Saturday, October 29, 2011

Bitcoin value crashes below cost of production as broader use stutters

AppId is over the quota
AppId is over the quota
Bitcoin value has fallen since June 2011 The value of Bitcoins has dropped dramatically since June 2011 when they peaked at $33: now they are between $1 and $2. (Black line: closing price on MTGox Exchange. Red and green lines: volumes.)

The value of Bitcoins, the "cryptocurrency" that some had thought would take over from more traditional currencies, has plummeted across exchanges – to a level where it costs more to "mine" them than they are worth.

Though there's no obvious reason why, part of the problem seems to be precisely what economists remarked on when its value began to spike as more and more people piled in: the appreciation in value was a speculative bubble, caused by people hoarding the currency, rather than the start of a new (or parallel) economy.

The value of Bitcoins on one of its main exchanges, MTGox, has collapsed since mid-June from a high where it was trading at the equivalent of about $30 per "coin" almost to parity now. That still marks an improvement over the year: on 1 January 2011, Bitcoins traded at 30c each.

Bitcoins have risen in value since January 2011 Bitcoins have appreciated in value since January 2011, but fallen a very long way from their peak. (Black line: closing price. Red and green spikes indicate volume of sales.)

Similar falls in value are evident across other exchanges, as shown by the values on Bitcoin Watch, where the value of Bitcoins being traded has fallen from a high of more than $30 to between $1 and $2 now.

Bitcoins, which are in fact just very long strings of numbers, are "produced" by a processor-intensive calculation which requires increasing amounts of computing power to create each one. There is also a limit on how many can ultimately be produced, according to the algorithm which generates them. So far 7.48m have been produced.

The problem with the Bitcoins' value falling below the cost of "mining" – actually the computer time that has to be devoted to them – arises because as each "coin" (or computer hash) is generated, the peer-to-peer network used by computers that accept and generate them makes it harder to generate the next.

According to the explanation at Tradehill, "New coins are generated by a network node each time it finds the solution to a certain mathematical problem (ie creates a new block), which is difficult to perform and can demonstrate a proof of work. The reward for solving a block is automatically adjusted so that in the first four years of the Bitcoin network, 10.5m BTC will be created. The amount is halved each four years, so it will be 5.25 over years four to eight, 2.625m over years eight to 12, and so on. Thus the total number of coins will approach 21m BTC over time."

In May one user suggested that the effort being thrown at Bitcoins was wasted: "We're all trying to profit from the high exchange rates (1BTC is 9USD at the time of writing this) that we're throwing everything we've got at the bitcoin network. We profit from our actions for a couple of days, then the network detects the increase in speed and adjusts itself down, negating all the efforts we put into it, forcing us to buy even more processing power. It's an endless cycle of stupidity that simply cannot be solved by human nature."

With the value of Bitcoins dropping so low, and the computing power required to produce them growing steadily, it is becoming uneconomic to generate more except through the use of hacked computers in "botnets". Although there has been anecdotal evidence of their being used to generate Bitcoins, many botnets are hired out on a commercial basis to send spam or host phishing websites – and that may be more profitable, directly, than creating the currency.

Hackers and members of the underground like Bitcoins because transactions involving them are almost untraceable, yet can be carried out between computers. That has proved both a blessing and a curse, though, after one user discovered in June that his computer had been hacked and 25,000 Bitcoins – then worth almost $500,000 – had been removed from the "wallet.dat" file on his machine. Because of their untraceability, he could not know who had taken ownership of them.

A few days later MTGox itself was attacked when someone tried to sell more than 400,000 Bitcoins, which would have been worth about $9m. But that prompted a huge drop in per-coin value from more than $17 to $0.01 because there weren't enough buyers at the higher price. MTGox went offline and pledged to reverse the transactions.

However, commentators had suggested that the biggest weakness about Bitcoin was that although many were being produced, their apparent value was based on small numbers of transactions within a small group – which is not an effective model for a viable currency. Although there are a number of websites that accept Bitcoins in exchange for real-world goods and services, it is very difficult to measure how many transactions have occurred.

That, in turn, makes it hard to calculate how many people are using them. But graphs on a Belgian site that tracks the computational power being applied to Bitcoin mining suggest that the amount dedicated to it peaked in mid-August, and has fallen since then. That would indicate that fewer people are trying to mine Bitcoins – even though only one-third of those that could be discovered have been.

