字幕列表 影片播放
[MUSIC PLAYING]
ANNOUNCER: This is CS50.
DAVID MALAN: Hello world.
This is the CS50 Podcast, episode 4, zero indexed.
My name is David Malan.
And I'm here with CS50's own Colton Ogden.
COLTON OGDEN: David, I'm curious what the first browser that you ever used
was.
DAVID MALAN: It was probably like Netscape 1.0 or something.
COLTON OGDEN: Netscape Navigator?
DAVID MALAN: Maybe, or even one of its predecessors,
one of the very first prototypes of a browser.
But it was old school for sure.
COLTON OGDEN: This would have been on a Windows computer.
DAVID MALAN: Gosh, probably.
Well, I started off life using Macs, and then I
switched I think in college to using PCs and windows.
And then, eventually, I think after a few years of teaching CS50
did I switch back to Mac.
So--
COLTON OGDEN: I think the meme is that there are
a lot of browsers that have come out.
There are a lot of popular browsers these days--
Chrome, Firefox, Opera, Edge.
On that list is not a particular browser of quite a bit of infamy,
that browser being Internet Explorer.
DAVID MALAN: Yeah, that one proved the bane
of most developers' existence for some time
because it was just so non-compliant when it came to certain standards.
And Microsoft really did its own thing with various interpretations
of the HTML and/or CSS specs.
I remember even we had struggled with that for some of our own web apps.
Like you'd get it working on Firefox.
You'd get it working on Chrome.
You'd get it working on Opera.
But, damn it, it doesn't actually work as you expect
in IE, especially IE6, version 6.
COLTON OGDEN: Indeed.
I mean, we used to even use BrowserStack internally, which is a website that you
can test on multiple--
you can sort of look in a browser and see
it working on multiple actual browsers.
DAVID MALAN: Yeah, no, and that was in large part because of that,
especially if a lot of us develop here on Macs.
And so it wasn't really easy to run Internet Explorer, let alone
any Windows-based browser.
But, yeah, we had some third-party help with that, which was handy.
COLTON OGDEN: Yeah, and IE6 was the particular offender because they did
have IE7.
They did have IE8.
And, from what I remember, they improved on some of the noncompliance
that IE6 sort of bore at the time.
But what's funny is this week, in doing some research for the podcast,
I came across an article--
a blog post, rather, by Chris Zacharias.
DAVID MALAN: Yeah, no this was wonderful--
"Conspiracy to Kill Internet Explorer 6."
COLTON OGDEN: Indeed.
He is a former YouTube employee.
And this is back in 2009-ish.
And, back then, I mean YouTube was huge.
You know, it started around 2005, 2006, but 2009 was really
when it started to kick off.
DAVID MALAN: Yeah, and I think, as the story goes,
they had just been YouTube acquired by Google.
And they were in the process of being integrated into Google's
own software-based workflows.
But enough of the developers on the YouTube team
were just completely fed up it seemed with having
to support IE6, which was still a non-trivial percentage of their user
base.
And I think, understandably, YouTube and presumably in turn Google
didn't want to deprecate support for IE6 because there's
a lot of employees at companies whose systems are pretty locked down.
There's teachers in schools whose computers are pretty locked down.
So there's a lot of users out there who can't just follow your instructions
to update to another browser.
They need like the IT department to actually do it for them.
So I was an understandable business concern.
But, as I understand it, the developers wanted nothing to do anymore with IE6.
And so they started sneaking into YouTube's own code base
a little banner advert essentially urging
IE6 users to upgrade to any number of suggested other browsers.
And they gave some direct links.
COLTON OGDEN: Yeah, no, it was pretty crazy.
And one of the stories that Chris even talked about in his blog
is empty source tags in images would just
load whatever the document root was.
And this would have the effect of essentially recursively loading,
similar to an iframe, all of the server's contents.
DAVID MALAN: Yeah, and that was just one of the bugs
I think that kept tripping them up.
COLTON OGDEN: And that one had the--
from what I remember reading, it actually
could cause blue screens of death on Windows machines.
