Coffee houses and civil liberty

For 11 days in 1675 King Charles II tried to suppress London’s coffee houses because they were regarded as “places where the disaffected met, and spread scandalous reports concerning the conduct of His Majesty and his Ministers“.

Spectateur by Jessie Romaneix. Used under license.
Spectateur by Jessie Romaneix. Used under license.

Seventeenth century coffee houses were great social levellers, open to all men from all walks of life, whatever their social status, and as a result were associated with equality and republicanism. Because they became meeting places where business could be carried on, news exchanged they were influential places – they provided bankers, intellectuals and artists with a forum to discuss political development and to carry out business. Indeed Lloyd’s of London and the London Stock Exchange both owe their very existence to the London coffee houses.

But with their popularity came controversy.

In 1674 The Women’s Petition Against Coffee was set up in London. Women complained that men were never to be found at home during times of domestic crises, since they were always enjoying themselves in the coffee houses. They circulated a petition protesting “the grand inconveniences accruing to their sex from the excessive use of the drying and enfeebling liquor”.

Strange to think that something so everyday as a coffee shop could on the one hand stir up such emotion and political fear and on the other provide a platform for some of the oldest and most successful companies in the world. Stranger yet that we are still making the same, wrong headed, decisions 333 years later.

Yesterday saw BBC newsbeat report that the “US Army warns of Twitter danger“:

US intelligence agencies are worried that terrorists might start to use new communication technologies like the blogging site Twitter to plan and organise attacks.

It goes on to quote the US Army report saying that:

Twitter is already used by some members to post and support extremist ideologies and perspectives.

Terrorists could theoretically use Twitter social networking in the US as an operational tool.

This follows the UK government’s desire to develop a central database of all mobile phone and internet traffic giving the police and security services easier access to the data.

As with coffee houses during the 17th century, the Internet is currently a new thing Рone that is challenging and scary for some while at the same time providing an environment where communication and commerce can flourish for others. And unfortunately for us this presents a challenge for society today. The Internet is something that has happened to our current generation of policy makers Рrather than something that they have grown up with Рand while that is true it will be seen through the glasses of those that see it as something that is special and different Рjust as coffee shops were to King Charles II. Or as Douglas Adams puts it:

…it’s [the Internet] very new to us. Newsreaders still feel it is worth a special and rather worrying mention if, for instance, a crime was planned by people ‘over the Internet.’ They don’t bother to mention when criminals use the telephone or the M4, or discuss their dastardly plans ‘over a cup of tea,’ though each of these was new and controversial in their day.

But there are difference, for starters in 1675 King Charles II realised his mistake and reversed his decision after 11 days. Today’s politicians don’t appears to be as humble as 17th century kings – which is a little worrying. But more importantly today’s technologies provide massive leverage – and in situations like this that’s a problem.

When a government gives a QUANGO, the police or security services a new power that doesn’t necessarily¬† mean that that power can be acted upon. Indeed there are lots of pieces of legislation that aren’t acted upon, because they are just silly but there are also laws that aren’t acted upon because they are too difficult or too expensive to do so, or at least too expensive to do so indiscriminately.

Society has to date had a useful safety value – the police need to apply common sense and intelligence when apply their powers. There is no practical way in which they can apply all laws, as written, indiscriminately instead they needed to decide where and how best to apply those laws. And in return society and individuals regulated their activity – taking responsibility for their actions. Most people choose not to break the law, not because they think they will get caught and punished but because we moderate our actions based on social norms and our own moral compass. The police and security services provide a backstop should this go wrong.

But things are changing – big centralised databases that record everyone’s phone calls and email, keep track of DNA profiles, or otherwise store your Identity makes it much, much easier for a government to enforce a piece of legislation universally, indiscriminately. The cost associated with running a query across a database of phone calls is practically nil and this means a government no longer need prioritise its searches as it once did. There’s no point – you might as well just search the database for suspicious patterns in the data, since it costs next to nothing to do so.

Yes people use the Internet to do bad thing, and quite possibly Twitter is one of those services that bad people use. But they also plan bad things in coffee house but for the last 300 odd years we’ve realised that trying to legislate against coffee houses is a bad thing for society. I suspect in generations to come we will view the Internet in the same way – recognising that bad people, do bad thing and one of the place they do bad things is on the Internet but the Internet is just another platform, like coffee houses.

The mobile computing cloud needs OAuth

As Paul Miller notes Cloud Computing is everywhere – we are pushing more and more data and services into the cloud. Particularly when accessed from mobile devices this creates an incredibly powerful and useful user experience. I love it. The way that I can access all sorts of services from my iPhone means that an already wonderful appliance becomes way more powerful. But not all is well in the land of mobile-cloud computing; a nasty anti-pattern is developing. Thankfully there is a solution and it’s OAuth.

"Mobile phone Zombies" by Edward B. Used under licence.
"Mobile phone Zombies" by Edward B. Used under licence.

So what’s the problem then? Since Apple opened up the iPhone to third party developers we have seen a heap of applications that connect you to your online services – there are apps that let you upload photos to Flickr, post to Twitter, see what’s going on in Facebook land all sorts of stuff. The problem is the way some of them are gaining access to these services by making you enter your credentials in the applications rather than seeking to authorise the application from the service.

Probably the best way to explain what I mean is to look at how it should work. The Pownce app is an example of doing it right as is Mobile Foto – these applications rely on OAuth. This is how it works: rather than entering your user-name and password in the application you are sent over to Safari to log into the website and from there you authorise (via OAuth) the application to do its thing.

This might not sound so great – you could argue that the user experience would be better if you were kept within the application. But that would mean that your login credentials would need to be stored on your ‘phone, and that means that you need to disclose those credentials to a third party (the folks that wrote the app).

By using OAuth you log into Flickr, Pownce etc. and from there authorise the application to user the site – your credentials are kept safe and if your iPhone gets stolen you can visit the site and disable access. Everything is where it should be and that means your login details are safe.

To be fair to the iPhone app developers this type of delegated authorisation isn’t always possible. Twitter, for example, still hasn’t implement OAuth and as a result if you want to use one of the growing number of iPhone Twitter app you need to give up your user-name and password. I find this incredible frustrating – especially from a service like Twitter where (according to Biz Stone, Twitter’s co-founder) “the API… has easily 10 times more traffic than the website“.