Skip to main content

Computing in the Cloud Will Cause “Horrible Problems,” Warns Apple Co-Founder [UPDATE]

(New Update: Privacy proposal targets cloud computing concerns.) 

As tech companies rush to make their services available in the cloud, one particularly notable member of the tech elite isn’t so sure about the current cloud computing craze. Speaking to a Washington audience after a performance of “The Agony and the Ecstasy of Steve Jobs”—the monologue of the controversial Mike Daisey—Apple co-founder Steve Wozniak expressed his concern about the increasingly popular trend.

“I really worry about everything going to the cloud,” Wozniak warned. “I think it’s going to be horrendous. I think there are going to be a lot of horrible problems in the next five years.”

What’s Wrong With Cloud Computing, Steve?

Elaborating on his statement, the Apple co-founder highlighted the proprietary ambiguity associated with cloud computing.

“With the cloud, you don’t own anything,” Wozniak observed. “You already signed it away.”

By signing it away, he was, of course, referring to the oft-convoluted terms of use and user agreements that cloud service providers make users sign in order to utilize their services. Although most of the more popular services—Google Drive, Microsoft SkyDrive, Apple iCloud—don’t explicitly grant themselves ownership rights over user data in their user agreements, the use of hazy terms like “worldwide license” and the exclusion of specific procedures regarding sharing and deleting user information leave that line suspiciously blurred.

“I want to feel that I own things,” the Apple co-founder continued. “A lot of people feel, ‘Oh, everything is really on my computer,’ but I say the more we transfer everything onto the web, onto the cloud, the less we’re going to have control over it.”

Wozniak’s feelings about computing in the cloud aren’t the first of their kind. Once cloud computing services began springing up for consumer use, concerns over the ownership, as well as the privacy, of user data quickly followed—and for good reason, especially given the considerable gains that stand to be made by cloud service providers.

However, given the benefits that cloud computing offers to users, it is difficult to think that Wozniak’s prediction will prove to be a practical deterrent against this massive migration—by consumers and businesses alike—into the cloud. That said, ensuring that this valid concern remains part of the dialogue throughout this transition may well put the necessary pressure on cloud service providers to make user agreements line up with these reasonable expectations on ownership and privacy rights.

If not, the issue will probably find itself in the same forum where most disputes of this nature are resolved: a courtroom.

UPDATE: Privacy Law Would Require Warrants to Obtain Cloud Data

…Or on the House floor, apparently.

According to a new report from Wired, a pair of democratic congressmen has proposed a measure that would significantly amend the increasingly dated Electronic Communication Privacy Act, or ECPA. Given the general stagnancy of the ECPA since being signed into law by the Reagan administration back in 1986, this latest attempt to modernize this law could not be more imperative than it is now.

“Communications technology is evolving at an exponential rate and, as such requires corresponding updates to our privacy laws,” observes Rep. Jerrold Nadler, who, along with colleague Rep. John Conyers Jr., is sponsoring the proposal. “This new legislation will ensure that ECPA strikes the right balance between the interests and needs of law enforcement and the privacy interests of the American people.”

To demonstrate just how behind the times the ECPA is, the law was passed during the CompuServe era, before the days of Google, Dropbox, Facebook and Twitter. Back then, obtaining a warrant was seen as unnecessary for information kept on servers for more than 180 days—the point at which such information was reasonably considered abandoned.

“But technology has evolved, and e-mail often remains stored on cloud servers indefinitely, in gigabytes upon gigabytes—meaning the authorities may access it without warrants if it’s older than six months,” writes Wired’s David Kravets.

Clearly, this was not the purpose of the ECPA’s warrant exception when it was passed into law, making the Nadler-Conyers bill a necessary one to say the least. To be sure, the proposal—whose chances of passage are likely steep in light of past attempts to modernize the ECPA—would address the act’s current shortfalls with the following changes (as posted on Rep. Nadler’s House member page):

· Provide a uniform standard and set notice rules when the government accesses the contents of communications;

· Amend the law to provide the same statutory suppression remedies for electronic communications as are currently provided for wire and oral communication surveillance. Currently, an aggrieved person can suppress wire or oral surveillance, but not electronic.

· Add new – and, in some instances, modify existing – reporting requirements to ensure that Congress has sufficient information for effective oversight and possible future reforms.

God knows such an update would be long overdue, especially in light of the concerns expressed by Wozniak (see above); however, whether it will survive, or even receive, a committee hearing is an entirely different matter.


Popular posts from this blog

The 101 Most Useful Websites

Kingston Launches HyperX Plug and Play RAM for Intel PCs

Kingston has released its new HyperX plug and play (PnP) series which is a collection of memory kits that utilize modules which are capable of working at frequencies of either 1,600 MHz or 1,866 MHz. This memory module is designed specifically for use with desktops and laptops powered by the latest generation of Intel Core i5 or Core i7 central processing units.

There are six kits in total, all of them composed of two kits, meaning that modules of 2 GB and 4 GB are used. There are two Dual in-line Memory Module (DIMM) kits, while the other four come in the Small Outline In-line Memory Module (SODIMM) form factor.

The modules are programmed using Joint Electron Devices Engineering Council (JEDEC) compliant settings, allowing 1600MHz and 1866MHz frequency support. It is as simple as plugging in the memory and turning on the machine, as the system automatically recognizes faster memory speed with no further basic input/output system (BIOS) settings required.

Mark Tekunoff, …

DriveLocker: Hide Any Hard Drive Partition on Your Computer

I have partitioned my hard drive into 2 parts: C and D. C, as is normally, is dedicated for installation files and such. My D drive is dedicated to songs and all types of personal files. Since I often have friends over who use my computer, I was looking for a way to hide my personal drive from them. I need a way to hide my D drive. And that way was excellently provided by DriveLocker. [You may also try: Restrict Users From Opening a Hard Disk Partition] DriveLocker is a wonderful program for Windows computers that hides any hard drive partition of your choice. Through the images and description below, you will see how it works. First of all, you will need to download the program’s ZIP archive that is only 23KB large. Then you will need to extract the executable within this archive. Opening this EXE file will run the program, no installation will be required. This is what the program looked like on my computer: Initially both drives will be unchecked. This means that I can view both my dri…