Paul Krugman, a Nobel prizewinner in economics, criticised Bitcoin in an article in the New York Times in September:

"What we want from a monetary system isn't to make people holding money rich; we want it to facilitate transactions and make the economy as a whole rich. And that's not at all what is happening in Bitcoin. Bear in mind that dollar prices have been relatively stable over the past few years – yes, some deflation in 2008-2009, then some inflation as commodity prices rebounded – but overall consumer prices are only slightly higher than they were three years ago. What that means is that if you measure prices in Bitcoins, they have plunged; the Bitcoin economy has in effect experienced massive deflation."

Writing in the September/October edition of Technology Review, the New Yorker financial writer James Surowiecki noted that Bitcoin might indeed be trapped in a deflationary spiral:

"With ordinary currencies, though, there's a limit to how far down the spiral can go, since people still need to eat, pay their bills, and so on, and to do so they need to use their currency. But these things aren't true of bitcoins: you can get along perfectly well without ever spending them, so there's no imperative for people to stop hoarding and start spending. It's easy to imagine a scenario in which the vast majority of bitcoins are held by people hoping to sell them to other people."


View the original article here

Friday, October 28, 2011

Sentencing the rioters: an alarming benchmark | Editorial

AppId is over the quota
AppId is over the quota

At the height of August's rioting, Jordan Blackshaw and Perry Sutcliffe created Facebook pages urging acquaintances to gather for – in Blackshaw's words – a "smash down". Extremely irresponsible as these postings were, neither of the proposed events took place, neither man participated in rioting and no actual harm occurred as a consequence. Both men were nonetheless sentenced to four years' imprisonment for inciting the commission of an offence. The court of appeal upheld those sentences yesterday in a ruling that sets a dismaying – and bewildering – precedent.

The appeal court judges were "unimpressed" by the argument that neither man had gone door-to-door to incite rioting, declaring that "modern technology has done away with the need for such direct personal communication". Lengthy sentences were appropriate because "decent citizens" had been "put in fear" by the threat to riot. The sentences, in short, had a deterrent effect and were justified in the context of "mob criminality". For similar reasons the court also upheld long jail terms for burglary and violence against the police, though it halved the sentences of three people convicted of handling stolen goods on the grounds that they did not contribute to the disorder. That is welcome. So too was the fact that none of yesterday's cases concerned minors, who can expect more sympathetic treatment at the hands of the youth courts.

No one should underestimate the harm and terror inflicted during those five days in August. The riots were unprecedented in recent history. Police involvement in Mark Duggan's death sparked the first disturbances in Tottenham, but the subsequent riots and looting were, as the lord chief justice said, "utterly inexcusable". Indeed, citing the Garden House riots 41 years ago, he made it clear that political motivation was in any case irrelevant to sentencing.

Any offence committed in the context of a breakdown of order will attract more serious punishment. The prime minister's call for judges to bear down hard on rioters met with general approval. But within days senior figures, including the former director of public prosecutions Ken Macdonald, were warning of a loss of proportion. The decision to cut the sentences for handling stolen goods justifies those concerns. Yet faced with the phenomenon of Facebook, the court missed the chance to cool the heat of those August days. The judiciary is inclined to take a dim view of anything that smacks of conspiracy and is instinctively twitchy about any new technology which they fear might wriggle beyond the rule of law. When Twitter users named a footballer who was the subject of a privacy injunction earlier this year, Lord Judge warned that "modern technology" was "totally out of control".

But those who remember the seven-year sentence Abu Hamza received in 2006 – for six counts of soliciting to murder and two of using threatening words or behaviour likely to stir up racial hatred – will find yesterday's ruling extraordinary, and all the more so for its failure to properly explain how judges arrived at the figure of four years. Had they not pleaded guilty, Lord Judge indicated, they would have received an even longer jail term. Last year Darren Tinklin was jailed for three years for illegal possession of a firearm and making explosives. The criminal justice system is right to make examples of Blackshaw and Sutcliffe. But they are not bomb-makers. This ruling ramps up pressure on Britain's overcrowded jails. It made no mention of restorative justice, nor suggested that rioters might benefit from being forced to confront the results of their actions directly. The justice secretary has pointed out that some of the rioters had been jailed before and lamented reoffending rates among former inmates. It is a bitter irony that his words now lie buried under the questionable belief that a prison term will either deter or reform.


