Sunday, May 1, 2022

Gaming with just your chin

Introduction


Gaming is a hobby for many people, but a lot of us don't consider the fact that some disabilities could seemingly massively hinder a person's abilities to compete in it or even enjoy it at all – but some people have shown it to be possible. Using ingenious input methods, some people have pulled off things that even other hobbyists without such setbacks often struggle with.

Handicapableone


Enter Handicapableone, a Twitch streamer suffering from Duchenne Muscular Dystrophy, which means the only feasible method of input is using his chin. This would discourage most of us, but not him, as he has conquered many games and even entire franchises that many consider "too difficult" to play in the first place – his achievements include the following games among others:
  • Dark Souls I, II and III, a series by FROMSOFT known for its difficulty, with all their respective DLC content
  • Sekiro: Shadows Die Twice, another FROMSOFT game, considered even more challenging by many
  • Cuphead, also in a similar vein to the previous two in the sense of being mechanically difficult
  • Jump King, a small indie game, while not known for its inherent mechanical difficulty, but instead for the pure frustration it induces

How does he do it?


Handicapableone uses a setup he created himself. It consists of a DualShock 4 controller, held up by a bendable arm. He uses the joysticks and the D-pad, mapped to different functions depending on the game, later also adding a sip-and-puff switch to his arsenal. Here is a clip of him defeating the final boss of Sekiro: Shadows Die Twice. The setup is clearly visible:

(embed did not work)

However, Handicapableone's channel along with himself has disappeared from Twitch. I am not sure what has happened to him, but he hasn't streamed in a while and information on him is scarce.

Conclusion


Handicapableone is an inspiration to many, especially handicapped people around the world, showing that you can still enjoy things like gaming if you really want to.

References


https://dotesports.com/streaming/news/handicapableone-beats-sekiro-shadows-die-twice-with-his-chin
https://dotesports.com/streaming/news/after-beating-jump-king-with-his-chin-handicapableone-hopes-his-stream-continues-to-inspire-disabled-gamers

Sunday, April 24, 2022

Two interesting Linux distros

Tails


Tails or The Amnesic Incognito Live System is a security-focused Linux distro based on Debian. The main aim of Tails is the preservation of anonymity and privacy, being sponsored by the Tor Project. This is also the reason why it exclusively uses TOR to connect to the Internet. Tails has also been funded by the Open Technology Fund, Mozilla, and the Freedom of the Press Foundation.

It is designed to be booted off of a bootable USB or DVD drive, and will not leave any sign of its use on the machine unless the user wants to and decides to do so. Tails comes with the GNOME 3 desktop environment pre-installed, along with the bare minimum software to enable viewing/editing/printing documents/images and playing video files.

The word "Amnesic" in its name means that it runs purely in the computer's RAM and does not write to any persistent type of storage by default. The user can choose to do so, in which case the storage will be automatically encrypted (although it will be detectable). On shutdown, Tails also overwrites most of the RAM it used to prevent/avoid cold boot attacks.

It was released first in June 2009, being a successor to Incognito, which is a now-discontinued Gentoo-based Linux distro. Laura Poitras, Glenn Greenwald, and Barton Gellman have credited Tails as an important tool used in their work with the (in?)famous NSA whistleblower Edward Snowden.

Puppy


The Puppy OS is somewhat akin to Tails in the sense both are quite lightweight, however, Puppy takes it to the next level. It only takes up about 300 MB of RAM for the 32-bit version, or 600 MB for the 64 bit one. It can also run on less than that, needing 128MB minimum to run from RAM and down to 48MB if some of the OS is run from persistent storage. Despite its small size, it includes some fairly basic software like AbiWord, Gnumeric and MPlayer.

The tool Woof can also be used to build a Puppy distribution from the binary packages of other Linux distributions. The supported distributions for this are Debian, Slackware and Ubuntu.

Puppy is generally well-liked thanks to its lightweight nature, being able to revive systems considered obsolete by any modern standard, making them usable for some light common desktop workloads.

The first release of Puppy was in June 2003, however, this was version 0.1, which, as suggested by the version number, was very barebones and lacked a lot of features such as a package manager or any ability to install applications. The full release, version 1.0 came out nearly 2 years later in March 2005. The latest release as of 25.04.2022 is version 9.5, which dropped support for 32-bit systems altogether as Ubuntu did so as well.