DAVID MALAN: Yeah, no, I believe it.
And I'm amazed that bugs like that persist.
And, even if they do eventually get fixed though,
if you have a lot of systems out there that are not 100% up to date,
then you're stuck dealing with these kinds of issues.
But what was funny, I thought, about the blog post disclosure years later,
after which they couldn't really get all that into trouble,
presumably, was how, coincidentally, the Google Docs team had recently
started advertising a similar message on top of Google Documents,
which of course was already owned by Google.
And that too was encouraging users to upgrade
to a newer version of a browser.
So they kind of snuck in under the radar there, but, even when it was detected,
it sounds like there was some internal tensions with the lawyers,
with the managers.
But, in the end, it kind of worked out OK.
But it's kind of a fascinating--
I think, if you take a step back at it, it's
kind of a fascinating risk for any company.
Unless you are constantly auditing your own lines of code,
or you have really a robust process in place,
it's possible for one or a few developers
to slip something past the others, for better or for worse.
Now this seemed to work out for the best in the end.
In fact, I think you noted IE's usage plummeted actually,
coincidentally or causally, after this particular change because YouTube
was so popular.
But you could imagine some adversarial employees
using this power of the ability to change their code base for more
evil purposes, if you will.
COLTON OGDEN: Yeah, and, on that note, I can certainly
understand why companies, especially as large as Google or Facebook,
want to instate these code review processes and ensure that this doesn't
happen and to make sure there are no sort
of committing back doors to production, directly to production, so to speak.
DAVID MALAN: Yeah, absolutely.
We just spoke recently about a new feature
that you can use on sites like GitHub where
you can have the notion of code ownership
so that, if a colleague changes a particular file or a line of code
really that you or I wrote, we can actually
have the whole pipeline notify us before that change to code is approved.
But it seems like the YouTube team here benefited from a bit of superpowers
when it came to who could actually push code,
probably some changing processes because it's not that easy presumably
to integrate an acquisition like YouTube into Google.
So they had this window of opportunity where they were actually
able to do something very developer friendly, but not necessarily
managerial or lawyerly friendly.
COLTON OGDEN: Indeed, I like to think it turned out well in the end.
DAVID MALAN: It did.
In fact, no one really worries about IE6 anymore,
let alone IE, which has now been replaced by Edge.
And even Edge now is based in part on the same core processor
that essentially Chrome itself is.
So things are starting to converge perhaps, which is interesting.
COLTON OGDEN: Indeed.
And I mean even modern browsers aren't immune to sort
of some of the issues that plague--
I guess any software at large, you know, every piece of software
is susceptible to issues.
In particular, this week, Firefox had a major issue over the weekend.
DAVID MALAN: Yeah, I heard that someone didn't
renew their certificate, so to speak.
COLTON OGDEN: Indeed.
So Firefox ships with a certificate that sort of basically
verifies that the add-ons that are installed onto the browser
are verified by Mozilla as being legitimate and not malicious.
And it turns out that they forgot to renew that certificate over the weekend
or by the weekend's arrival.
And, therefore, all Firefox users sort of over time,
because it doesn't happen immediately, but, within about a 24-hour period, all
of their add-ons were no longer functioning.
DAVID MALAN: I know.
And that's a pretty big deal because the people are
relying on add-ons or extensions or plug-ins,
however you want to think about them.
To have all of your features stop working
is not that exciting or not that good.
And I should concede that this is a not uncommon problem.
At least, I like to think I'm in good company
here because I have, for instance, been guilty of not renewing
some of our certificates in time.
In fact, this happened just a few months ago
where one of our certificates for CS50's website, so similar in spirit
in that these things too have an expiration date just like code signing
certificates can, I had set a reminder to actually renew this certificate.
And I thought we had migrated all of our certificates
to an auto-renewal process on Amazon's cloud platform.
And so I literally kept ignoring, ignoring, ignoring the email reminders
that I was being sent because I thought we had automated it all.
