to do it as a

48:20

YouTuber, right, So in my case,

48:23

when my check mark went away, I thought, you

48:25

know, that's totally fair. I'm an outlier

48:27

and I don't meet this

48:30

requirement. I definitely don't deserve the check

48:32

mark. It's okay that it's gone, But

48:34

there are lots of creators out there who

48:36

did deserve the check mark and they saw

48:39

it go away. So for them,

48:41

I'm glad that it came back, because that

48:44

thing can really help you. That check

48:46

mark means that you have a little

48:48

bit more clout when it comes to stuff like

48:51

looking for sponsorships, maybe getting advertisers

48:53

to support your channel, monetizing your work

48:56

so that you can get compensated for it. That's

48:59

important. Now my case, again, I

49:01

was doing it for fun. I never expected it

49:03

to be anything beyond that for my

49:05

own personal channel, so I didn't worry about

49:07

it. Forward thinking was a different story, but that was also

49:11

a project that had a company backing

49:13

it, so that was a totally different case. So

49:15

yeah, I'm glad that it got fixed

49:18

and moving forward, YouTube is being

49:21

much more picky about

49:23

who gets a verification check mark, but

49:25

they're not wholesale eliminating

49:27

all the previously awarded check

49:29

marks. But another controversy that's

49:32

also playing out on YouTube is one

49:34

that's going to roll into and beyond,

49:36

and it all has to do with a law from the

49:38

nineteen nineties intended to protect

49:41

children, and that law is

49:43

a US law. It's called Children's

49:45

Online Privacy Protection Act or

49:47

Kappa CEO p p A. It

49:50

was again first established as law, and

49:54

in twenty nineteen, the Federal Trade Commission,

49:56

also known as the FTC, brought

49:59

a suit again YouTube

50:01

and alleged that YouTube had been illegally

50:04

collecting the personal information of children

50:06

without their parents consent, that

50:09

kids were watching videos on YouTube,

50:11

that what they were watching was being tracked

50:13

by YouTube, and that this was creating

50:15

a digital fingerprint that advertisers

50:18

were using to target advertising towards

50:21

those children, and the children being too young

50:23

to consent to this meant

50:26

that this whole practice under Kappa was

50:28

illegal, and specifically

50:31

that the company was using this quote

50:33

in the form of persistent identifiers

50:35

that are used to track users across the

50:38

Internet end quote. So in

50:40

other words, this would be the sort of thing where if

50:42

you were watching a bunch of videos about elephants

50:45

and then you happened to navigate over to say

50:48

Amazon, you might see a bunch

50:50

of suggestions that relate in some

50:52

way to elephants. And the

50:55

concern was that this was going to be targeting

50:57

kids, and there was no way for kids

50:59

to give legal consent to allow that to happen,

51:02

and that data has value

51:04

in it, and children's privacy and

51:06

security also has value

51:08

to them, so that was the problem.

51:11

Well, YouTube would settle this lawsuit

51:14

out of court. They paid a hundred seventy

51:16

million dollars in fines, which really sounds

51:19

like a lot, but for YouTube, it's nothing. And

51:21

if that's where it all ended, we would just wrap

51:24

up the story and beyond with it. But in addition

51:26

to the fine, the company had to agree

51:28

to create a system that is compliant

51:31

with Kappa. So this would mean

51:33

that any creator who was making

51:35

child directed content, meaning

51:38

content meant to be viewed by

51:40

children would be affected by this. They

51:42

would have to be Kappa compliant. They

51:44

would have to make sure that

51:47

they were running a channel that was not gathering

51:49

information about the uh

51:51

the children watching it, that they were not building

51:54

in targeted advertising, that

51:56

they had to self identify as

51:59

being a creator it was creating

52:01

child directed content. You had to

52:03

actually go into your little profile and

52:05

click and say whether or not your channel

52:08

was meant for kids or not. But this raises

52:10

questions like what exactly is child

52:12

directed? And it has a lot of creators

52:14

nervous right now because there are creators

52:17

who do, for example, unboxing videos,

52:19

and some of them are clearly meant for kids.

52:22

Some of them are hosted by kids and clearly meant

52:24

for kids, but there are others where

52:27

it may not be for kids. It maybe for people

52:29

who really are into collecting toys

52:32

that are from their favorite you

52:34

know, franchises, for example, so

52:37

toy unboxing would likely

52:39

be in the spotlight. Creators who

52:41

use video games are likewise concerned.

52:44

There are people who are using video games to tell stories

52:46

that are people use let's plays or

52:49

play throughs, but they're not necessarily

52:51

meant for kids. There's also people who are working

52:53

in animation, and that animation may

52:55

not be meant for kids, but the general perception

52:58

is that cartoons are children and

53:01

they're concerned that they will be interpreted

53:04

as being child directed when they don't

53:06

intend to be, and that they will be affected by

53:08

this. There's a lot of fear that

53:10

this is going to have an effect on monetization,

53:13

so that people might not be able to get paid

53:15

for what they're making, which means they'll probably

53:17

stop making it. I mean, you've got to make

53:19

your living. Uh. They may move

53:21

on to a different platform than YouTube, or

53:24

they may just stop entirely. Every

53:26

single violation of Kappa can

53:29

be fined up to a maximum of forty

53:31

two dollars.