Conclusion


Tails and Puppy are two Linux distros that were made for completely different things – one for security, the other for its extremely light weight. They do share some similarities though despite their completely different use cases.

Monday, April 18, 2022

The hacker ideals in the modern world

Hacker culture


The hacker culture has been around ever since computers came around, and even preceded them by a little – but do the culture's ideals hold up in the modern world?

The ideals


1. Unlimited access to computers - and anything which might teach you something about the way the world works.


This has been a goal for most tech-literate people for a while now, and the world is inching ever closer to it. The practice of teaching kids to be somewhat versed in using a computer is fairly well-spread (although sometimes, the kids are already more experienced than the teachers!). This is also a pitfall in disguise – people tend to leave their young kids alone with their devices, open to the opportunities of the powerful Web, which is not exactly child-friendly in most of its content.

On the topic of "anything which might teach you something about the way the world works", while computers may be reaching ubiquity, information is not quite there.


2. All information should be free.


A lot of information has been made much more freely accessible with the Web becoming as widely used as it is today. Online encyclopedias such as Wikipedia, which anyone can edit, may not be the best source for any scientific work, but they are great for acquiring general level knowledge about a lot of topics.

Obviously, there still is a lot of secret information, mostly related to manufacturing processes or other things that might compromise a company's lead in its field if leaked. Unfortunately, making this information publicly available is fairly improbable, although it could help pave the way to the mentioned Capitalism 3.0.

3. Mistrust authority - promote decentralization.


The hacker ethic doesn't exactly mistrust all authority, but rather the misuse of authority. I think it is a good, if simplistic approach to a complex issue. On the topic of decentralization, the Internet has been quite decentralized from the start – and looks to be staying that way. New technologies, for example, blockchain and the cryptocurrency based on it, seek to expand the decentralization to the financial world. Judging by their success in the last few years, decentralization seems to be the way of the future.

However, social media along with a lot of the services people use online are often owned by a single tech giant parent company, which introduces concerns about privacy, data collection and more. The Internet isn't homogeneously moving towards decentralization at all.

4. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.


This is how it should be. However, in a lot of cases, it isn't. The problem is that fake or bogus "hackers" that have close to no idea about these ideals are a lot more prevalent on the internet than real, ethical hackers, so much so in fact, that the general public associates the word "hacker" with them instead.

For example, the most famous/infamous hacker group in the world Anonymous is frankly hard to take seriously. Before the war in Ukraine, all they did was post scary videos sometimes, but I must admit that their contribution to the war was something I did not expect at all.

Additionally, the idea of the internet being more equal than other channels of communication does stand, however even this has started to deteriorate, with all kinds of "ironic" -isms becoming prevalent in modern Internet humour.

5. You can create art and beauty on a computer.


Of course. Digital art is a large portion of the art being created today. Even I've tried my hand at it, and the power of computers in creating art is undeniable.

If you don't consider merely using a computer as a medium to create traditional art, actually "creating beauty on a computer", then I'd say a well-written piece of code is just as inspiring and beautiful. Beauty is in the eye of the beholder, after all.

6. Computers can change your life for the better.


This is also very obvious – unless you are a Chinese sweatshop worker toiling away to assemble tech devices for a slave-like pay or a hopeless gaming addict, chances are computers already have affected your life in a positive way, whether you realize it or not.

Drastically changing one's life though is a little different, and I believe computers alone can't just "change" someone's life that deeply (unless you plop a person from a few hundred years ago into the modern times). The computer, in the end, is a tool, an extension with which you can change your life, but the existence of the computer alone won't.

Conclusion


The hacker ideals might not be prevalent in all of the general populace, but they still are relevant and absolutely followable in the modern world.

Sunday, April 10, 2022

Online censorship and privacy

Online censorship


Online censorship is either blocking or limiting the data/websites viewable on the internet by some group of people. The level of censorship varies mostly on a country-to-country basis. It is a controversial topic, with most people agreeing that some sort of censorship should exist on the internet, however, the extent of this censorship is still debated.

