Academic Travel Tips
Academics — at least those actively involved in computer science research — do a fair amount of travel. Making this go smoothly is something of a learned and practiced skill. Here are some things that have helped me.
Academics — at least those actively involved in computer science research — do a fair amount of travel. Making this go smoothly is something of a learned and practiced skill. Here are some things that have helped me.
This crossed my Twitter stream today, thanks to Mark Guzdial:
What could fund free public higher education for the next 58 years? pic.twitter.com/kaJ6mLUCmC
— Jeffrey Levin (@jilevin) January 2, 2014
The original article has posted an important correction — the funds spent on the wars in Iraq and Afghanistan (not just Iraq) would fund public higher education for 52 years (not 58). The numbers are weakened a bit, but don’t really undermine the point.
Generally-accepted practice for verifying the identity of other cryptography users and extending your web of trust to them usually involves checking a government-issued photo ID, verifying that the picture is the person giving you the key fingerprint, and then verifying that the name on the ID matches the name on the PGP key that you are going to sign. The purpose of this is to know that, when you encrypt to that key, only the person you think is receiving the mail can read it, and that signatures from that key come from the person who claims to use it. It allows you to associate the cryptographic key with a person.
In the present era, where state-level adversaries are on the top of many security-conscious users’ minds, isn’t this a hole? Aren’t we depending, critically, on the very entity we are trying to protect ourselves from?
I don’t think this is a significant weakness, though. To understand why, let’s first consider exactly what attacks would be enabled by the government misusing its identity-certifying authority. It allows them to compromise key exchanges. That is it. Specifically, if Alice and Bob want to exchange key fingerprints, what Proconsul Eve can do by forging an identity document is to substitute her operative Albert, with government-issued documents certifying he is Alice, at the meeting. The result is that Bob will have thought he verified that Alice’s key actually belongs to Alice, when in reality the private key is held by Eve. So when he talks to Alice, he’s really talking to Eve.
Once the key exchange is done, however, Alice and Bob have no need for government-issued ID. They have securely exchanged keys, and Eve cannot fake an exchange to substitute her own keys. The only thing that can be done by issuing an invalid ID card is to compromise the initial key exchange.
So you have a new research question. You’re reading a paper, or a book, or a news article, and a hypothesis forms in your head. Or you have a new idea for resolving an important conundrum in your research.
What do you do?
In startup and business culture (or certain segments of it, at least), there is the concept of the minimum viable product. This is basically the smallest version of a product, stripped down to its barest essentials, to see whether it would gain traction in the market. Create a minimal product and iterate quickly instead of spending a year building something that might not take off.
I think this concept is instructional for research. Minimum viable research would be to ask yourself: what is the simplest thing I can test to see if this idea might go somewhere? Rather than spending a week doing data analysis, is there a 1—2 hour way to see if it might work, or if it is trivially falsifiable? Can you structure your research inquiry so as to fail fast, to not spend excessive time trying to fit a model that just won’t work?
Patrick Volkerding released Slackware 14.1 yesterday. Yep, Slackware is still alive and kicking.
Many years ago, I first encountered Slackware. I was in junior high, and had been using some GNU tools on Windows via DJGPP, but I read about ‘GNOME’ and wanted wanted to try this Linux thing. So I convinced my dad to let me install LoopLinux on the family computer (a 120 MHz Pentium from Gateway 2000).
LoopLinux was a Linux system that ran from a single file on your DOS or Windows filesystem. The installed system consisted of the filesystem file, kernel, initrd, and LOADLIN; it would boot the kernel, mount the DOS filesystem, and mount the Linux system as a loopback filesystem. Once installed, LoopLinux used Slackware packages.
We only had dialup at the time. I stayed up all night the night I downloaded LoopLinux; I’d sleep for an hour or two on the living room couch, then wake up and go check the downloads and see if I needed to start another of the files downloading.