View the original article here

Wednesday, October 26, 2011

BlackBerry maker admits failures over outages

AppId is over the quota
AppId is over the quota
BlackBerry maker Research In Motion has launched an audit into last week's outages BlackBerry maker Research In Motion has launched an audit into last week's outages. Photograph: Justin Sullivan/Getty Images

The UK boss of BlackBerry maker Research In Motion has admitted the company was too slow to update customers about last week's outages across Europe, the Middle East and US.

Answering questions from BlackBerry users on the BBC website, Stephen Bates said RIM had launched a full audit of its infrastructure after millions of customers were unable to send email or browse the web for most of last week.

The internal audit will also look at how the Canada-based company struggled to communicate with its customers, Bates said.

"We didn't spend enough time thinking about the communication, so we've since spent more time doing that," he said. "The communication can always be improved and part of the review we're doing is about that, so we can be much quicker in future."

Bates added that it was "too early to say" whether anyone deserved to lose their job over the outage, by far the most severe in RIM's history, which stemmed from the company's Slough network operating centre.

"For us, we designed a very resilient system in our infrastructure that has lots of backups," he said.

"This problem happened with a system that should have backed up in the normal fashion, but it didn't. We test these systems and they work fine – the team have done everything they can and this appears to be an anomaly. It's early days, we're still investigating and we're not going to come to any conclusions on that point."

He confirmed that RIM's chief technology officer, David Yach, has launched a "full audit of our full infrastructure". Bates said: "He's got the authority to do whatever he needs to do to ensure that resiliency is maintained."

Those affected by the outage will be compensated with $100 (£63) worth of apps from the BlackBerry App World, the company said on Monday.

RIM shares opened up 2%, at $22.80, on the Nasdaq stock exchange on Tuesday, but remained almost 3% down on 12 October, at the height of the outage.


View the original article here

Monday, October 24, 2011

How an email hacker ruined my life – then tried to sell it back to me

AppId is over the quota
AppId is over the quota
rowenna davis email hacked Rowenna Davis. who was targeted by an email hacker who wanted money to restore her address book. Photograph: Andy Hall for the Observer

A hacker has been occupying my email account for the past week. And he or she may still be there. A disembodied intruder, this person has been stalking my inbox, replying to messages, signing off with my nickname and refusing to let me in. They have been going through my personal history and making judgments about my character. In the weirdest twist, the hacker even started writing to me. If it wasn't so unsettling, it could be the plot of a black postmodern comedy.

It started when my phone went crazy in the middle of a crucial meeting. Some 5,000 contacts received an email from my account saying that I'd been held up at gunpoint in Madrid. My internet-savvy friends sent texts to say I'd been hacked, while my elderly, migrant and more vulnerable friends wanted to know where to send the cash. According to the story, my mobile phone and credit cards had been taken and I was badly in need of money. There was a number to call to reach me at my hotel – presumably chargeable – and a Western Union account had been set up in my name to wire a transfer.

Suddenly you're hit with an organisational bombshell – drop what you're doing; freeze your bank account; answer anxious calls; lose crucial, last-minute messages; miss work deadlines; irritate bosses; reset all email-based passwords; forget to pay e-bills; irritate friends who think you're ignoring them. The realisation dawns that the email account is the nexus of the modern world. It's connected to just about every part of our daily life, and if something goes wrong, it spreads. But the biggest effect is psychological. On some level, your identity is being held hostage.

Out of sheer frustration, I fired off an email to my occupied address labelled "to those who hacked my account", laying out how I felt and asking for my contacts. Shockingly, I got an almost instantaneous reply. The hacker said they would return my address book for £500. It was unreal. There I was, sitting at my laptop, alone in my flat, receiving emails from someone claiming to be me. Whoever it was must have been sitting watching my account and responding in real time. Who else was this person replying to in the same way?

I wrote back straight away, saying that I didn't have those kind of finances and pointing out that I had no reason to believe the deal would be kept even if I did send the money. I couldn't help but end with a rhetorical: "Do you ever feel even slightly bad about what you are doing?"