But, nope, it turns out that one certificate was not
yet configured to auto-renew.
And so, at the stroke of midnight or whatever it was,
the darn thing stopped working.
We and some of our students noticed.
And, thankfully, it only took a few minutes to fix,
but it turns out that constant email reminders and a Google Calendar
reminder is not sufficient, at least when I'm in charge of the certificates.
COLTON OGDEN: Yeah, no, problems like that are somewhat easy to solve.
Unfortunately, Firefox had some problems because their certificates
were actually deployed with the browser itself.
They had to remote deploy a new certificate
through their sort of system called--
what's the series called?
I think it's called series, actually.
I don't think I wrote it down here.
But the system is called Normandy.
And they have a system that allows them to actually
remote deploy the new certificates.
Or, actually, well, it lets them perform research studies.
Studies was the name of it.
They have a tool called Studies, which allows them
to remote deploy and remote test sort of behavior in folks' browsers.
And this allowed them to ship a new certificate, which
they signed because this is actually technically an add-on, this feature.
They signed this with a new certificate that they then
shipped with this feature.
DAVID MALAN: I see.
COLTON OGDEN: Yeah, but it's interesting that, somewhere in the process,
there's presumably someone who had set a reminder that didn't quite go off
or didn't quite get noticed.
So it happens to the best of us, perhaps.
DAVID MALAN: Yeah, thankfully, Mozilla, in their blog where they sort of break
down this process, a-la how Facebook recently broke down
how their passwords were stored in plain text, they outlined sort of the ways
that they got this right, I guess, in fixing the problem,
but they also did disclose the issues that they faced
and ways that they would approach making sure that it doesn't happen again.
COLTON OGDEN: Yeah, no it was really, to their credit,
a nice post-mortem online, so to speak, which is worth reading.
If you go to hacks.mozilla.org, you can find it under the May 2019 listings.
DAVID MALAN: Indeed.
We don't really use Chromebooks here at CS50,
but we have some of them lying around.
We've seen some folks using them, but Chromebooks
have up to this point, up until fairly recently,
been a fairly limited operating system in as much
as they're essentially Chrome on a computer.
COLTON OGDEN: Yeah, dedicated.
So it's meant to be used really only in cloud.
There isn't any client-side software or at least the appearance
thereof, even though there actually is, even
though it supports Google Docs and Gmail and Google Calendar
and some other apps too that can be used offline.
But, of course, you can't actually send and receive
mail and other such notifications if you're actually offline.
So it's kind of a product that's a little ahead of its time.
I mean, honestly, I do think it's kind of inevitable that we'll
see more of this once you have omnipresent internet access,
both on the ground and in the sky and elsewhere on Earth, so to speak.
But what's interesting is that underneath the hood
is an underlying Linux-based operating system that traditionally hasn't really
been exposed.
It really is meant to be more of an appliance of sorts,
an internet appliance.
But now I gather that you'll actually be able to run Linux on these things
so much more easily than in the past, which is great for power users who
want access to pretty cheap hardware, but, nonetheless,
with the ability to do something with Linux on it.
DAVID MALAN: Indeed.
Yeah, now folks will be able to actually fire up a terminal
and interact with a Linux kernel.
And it is actually called Termina.
It runs on a VM.
But the Linux kernel is actually directly interfaced
with Chrome OS itself.
And, in this case, therefore, you can pull up graphical applications
and use them directly on Chrome OS like you would use on a Gnome or the like.
COLTON OGDEN: Yeah, and, to come back to price too, what's
been compelling historically about Chromebooks
is that you can get a decent computer for like $100, $200.
And that's really compelling.
In fact, there's some school districts, certainly in the US and presumably
abroad, that actually have their students use Chromebooks
because it's so much more of an economical approach
to equipping kids with hardware for the classroom.
Of course, the catch is-- and we've encountered this with some
of our students out in more rural areas--
they are sometimes allowed by their schools to take the laptops home,
but they can't actually use them very much
because, if they don't have internet access and, therefore, Wi-Fi at home,
it's not all that useful a device except for, of course, purely offline access.
