Sunday, June 13, 2021

Hacker Ways And The Decline of Language

Decadent thought leads to decadent language, which leads to even more decadent thought... and a vicious vortex of decay and corruption ensues. Is the process accidental or deliberate?

In "Politics And The English Language", George Orwell compares sloppy language to a sloppy drunkard.

"A man may take to drink because he feels himself to be a failure, and then fail all the more completely because he drinks. It is rather the same thing that is happening to the English language. It becomes ugly and inaccurate because our thoughts are foolish, but the slovenliness of our language makes it easier for us to have foolish thoughts." 
 
In 1945/1946, Orwell seemed to believe that the decline was reversible and clarity of thought and expression could be revived if writers and speakers made an effort and followed simple, critical rules such as:

i. Never use a metaphor, simile or other figure of speech which you are used to seeing in print.

ii. Never use a long word where a short one will do.

iii. If it is possible to cut a word out, always cut it out.

iv. Never use the passive where you can use the active.

v. Never use a foreign phrase, a scientific word or a jargon word if you can think of an everyday English equivalent.

vi. Break any of these rules sooner than say anything outright barbarous.

https://www.orwellfoundation.com/the-orwell-foundation/orwell/essays-and-other-works/politics-and-the-english-language/
 
Today, public speakers appear not to know the difference between a benefactor and a beneficiary, or between an expletive (noun) and something that is explicative (adj).  Badly written advertisements don't say what the advertiser intends: "Like you, my hands mean everything to me." "Report your allergy to your doctor."  "As a scientist, my dog..."  How supportive of vaccine acceptance is it for one Medicare coverage provider to be advertising, "With all the uncertainty of the virus AND VACCINE..."?
 
The one-time service to help copyright owners remove infringing copies of copyrighted works from the internet, MUSO writes about the predictive value of piracy , based on a study conducted in Europe.

They describe pirates as a bellwether, and explain (approximately) what a wether is... while decorously omitting the difference between a ram and a wether.  In a nutshell, a wether is castrated.
 
If one has to explain ones metaphor or simile, and if one cannot explain it fully, perhaps the metaphor is dead and the imagery stale. That said, I dropped the "nutshell" knowingly.
 
While MUSO  may or may not be pivoting to a marketing business,  the authorities in Canada seem to have less use for intellectual property pirates.

Legal bloggers Ken Clark and Lawrence Veregin  representing the combined intellectual property team of Aird and Berlis LLP and Aird and McBurney LP predict the beginning of the end of online piracy in Canada, and describe how Take Down and Stay Down will work --in Canada-- via real time site blocking.


https://www.airdberlis.com/insights/blogs/thespotlight/post/ts-item/the-beginning-of-the-end-of-online-piracy-in-canada

On hacking, Mary B. Ramsay and Grant P. Dearborn of  Schumaker Loop and Kendrick discuss the devious ways of Hackers and the risk from phishers phishing. Never give your email address and PW in order to open an attachment, even if it appears to have come from your better half or significant other.
 
There is a story involving far greater effrontery than that shown by all those young men who make telephone calls to seniors in the hope that the senior victim will find it plausible that he or she has a grandchild in immediate financial distress... but with access to Bitcoin or Western Union.

Lexology link
https://www.lexology.com/library/detail.aspx?g=06214f43-8b53-46d1-9281-076a4569a61a

Original link:
https://www.shumaker.com/latest-thinking/publications/2021/06/client-alert-the-risk-from-phishing


The news has covered the Colonial Pipeline and the JBS meat packer hacks but less has been said about the hacking of iConstituent, perhaps because the latter is less inconvenient to the public.

Apparently, according to at least two sources, sixty members of the US Congress have been hacked or phished, and as a result they lost their access to iConstituent.  If you notice a pause in the begging letters and emails, you might infer that your Congressperson's internet hygiene is --or was-- substandard.  Maybe if your trusted Congressperson sends you an attachment or link, you should not open it or click through.
https://www.independent.co.uk/news/world/americas/us-politics/congress-ransomware-attack-internet-latest-b1861759.html

On that happy note...

All the best,

Rowena Cherry   

No comments:

Post a Comment