The latest and most prominent example of internet censorship is the Russo-Ukrainian war – due to the nature and extent of the conflict (maybe not physically, but this conflict is politically much bigger than just the two countries). In this conflict, both sides have begun massively censoring each other's general media, labelling it propaganda. Russia has gone further and limited access to social media, more specifically Twitter, which is blocked in most regions, and Facebook and Instagram, which are blocked in the entire country altogether.

Even before the war, social media sites faced pressure from the Kremlin to remove "unfavourable" content. While this censorship has not developed far enough yet to be compared to the Great Firewall of China (since a VPN is still not that hard to find, and will bypass censorship), it isn't too far-fetched to consider it a possibility in the future.

Privacy


Privacy on the internet is another hotly contested topic, with many apps and services gathering data about their users, claiming it is to improve the users' experience. However, this is not always the case.

The Facebook and Cambridge Analytica data scandal was perhaps the biggest of its kind to date. In the 2010s, Cambridge Analytica obtained the private data of tens of millions of Facebook users. This was the largest known data leak in the history of Facebook. Cambridge Analytica then used this data to construct voter profiles to sell to political campaigns.

This scandal quickly blew up, with connections spanning from Trump's aide Stephen K. Bannon to Russia's Lukoil oil giant company (which had connections to the Kremlin).

In the end, it is estimated that around 87 million people's data was misused. The incident prompted people to be more concerned with their privacy online, and the phrase "You are the product on the internet." was popularized.

Conclusion


Censorship and privacy are two distinct yet connected topics on the Internet – and a complete agreement is to be reached on both of them. The future could hold dangerous things both in censorship and privacy.

Monday, April 4, 2022

Cyber security in Estonia

Introduction


Estonia has focused on cyber security for quite some time now and takes pride in its achievements in the field. It's a given then that the cyber security situation here is generally above the global standard.

NCSI


The NCSI or the National Cyber Security Index ranks countries based on their development level in several cybersecurity-related fields. According to the NCSI, Estonia currently ranks 5th in the world, only beaten by Greece, Lithuania, Belgium and the Czech Republic.

The top 5 countries. NCSI

They also provide a fairly in-depth analysis of what capabilities the country lacks to achieve a better score. The NCSI attributes these shortcomings to Estonia:
  • No cyber security strategy implementation plan
  • No PhD level cyber security programme
  • No regulated requirements for cryptosystems 
  • No specific government entity to combat cybercrime

Other than the aforementioned shortcomings, the NCSI gives Estonia an otherwise perfect score. Some notable points include:
  • The inclusion of cyber/computer safety competencies in primary/secondary school curriculums
  • The existence of a dedicated military cyber operations unit, and its active participation in exercises
  • Hosting of an international cyber security organization in the country (CCDCOE)

It should be mentioned that the NCSI is based in Estonia, but they don't seem to be doing anything to make our country seem better than it is.


Conclusion


Estonia is punching above its weight in cyber security right now, with people being actively educated about the basics in schools (although some people from the older generations can still be sort of clueless). The Estonian international cyber security situation is a bit better than its internal one though. There is no top-level cyber security education, no cybercrime unit and some lacking regulations.

References:

Sunday, March 27, 2022

HCI – difference between a disaster and a miracle?

Human-Computer interaction


The user experience of a system or a program is something that everyday users might take for granted, depending on their needs. Today's mainstream applications and devices usually feature carefully thought out designs to make the interaction between man and machine as seamless as possible (with a few exceptions). However, in some applications, HCI can quickly turn into a life-or-death matter.

When it goes wrong


In aviation, a lot can happen during a brief period of confusion. Air Inter flight ITF148, an Airbus A320, was on approach to Strasbourg Airport when the pilots forgot to switch the autopilot mode from Vertical Speed Mode to Flight Angle Path mode for landing. The pilots then intended to set the aircraft's autopilot to a normal 3.3-degree descent angle and input the number "33" to the system. However, in the Vertical Speed Mode, this 33 translated to a descent of 3300 feet (or around 1000 meters) per minute. This happened in the mountains at night, and there were low, fairly dense clouds, so the pilots had no visual cue of how fast they were descending. Shortly after that, the aircraft crashed into the mountains, and no survivors were found. In response, Airbus changed the way their system displays descent speed, which is now displayed as a four-digit number instead of just two to prevent confusion.