But letting people actually use it for multiple purposes now I think
is pretty compelling, especially given those price points.
DAVID MALAN: Indeed, and, to your point, I
mean I think it is pretty inevitable that we do have internet, even
commoditized like utilities maybe eventually in the future just given
how essential it is to modern life.
But I can see, prior to maybe the last couple of years,
it's not guaranteed that you'll always have internet access everywhere you go
and that it'll be quality internet access.
But, for those folks out there who are trying to learn more about computing,
learn more about Linux, I mean it's a great device, kind of device.
And there's a bunch of different versions
made by bunches of different companies.
It's a great device to kind of hack on and sort of just
play around and learn the ropes.
Back in the day, when I was growing up, I
used to use actual little tower computers because there weren't really
laptops in as great supply, let alone at those price points.
They were much more expensive, but it's a great device
to just learn and play on I would say.
COLTON OGDEN: I think I've seen one of those desktops lying around somewhere.
DAVID MALAN: Yeah, we still have them in the corner somewhere for parts.
COLTON OGDEN: Well, awfully coincidentally, though,
Microsoft, it turns out, for Windows 10, they're
going to be shipping a full Linux kernel with their Linux subsystem,
Windows' subsystem for Linux.
DAVID MALAN: Yeah, you know, Microsoft, to their credit,
has really gotten a lot more accommodating of Linux-type usage,
previously with Windows 10, the earlier incarnation of it,
just being able to run Bash, a so-called shell program,
so that you have a much better command prompt than the actual software called
historically Command Prompt, which, in yesteryear, was an actual DOS prompt--
so terribly limited.
I mean my god.
In like Windows XP and I think even later,
you couldn't even copy-paste in the program very easily by default.
And this is in stark contrast to like any X Window interface on Linux
or Unix or Solaris or even on macOS.
So they just really didn't adapt for this.
And, frankly, given just how powerful it is
to have a command-line interface on a Mac or a PC or a Linux Box,
it just seemed very silly to sort of expect
users to go to third-party utilities and not
to optimize for what a lot of power users and certainly developers
might want.
COLTON OGDEN: Indeed, it is kind of a barrier, especially when
so much documentation online too for developers
is catered towards Linus environments.
DAVID MALAN: Yeah.
COLTON OGDEN: To their credit, to your point,
they just announced the Windows Terminal, actually,
which is an upgraded terminal.
So it won't be replacing the Command Prompt.
For legacy purposes, they want to ensure a backwards compatibility
for so much software that relies on it, but they
will be releasing this as a separate application that folks can download.
And it actually looks quite pretty.
It looks really nice.
DAVID MALAN: And, hopefully, it'll improve the performance too
for people, which is compelling as well.
COLTON OGDEN: Indeed.
Yeah, it's nice to see sort of this, I guess, all these companies
embracing Linux and really sort of bringing their computers
to a more usable I guess, end point.
DAVID MALAN: I guess so.
Though, I feel like we're going to invite some religious debate there
if we claim it's more usable, but I do agree.
COLTON OGDEN: For developers, I should say for I
guess in a development environment.
DAVID MALAN: Yeah, absolutely.
I think there's great power that comes with the command line
and just making it more user friendly.
And there's decades of experience and expertise
when it comes to all of these shell-based systems that
might as well, I think, make it easier for people to use them still.
COLTON OGDEN: Indeed.
Have you heard of a KeePass?
DAVID MALAN: I maybe had, but I really heard about it
in the context of what I think you're about to tell us about.
COLTON OGDEN: Yeah, so KeePass in an open-source password manager.
And they are hosted at keepass.info, which
an interesting choice for a domain name.
DAVID MALAN: Oh, yeah.
It sounds legit.
COLTON OGDEN: Well, it turns out that keepass.info is legit,
but keepass.com is not legit.
DAVID MALAN: Yeah, I gather keepass.com, the illegit site,
actually has had and maybe still has some malware built into it.
So it's malicious software that you are duped into installing.