Just for a minute, the hacker seemed anxious to prove that he or she had some sense of morality. According to this individual, it "didn't feel great" to be a hacker. They said they didn't have a choice. I immediately asked why. They said their life "wasn't as nice and sweet" as mine. In what I guess was supposed to be a gesture of magnanimity, this individual said that they would release my contacts for just £300, and even offered to send me 20 contacts upfront as a sign of "goodwill". You could tell this person thought they were being reasonable – they insisted that their actions weren't as bad as robbing people on the streets.

What I wanted to reply, but found difficult to articulate at the time, was that hacking can be worse than that. When someone holds you up in the street, you lose a set of isolated possessions and then get to walk away. But if someone colonises one of your chief platforms of interaction with the world, there's always a feeling of "what next?" They can read your most intimate emails and potentially pass them on. A simple search would allow them to find out not just my address, but also those of my friends and family – something that crossed my mind when I registered my case with the police.

Apparently some 3,000 people reported such scams last year, but too few of these are brought to justice. The police haven't even returned my call for a full report. When I did eventually get access to my account back through Gmail a week later, I found that the hacker had personally written to more than 30 people who had asked about my problems in Madrid. The intruder said I'd had a "terrible experience" and signed off with my nickname, "Row". The fact that someone could be so callous to people who cared about me – all in my name – left me furious.

I was lucky. The only reason I was able to regain access to my account was through chance – a friend of a friend works at Google. Until then, my hacker had given me better feedback than Gmail and Google, following my attempts to get in touch with them. The company that presents itself as the friendly face of the web doesn't have a single human being to talk to in these circumstances. The UK office just cut me off and, after a friend waited 20 minutes to ask the head US team if there was anything that could be done to help, they received a simple "nope".

When someone did bother to look into my problem, it only took five minutes to fix. The hacker had doubled the verification process on my password so I couldn't get in. Once Google disabled it from the inside, I was able to reset all my security checks without a problem.

Even now, I'm not sure it's over. In one last message, addressed from myself just two days ago, the hacker wrote: "I see you got the account back. Sorry for the trouble." I never replied, so I guess I'll never know what this individual's circumstances were. But I feel the need to understand them. Perhaps we believe that if we find reasons for things, we'll feel safer. Perhaps it's about restoring a bit more faith in human nature. Either way, my hacker seems to have disappeared back into the 21st-century ether. Although, of course, they could be reading this now.

Rowenna Davis is a freelance journalist

Last Tuesday Rowenna Davis sent an email to her own email account to try to contact the hacker. Nine minutes later, he or she responded – with a demand for money…

From: Rowenna Davis

To: the hacker

Tuesday 11 October

8.33am

Subject: to those who hacked my account

Hi, I can't believe you would do this. The poorest, most vulnerable of my contacts are the most worried about me and most likely to send you money. The most educated people with resources know it's a scam. I also find it difficult to make ends meet, but without access to this account I can't work because all my contacts are stored in the account you have taken over. I am totally paralysed. If there is any way you can send me my address book, I would be willing to pay for it. It's horrible to be forwarded messages that have been sent in your own name. I honestly don't know how you justify this to yourself.

Rowenna

From: the hacker

To: Rowenna

8.42am

Can you send me 500 quid?

From: Rowenna Davis

To: the hacker

10.33am

Subject: Re: to those who hacked my account

1) I literally don't have 500 quid to give you. I can't make any more money until I have access to my account back — I work freelance and all my work contacts are being held by you.

2) How would I know if I gave you any money that you'd actually send me my contacts anyway?

3) Do you ever feel even slightly bad about what you're doing?

From: the hacker

To: Rowenna Davis

10.38am

Sure I don't feel great, but I don't seem to have a choice, its way better than robbing you on the streets, I give you my word, if you send me money, I will give you back access to you account with all your emails and contacts intact. If you can't send 500 quid at least 300 quid will do. Send money by western union to Rowenna Davis Madrid Spain Waiting

From: Rowenna Davis

To: the hacker

10.40am

Subject: Re: to those who hacked my account

Why don't you have a choice?

From: the hacker

To: Rowenna Davis

10.44am

You don't wanna the kinda life am living, you think its as nice and sweet as your life? But at least I don't have to rob on the streets

From: Rowenna Davis

To: the hacker

10.56am

Subject: Re: to those who hacked my account

I'm not making judgments about your life – you are making judgments about mine. If you read some of those emails you'll know it gets pretty shit at this end too. And even if my life was really happy, I don't see why that justifies you taking over my emails. But I wonder why you feel that you have no choice.