ITF148. Wikipedia



There have been other similar incidents over the years, most of which were met with aerospace companies improving their designs to what they are today. Hopefully, by now, they've gotten it right, or at least right enough.

When it goes right


Generally, good HCI is achieved when the user, its needs, capabilities and limits are considered in the system's design. Staying on the topic of aviation, the General Dynamics F-16 fighter jet is completely fly-by-wire (meaning that the pilot input is given to a computer, which then controls the aircraft based on how it interprets the input). This feature allowed the designers to incorporate something called the Automatic Ground Collision Avoidance System, which, as the name suggests, avoids colliding with the ground. This is especially important in fighter jets, where the pilots could potentially pass out mid-maneuver due to extreme G-forces. To date, it has reportedly saved 10 pilots and 9 aircraft in total.

The USAF released footage of this system in action a few years ago:


Conclusion


HCI can potentially make or break a bad situation, especially in crucial applications such as aviation. The human aspect of a system is a very important thing to consider.

References


Sunday, March 20, 2022

Last 20 years of the IT sector in Estonia briefly

IT professionals and Estonia


For as long as I remember, IT people have been highly valued in the Estonian economy. While tech-savvy people looking for work in line with their interests have generally been a fairly common occurrence here, some events in our country's history have deepened the need for truly skilled IT specialists.

Today, Estonia has made itself somewhat known in the world (at least among people in the IT field) by trying to be the most digitized country in the world. It has worked somewhat, although some of the claims circulating the internet are false (like the "wifi anywhere in the country, even forests" thing, who thought of that one). This goal has greatly increased the demand for IT professionals in Estonia over the years.

How did it start?


Estonia's recent history is entangled with tech, becoming the first country to allow digital voting as early as 2005. It was no small effort, and the voting system itself is inherently very security-focused, so a considerable workforce versed in cyber security was required.

The cyber security focus escalated massively after 2007 when Estonia suffered the then-second largest cyber attack ever recorded. This attack displayed the potential vulnerability of a country, unprotected from potential cyber threats. As a response, Estonia took up bolstering its cyber security capabilities, creating even more demand for workers in the field. Today, Estonia houses the NATO cyber defence hub CCDCOE and has a separate branch in its military dedicated to cyber defence (KÜVJ).

From a non-defence perspective, Tallinn has been dubbed the Silicon Valley of Europe, with the number of startups per person surpassing any other European country.

What does this mean for an IT professional?


The range of jobs a professional can find here is pretty colourful. In CVKeskus.ee, as I'm writing this, there are 188 job offers in the IT category, with the oldest offers being just under a month old. A lot of them offer the chance for working from home, and almost all of them are well-paid by Estonian standards. In addition, a lot of professionals prefer to change jobs every ~3 years to keep the pay competitive by market standards. Some of the offers are listed in English, but most of them require at least some English language skills anyway.

Common expectations for a worker in the field


In addition to whatever skill set is needed to complete the technical job, good English and overall communication skills are highly valued. As the crowd in Tallinn becomes more international, the Russian language loses a little bit of its importance in the workplace compared to the past, however, it is still a plus.

Comparing past expectations and conditions to current ones, we can see that the amount of jobs has grown, but workers are also much less "loyal to their workplace". I see it as a good thing because it incentivizes employers to make working for them more beneficial for the worker as well. In addition, the importance of the Russian language has declined, with English mostly taking over in the IT sector. Skills with newer version control technologies like Git have become almost required to facilitate more efficient development. Formal education in the field has lost a little bit of its importance, however, it is still heavily considered as a factor in hiring (although experience and overall competency outweigh a certificate – if you make it to the interview).

Conclusion


Estonia's strides towards digitization (successful or unsuccessful, depending on the take) have undoubtedly facilitated the emergence of a fairly IT-focused job market that has changed and evolved quite a bit over the years.

Gaming with just your chin

Introduction Gaming is a hobby for many people, but a lot of us don't consider the fact that some disabilities could seemingly massively...