And yet, the site, I actually pulled it up before the podcast today.
It actually looked pretty legit.
And, if you search for just KeePass, K-E-E-P-A-S-S, and hit Enter,
thankfully, the first hit is indeed the legit one, keepass.info.
But I think, for my browser, third or fourth among the search
results on Google was keepass.com, which is the illegitimate site.
So you can't even use Google search results necessarily
as a compelling signal as to which one is the official one when
they're so close together, frankly.
COLTON OGDEN: Yeah, it's kind of alarming.
And there's a point here about I guess the responsibility of,
as a developer, as a company, making sure
that you purchase the right domains for your application to reach the most
users without giving room to nefarious actors to I guess kind of trick users
into thinking that they're you.
DAVID MALAN: Yeah, no, this is a tricky one
because often there's squatters, people who
have bought domain names in anticipation of other people wanting them.
And I can only guess that keepass.com was
taken when the authors of the software decided to get keepass.info.
But, honestly, there's so many TLDs or Top-Level Domains now, hundreds,
you certainly can't afford, most people, to get all of them-- so keepass.com,
keepass.org, keepass.net, and the like--
just to kind of protect yourself.
And even then you're vulnerable to typographical errors, even
malicious ones.
We, for instance, in a class I used to teach
used to talk all the time about bankofthewest.com,
which is the legitimate website for a bank out west in the United States.
But someone very cleverly years ago bought bankofthe V-V-E-S-T .com, which,
in a small font, looks like Bank of the West--
I can't even pronounce it now-- because two Vs together, of course,
look like a W.
And, honestly, at that point, especially if that one
happens to bubble up in search results for whatever reasons,
is even harder to spot as well.
So this is kind of a fundamental challenge, I think,
when it comes to distinguishing legitimacy on the web.
COLTON OGDEN: I feel like I've seen this too with like the Russian alphabet has
a Y, but it's actually an "oo."
It's an "oo" character.
DAVID MALAN: Yeah.
COLTON OGDEN: And I feel like I've seen this in URLs.
Like you can actually get tricked if the URL has
that character in the place of a Y, like yahoo.com with that character.
It's actually not technically the same character.
It's an Unicode character.
DAVID MALAN: No, and, thanks to Unicode, there's
so many variants that there's actually other characters that
look quite like the typical English alphabet that
might trick folks like you and me.
And I used to advise students that, all right,
if you're not sure what the address of the URL, at least
rely on your search engine.
So search for the name of your bank, or search for the name of this product,
KeePass in this case, and see what bubbles up.
And, granted, the first hit is indeed the legitimate one,
but you could imagine, if keepass.com gets talked about enough, and somehow
the owners of that site sort of game the system in enough ways
that their result bubbles up above the legitimate one,
you could trick users even then.
So, frankly, at this point, I'm wondering how do you avoid this.
You kind of want to maybe start poking around in various articles,
maybe in tech blogs or tech websites, and see what some legitimate authors
are recommending people do.
And, hopefully, they haven't been duped.
And, if you see the same URL appearing again and again on websites that you
do trust, various news outlets or blogging sites, then
at least that's one additional signal you can take into account.
But then I dare say you as the human are reinventing
what Google calls page rank where you're sort of analyzing in your mind
the number of people that are all recommending this particular URL.
And so with high probability it must be legit.
I mean, frankly, that's what the search engine is supposed to do,
but, clearly, those results can be gamed,
as we're seeing here on my own browser.
COLTON OGDEN: I don't know if Google does already,
but having some sort of flag for a malicious website
such that it shows up very blatantly with maybe some red div or some red tag
somewhere that says this site is reportedly nefarious.
DAVID MALAN: Yeah, they do do that sometimes.
And I don't know in this case.
Is keepass.com intentionally being malicious,
or was it compromised such that it's now distributing malware
because someone got into it?
COLTON OGDEN: Well, it turns out that there are a lot of other similar sites
recently within the last 10 months that look very identical to this website.
DAVID MALAN: Oh, interesting.