From: the hacker

To: Rowenna Davis

10.58am

Are you sending money?

From: Rowenna Davis

To: the hacker

11.17am

Subject: Re: to those who hacked my account

It's my turn not to have any choice. I don't have £300. I have asked some of my friends if they can help, but they think it's a stupid idea because you can't be trusted to return the details.

From: the hacker

To: Rowenna Davis

11.23am

I don't need your details for anything, to show some good will I could give you about 20 contacts, then when you send money, I give you the rest of it

From: the hacker

To: Rowenna Davis

Thursday 13 October 2011

11.04pm

Subject: I see you got back your account

Sorry for the trouble


View the original article here

Saturday, October 22, 2011

Alleged LulzSec hacker of Sony Pictures faces trial date in December

AppId is over the quota
AppId is over the quota
LulzSec The background from LulzSec's Twitter page. Leaked IRC logs show the group's inner workings. Photograph: AP

An alleged member of the clandestine hacking group LulzSec pleaded not guilty on Monday to charges of taking part in an extensive computer breach of the Sony Pictures Entertainment film studio's European systems.

Cody Kretsinger, 23, entered not guilty pleas to one count each of conspiracy and unauthorized impairment of a protected computer during a brief hearing in U.S. District Court in Los Angeles.

US Magistrate Judge Victor Kenton set a trial date of 13 December for Kretsinger, who spoke only in response to questions from the judge.

Kenton also ordered that Kretsinger be represented by a court-appointed public defender.

Kretsinger faces a maximum sentence of 15 years in prison if convicted. He declined to comment to the Reuters after the hearing.

A nine-page federal grand jury indictment unsealed in September charges Kretsinger with obtaining confidential information from Sony Pictures' computer systems using an SQL injection attack against its website, a technique commonly used by hackers to steal information.

The indictment asserts that Kretsinger, who it is claimed went by the online handle "recursion", helped post information he and his co-conspirators stole from Sony on LulzSec's website and announced the intrusion via the hacking group's Twitter account.

LulzSec, an underground group also known as Lulz Security, at the time published the names, birth dates, addresses, e-mails, phone numbers and passwords of thousands of people who had entered contests promoted by Sony.

"From a single injection we accessed EVERYTHING," the hacking group said in a statement at the time. "Why do you put such faith in a company that allows itself to become open to these simple attacks."

A number of Britons have been charged with offences relating to LulzSec's activities; they are not due to come to trial until early in 2012.

The de facto leader of LulzSec, who goes by the handle Sabu, recently responded to a string of questions on the Reddit website and suggested that he was "effectively on the run" - although he is not believed to have moved from his location, believed to be in New York.

Hackers previously had accessed personal information on 77 million Sony PlayStation Network and Qriocity accounts, the vast majority of which were users in North America and Europe, in what was then the biggest such security breach in history. Nobody and no group has ever directly claimed responsibility, and Sony has never released any details about how the attack was carried out. At one point it did suggest that members of the loose hacking collective Anonymous may have been responsible, but that has never been confirmed by either side.


View the original article here

Thursday, October 20, 2011

ISPs: Cameron's 'porn filter' won't work

AppId is over the quota
AppId is over the quota
Someone looking at a porn website ISPs have insisted that David Cameron's 'porn filter' plan will only apply to new broadband subscribers. Photograph: Dan Chung for the Guardian

Claims that David Cameron has forced a new "porn filter" on UK internet content have been disavowed by internet service providers, which said that the vast majority of customers will see "absolutely no difference" to their web content.

Confusion arose after it was suggested that a new "filtered feed" system will be applied to everyone using internet connections provided by the biggest four ISPs – BT, TalkTalk, Virgin and Sky, which between them have 17.6 million of the 19.2 million broadband customers in the UK.

It was claimed that the prime minister would unveil the measures on Tuesday as he hosted a No 10 meeting with the Mothers' Union, which earlier this year produced a raft of proposals to shield children from sexualised imagery.

But ISPs moved quickly to insist that the provisions will only apply to people taking out completely new contracts, who will be offered the choice of a connection with "parental controls", or one without. "Customers will have to choose one or the other, but we won't be making either one the default," said a source at one of the ISPs. A spokesperson for TalkTalk said: "This is called 'active choice' rather than an opt-in or opt-out." People who change to a different tier of connection within the same service will not be obliged to change the setting. BT said that new customers will be offered a package of parental control systems, provided by the security company McAfee.