53:33

Now, keep in mind some of these channels

53:36

have hundreds or thousands of videos

53:38

up online, so if they were

53:41

identified as being child directed and

53:43

that their material wasn't Kappa compliant,

53:46

they could get that maximum fine

53:48

for every single video that seemed

53:51

to be that was on their channel.

53:53

So the cost could be staggering. So

53:55

it's possible we'll see entire channels

53:58

go dark with PAS videos

54:00

hidden away or deleted, all out

54:02

of fear that a mislite labeling situation

54:05

could result in massive fines, and there's still

54:07

a lot of uncertainty around this issue, and we're

54:10

not entirely sure how it's all going to play out

54:12

now. As for me, well, I'm in favor

54:15

of rules that protect kids from having their data

54:17

harvested without consent. I mean, I don't

54:19

like that idea at all about kids getting

54:21

tracked and targeted and advertising that's

54:24

you know, before they're able to even work

54:27

with the idea of what that means. They're

54:29

particularly uh, you know, vulnerable

54:32

to it. It's one thing to be

54:34

an adult and to understand, at least

54:36

on a basic level, what is going on when we

54:38

use the internet. It's another matter entirely

54:41

for children. However, the application

54:43

of those rules can be pretty chaotic

54:46

and disruptive, particularly to people

54:48

who are well intentioned. They are not

54:50

trying to create child directed content, but

54:53

they're worried about their material being

54:56

misrepresented or misunderstood as child

54:58

directed, and therefore every thing is

55:00

put in danger. That's not great

55:02

either, and channels that are clearly

55:05

not meant for kids could get caught up in

55:07

the crosshairs through no fault of their own.

55:09

So this is a situation worthy of attention.

55:12

Because it stands to affect hundreds

55:15

of creators on YouTube who

55:18

are not trying to make stuff for kids.

55:20

Then you've got people who like

55:23

their main audience are

55:25

kids, and they're not making stuff for kids.

55:28

Just so happens that their audience is

55:30

mostly kids. That's an issue

55:32

all on its own, and one that I don't

55:35

have any solutions for. If you're making

55:37

stuff that you know you didn't intend

55:40

to appeal to children, but children

55:43

think it's fantastic, where

55:45

does that put you because you weren't targeting them,

55:48

but that's your audience. That's

55:50

tough. Now. There are a lot of other stories

55:52

I didn't get to like, for example,

55:54

the Testlas Cybertruck debut and

55:57

how awkward it was when they had

55:59

the debut and they hit it with a sledgehammer

56:02

and then they threw some stuff at

56:04

the windows and the windows started cracking.

56:06

That was pretty a pretty rough

56:08

showing. And the cybertruck itself is is

56:11

really funky. It's a very odd

56:13

design, kind of reminds me of a Lamborghini Kuntash

56:16

or an old DeLorean in a way.

56:19

Or I didn't talk about how the Samsung Galaxy

56:21

folds mobile device, the foldable

56:24

smartphone how that launch

56:27

didn't go so well. You could say that the fold

56:29

cracked under pressure. I

56:32

didn't talk about the launch of Star Wars Galaxy's

56:34

Edge at Disneyland and Disney World. That was a

56:36

big deal, not just in tech obviously, but in theme

56:39

parks. Uh. There were the seemingly endless

56:41

supply of movie and television streaming

56:43

services that either launched in twenty

56:46

nineteen or were announced in twenty nineteen,

56:48

stuff like Disney Plus and the upcoming

56:51

HBO streaming service, Apple Plus

56:53

launched just tons of them. Now there

56:56

was Baby Yoda. But I

56:58

think it's a good time to wrap up this episode.

57:02

Let's set our sights on twenty

57:05

Yeah, you know what, Let's all get

57:07

twenty twenty vision in the

57:09

year with a pun. I guess technically

57:11

I'm starting the year with a pun because I think this episode

57:13

goes live on January

57:16

one. Anyway, that was twenty nineteen

57:19

in a nutshell. I've got a lot

57:21

of plans for I'm looking

57:23

forward to sharing with you more

57:25

wonderful stories about technology, interesting

57:28

stuff about how tech works, how it affects

57:30

us, how we affect it, how

57:32

things change over time, and how that change

57:34

can be messy. But sometimes once

57:37

you get through the messy parts, you can get

57:39

something really incredible. So we're

57:41

gonna look at those stories as well as well as the times

57:44

where things just didn't go right. We'll

57:46

be covering more of those as well. If you guys have suggestions

57:49

for future topics I should cover in technology,

57:52

let me know. The Facebook and Twitter

57:54

handle are both tech stuff hs

57:56

W. It's best to reach out to me there and

57:59

I We'll talk to you again really

58:01

soon. Hext

58:06

Stuff is a production of I Heart Radio's How Stuff

58:08

Works. For more podcasts from I heart

58:11

Radio, visit the I heart Radio app,

58:13

Apple Podcasts, or wherever you listen

58:15

to your favorite shows.

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features