COLTON OGDEN: 7-Zip, BlueStacks, UNetbootin, and GIMP,
which is a very popular image editor, Snapseed, and a bunch of others--
10 months this has been going on.
It's a pattern that the--
actually, this was originally revealed in the form of a tweet by berkcgoksel.
And they show this and reference the other web pages.
DAVID MALAN: Interesting.
Now there is a solution in the SSL world where
you have a security certificate for your website
that, if you pay for an expensive enough one,
browsers will actually show you a verified signal
with an additional padlock or check mark in the browser's URL
bar indicating that this belongs to Bank of the West comma Inc
based in Seattle, Washington or wherever they happen to be or California.
And that's an additional signal, and they do charge more for it
to do the additional verification.
But, of course, all it takes then is for an adversary with a few dollars
to spend to actually buy one of these same legitimate ones
somehow and still trick users into clicking it.
So it's a real problem of trust, which is sort of omnipresent on the web
and ever more so with examples like this.
COLTON OGDEN: And ever present in our podcasts.
DAVID MALAN: Indeed, and even in the real world.
In fact, you came across an article recently,
if we might transition to the physical world, where
some tenants in an apartment building were
upset that the owner of the building had installed
not physical key-based locks, but rather digital locks that required
an app in order to unlock your door.
Now, at first glance, I think this sounds fantastic.
I mean it's kind of cool.
It's trendy.
You can unlock the door from your phone.
Maybe there's food being delivered, and you
won't have to go all the way downstairs to let them in.
So there's a lot of like compelling use cases for this,
but this is also a potential invasion of privacy
because now the owner of the building knows exactly who is coming
and when and what time of day and how frequently or how infrequently,
not unlike a hotel.
But, in this case, these are people's homes
that they're paying for or renting.
And, therefore, it's a little more worrisome that someone can effectively
then track all of their movements.
COLTON OGDEN: Yeah, and funny too, KeePass, we talk about digital keys.
And now we're talking about physical keys.
The main issue with this is definitely that it's
putting the power into the people that are leasing the building,
like an unjust amount of power.
And, thankfully, the court decided that it was in the favor of the tenants.
The tenants actually won a settlement.
They ended up suing the landlords for invasion of privacy
and other difficulties related to this whole process,
one of them being, for example, one of the tenants was actually 93 years old
and couldn't leave their own room because they were locked in.
And they couldn't figure out how to use the app, which
would have been circumvented had they had just a basic physical key to open
their door with.
DAVID MALAN: Yeah, absolutely.
And I think, I mean, even if just your phone dies because it's out
of battery-- you don't have it with you--
I mean, there's other reasons where this would be annoying.
Now, to be fair, that could happen with physical keys as well.
So I'm inclined to say that maybe the happy medium is
to have both, physical key as well as the digital key.
But the catch is physical keys have been insecure for years.
Locks can certainly be picked, more so physically perhaps than digitally,
especially if you have some software-based defenses in place,
much like iPhones and Androids do these days.
And, of course, there's probably a whole lot of locks
out there such that, when a tenant moves, and someone else moves in,
the old tenant may very well have copies of those original keys
because a lot of landlords probably don't
bother spending the money to change the locks every time someone new moves in.
So it kind of goes both ways.
It's arguably more secure in some ways, but it's less secure in others.
But it's hands down more invasive because your movements
are being tracked.
Now, then again, you can imagine CCTVs and just
security cameras also violating that same tenant,
but, again, this seems like an interesting tension
when it comes to sort of convenience and user experience
and also privacy and security I'd say.
COLTON OGDEN: Yeah, and, at least with a CCTV,
the onus is on the landlord to actually spend all that time looking
at the video if they want.
I mean, I guess they could use sensors probably to programmatically figure out
when people go in and out of a place.
DAVID MALAN: But software can do this a lot quickly, you know?
You could have a little alert saying ho, ho, ho.
Look who came home really late last night.
COLTON OGDEN: Yeah, no, it's a magnifier, the technology.
DAVID MALAN: Yeah, I think that's a good way of putting it.