However, it is highly unlikely that the initiative to be announced by Cameron will make any noticeable impact on UK web browsing. Very few people take out new contracts: during a typical quarter, fewer than 5% of any ISP's customers change provider. Data from uSwitch suggests about 12 million people have not changed their broadband contract in the past year, and 5 million who have never changed it.

In a statement, the ISPs said: "BT, Sky, TalkTalk and Virgin Media are pleased to have developed and agreed a code of practice, including measures to ensure that customers are provided with an active choice as to whether to activate parental controls in the home.

"The four internet service providers have worked closely with government and a range of stakeholders to swiftly introduce measures addressing recommendations set out in the Bailey report.

"The ISPs have committed to improve the way they communicate to customers, enabling parents to make simple and well-informed choices about installing and activating parental controls and other measures to protect children online. The four ISPs are working with parents' groups and children's charities on this important initiative and will continue to do so."

But questions have been raised about the systems used to implement the blocking, for which TalkTalk will use a service called HomeSafe. As implemented by TalkTalk, every web location that a customer connects to will be recorded and checked for malicious software – even if they have not opted into the "parental control" system.

The prime minister is expected to announce other moves in line with the Christian charity's review, such as restrictions on aggressive advertising campaigns and certain types of images on billboards.

There will also be a website, ParentPort, which parents can use to complain about television programmes, advertisements, products or services they believe are inappropriate for children.

The site, which will direct complaints to the regulator dealing with that specific area of concern, is expected to be run by watchdogs including the Advertising Standards Authority, BBC Trust, British Board of Film Classification, Ofcom, Press Complaints Commission, Video Standards Council and Pan European Game Information.

Cameron gave strong backing in June to the Mothers' Union proposals after he commissioned a six-month review by the charity's chief executive, Reg Bailey. However, Cameron did not commit to legislation.

Bailey's recommendations included providing parents with one single website to make it easier to complain about any programme, advert, product or service, putting age restrictions on music videos and ensuring retailers offer age-appropriate clothes for children.

Cameron wrote to Bailey in June to thank him for his report. "I very much agree with the central approach you set out," the letter said.

"As you say, we should not try and wrap children in cotton wool or simply throw our hands up and accept the world as it is. Instead, we should look to put 'the brakes on an unthinking drift towards ever-greater commercialisation and sexualisation'."

Bailey's report asked for government and business to work together on initiatives such as ending the sale of inappropriately "sexy" clothing for young children, for example underwired bras and T-shirts with suggestive slogans.

However, he recommended that if retailers do not make progress on the issue they should be forced to make the changes in 18 months.


View the original article here

Wednesday, October 19, 2011

Occupy protests around the world: full list visualised

AppId is over the quota
AppId is over the quota

"951 cities in 82 countries" has become the standard definition of the scale of the Occupy protests around the world this weekend, following on from the Occupy Wall Street and Madrid demonstrations that have shaped public debate in the past month.

We wanted to list exactly where protests have taken place as part of the Occupy movement - and see exactly what is happening where around the globe.

As we wrote this week:

Protests inspired by the Occupy Wall Street movement in New York and the "Indignants" in Spain have spread to cities around the world. Tens of thousands went on the march in New York, London, Frankfurt, Madrid, Rome, Sydney and Hong Kong as organisers aimed to "initiate global change" against capitalism and austerity measures. There were extraordinary scenes in New York where at least 10,000 protesters took their message from the outpost of Zuccotti Park into the heart of the city, thronging into Times Square.

So, we have started listing all the events we can find verified news reports for. There's not 951 yet, but we do have most of the major ones. You can see them mapped here:

Larger version

But what have we missed? If you know of one that should be on the list, you can help by filling in the form below.

DATA: download the full spreadsheet

Data journalism and data visualisations from the Guardian

Search the world's government data with our gateway

Search the world's global development data with our gateway

Flickr Please post your visualisations and mash-ups on our Flickr group
• Contact us at data@guardian.co.uk

Get the A-Z of data
More at the Datastore directory

Follow us on Twitter
Like us on Facebook


View the original article here