And it'll be interesting to see how this plays out because, in this case,
the situation was indeed settled.
So there's not necessarily new case law around it,
but it would be interesting to see how this evolves over time
and how it just becomes more economical and more compelling
security-wise to track, as a side effect, users'
movements in this way in the interests of having software-based security
instead.
COLTON OGDEN: Still on the note of physical keys too, one of the things
that I recently learned, which was pretty fascinating,
is just how easy it is, even given an image of a key,
just to create a duplicate of it because they're standardized.
DAVID MALAN: Yeah, no, and that's true even of those car clickers, right?
Supposedly, if you walk around like the Disney World parking
lot with your own personal key clicker, and you walk far enough,
eventually, you might very well unlock someone else's car
because the address space isn't necessarily that large.
And that's absolutely true for physical keys.
They just rely on probability that no two people
are going to have the same two keys.
COLTON OGDEN: Yeah, it's pretty alarming.
When humans are motivated, they'll find a way to get into just about anything.
DAVID MALAN: Yeah, at that point, though,
it's probably easier just to break a window
than to walk up and down the aisles of Disney World
and get caught on any number of cameras.
So there are some I think downward pressures on these actual risks,
but it's a trade-off, right?
It's going to probably cost more time or more money or more metal
to actually make these things more secure.
COLTON OGDEN: That's true.
We talk about so many things that are kind of depressing, negative,
but it's fun occasionally to maybe shine a brighter
spotlight on some of the more positive, fun things going on.
And you actually brought this to my attention.
They released a 30th anniversary edition of Hitchhiker's Guide
to the Galaxy, which is a game that you remember playing years back.
DAVID MALAN: Yeah, and it's probably my favorite book by Douglas Adams,
Hitchhiker's Guide to the Galaxy.
I've read it a few times.
And I'll admit I've started reading it more times
than I've actually finished reading it, but I do really enjoy it.
And, years ago, growing up, there was a company
called Infocom that made a text-based adventure
game around Hitchhiker's Guide to the Galaxy
where there is no GUI, no Graphical User Interface.
It's all text.
And so the first line in the game is essentially
a statement along the lines of you wake up, and it's dark.
And you have to start typing commands like look around or turn on lights--
sorry, spoiler, 30 years later though--
in order to figure out where you are and what you can do next.
And it was a really rich game textually because the authors would
describe what it is you're seeing.
And so it kind of puts into your mind's eye
what the scene is without actually having to see anything.
And, in fact, fast forward to decades later when
the Hitchhiker's Guide to the Galaxy movie came out, like probably 10 years
plus ago now, it really did not look anything like the book looked
and the game looked like in my own head, which was an interesting contrast.
But it was such fun.
And, indeed, last weekend I sort of escaped
into the virtual world of this game, thanks
to the simulator that's now online.
Frankly, one of the downsides of playing it
on an online simulator now 30 years later
is that they've added to it some images, which is nice.
It's sort of static images, akin to what you'd see every few pages
in a nice black and white printed book.
But it also kind of spoils the imagination that I had.
And so I didn't click around enough, but I'm
hoping there's a button with which to turn that off so you can just
play the purely text-based version.
COLTON OGDEN: Yeah, you'd probably even get that probably
as a terminal program.
DAVID MALAN: Probably, if I dug a little deeper.
And I will admit I got as far as lying in the mud in front of the bulldozer
where Arthur Dent's house is about to be knocked down.
That's not really a spoiler.
That happens like in the first few pages of the book,
but then I got distracted or fell asleep or bored or something.
So I'm going to have to try to come back to it this weekend
and see how far I get.
COLTON OGDEN: It is pretty cool.
And it sort of reminds me of the podcast where we talked about those Infocom
games coming out.
I'm guessing they're related.
They probably are.
DAVID MALAN: Yeah.
Well, and you mentioned another release of a game
from yesteryear that you really liked had come out.
COLTON OGDEN: Yeah, I mean, the old and the new, we've talked about this.
So, with the old, this is an older game.
It's 30 years old.
But Minecraft is a very famous game, very popular.
It was really huge, especially in the early 2010s.
But it's approaching its 10-year anniversary.
And they just released Classic Minecraft free to play in the web browser.
DAVID MALAN: Oh, interesting.
Yeah, I never really got into that, but it's
been big and gotten bigger I think in recent years.
COLTON OGDEN: Yeah, no, I mean, I would say it probably
reached its peak in maybe 2015, 2016, but, even to this day,
it's still pretty popular.
It's not Fortnite popular.
That's the new-- that's the new hotness.
And even that I would imagine is probably
going to be out-competed at some point in the near future.
I think it's just the inevitability of games.
They come out.
People play them.
They get so enraptured by them.
And then the next big game comes out, and everyone just sort of jumps
ship, more or less.
DAVID MALAN: Absolutely.
But I do have a fondness.
Granted, I grew up with these older games,
albeit not Minecraft in this case, where it's just kind of fun
to play these older 8-bit games or even black and white games for which you
have such fond memories.
And even though, admittedly, they don't necessarily hold my interest as much
anymore, I mean they really were wonderfully done
and were cutting edge at the time.
And I think they really do speak to the fact that some of the best games
really are about story or about puzzles and about challenges
and not necessarily about like 3D-rendered graphics and all
that, which is certainly nice and immersive and all the more compelling.
But you can have all of that, but not have a good game, nonetheless.
So that's not what's perhaps core to some of the best games from yesteryear.
COLTON OGDEN: Yeah, when I played Minecraft in virtual reality,
I was terrified.
[LAUGHTER]
DAVID MALAN: The blocks almost got you?
COLTON OGDEN: There was a cave in the distance.
And I've never been more scared to go and do anything.
And that's a testament to how powerful VR is.
And I can't wait to see--
I can't wait to get 3D movement with like those treadmill devices and VR
altogether.
DAVID MALAN: Yeah, that will be amazing.
COLTON OGDEN: That is going to be-- that is going to be cutting edge.
DAVID MALAN: Gaming of the future I do think
will be all the more immersive and escapist for sure.
COLTON OGDEN: Yeah, we've got to get some of that.
So takeaways then for today's episode, what would you recommend?
DAVID MALAN: Play Hitchhiker's Guide to the Galaxy.
If you Google this and type in emulator, you
can find the anniversary edition on the BBC's website, the British Broadcasting
Company, which has the simulator.
You might have to create--
actually, you do have to create an account on their website
if you want to be able to save your progress because I very
quickly realized, wow, you die constantly in the text-based adventure
by taking too long or by typing the wrong command.
So definitely go ahead and do that.
COLTON OGDEN: And play Minecraft.
DAVID MALAN: And play Minecraft.
So I think the takeaways there are, despite all of these dangers
and threats in the world to your privacy and security and the like,
there is plenty of ways to escape it, including this weekend.
COLTON OGDEN: And I guess, when trying to download software,
be mindful of the domains.
You know, find out for sure, if you're not 100% sure what product you're
downloading or buying, that you're at the right place for it
because it's so easy now, especially to your point of all these TLDs
that are now available.
Someone could easily trick you into thinking that you're
going to photoshop.info or what not.
And you're not getting Photoshop.
You're getting malware installed on your computer.
DAVID MALAN: Yeah, absolutely.
Do own photoshop.info?
Is that what's happening here?
COLTON OGDEN: I cannot confirm or deny.
[LAUGHTER]
DAVID MALAN: Well, maybe google Photoshop in order
to download Photoshop.
COLTON OGDEN: But, yeah, I think that's probably a huge thing.
DAVID MALAN: Awesome.
Well, thanks so much to everyone for tuning in.
And, by all means, chime in online if you'd
like to suggest some topics for future episodes.
We'd love to chat about those as well.
COLTON OGDEN: Indeed.
This is the CS50 Podcast, episode 4, zero indexed.
DAVID MALAN: Take care.
COLTON OGDEN: Bye bye.